From b154474a202e3f6f6193fc375ca7dbbcfdce02c6 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Fri, 15 Oct 2021 17:32:14 +0100 Subject: [PATCH 01/18] feat: progress on javascript action --- .github/workflows/test-action.yaml | 14 + .gitignore | 2 + Dockerfile | 7 - action.yml | 81 +- deps.txt | 3 + dist/index.js | 11564 ++++++++++++ entrypoint.sh | 38 +- package-lock.json | 542 + package.json | 32 + positive.tf | 21 + results.json | 27008 +++++++++++++++++++++++++++ src/commenter.js | 88 + src/install.js | 128 + src/main.js | 29 + src/scanner.js | 38 + 15 files changed, 39535 insertions(+), 60 deletions(-) create mode 100644 .github/workflows/test-action.yaml create mode 100644 .gitignore delete mode 100644 Dockerfile create mode 100644 deps.txt create mode 100644 dist/index.js create mode 100644 package-lock.json create mode 100644 package.json create mode 100644 positive.tf create mode 100644 results.json create mode 100644 src/commenter.js create mode 100644 src/install.js create mode 100644 src/main.js create mode 100644 src/scanner.js diff --git a/.github/workflows/test-action.yaml b/.github/workflows/test-action.yaml new file mode 100644 index 0000000..c4fb64d --- /dev/null +++ b/.github/workflows/test-action.yaml @@ -0,0 +1,14 @@ +name: Test + +on: + pull_request: + types: [opened] + +jobs: + test: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v2 + - uses: ./ + with: + path: positive.tf diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..55371e5 --- /dev/null +++ b/.gitignore @@ -0,0 +1,2 @@ +node_modules +.vscode \ No newline at end of file diff --git a/Dockerfile b/Dockerfile deleted file mode 100644 index 5795d6a..0000000 --- a/Dockerfile +++ /dev/null @@ -1,7 +0,0 @@ -FROM checkmarx/kics:v1.4.4-alpine - -COPY entrypoint.sh /entrypoint.sh - -RUN chmod +x /entrypoint.sh - -ENTRYPOINT ["/entrypoint.sh"] diff --git a/action.yml b/action.yml index bbabc77..e952ee6 100644 --- a/action.yml +++ b/action.yml @@ -1,27 +1,35 @@ # action.yml -name: 'KICS Github Action' -description: 'Run KICS scan against IaC projects' +name: "KICS Github Action" +description: "Run KICS scan against IaC projects" inputs: + kics_version: + required: false + default: "latest" + description: "KICS version to use (defaults to latest)" + enable_pr_comments: + required: false + default: false + description: "Enable PR comments" path: - description: 'paths to a file or directories to scan, accepts a comma separated list' + description: "paths to a file or directories to scan, accepts a comma separated list" required: true ignore_on_exit: - description: 'defines which non-zero exit codes should be ignored (all, results, errors, none)' + description: "defines which non-zero exit codes should be ignored (all, results, errors, none)" required: false fail_on: - description: 'comma separated list of which severities returns exit code !=0' + description: "comma separated list of which severities returns exit code !=0" required: false timeout: - description: 'number of seconds the query has to execute before being canceled' + description: "number of seconds the query has to execute before being canceled" required: false profiling: - description: 'turns on profiler that prints resource consumption in the logs during the execution (CPU, MEM)' + description: "turns on profiler that prints resource consumption in the logs during the execution (CPU, MEM)" required: false config_path: - description: 'path to configuration file' + description: "path to configuration file" required: false platform_type: - description: 'case insensitive list of platform types to scan' + description: "case insensitive list of platform types to scan" required: false exclude_paths: description: "exclude paths from scan, supports glob, quoted comma separated string example: './shouldNotScan/*,somefile.txt'" @@ -39,39 +47,44 @@ inputs: description: "formats in which the results report will be exported (json, sarif)" required: false output_path: - description: 'file path to store results report (json, sarif)' + description: "file path to store results report (json, sarif)" required: false payload_path: - description: 'file path to store source internal representation in JSON format' + description: "file path to store source internal representation in JSON format" required: false queries: description: 'path to directory with queries (default "./assets/queries")' required: false + secrets_regexes_path: + description: "path to secrets regex rules configuration file" + required: false + libraries_path: + description: "path to directory with libraries" + required: false + disable_full_descriptions: + description: "disable request for full descriptions and use default vulnerability descriptions" + required: false + disable_secrets: + description: "disable secrets detection" + required: false + type: + description: "case insensitive comma-separated list of platform types to scan (Ansible, AzureResourceManager, CloudFormation, Dockerfile, Kubernetes, OpenAPI, Terraform)" + required: false verbose: - description: 'verbose scan' + description: "verbose scan" + required: false + include_queries: + description: "comma separated list of queries ID's to include, cannot be provided with query exclusion flags" + required: false + bom: + description: "include bill of materials (BoM) in results output" + required: false outputs: results: - description: 'the result of KICS scan' + description: "the result of KICS scan" branding: - icon: 'shield' - color: 'green' + icon: "shield" + color: "green" runs: - using: 'docker' - image: 'Dockerfile' - args: - - ${{ inputs.path }} - - ${{ inputs.ignore_on_exit }} - - ${{ inputs.fail_on }} - - ${{ inputs.timeout }} - - ${{ inputs.profiling }} - - ${{ inputs.config }} - - ${{ inputs.platform_type }} - - ${{ inputs.exclude_paths }} - - ${{ inputs.exclude_queries }} - - ${{ inputs.exclude_categories }} - - ${{ inputs.exclude_results }} - - ${{ inputs.output_formats }} - - ${{ inputs.output_path }} - - ${{ inputs.payload_path }} - - ${{ inputs.queries }} - - ${{ inputs.verbose }} \ No newline at end of file + using: node12 + main: dist/index.js diff --git a/deps.txt b/deps.txt new file mode 100644 index 0000000..008478c --- /dev/null +++ b/deps.txt @@ -0,0 +1,3 @@ + "@fohlen/github-release-downloader": "^1.0.0", + "decompress": "^4.2.1", + "decompress-targz": "^4.1.1", \ No newline at end of file diff --git a/dist/index.js b/dist/index.js new file mode 100644 index 0000000..437bb63 --- /dev/null +++ b/dist/index.js @@ -0,0 +1,11564 @@ +/******/ (() => { // webpackBootstrap +/******/ var __webpack_modules__ = ({ + +/***/ 351: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.issue = exports.issueCommand = void 0; +const os = __importStar(__nccwpck_require__(87)); +const utils_1 = __nccwpck_require__(278); +/** + * Commands + * + * Command Format: + * ::name key=value,key=value::message + * + * Examples: + * ::warning::This is the message + * ::set-env name=MY_VAR::some value + */ +function issueCommand(command, properties, message) { + const cmd = new Command(command, properties, message); + process.stdout.write(cmd.toString() + os.EOL); +} +exports.issueCommand = issueCommand; +function issue(name, message = '') { + issueCommand(name, {}, message); +} +exports.issue = issue; +const CMD_STRING = '::'; +class Command { + constructor(command, properties, message) { + if (!command) { + command = 'missing.command'; + } + this.command = command; + this.properties = properties; + this.message = message; + } + toString() { + let cmdStr = CMD_STRING + this.command; + if (this.properties && Object.keys(this.properties).length > 0) { + cmdStr += ' '; + let first = true; + for (const key in this.properties) { + if (this.properties.hasOwnProperty(key)) { + const val = this.properties[key]; + if (val) { + if (first) { + first = false; + } + else { + cmdStr += ','; + } + cmdStr += `${key}=${escapeProperty(val)}`; + } + } + } + } + cmdStr += `${CMD_STRING}${escapeData(this.message)}`; + return cmdStr; + } +} +function escapeData(s) { + return utils_1.toCommandValue(s) + .replace(/%/g, '%25') + .replace(/\r/g, '%0D') + .replace(/\n/g, '%0A'); +} +function escapeProperty(s) { + return utils_1.toCommandValue(s) + .replace(/%/g, '%25') + .replace(/\r/g, '%0D') + .replace(/\n/g, '%0A') + .replace(/:/g, '%3A') + .replace(/,/g, '%2C'); +} +//# sourceMappingURL=command.js.map + +/***/ }), + +/***/ 186: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.getIDToken = exports.getState = exports.saveState = exports.group = exports.endGroup = exports.startGroup = exports.info = exports.notice = exports.warning = exports.error = exports.debug = exports.isDebug = exports.setFailed = exports.setCommandEcho = exports.setOutput = exports.getBooleanInput = exports.getMultilineInput = exports.getInput = exports.addPath = exports.setSecret = exports.exportVariable = exports.ExitCode = void 0; +const command_1 = __nccwpck_require__(351); +const file_command_1 = __nccwpck_require__(717); +const utils_1 = __nccwpck_require__(278); +const os = __importStar(__nccwpck_require__(87)); +const path = __importStar(__nccwpck_require__(622)); +const oidc_utils_1 = __nccwpck_require__(41); +/** + * The code to exit an action + */ +var ExitCode; +(function (ExitCode) { + /** + * A code indicating that the action was successful + */ + ExitCode[ExitCode["Success"] = 0] = "Success"; + /** + * A code indicating that the action was a failure + */ + ExitCode[ExitCode["Failure"] = 1] = "Failure"; +})(ExitCode = exports.ExitCode || (exports.ExitCode = {})); +//----------------------------------------------------------------------- +// Variables +//----------------------------------------------------------------------- +/** + * Sets env variable for this action and future actions in the job + * @param name the name of the variable to set + * @param val the value of the variable. Non-string values will be converted to a string via JSON.stringify + */ +// eslint-disable-next-line @typescript-eslint/no-explicit-any +function exportVariable(name, val) { + const convertedVal = utils_1.toCommandValue(val); + process.env[name] = convertedVal; + const filePath = process.env['GITHUB_ENV'] || ''; + if (filePath) { + const delimiter = '_GitHubActionsFileCommandDelimeter_'; + const commandValue = `${name}<<${delimiter}${os.EOL}${convertedVal}${os.EOL}${delimiter}`; + file_command_1.issueCommand('ENV', commandValue); + } + else { + command_1.issueCommand('set-env', { name }, convertedVal); + } +} +exports.exportVariable = exportVariable; +/** + * Registers a secret which will get masked from logs + * @param secret value of the secret + */ +function setSecret(secret) { + command_1.issueCommand('add-mask', {}, secret); +} +exports.setSecret = setSecret; +/** + * Prepends inputPath to the PATH (for this action and future actions) + * @param inputPath + */ +function addPath(inputPath) { + const filePath = process.env['GITHUB_PATH'] || ''; + if (filePath) { + file_command_1.issueCommand('PATH', inputPath); + } + else { + command_1.issueCommand('add-path', {}, inputPath); + } + process.env['PATH'] = `${inputPath}${path.delimiter}${process.env['PATH']}`; +} +exports.addPath = addPath; +/** + * Gets the value of an input. + * Unless trimWhitespace is set to false in InputOptions, the value is also trimmed. + * Returns an empty string if the value is not defined. + * + * @param name name of the input to get + * @param options optional. See InputOptions. + * @returns string + */ +function getInput(name, options) { + const val = process.env[`INPUT_${name.replace(/ /g, '_').toUpperCase()}`] || ''; + if (options && options.required && !val) { + throw new Error(`Input required and not supplied: ${name}`); + } + if (options && options.trimWhitespace === false) { + return val; + } + return val.trim(); +} +exports.getInput = getInput; +/** + * Gets the values of an multiline input. Each value is also trimmed. + * + * @param name name of the input to get + * @param options optional. See InputOptions. + * @returns string[] + * + */ +function getMultilineInput(name, options) { + const inputs = getInput(name, options) + .split('\n') + .filter(x => x !== ''); + return inputs; +} +exports.getMultilineInput = getMultilineInput; +/** + * Gets the input value of the boolean type in the YAML 1.2 "core schema" specification. + * Support boolean input list: `true | True | TRUE | false | False | FALSE` . + * The return value is also in boolean type. + * ref: https://yaml.org/spec/1.2/spec.html#id2804923 + * + * @param name name of the input to get + * @param options optional. See InputOptions. + * @returns boolean + */ +function getBooleanInput(name, options) { + const trueValue = ['true', 'True', 'TRUE']; + const falseValue = ['false', 'False', 'FALSE']; + const val = getInput(name, options); + if (trueValue.includes(val)) + return true; + if (falseValue.includes(val)) + return false; + throw new TypeError(`Input does not meet YAML 1.2 "Core Schema" specification: ${name}\n` + + `Support boolean input list: \`true | True | TRUE | false | False | FALSE\``); +} +exports.getBooleanInput = getBooleanInput; +/** + * Sets the value of an output. + * + * @param name name of the output to set + * @param value value to store. Non-string values will be converted to a string via JSON.stringify + */ +// eslint-disable-next-line @typescript-eslint/no-explicit-any +function setOutput(name, value) { + process.stdout.write(os.EOL); + command_1.issueCommand('set-output', { name }, value); +} +exports.setOutput = setOutput; +/** + * Enables or disables the echoing of commands into stdout for the rest of the step. + * Echoing is disabled by default if ACTIONS_STEP_DEBUG is not set. + * + */ +function setCommandEcho(enabled) { + command_1.issue('echo', enabled ? 'on' : 'off'); +} +exports.setCommandEcho = setCommandEcho; +//----------------------------------------------------------------------- +// Results +//----------------------------------------------------------------------- +/** + * Sets the action status to failed. + * When the action exits it will be with an exit code of 1 + * @param message add error issue message + */ +function setFailed(message) { + process.exitCode = ExitCode.Failure; + error(message); +} +exports.setFailed = setFailed; +//----------------------------------------------------------------------- +// Logging Commands +//----------------------------------------------------------------------- +/** + * Gets whether Actions Step Debug is on or not + */ +function isDebug() { + return process.env['RUNNER_DEBUG'] === '1'; +} +exports.isDebug = isDebug; +/** + * Writes debug message to user log + * @param message debug message + */ +function debug(message) { + command_1.issueCommand('debug', {}, message); +} +exports.debug = debug; +/** + * Adds an error issue + * @param message error issue message. Errors will be converted to string via toString() + * @param properties optional properties to add to the annotation. + */ +function error(message, properties = {}) { + command_1.issueCommand('error', utils_1.toCommandProperties(properties), message instanceof Error ? message.toString() : message); +} +exports.error = error; +/** + * Adds a warning issue + * @param message warning issue message. Errors will be converted to string via toString() + * @param properties optional properties to add to the annotation. + */ +function warning(message, properties = {}) { + command_1.issueCommand('warning', utils_1.toCommandProperties(properties), message instanceof Error ? message.toString() : message); +} +exports.warning = warning; +/** + * Adds a notice issue + * @param message notice issue message. Errors will be converted to string via toString() + * @param properties optional properties to add to the annotation. + */ +function notice(message, properties = {}) { + command_1.issueCommand('notice', utils_1.toCommandProperties(properties), message instanceof Error ? message.toString() : message); +} +exports.notice = notice; +/** + * Writes info to log with console.log. + * @param message info message + */ +function info(message) { + process.stdout.write(message + os.EOL); +} +exports.info = info; +/** + * Begin an output group. + * + * Output until the next `groupEnd` will be foldable in this group + * + * @param name The name of the output group + */ +function startGroup(name) { + command_1.issue('group', name); +} +exports.startGroup = startGroup; +/** + * End an output group. + */ +function endGroup() { + command_1.issue('endgroup'); +} +exports.endGroup = endGroup; +/** + * Wrap an asynchronous function call in a group. + * + * Returns the same type as the function itself. + * + * @param name The name of the group + * @param fn The function to wrap in the group + */ +function group(name, fn) { + return __awaiter(this, void 0, void 0, function* () { + startGroup(name); + let result; + try { + result = yield fn(); + } + finally { + endGroup(); + } + return result; + }); +} +exports.group = group; +//----------------------------------------------------------------------- +// Wrapper action state +//----------------------------------------------------------------------- +/** + * Saves state for current action, the state can only be retrieved by this action's post job execution. + * + * @param name name of the state to store + * @param value value to store. Non-string values will be converted to a string via JSON.stringify + */ +// eslint-disable-next-line @typescript-eslint/no-explicit-any +function saveState(name, value) { + command_1.issueCommand('save-state', { name }, value); +} +exports.saveState = saveState; +/** + * Gets the value of an state set by this action's main execution. + * + * @param name name of the state to get + * @returns string + */ +function getState(name) { + return process.env[`STATE_${name}`] || ''; +} +exports.getState = getState; +function getIDToken(aud) { + return __awaiter(this, void 0, void 0, function* () { + return yield oidc_utils_1.OidcClient.getIDToken(aud); + }); +} +exports.getIDToken = getIDToken; +//# sourceMappingURL=core.js.map + +/***/ }), + +/***/ 717: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +// For internal use, subject to change. +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.issueCommand = void 0; +// We use any as a valid input type +/* eslint-disable @typescript-eslint/no-explicit-any */ +const fs = __importStar(__nccwpck_require__(747)); +const os = __importStar(__nccwpck_require__(87)); +const utils_1 = __nccwpck_require__(278); +function issueCommand(command, message) { + const filePath = process.env[`GITHUB_${command}`]; + if (!filePath) { + throw new Error(`Unable to find environment variable for file command ${command}`); + } + if (!fs.existsSync(filePath)) { + throw new Error(`Missing file at path: ${filePath}`); + } + fs.appendFileSync(filePath, `${utils_1.toCommandValue(message)}${os.EOL}`, { + encoding: 'utf8' + }); +} +exports.issueCommand = issueCommand; +//# sourceMappingURL=file-command.js.map + +/***/ }), + +/***/ 41: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.OidcClient = void 0; +const http_client_1 = __nccwpck_require__(925); +const auth_1 = __nccwpck_require__(702); +const core_1 = __nccwpck_require__(186); +class OidcClient { + static createHttpClient(allowRetry = true, maxRetry = 10) { + const requestOptions = { + allowRetries: allowRetry, + maxRetries: maxRetry + }; + return new http_client_1.HttpClient('actions/oidc-client', [new auth_1.BearerCredentialHandler(OidcClient.getRequestToken())], requestOptions); + } + static getRequestToken() { + const token = process.env['ACTIONS_ID_TOKEN_REQUEST_TOKEN']; + if (!token) { + throw new Error('Unable to get ACTIONS_ID_TOKEN_REQUEST_TOKEN env variable'); + } + return token; + } + static getIDTokenUrl() { + const runtimeUrl = process.env['ACTIONS_ID_TOKEN_REQUEST_URL']; + if (!runtimeUrl) { + throw new Error('Unable to get ACTIONS_ID_TOKEN_REQUEST_URL env variable'); + } + return runtimeUrl; + } + static getCall(id_token_url) { + var _a; + return __awaiter(this, void 0, void 0, function* () { + const httpclient = OidcClient.createHttpClient(); + const res = yield httpclient + .getJson(id_token_url) + .catch(error => { + throw new Error(`Failed to get ID Token. \n + Error Code : ${error.statusCode}\n + Error Message: ${error.result.message}`); + }); + const id_token = (_a = res.result) === null || _a === void 0 ? void 0 : _a.value; + if (!id_token) { + throw new Error('Response json body do not have ID Token field'); + } + return id_token; + }); + } + static getIDToken(audience) { + return __awaiter(this, void 0, void 0, function* () { + try { + // New ID Token is requested from action service + let id_token_url = OidcClient.getIDTokenUrl(); + if (audience) { + const encodedAudience = encodeURIComponent(audience); + id_token_url = `${id_token_url}&audience=${encodedAudience}`; + } + core_1.debug(`ID token url is ${id_token_url}`); + const id_token = yield OidcClient.getCall(id_token_url); + core_1.setSecret(id_token); + return id_token; + } + catch (error) { + throw new Error(`Error message: ${error.message}`); + } + }); + } +} +exports.OidcClient = OidcClient; +//# sourceMappingURL=oidc-utils.js.map + +/***/ }), + +/***/ 278: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + +// We use any as a valid input type +/* eslint-disable @typescript-eslint/no-explicit-any */ +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.toCommandProperties = exports.toCommandValue = void 0; +/** + * Sanitizes an input into a string so it can be passed into issueCommand safely + * @param input input to sanitize into a string + */ +function toCommandValue(input) { + if (input === null || input === undefined) { + return ''; + } + else if (typeof input === 'string' || input instanceof String) { + return input; + } + return JSON.stringify(input); +} +exports.toCommandValue = toCommandValue; +/** + * + * @param annotationProperties + * @returns The command properties to send with the actual annotation command + * See IssueCommandProperties: https://github.com/actions/runner/blob/main/src/Runner.Worker/ActionCommandManager.cs#L646 + */ +function toCommandProperties(annotationProperties) { + if (!Object.keys(annotationProperties).length) { + return {}; + } + return { + title: annotationProperties.title, + file: annotationProperties.file, + line: annotationProperties.startLine, + endLine: annotationProperties.endLine, + col: annotationProperties.startColumn, + endColumn: annotationProperties.endColumn + }; +} +exports.toCommandProperties = toCommandProperties; +//# sourceMappingURL=utils.js.map + +/***/ }), + +/***/ 514: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.getExecOutput = exports.exec = void 0; +const string_decoder_1 = __nccwpck_require__(304); +const tr = __importStar(__nccwpck_require__(159)); +/** + * Exec a command. + * Output will be streamed to the live console. + * Returns promise with return code + * + * @param commandLine command to execute (can include additional args). Must be correctly escaped. + * @param args optional arguments for tool. Escaping is handled by the lib. + * @param options optional exec options. See ExecOptions + * @returns Promise exit code + */ +function exec(commandLine, args, options) { + return __awaiter(this, void 0, void 0, function* () { + const commandArgs = tr.argStringToArray(commandLine); + if (commandArgs.length === 0) { + throw new Error(`Parameter 'commandLine' cannot be null or empty.`); + } + // Path to tool to execute should be first arg + const toolPath = commandArgs[0]; + args = commandArgs.slice(1).concat(args || []); + const runner = new tr.ToolRunner(toolPath, args, options); + return runner.exec(); + }); +} +exports.exec = exec; +/** + * Exec a command and get the output. + * Output will be streamed to the live console. + * Returns promise with the exit code and collected stdout and stderr + * + * @param commandLine command to execute (can include additional args). Must be correctly escaped. + * @param args optional arguments for tool. Escaping is handled by the lib. + * @param options optional exec options. See ExecOptions + * @returns Promise exit code, stdout, and stderr + */ +function getExecOutput(commandLine, args, options) { + var _a, _b; + return __awaiter(this, void 0, void 0, function* () { + let stdout = ''; + let stderr = ''; + //Using string decoder covers the case where a mult-byte character is split + const stdoutDecoder = new string_decoder_1.StringDecoder('utf8'); + const stderrDecoder = new string_decoder_1.StringDecoder('utf8'); + const originalStdoutListener = (_a = options === null || options === void 0 ? void 0 : options.listeners) === null || _a === void 0 ? void 0 : _a.stdout; + const originalStdErrListener = (_b = options === null || options === void 0 ? void 0 : options.listeners) === null || _b === void 0 ? void 0 : _b.stderr; + const stdErrListener = (data) => { + stderr += stderrDecoder.write(data); + if (originalStdErrListener) { + originalStdErrListener(data); + } + }; + const stdOutListener = (data) => { + stdout += stdoutDecoder.write(data); + if (originalStdoutListener) { + originalStdoutListener(data); + } + }; + const listeners = Object.assign(Object.assign({}, options === null || options === void 0 ? void 0 : options.listeners), { stdout: stdOutListener, stderr: stdErrListener }); + const exitCode = yield exec(commandLine, args, Object.assign(Object.assign({}, options), { listeners })); + //flush any remaining characters + stdout += stdoutDecoder.end(); + stderr += stderrDecoder.end(); + return { + exitCode, + stdout, + stderr + }; + }); +} +exports.getExecOutput = getExecOutput; +//# sourceMappingURL=exec.js.map + +/***/ }), + +/***/ 159: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.argStringToArray = exports.ToolRunner = void 0; +const os = __importStar(__nccwpck_require__(87)); +const events = __importStar(__nccwpck_require__(614)); +const child = __importStar(__nccwpck_require__(129)); +const path = __importStar(__nccwpck_require__(622)); +const io = __importStar(__nccwpck_require__(436)); +const ioUtil = __importStar(__nccwpck_require__(962)); +const timers_1 = __nccwpck_require__(213); +/* eslint-disable @typescript-eslint/unbound-method */ +const IS_WINDOWS = process.platform === 'win32'; +/* + * Class for running command line tools. Handles quoting and arg parsing in a platform agnostic way. + */ +class ToolRunner extends events.EventEmitter { + constructor(toolPath, args, options) { + super(); + if (!toolPath) { + throw new Error("Parameter 'toolPath' cannot be null or empty."); + } + this.toolPath = toolPath; + this.args = args || []; + this.options = options || {}; + } + _debug(message) { + if (this.options.listeners && this.options.listeners.debug) { + this.options.listeners.debug(message); + } + } + _getCommandString(options, noPrefix) { + const toolPath = this._getSpawnFileName(); + const args = this._getSpawnArgs(options); + let cmd = noPrefix ? '' : '[command]'; // omit prefix when piped to a second tool + if (IS_WINDOWS) { + // Windows + cmd file + if (this._isCmdFile()) { + cmd += toolPath; + for (const a of args) { + cmd += ` ${a}`; + } + } + // Windows + verbatim + else if (options.windowsVerbatimArguments) { + cmd += `"${toolPath}"`; + for (const a of args) { + cmd += ` ${a}`; + } + } + // Windows (regular) + else { + cmd += this._windowsQuoteCmdArg(toolPath); + for (const a of args) { + cmd += ` ${this._windowsQuoteCmdArg(a)}`; + } + } + } + else { + // OSX/Linux - this can likely be improved with some form of quoting. + // creating processes on Unix is fundamentally different than Windows. + // on Unix, execvp() takes an arg array. + cmd += toolPath; + for (const a of args) { + cmd += ` ${a}`; + } + } + return cmd; + } + _processLineBuffer(data, strBuffer, onLine) { + try { + let s = strBuffer + data.toString(); + let n = s.indexOf(os.EOL); + while (n > -1) { + const line = s.substring(0, n); + onLine(line); + // the rest of the string ... + s = s.substring(n + os.EOL.length); + n = s.indexOf(os.EOL); + } + return s; + } + catch (err) { + // streaming lines to console is best effort. Don't fail a build. + this._debug(`error processing line. Failed with error ${err}`); + return ''; + } + } + _getSpawnFileName() { + if (IS_WINDOWS) { + if (this._isCmdFile()) { + return process.env['COMSPEC'] || 'cmd.exe'; + } + } + return this.toolPath; + } + _getSpawnArgs(options) { + if (IS_WINDOWS) { + if (this._isCmdFile()) { + let argline = `/D /S /C "${this._windowsQuoteCmdArg(this.toolPath)}`; + for (const a of this.args) { + argline += ' '; + argline += options.windowsVerbatimArguments + ? a + : this._windowsQuoteCmdArg(a); + } + argline += '"'; + return [argline]; + } + } + return this.args; + } + _endsWith(str, end) { + return str.endsWith(end); + } + _isCmdFile() { + const upperToolPath = this.toolPath.toUpperCase(); + return (this._endsWith(upperToolPath, '.CMD') || + this._endsWith(upperToolPath, '.BAT')); + } + _windowsQuoteCmdArg(arg) { + // for .exe, apply the normal quoting rules that libuv applies + if (!this._isCmdFile()) { + return this._uvQuoteCmdArg(arg); + } + // otherwise apply quoting rules specific to the cmd.exe command line parser. + // the libuv rules are generic and are not designed specifically for cmd.exe + // command line parser. + // + // for a detailed description of the cmd.exe command line parser, refer to + // http://stackoverflow.com/questions/4094699/how-does-the-windows-command-interpreter-cmd-exe-parse-scripts/7970912#7970912 + // need quotes for empty arg + if (!arg) { + return '""'; + } + // determine whether the arg needs to be quoted + const cmdSpecialChars = [ + ' ', + '\t', + '&', + '(', + ')', + '[', + ']', + '{', + '}', + '^', + '=', + ';', + '!', + "'", + '+', + ',', + '`', + '~', + '|', + '<', + '>', + '"' + ]; + let needsQuotes = false; + for (const char of arg) { + if (cmdSpecialChars.some(x => x === char)) { + needsQuotes = true; + break; + } + } + // short-circuit if quotes not needed + if (!needsQuotes) { + return arg; + } + // the following quoting rules are very similar to the rules that by libuv applies. + // + // 1) wrap the string in quotes + // + // 2) double-up quotes - i.e. " => "" + // + // this is different from the libuv quoting rules. libuv replaces " with \", which unfortunately + // doesn't work well with a cmd.exe command line. + // + // note, replacing " with "" also works well if the arg is passed to a downstream .NET console app. + // for example, the command line: + // foo.exe "myarg:""my val""" + // is parsed by a .NET console app into an arg array: + // [ "myarg:\"my val\"" ] + // which is the same end result when applying libuv quoting rules. although the actual + // command line from libuv quoting rules would look like: + // foo.exe "myarg:\"my val\"" + // + // 3) double-up slashes that precede a quote, + // e.g. hello \world => "hello \world" + // hello\"world => "hello\\""world" + // hello\\"world => "hello\\\\""world" + // hello world\ => "hello world\\" + // + // technically this is not required for a cmd.exe command line, or the batch argument parser. + // the reasons for including this as a .cmd quoting rule are: + // + // a) this is optimized for the scenario where the argument is passed from the .cmd file to an + // external program. many programs (e.g. .NET console apps) rely on the slash-doubling rule. + // + // b) it's what we've been doing previously (by deferring to node default behavior) and we + // haven't heard any complaints about that aspect. + // + // note, a weakness of the quoting rules chosen here, is that % is not escaped. in fact, % cannot be + // escaped when used on the command line directly - even though within a .cmd file % can be escaped + // by using %%. + // + // the saving grace is, on the command line, %var% is left as-is if var is not defined. this contrasts + // the line parsing rules within a .cmd file, where if var is not defined it is replaced with nothing. + // + // one option that was explored was replacing % with ^% - i.e. %var% => ^%var^%. this hack would + // often work, since it is unlikely that var^ would exist, and the ^ character is removed when the + // variable is used. the problem, however, is that ^ is not removed when %* is used to pass the args + // to an external program. + // + // an unexplored potential solution for the % escaping problem, is to create a wrapper .cmd file. + // % can be escaped within a .cmd file. + let reverse = '"'; + let quoteHit = true; + for (let i = arg.length; i > 0; i--) { + // walk the string in reverse + reverse += arg[i - 1]; + if (quoteHit && arg[i - 1] === '\\') { + reverse += '\\'; // double the slash + } + else if (arg[i - 1] === '"') { + quoteHit = true; + reverse += '"'; // double the quote + } + else { + quoteHit = false; + } + } + reverse += '"'; + return reverse + .split('') + .reverse() + .join(''); + } + _uvQuoteCmdArg(arg) { + // Tool runner wraps child_process.spawn() and needs to apply the same quoting as + // Node in certain cases where the undocumented spawn option windowsVerbatimArguments + // is used. + // + // Since this function is a port of quote_cmd_arg from Node 4.x (technically, lib UV, + // see https://github.com/nodejs/node/blob/v4.x/deps/uv/src/win/process.c for details), + // pasting copyright notice from Node within this function: + // + // Copyright Joyent, Inc. and other Node contributors. All rights reserved. + // + // Permission is hereby granted, free of charge, to any person obtaining a copy + // of this software and associated documentation files (the "Software"), to + // deal in the Software without restriction, including without limitation the + // rights to use, copy, modify, merge, publish, distribute, sublicense, and/or + // sell copies of the Software, and to permit persons to whom the Software is + // furnished to do so, subject to the following conditions: + // + // The above copyright notice and this permission notice shall be included in + // all copies or substantial portions of the Software. + // + // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER + // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING + // FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS + // IN THE SOFTWARE. + if (!arg) { + // Need double quotation for empty argument + return '""'; + } + if (!arg.includes(' ') && !arg.includes('\t') && !arg.includes('"')) { + // No quotation needed + return arg; + } + if (!arg.includes('"') && !arg.includes('\\')) { + // No embedded double quotes or backslashes, so I can just wrap + // quote marks around the whole thing. + return `"${arg}"`; + } + // Expected input/output: + // input : hello"world + // output: "hello\"world" + // input : hello""world + // output: "hello\"\"world" + // input : hello\world + // output: hello\world + // input : hello\\world + // output: hello\\world + // input : hello\"world + // output: "hello\\\"world" + // input : hello\\"world + // output: "hello\\\\\"world" + // input : hello world\ + // output: "hello world\\" - note the comment in libuv actually reads "hello world\" + // but it appears the comment is wrong, it should be "hello world\\" + let reverse = '"'; + let quoteHit = true; + for (let i = arg.length; i > 0; i--) { + // walk the string in reverse + reverse += arg[i - 1]; + if (quoteHit && arg[i - 1] === '\\') { + reverse += '\\'; + } + else if (arg[i - 1] === '"') { + quoteHit = true; + reverse += '\\'; + } + else { + quoteHit = false; + } + } + reverse += '"'; + return reverse + .split('') + .reverse() + .join(''); + } + _cloneExecOptions(options) { + options = options || {}; + const result = { + cwd: options.cwd || process.cwd(), + env: options.env || process.env, + silent: options.silent || false, + windowsVerbatimArguments: options.windowsVerbatimArguments || false, + failOnStdErr: options.failOnStdErr || false, + ignoreReturnCode: options.ignoreReturnCode || false, + delay: options.delay || 10000 + }; + result.outStream = options.outStream || process.stdout; + result.errStream = options.errStream || process.stderr; + return result; + } + _getSpawnOptions(options, toolPath) { + options = options || {}; + const result = {}; + result.cwd = options.cwd; + result.env = options.env; + result['windowsVerbatimArguments'] = + options.windowsVerbatimArguments || this._isCmdFile(); + if (options.windowsVerbatimArguments) { + result.argv0 = `"${toolPath}"`; + } + return result; + } + /** + * Exec a tool. + * Output will be streamed to the live console. + * Returns promise with return code + * + * @param tool path to tool to exec + * @param options optional exec options. See ExecOptions + * @returns number + */ + exec() { + return __awaiter(this, void 0, void 0, function* () { + // root the tool path if it is unrooted and contains relative pathing + if (!ioUtil.isRooted(this.toolPath) && + (this.toolPath.includes('/') || + (IS_WINDOWS && this.toolPath.includes('\\')))) { + // prefer options.cwd if it is specified, however options.cwd may also need to be rooted + this.toolPath = path.resolve(process.cwd(), this.options.cwd || process.cwd(), this.toolPath); + } + // if the tool is only a file name, then resolve it from the PATH + // otherwise verify it exists (add extension on Windows if necessary) + this.toolPath = yield io.which(this.toolPath, true); + return new Promise((resolve, reject) => __awaiter(this, void 0, void 0, function* () { + this._debug(`exec tool: ${this.toolPath}`); + this._debug('arguments:'); + for (const arg of this.args) { + this._debug(` ${arg}`); + } + const optionsNonNull = this._cloneExecOptions(this.options); + if (!optionsNonNull.silent && optionsNonNull.outStream) { + optionsNonNull.outStream.write(this._getCommandString(optionsNonNull) + os.EOL); + } + const state = new ExecState(optionsNonNull, this.toolPath); + state.on('debug', (message) => { + this._debug(message); + }); + if (this.options.cwd && !(yield ioUtil.exists(this.options.cwd))) { + return reject(new Error(`The cwd: ${this.options.cwd} does not exist!`)); + } + const fileName = this._getSpawnFileName(); + const cp = child.spawn(fileName, this._getSpawnArgs(optionsNonNull), this._getSpawnOptions(this.options, fileName)); + let stdbuffer = ''; + if (cp.stdout) { + cp.stdout.on('data', (data) => { + if (this.options.listeners && this.options.listeners.stdout) { + this.options.listeners.stdout(data); + } + if (!optionsNonNull.silent && optionsNonNull.outStream) { + optionsNonNull.outStream.write(data); + } + stdbuffer = this._processLineBuffer(data, stdbuffer, (line) => { + if (this.options.listeners && this.options.listeners.stdline) { + this.options.listeners.stdline(line); + } + }); + }); + } + let errbuffer = ''; + if (cp.stderr) { + cp.stderr.on('data', (data) => { + state.processStderr = true; + if (this.options.listeners && this.options.listeners.stderr) { + this.options.listeners.stderr(data); + } + if (!optionsNonNull.silent && + optionsNonNull.errStream && + optionsNonNull.outStream) { + const s = optionsNonNull.failOnStdErr + ? optionsNonNull.errStream + : optionsNonNull.outStream; + s.write(data); + } + errbuffer = this._processLineBuffer(data, errbuffer, (line) => { + if (this.options.listeners && this.options.listeners.errline) { + this.options.listeners.errline(line); + } + }); + }); + } + cp.on('error', (err) => { + state.processError = err.message; + state.processExited = true; + state.processClosed = true; + state.CheckComplete(); + }); + cp.on('exit', (code) => { + state.processExitCode = code; + state.processExited = true; + this._debug(`Exit code ${code} received from tool '${this.toolPath}'`); + state.CheckComplete(); + }); + cp.on('close', (code) => { + state.processExitCode = code; + state.processExited = true; + state.processClosed = true; + this._debug(`STDIO streams have closed for tool '${this.toolPath}'`); + state.CheckComplete(); + }); + state.on('done', (error, exitCode) => { + if (stdbuffer.length > 0) { + this.emit('stdline', stdbuffer); + } + if (errbuffer.length > 0) { + this.emit('errline', errbuffer); + } + cp.removeAllListeners(); + if (error) { + reject(error); + } + else { + resolve(exitCode); + } + }); + if (this.options.input) { + if (!cp.stdin) { + throw new Error('child process missing stdin'); + } + cp.stdin.end(this.options.input); + } + })); + }); + } +} +exports.ToolRunner = ToolRunner; +/** + * Convert an arg string to an array of args. Handles escaping + * + * @param argString string of arguments + * @returns string[] array of arguments + */ +function argStringToArray(argString) { + const args = []; + let inQuotes = false; + let escaped = false; + let arg = ''; + function append(c) { + // we only escape double quotes. + if (escaped && c !== '"') { + arg += '\\'; + } + arg += c; + escaped = false; + } + for (let i = 0; i < argString.length; i++) { + const c = argString.charAt(i); + if (c === '"') { + if (!escaped) { + inQuotes = !inQuotes; + } + else { + append(c); + } + continue; + } + if (c === '\\' && escaped) { + append(c); + continue; + } + if (c === '\\' && inQuotes) { + escaped = true; + continue; + } + if (c === ' ' && !inQuotes) { + if (arg.length > 0) { + args.push(arg); + arg = ''; + } + continue; + } + append(c); + } + if (arg.length > 0) { + args.push(arg.trim()); + } + return args; +} +exports.argStringToArray = argStringToArray; +class ExecState extends events.EventEmitter { + constructor(options, toolPath) { + super(); + this.processClosed = false; // tracks whether the process has exited and stdio is closed + this.processError = ''; + this.processExitCode = 0; + this.processExited = false; // tracks whether the process has exited + this.processStderr = false; // tracks whether stderr was written to + this.delay = 10000; // 10 seconds + this.done = false; + this.timeout = null; + if (!toolPath) { + throw new Error('toolPath must not be empty'); + } + this.options = options; + this.toolPath = toolPath; + if (options.delay) { + this.delay = options.delay; + } + } + CheckComplete() { + if (this.done) { + return; + } + if (this.processClosed) { + this._setResult(); + } + else if (this.processExited) { + this.timeout = timers_1.setTimeout(ExecState.HandleTimeout, this.delay, this); + } + } + _debug(message) { + this.emit('debug', message); + } + _setResult() { + // determine whether there is an error + let error; + if (this.processExited) { + if (this.processError) { + error = new Error(`There was an error when attempting to execute the process '${this.toolPath}'. This may indicate the process failed to start. Error: ${this.processError}`); + } + else if (this.processExitCode !== 0 && !this.options.ignoreReturnCode) { + error = new Error(`The process '${this.toolPath}' failed with exit code ${this.processExitCode}`); + } + else if (this.processStderr && this.options.failOnStdErr) { + error = new Error(`The process '${this.toolPath}' failed because one or more lines were written to the STDERR stream`); + } + } + // clear the timeout + if (this.timeout) { + clearTimeout(this.timeout); + this.timeout = null; + } + this.done = true; + this.emit('done', error, this.processExitCode); + } + static HandleTimeout(state) { + if (state.done) { + return; + } + if (!state.processClosed && state.processExited) { + const message = `The STDIO streams did not close within ${state.delay / + 1000} seconds of the exit event from process '${state.toolPath}'. This may indicate a child process inherited the STDIO streams and has not yet exited.`; + state._debug(message); + } + state._setResult(); + } +} +//# sourceMappingURL=toolrunner.js.map + +/***/ }), + +/***/ 702: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + +Object.defineProperty(exports, "__esModule", ({ value: true })); +class BasicCredentialHandler { + constructor(username, password) { + this.username = username; + this.password = password; + } + prepareRequest(options) { + options.headers['Authorization'] = + 'Basic ' + + Buffer.from(this.username + ':' + this.password).toString('base64'); + } + // This handler cannot handle 401 + canHandleAuthentication(response) { + return false; + } + handleAuthentication(httpClient, requestInfo, objs) { + return null; + } +} +exports.BasicCredentialHandler = BasicCredentialHandler; +class BearerCredentialHandler { + constructor(token) { + this.token = token; + } + // currently implements pre-authorization + // TODO: support preAuth = false where it hooks on 401 + prepareRequest(options) { + options.headers['Authorization'] = 'Bearer ' + this.token; + } + // This handler cannot handle 401 + canHandleAuthentication(response) { + return false; + } + handleAuthentication(httpClient, requestInfo, objs) { + return null; + } +} +exports.BearerCredentialHandler = BearerCredentialHandler; +class PersonalAccessTokenCredentialHandler { + constructor(token) { + this.token = token; + } + // currently implements pre-authorization + // TODO: support preAuth = false where it hooks on 401 + prepareRequest(options) { + options.headers['Authorization'] = + 'Basic ' + Buffer.from('PAT:' + this.token).toString('base64'); + } + // This handler cannot handle 401 + canHandleAuthentication(response) { + return false; + } + handleAuthentication(httpClient, requestInfo, objs) { + return null; + } +} +exports.PersonalAccessTokenCredentialHandler = PersonalAccessTokenCredentialHandler; + + +/***/ }), + +/***/ 925: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + +Object.defineProperty(exports, "__esModule", ({ value: true })); +const http = __nccwpck_require__(605); +const https = __nccwpck_require__(211); +const pm = __nccwpck_require__(443); +let tunnel; +var HttpCodes; +(function (HttpCodes) { + HttpCodes[HttpCodes["OK"] = 200] = "OK"; + HttpCodes[HttpCodes["MultipleChoices"] = 300] = "MultipleChoices"; + HttpCodes[HttpCodes["MovedPermanently"] = 301] = "MovedPermanently"; + HttpCodes[HttpCodes["ResourceMoved"] = 302] = "ResourceMoved"; + HttpCodes[HttpCodes["SeeOther"] = 303] = "SeeOther"; + HttpCodes[HttpCodes["NotModified"] = 304] = "NotModified"; + HttpCodes[HttpCodes["UseProxy"] = 305] = "UseProxy"; + HttpCodes[HttpCodes["SwitchProxy"] = 306] = "SwitchProxy"; + HttpCodes[HttpCodes["TemporaryRedirect"] = 307] = "TemporaryRedirect"; + HttpCodes[HttpCodes["PermanentRedirect"] = 308] = "PermanentRedirect"; + HttpCodes[HttpCodes["BadRequest"] = 400] = "BadRequest"; + HttpCodes[HttpCodes["Unauthorized"] = 401] = "Unauthorized"; + HttpCodes[HttpCodes["PaymentRequired"] = 402] = "PaymentRequired"; + HttpCodes[HttpCodes["Forbidden"] = 403] = "Forbidden"; + HttpCodes[HttpCodes["NotFound"] = 404] = "NotFound"; + HttpCodes[HttpCodes["MethodNotAllowed"] = 405] = "MethodNotAllowed"; + HttpCodes[HttpCodes["NotAcceptable"] = 406] = "NotAcceptable"; + HttpCodes[HttpCodes["ProxyAuthenticationRequired"] = 407] = "ProxyAuthenticationRequired"; + HttpCodes[HttpCodes["RequestTimeout"] = 408] = "RequestTimeout"; + HttpCodes[HttpCodes["Conflict"] = 409] = "Conflict"; + HttpCodes[HttpCodes["Gone"] = 410] = "Gone"; + HttpCodes[HttpCodes["TooManyRequests"] = 429] = "TooManyRequests"; + HttpCodes[HttpCodes["InternalServerError"] = 500] = "InternalServerError"; + HttpCodes[HttpCodes["NotImplemented"] = 501] = "NotImplemented"; + HttpCodes[HttpCodes["BadGateway"] = 502] = "BadGateway"; + HttpCodes[HttpCodes["ServiceUnavailable"] = 503] = "ServiceUnavailable"; + HttpCodes[HttpCodes["GatewayTimeout"] = 504] = "GatewayTimeout"; +})(HttpCodes = exports.HttpCodes || (exports.HttpCodes = {})); +var Headers; +(function (Headers) { + Headers["Accept"] = "accept"; + Headers["ContentType"] = "content-type"; +})(Headers = exports.Headers || (exports.Headers = {})); +var MediaTypes; +(function (MediaTypes) { + MediaTypes["ApplicationJson"] = "application/json"; +})(MediaTypes = exports.MediaTypes || (exports.MediaTypes = {})); +/** + * Returns the proxy URL, depending upon the supplied url and proxy environment variables. + * @param serverUrl The server URL where the request will be sent. For example, https://api.github.com + */ +function getProxyUrl(serverUrl) { + let proxyUrl = pm.getProxyUrl(new URL(serverUrl)); + return proxyUrl ? proxyUrl.href : ''; +} +exports.getProxyUrl = getProxyUrl; +const HttpRedirectCodes = [ + HttpCodes.MovedPermanently, + HttpCodes.ResourceMoved, + HttpCodes.SeeOther, + HttpCodes.TemporaryRedirect, + HttpCodes.PermanentRedirect +]; +const HttpResponseRetryCodes = [ + HttpCodes.BadGateway, + HttpCodes.ServiceUnavailable, + HttpCodes.GatewayTimeout +]; +const RetryableHttpVerbs = ['OPTIONS', 'GET', 'DELETE', 'HEAD']; +const ExponentialBackoffCeiling = 10; +const ExponentialBackoffTimeSlice = 5; +class HttpClientError extends Error { + constructor(message, statusCode) { + super(message); + this.name = 'HttpClientError'; + this.statusCode = statusCode; + Object.setPrototypeOf(this, HttpClientError.prototype); + } +} +exports.HttpClientError = HttpClientError; +class HttpClientResponse { + constructor(message) { + this.message = message; + } + readBody() { + return new Promise(async (resolve, reject) => { + let output = Buffer.alloc(0); + this.message.on('data', (chunk) => { + output = Buffer.concat([output, chunk]); + }); + this.message.on('end', () => { + resolve(output.toString()); + }); + }); + } +} +exports.HttpClientResponse = HttpClientResponse; +function isHttps(requestUrl) { + let parsedUrl = new URL(requestUrl); + return parsedUrl.protocol === 'https:'; +} +exports.isHttps = isHttps; +class HttpClient { + constructor(userAgent, handlers, requestOptions) { + this._ignoreSslError = false; + this._allowRedirects = true; + this._allowRedirectDowngrade = false; + this._maxRedirects = 50; + this._allowRetries = false; + this._maxRetries = 1; + this._keepAlive = false; + this._disposed = false; + this.userAgent = userAgent; + this.handlers = handlers || []; + this.requestOptions = requestOptions; + if (requestOptions) { + if (requestOptions.ignoreSslError != null) { + this._ignoreSslError = requestOptions.ignoreSslError; + } + this._socketTimeout = requestOptions.socketTimeout; + if (requestOptions.allowRedirects != null) { + this._allowRedirects = requestOptions.allowRedirects; + } + if (requestOptions.allowRedirectDowngrade != null) { + this._allowRedirectDowngrade = requestOptions.allowRedirectDowngrade; + } + if (requestOptions.maxRedirects != null) { + this._maxRedirects = Math.max(requestOptions.maxRedirects, 0); + } + if (requestOptions.keepAlive != null) { + this._keepAlive = requestOptions.keepAlive; + } + if (requestOptions.allowRetries != null) { + this._allowRetries = requestOptions.allowRetries; + } + if (requestOptions.maxRetries != null) { + this._maxRetries = requestOptions.maxRetries; + } + } + } + options(requestUrl, additionalHeaders) { + return this.request('OPTIONS', requestUrl, null, additionalHeaders || {}); + } + get(requestUrl, additionalHeaders) { + return this.request('GET', requestUrl, null, additionalHeaders || {}); + } + del(requestUrl, additionalHeaders) { + return this.request('DELETE', requestUrl, null, additionalHeaders || {}); + } + post(requestUrl, data, additionalHeaders) { + return this.request('POST', requestUrl, data, additionalHeaders || {}); + } + patch(requestUrl, data, additionalHeaders) { + return this.request('PATCH', requestUrl, data, additionalHeaders || {}); + } + put(requestUrl, data, additionalHeaders) { + return this.request('PUT', requestUrl, data, additionalHeaders || {}); + } + head(requestUrl, additionalHeaders) { + return this.request('HEAD', requestUrl, null, additionalHeaders || {}); + } + sendStream(verb, requestUrl, stream, additionalHeaders) { + return this.request(verb, requestUrl, stream, additionalHeaders); + } + /** + * Gets a typed object from an endpoint + * Be aware that not found returns a null. Other errors (4xx, 5xx) reject the promise + */ + async getJson(requestUrl, additionalHeaders = {}) { + additionalHeaders[Headers.Accept] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.Accept, MediaTypes.ApplicationJson); + let res = await this.get(requestUrl, additionalHeaders); + return this._processResponse(res, this.requestOptions); + } + async postJson(requestUrl, obj, additionalHeaders = {}) { + let data = JSON.stringify(obj, null, 2); + additionalHeaders[Headers.Accept] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.Accept, MediaTypes.ApplicationJson); + additionalHeaders[Headers.ContentType] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.ContentType, MediaTypes.ApplicationJson); + let res = await this.post(requestUrl, data, additionalHeaders); + return this._processResponse(res, this.requestOptions); + } + async putJson(requestUrl, obj, additionalHeaders = {}) { + let data = JSON.stringify(obj, null, 2); + additionalHeaders[Headers.Accept] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.Accept, MediaTypes.ApplicationJson); + additionalHeaders[Headers.ContentType] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.ContentType, MediaTypes.ApplicationJson); + let res = await this.put(requestUrl, data, additionalHeaders); + return this._processResponse(res, this.requestOptions); + } + async patchJson(requestUrl, obj, additionalHeaders = {}) { + let data = JSON.stringify(obj, null, 2); + additionalHeaders[Headers.Accept] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.Accept, MediaTypes.ApplicationJson); + additionalHeaders[Headers.ContentType] = this._getExistingOrDefaultHeader(additionalHeaders, Headers.ContentType, MediaTypes.ApplicationJson); + let res = await this.patch(requestUrl, data, additionalHeaders); + return this._processResponse(res, this.requestOptions); + } + /** + * Makes a raw http request. + * All other methods such as get, post, patch, and request ultimately call this. + * Prefer get, del, post and patch + */ + async request(verb, requestUrl, data, headers) { + if (this._disposed) { + throw new Error('Client has already been disposed.'); + } + let parsedUrl = new URL(requestUrl); + let info = this._prepareRequest(verb, parsedUrl, headers); + // Only perform retries on reads since writes may not be idempotent. + let maxTries = this._allowRetries && RetryableHttpVerbs.indexOf(verb) != -1 + ? this._maxRetries + 1 + : 1; + let numTries = 0; + let response; + while (numTries < maxTries) { + response = await this.requestRaw(info, data); + // Check if it's an authentication challenge + if (response && + response.message && + response.message.statusCode === HttpCodes.Unauthorized) { + let authenticationHandler; + for (let i = 0; i < this.handlers.length; i++) { + if (this.handlers[i].canHandleAuthentication(response)) { + authenticationHandler = this.handlers[i]; + break; + } + } + if (authenticationHandler) { + return authenticationHandler.handleAuthentication(this, info, data); + } + else { + // We have received an unauthorized response but have no handlers to handle it. + // Let the response return to the caller. + return response; + } + } + let redirectsRemaining = this._maxRedirects; + while (HttpRedirectCodes.indexOf(response.message.statusCode) != -1 && + this._allowRedirects && + redirectsRemaining > 0) { + const redirectUrl = response.message.headers['location']; + if (!redirectUrl) { + // if there's no location to redirect to, we won't + break; + } + let parsedRedirectUrl = new URL(redirectUrl); + if (parsedUrl.protocol == 'https:' && + parsedUrl.protocol != parsedRedirectUrl.protocol && + !this._allowRedirectDowngrade) { + throw new Error('Redirect from HTTPS to HTTP protocol. This downgrade is not allowed for security reasons. If you want to allow this behavior, set the allowRedirectDowngrade option to true.'); + } + // we need to finish reading the response before reassigning response + // which will leak the open socket. + await response.readBody(); + // strip authorization header if redirected to a different hostname + if (parsedRedirectUrl.hostname !== parsedUrl.hostname) { + for (let header in headers) { + // header names are case insensitive + if (header.toLowerCase() === 'authorization') { + delete headers[header]; + } + } + } + // let's make the request with the new redirectUrl + info = this._prepareRequest(verb, parsedRedirectUrl, headers); + response = await this.requestRaw(info, data); + redirectsRemaining--; + } + if (HttpResponseRetryCodes.indexOf(response.message.statusCode) == -1) { + // If not a retry code, return immediately instead of retrying + return response; + } + numTries += 1; + if (numTries < maxTries) { + await response.readBody(); + await this._performExponentialBackoff(numTries); + } + } + return response; + } + /** + * Needs to be called if keepAlive is set to true in request options. + */ + dispose() { + if (this._agent) { + this._agent.destroy(); + } + this._disposed = true; + } + /** + * Raw request. + * @param info + * @param data + */ + requestRaw(info, data) { + return new Promise((resolve, reject) => { + let callbackForResult = function (err, res) { + if (err) { + reject(err); + } + resolve(res); + }; + this.requestRawWithCallback(info, data, callbackForResult); + }); + } + /** + * Raw request with callback. + * @param info + * @param data + * @param onResult + */ + requestRawWithCallback(info, data, onResult) { + let socket; + if (typeof data === 'string') { + info.options.headers['Content-Length'] = Buffer.byteLength(data, 'utf8'); + } + let callbackCalled = false; + let handleResult = (err, res) => { + if (!callbackCalled) { + callbackCalled = true; + onResult(err, res); + } + }; + let req = info.httpModule.request(info.options, (msg) => { + let res = new HttpClientResponse(msg); + handleResult(null, res); + }); + req.on('socket', sock => { + socket = sock; + }); + // If we ever get disconnected, we want the socket to timeout eventually + req.setTimeout(this._socketTimeout || 3 * 60000, () => { + if (socket) { + socket.end(); + } + handleResult(new Error('Request timeout: ' + info.options.path), null); + }); + req.on('error', function (err) { + // err has statusCode property + // res should have headers + handleResult(err, null); + }); + if (data && typeof data === 'string') { + req.write(data, 'utf8'); + } + if (data && typeof data !== 'string') { + data.on('close', function () { + req.end(); + }); + data.pipe(req); + } + else { + req.end(); + } + } + /** + * Gets an http agent. This function is useful when you need an http agent that handles + * routing through a proxy server - depending upon the url and proxy environment variables. + * @param serverUrl The server URL where the request will be sent. For example, https://api.github.com + */ + getAgent(serverUrl) { + let parsedUrl = new URL(serverUrl); + return this._getAgent(parsedUrl); + } + _prepareRequest(method, requestUrl, headers) { + const info = {}; + info.parsedUrl = requestUrl; + const usingSsl = info.parsedUrl.protocol === 'https:'; + info.httpModule = usingSsl ? https : http; + const defaultPort = usingSsl ? 443 : 80; + info.options = {}; + info.options.host = info.parsedUrl.hostname; + info.options.port = info.parsedUrl.port + ? parseInt(info.parsedUrl.port) + : defaultPort; + info.options.path = + (info.parsedUrl.pathname || '') + (info.parsedUrl.search || ''); + info.options.method = method; + info.options.headers = this._mergeHeaders(headers); + if (this.userAgent != null) { + info.options.headers['user-agent'] = this.userAgent; + } + info.options.agent = this._getAgent(info.parsedUrl); + // gives handlers an opportunity to participate + if (this.handlers) { + this.handlers.forEach(handler => { + handler.prepareRequest(info.options); + }); + } + return info; + } + _mergeHeaders(headers) { + const lowercaseKeys = obj => Object.keys(obj).reduce((c, k) => ((c[k.toLowerCase()] = obj[k]), c), {}); + if (this.requestOptions && this.requestOptions.headers) { + return Object.assign({}, lowercaseKeys(this.requestOptions.headers), lowercaseKeys(headers)); + } + return lowercaseKeys(headers || {}); + } + _getExistingOrDefaultHeader(additionalHeaders, header, _default) { + const lowercaseKeys = obj => Object.keys(obj).reduce((c, k) => ((c[k.toLowerCase()] = obj[k]), c), {}); + let clientHeader; + if (this.requestOptions && this.requestOptions.headers) { + clientHeader = lowercaseKeys(this.requestOptions.headers)[header]; + } + return additionalHeaders[header] || clientHeader || _default; + } + _getAgent(parsedUrl) { + let agent; + let proxyUrl = pm.getProxyUrl(parsedUrl); + let useProxy = proxyUrl && proxyUrl.hostname; + if (this._keepAlive && useProxy) { + agent = this._proxyAgent; + } + if (this._keepAlive && !useProxy) { + agent = this._agent; + } + // if agent is already assigned use that agent. + if (!!agent) { + return agent; + } + const usingSsl = parsedUrl.protocol === 'https:'; + let maxSockets = 100; + if (!!this.requestOptions) { + maxSockets = this.requestOptions.maxSockets || http.globalAgent.maxSockets; + } + if (useProxy) { + // If using proxy, need tunnel + if (!tunnel) { + tunnel = __nccwpck_require__(294); + } + const agentOptions = { + maxSockets: maxSockets, + keepAlive: this._keepAlive, + proxy: { + ...((proxyUrl.username || proxyUrl.password) && { + proxyAuth: `${proxyUrl.username}:${proxyUrl.password}` + }), + host: proxyUrl.hostname, + port: proxyUrl.port + } + }; + let tunnelAgent; + const overHttps = proxyUrl.protocol === 'https:'; + if (usingSsl) { + tunnelAgent = overHttps ? tunnel.httpsOverHttps : tunnel.httpsOverHttp; + } + else { + tunnelAgent = overHttps ? tunnel.httpOverHttps : tunnel.httpOverHttp; + } + agent = tunnelAgent(agentOptions); + this._proxyAgent = agent; + } + // if reusing agent across request and tunneling agent isn't assigned create a new agent + if (this._keepAlive && !agent) { + const options = { keepAlive: this._keepAlive, maxSockets: maxSockets }; + agent = usingSsl ? new https.Agent(options) : new http.Agent(options); + this._agent = agent; + } + // if not using private agent and tunnel agent isn't setup then use global agent + if (!agent) { + agent = usingSsl ? https.globalAgent : http.globalAgent; + } + if (usingSsl && this._ignoreSslError) { + // we don't want to set NODE_TLS_REJECT_UNAUTHORIZED=0 since that will affect request for entire process + // http.RequestOptions doesn't expose a way to modify RequestOptions.agent.options + // we have to cast it to any and change it directly + agent.options = Object.assign(agent.options || {}, { + rejectUnauthorized: false + }); + } + return agent; + } + _performExponentialBackoff(retryNumber) { + retryNumber = Math.min(ExponentialBackoffCeiling, retryNumber); + const ms = ExponentialBackoffTimeSlice * Math.pow(2, retryNumber); + return new Promise(resolve => setTimeout(() => resolve(), ms)); + } + static dateTimeDeserializer(key, value) { + if (typeof value === 'string') { + let a = new Date(value); + if (!isNaN(a.valueOf())) { + return a; + } + } + return value; + } + async _processResponse(res, options) { + return new Promise(async (resolve, reject) => { + const statusCode = res.message.statusCode; + const response = { + statusCode: statusCode, + result: null, + headers: {} + }; + // not found leads to null obj returned + if (statusCode == HttpCodes.NotFound) { + resolve(response); + } + let obj; + let contents; + // get the result from the body + try { + contents = await res.readBody(); + if (contents && contents.length > 0) { + if (options && options.deserializeDates) { + obj = JSON.parse(contents, HttpClient.dateTimeDeserializer); + } + else { + obj = JSON.parse(contents); + } + response.result = obj; + } + response.headers = res.message.headers; + } + catch (err) { + // Invalid resource (contents not json); leaving result obj null + } + // note that 3xx redirects are handled by the http layer. + if (statusCode > 299) { + let msg; + // if exception/error in body, attempt to get better error + if (obj && obj.message) { + msg = obj.message; + } + else if (contents && contents.length > 0) { + // it may be the case that the exception is in the body message as string + msg = contents; + } + else { + msg = 'Failed request: (' + statusCode + ')'; + } + let err = new HttpClientError(msg, statusCode); + err.result = response.result; + reject(err); + } + else { + resolve(response); + } + }); + } +} +exports.HttpClient = HttpClient; + + +/***/ }), + +/***/ 443: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + +Object.defineProperty(exports, "__esModule", ({ value: true })); +function getProxyUrl(reqUrl) { + let usingSsl = reqUrl.protocol === 'https:'; + let proxyUrl; + if (checkBypass(reqUrl)) { + return proxyUrl; + } + let proxyVar; + if (usingSsl) { + proxyVar = process.env['https_proxy'] || process.env['HTTPS_PROXY']; + } + else { + proxyVar = process.env['http_proxy'] || process.env['HTTP_PROXY']; + } + if (proxyVar) { + proxyUrl = new URL(proxyVar); + } + return proxyUrl; +} +exports.getProxyUrl = getProxyUrl; +function checkBypass(reqUrl) { + if (!reqUrl.hostname) { + return false; + } + let noProxy = process.env['no_proxy'] || process.env['NO_PROXY'] || ''; + if (!noProxy) { + return false; + } + // Determine the request port + let reqPort; + if (reqUrl.port) { + reqPort = Number(reqUrl.port); + } + else if (reqUrl.protocol === 'http:') { + reqPort = 80; + } + else if (reqUrl.protocol === 'https:') { + reqPort = 443; + } + // Format the request hostname and hostname with port + let upperReqHosts = [reqUrl.hostname.toUpperCase()]; + if (typeof reqPort === 'number') { + upperReqHosts.push(`${upperReqHosts[0]}:${reqPort}`); + } + // Compare request host against noproxy + for (let upperNoProxyItem of noProxy + .split(',') + .map(x => x.trim().toUpperCase()) + .filter(x => x)) { + if (upperReqHosts.some(x => x === upperNoProxyItem)) { + return true; + } + } + return false; +} +exports.checkBypass = checkBypass; + + +/***/ }), + +/***/ 962: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +var _a; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.getCmdPath = exports.tryGetExecutablePath = exports.isRooted = exports.isDirectory = exports.exists = exports.IS_WINDOWS = exports.unlink = exports.symlink = exports.stat = exports.rmdir = exports.rename = exports.readlink = exports.readdir = exports.mkdir = exports.lstat = exports.copyFile = exports.chmod = void 0; +const fs = __importStar(__nccwpck_require__(747)); +const path = __importStar(__nccwpck_require__(622)); +_a = fs.promises, exports.chmod = _a.chmod, exports.copyFile = _a.copyFile, exports.lstat = _a.lstat, exports.mkdir = _a.mkdir, exports.readdir = _a.readdir, exports.readlink = _a.readlink, exports.rename = _a.rename, exports.rmdir = _a.rmdir, exports.stat = _a.stat, exports.symlink = _a.symlink, exports.unlink = _a.unlink; +exports.IS_WINDOWS = process.platform === 'win32'; +function exists(fsPath) { + return __awaiter(this, void 0, void 0, function* () { + try { + yield exports.stat(fsPath); + } + catch (err) { + if (err.code === 'ENOENT') { + return false; + } + throw err; + } + return true; + }); +} +exports.exists = exists; +function isDirectory(fsPath, useStat = false) { + return __awaiter(this, void 0, void 0, function* () { + const stats = useStat ? yield exports.stat(fsPath) : yield exports.lstat(fsPath); + return stats.isDirectory(); + }); +} +exports.isDirectory = isDirectory; +/** + * On OSX/Linux, true if path starts with '/'. On Windows, true for paths like: + * \, \hello, \\hello\share, C:, and C:\hello (and corresponding alternate separator cases). + */ +function isRooted(p) { + p = normalizeSeparators(p); + if (!p) { + throw new Error('isRooted() parameter "p" cannot be empty'); + } + if (exports.IS_WINDOWS) { + return (p.startsWith('\\') || /^[A-Z]:/i.test(p) // e.g. \ or \hello or \\hello + ); // e.g. C: or C:\hello + } + return p.startsWith('/'); +} +exports.isRooted = isRooted; +/** + * Best effort attempt to determine whether a file exists and is executable. + * @param filePath file path to check + * @param extensions additional file extensions to try + * @return if file exists and is executable, returns the file path. otherwise empty string. + */ +function tryGetExecutablePath(filePath, extensions) { + return __awaiter(this, void 0, void 0, function* () { + let stats = undefined; + try { + // test file exists + stats = yield exports.stat(filePath); + } + catch (err) { + if (err.code !== 'ENOENT') { + // eslint-disable-next-line no-console + console.log(`Unexpected error attempting to determine if executable file exists '${filePath}': ${err}`); + } + } + if (stats && stats.isFile()) { + if (exports.IS_WINDOWS) { + // on Windows, test for valid extension + const upperExt = path.extname(filePath).toUpperCase(); + if (extensions.some(validExt => validExt.toUpperCase() === upperExt)) { + return filePath; + } + } + else { + if (isUnixExecutable(stats)) { + return filePath; + } + } + } + // try each extension + const originalFilePath = filePath; + for (const extension of extensions) { + filePath = originalFilePath + extension; + stats = undefined; + try { + stats = yield exports.stat(filePath); + } + catch (err) { + if (err.code !== 'ENOENT') { + // eslint-disable-next-line no-console + console.log(`Unexpected error attempting to determine if executable file exists '${filePath}': ${err}`); + } + } + if (stats && stats.isFile()) { + if (exports.IS_WINDOWS) { + // preserve the case of the actual file (since an extension was appended) + try { + const directory = path.dirname(filePath); + const upperName = path.basename(filePath).toUpperCase(); + for (const actualName of yield exports.readdir(directory)) { + if (upperName === actualName.toUpperCase()) { + filePath = path.join(directory, actualName); + break; + } + } + } + catch (err) { + // eslint-disable-next-line no-console + console.log(`Unexpected error attempting to determine the actual case of the file '${filePath}': ${err}`); + } + return filePath; + } + else { + if (isUnixExecutable(stats)) { + return filePath; + } + } + } + } + return ''; + }); +} +exports.tryGetExecutablePath = tryGetExecutablePath; +function normalizeSeparators(p) { + p = p || ''; + if (exports.IS_WINDOWS) { + // convert slashes on Windows + p = p.replace(/\//g, '\\'); + // remove redundant slashes + return p.replace(/\\\\+/g, '\\'); + } + // remove redundant slashes + return p.replace(/\/\/+/g, '/'); +} +// on Mac/Linux, test the execute bit +// R W X R W X R W X +// 256 128 64 32 16 8 4 2 1 +function isUnixExecutable(stats) { + return ((stats.mode & 1) > 0 || + ((stats.mode & 8) > 0 && stats.gid === process.getgid()) || + ((stats.mode & 64) > 0 && stats.uid === process.getuid())); +} +// Get the path of cmd.exe in windows +function getCmdPath() { + var _a; + return (_a = process.env['COMSPEC']) !== null && _a !== void 0 ? _a : `cmd.exe`; +} +exports.getCmdPath = getCmdPath; +//# sourceMappingURL=io-util.js.map + +/***/ }), + +/***/ 436: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.findInPath = exports.which = exports.mkdirP = exports.rmRF = exports.mv = exports.cp = void 0; +const assert_1 = __nccwpck_require__(357); +const childProcess = __importStar(__nccwpck_require__(129)); +const path = __importStar(__nccwpck_require__(622)); +const util_1 = __nccwpck_require__(669); +const ioUtil = __importStar(__nccwpck_require__(962)); +const exec = util_1.promisify(childProcess.exec); +const execFile = util_1.promisify(childProcess.execFile); +/** + * Copies a file or folder. + * Based off of shelljs - https://github.com/shelljs/shelljs/blob/9237f66c52e5daa40458f94f9565e18e8132f5a6/src/cp.js + * + * @param source source path + * @param dest destination path + * @param options optional. See CopyOptions. + */ +function cp(source, dest, options = {}) { + return __awaiter(this, void 0, void 0, function* () { + const { force, recursive, copySourceDirectory } = readCopyOptions(options); + const destStat = (yield ioUtil.exists(dest)) ? yield ioUtil.stat(dest) : null; + // Dest is an existing file, but not forcing + if (destStat && destStat.isFile() && !force) { + return; + } + // If dest is an existing directory, should copy inside. + const newDest = destStat && destStat.isDirectory() && copySourceDirectory + ? path.join(dest, path.basename(source)) + : dest; + if (!(yield ioUtil.exists(source))) { + throw new Error(`no such file or directory: ${source}`); + } + const sourceStat = yield ioUtil.stat(source); + if (sourceStat.isDirectory()) { + if (!recursive) { + throw new Error(`Failed to copy. ${source} is a directory, but tried to copy without recursive flag.`); + } + else { + yield cpDirRecursive(source, newDest, 0, force); + } + } + else { + if (path.relative(source, newDest) === '') { + // a file cannot be copied to itself + throw new Error(`'${newDest}' and '${source}' are the same file`); + } + yield copyFile(source, newDest, force); + } + }); +} +exports.cp = cp; +/** + * Moves a path. + * + * @param source source path + * @param dest destination path + * @param options optional. See MoveOptions. + */ +function mv(source, dest, options = {}) { + return __awaiter(this, void 0, void 0, function* () { + if (yield ioUtil.exists(dest)) { + let destExists = true; + if (yield ioUtil.isDirectory(dest)) { + // If dest is directory copy src into dest + dest = path.join(dest, path.basename(source)); + destExists = yield ioUtil.exists(dest); + } + if (destExists) { + if (options.force == null || options.force) { + yield rmRF(dest); + } + else { + throw new Error('Destination already exists'); + } + } + } + yield mkdirP(path.dirname(dest)); + yield ioUtil.rename(source, dest); + }); +} +exports.mv = mv; +/** + * Remove a path recursively with force + * + * @param inputPath path to remove + */ +function rmRF(inputPath) { + return __awaiter(this, void 0, void 0, function* () { + if (ioUtil.IS_WINDOWS) { + // Node doesn't provide a delete operation, only an unlink function. This means that if the file is being used by another + // program (e.g. antivirus), it won't be deleted. To address this, we shell out the work to rd/del. + // Check for invalid characters + // https://docs.microsoft.com/en-us/windows/win32/fileio/naming-a-file + if (/[*"<>|]/.test(inputPath)) { + throw new Error('File path must not contain `*`, `"`, `<`, `>` or `|` on Windows'); + } + try { + const cmdPath = ioUtil.getCmdPath(); + if (yield ioUtil.isDirectory(inputPath, true)) { + yield exec(`${cmdPath} /s /c "rd /s /q "%inputPath%""`, { + env: { inputPath } + }); + } + else { + yield exec(`${cmdPath} /s /c "del /f /a "%inputPath%""`, { + env: { inputPath } + }); + } + } + catch (err) { + // if you try to delete a file that doesn't exist, desired result is achieved + // other errors are valid + if (err.code !== 'ENOENT') + throw err; + } + // Shelling out fails to remove a symlink folder with missing source, this unlink catches that + try { + yield ioUtil.unlink(inputPath); + } + catch (err) { + // if you try to delete a file that doesn't exist, desired result is achieved + // other errors are valid + if (err.code !== 'ENOENT') + throw err; + } + } + else { + let isDir = false; + try { + isDir = yield ioUtil.isDirectory(inputPath); + } + catch (err) { + // if you try to delete a file that doesn't exist, desired result is achieved + // other errors are valid + if (err.code !== 'ENOENT') + throw err; + return; + } + if (isDir) { + yield execFile(`rm`, [`-rf`, `${inputPath}`]); + } + else { + yield ioUtil.unlink(inputPath); + } + } + }); +} +exports.rmRF = rmRF; +/** + * Make a directory. Creates the full path with folders in between + * Will throw if it fails + * + * @param fsPath path to create + * @returns Promise + */ +function mkdirP(fsPath) { + return __awaiter(this, void 0, void 0, function* () { + assert_1.ok(fsPath, 'a path argument must be provided'); + yield ioUtil.mkdir(fsPath, { recursive: true }); + }); +} +exports.mkdirP = mkdirP; +/** + * Returns path of a tool had the tool actually been invoked. Resolves via paths. + * If you check and the tool does not exist, it will throw. + * + * @param tool name of the tool + * @param check whether to check if tool exists + * @returns Promise path to tool + */ +function which(tool, check) { + return __awaiter(this, void 0, void 0, function* () { + if (!tool) { + throw new Error("parameter 'tool' is required"); + } + // recursive when check=true + if (check) { + const result = yield which(tool, false); + if (!result) { + if (ioUtil.IS_WINDOWS) { + throw new Error(`Unable to locate executable file: ${tool}. Please verify either the file path exists or the file can be found within a directory specified by the PATH environment variable. Also verify the file has a valid extension for an executable file.`); + } + else { + throw new Error(`Unable to locate executable file: ${tool}. Please verify either the file path exists or the file can be found within a directory specified by the PATH environment variable. Also check the file mode to verify the file is executable.`); + } + } + return result; + } + const matches = yield findInPath(tool); + if (matches && matches.length > 0) { + return matches[0]; + } + return ''; + }); +} +exports.which = which; +/** + * Returns a list of all occurrences of the given tool on the system path. + * + * @returns Promise the paths of the tool + */ +function findInPath(tool) { + return __awaiter(this, void 0, void 0, function* () { + if (!tool) { + throw new Error("parameter 'tool' is required"); + } + // build the list of extensions to try + const extensions = []; + if (ioUtil.IS_WINDOWS && process.env['PATHEXT']) { + for (const extension of process.env['PATHEXT'].split(path.delimiter)) { + if (extension) { + extensions.push(extension); + } + } + } + // if it's rooted, return it if exists. otherwise return empty. + if (ioUtil.isRooted(tool)) { + const filePath = yield ioUtil.tryGetExecutablePath(tool, extensions); + if (filePath) { + return [filePath]; + } + return []; + } + // if any path separators, return empty + if (tool.includes(path.sep)) { + return []; + } + // build the list of directories + // + // Note, technically "where" checks the current directory on Windows. From a toolkit perspective, + // it feels like we should not do this. Checking the current directory seems like more of a use + // case of a shell, and the which() function exposed by the toolkit should strive for consistency + // across platforms. + const directories = []; + if (process.env.PATH) { + for (const p of process.env.PATH.split(path.delimiter)) { + if (p) { + directories.push(p); + } + } + } + // find all matches + const matches = []; + for (const directory of directories) { + const filePath = yield ioUtil.tryGetExecutablePath(path.join(directory, tool), extensions); + if (filePath) { + matches.push(filePath); + } + } + return matches; + }); +} +exports.findInPath = findInPath; +function readCopyOptions(options) { + const force = options.force == null ? true : options.force; + const recursive = Boolean(options.recursive); + const copySourceDirectory = options.copySourceDirectory == null + ? true + : Boolean(options.copySourceDirectory); + return { force, recursive, copySourceDirectory }; +} +function cpDirRecursive(sourceDir, destDir, currentDepth, force) { + return __awaiter(this, void 0, void 0, function* () { + // Ensure there is not a run away recursive copy + if (currentDepth >= 255) + return; + currentDepth++; + yield mkdirP(destDir); + const files = yield ioUtil.readdir(sourceDir); + for (const fileName of files) { + const srcFile = `${sourceDir}/${fileName}`; + const destFile = `${destDir}/${fileName}`; + const srcFileStat = yield ioUtil.lstat(srcFile); + if (srcFileStat.isDirectory()) { + // Recurse + yield cpDirRecursive(srcFile, destFile, currentDepth, force); + } + else { + yield copyFile(srcFile, destFile, force); + } + } + // Change the mode for the newly created directory + yield ioUtil.chmod(destDir, (yield ioUtil.stat(sourceDir)).mode); + }); +} +// Buffered file copy +function copyFile(srcFile, destFile, force) { + return __awaiter(this, void 0, void 0, function* () { + if ((yield ioUtil.lstat(srcFile)).isSymbolicLink()) { + // unlink/re-link it + try { + yield ioUtil.lstat(destFile); + yield ioUtil.unlink(destFile); + } + catch (e) { + // Try to override file permission + if (e.code === 'EPERM') { + yield ioUtil.chmod(destFile, '0666'); + yield ioUtil.unlink(destFile); + } + // other errors = it doesn't exist, no work to do + } + // Copy over symlink + const symlinkFull = yield ioUtil.readlink(srcFile); + yield ioUtil.symlink(symlinkFull, destFile, ioUtil.IS_WINDOWS ? 'junction' : null); + } + else if (!(yield ioUtil.exists(destFile)) || force) { + yield ioUtil.copyFile(srcFile, destFile); + } + }); +} +//# sourceMappingURL=io.js.map + +/***/ }), + +/***/ 473: +/***/ (function(module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports._readLinuxVersionFile = exports._getOsVersion = exports._findMatch = void 0; +const semver = __importStar(__nccwpck_require__(562)); +const core_1 = __nccwpck_require__(186); +// needs to be require for core node modules to be mocked +/* eslint @typescript-eslint/no-require-imports: 0 */ +const os = __nccwpck_require__(87); +const cp = __nccwpck_require__(129); +const fs = __nccwpck_require__(747); +function _findMatch(versionSpec, stable, candidates, archFilter) { + return __awaiter(this, void 0, void 0, function* () { + const platFilter = os.platform(); + let result; + let match; + let file; + for (const candidate of candidates) { + const version = candidate.version; + core_1.debug(`check ${version} satisfies ${versionSpec}`); + if (semver.satisfies(version, versionSpec) && + (!stable || candidate.stable === stable)) { + file = candidate.files.find(item => { + core_1.debug(`${item.arch}===${archFilter} && ${item.platform}===${platFilter}`); + let chk = item.arch === archFilter && item.platform === platFilter; + if (chk && item.platform_version) { + const osVersion = module.exports._getOsVersion(); + if (osVersion === item.platform_version) { + chk = true; + } + else { + chk = semver.satisfies(osVersion, item.platform_version); + } + } + return chk; + }); + if (file) { + core_1.debug(`matched ${candidate.version}`); + match = candidate; + break; + } + } + } + if (match && file) { + // clone since we're mutating the file list to be only the file that matches + result = Object.assign({}, match); + result.files = [file]; + } + return result; + }); +} +exports._findMatch = _findMatch; +function _getOsVersion() { + // TODO: add windows and other linux, arm variants + // right now filtering on version is only an ubuntu and macos scenario for tools we build for hosted (python) + const plat = os.platform(); + let version = ''; + if (plat === 'darwin') { + version = cp.execSync('sw_vers -productVersion').toString(); + } + else if (plat === 'linux') { + // lsb_release process not in some containers, readfile + // Run cat /etc/lsb-release + // DISTRIB_ID=Ubuntu + // DISTRIB_RELEASE=18.04 + // DISTRIB_CODENAME=bionic + // DISTRIB_DESCRIPTION="Ubuntu 18.04.4 LTS" + const lsbContents = module.exports._readLinuxVersionFile(); + if (lsbContents) { + const lines = lsbContents.split('\n'); + for (const line of lines) { + const parts = line.split('='); + if (parts.length === 2 && + (parts[0].trim() === 'VERSION_ID' || + parts[0].trim() === 'DISTRIB_RELEASE')) { + version = parts[1] + .trim() + .replace(/^"/, '') + .replace(/"$/, ''); + break; + } + } + } + } + return version; +} +exports._getOsVersion = _getOsVersion; +function _readLinuxVersionFile() { + const lsbReleaseFile = '/etc/lsb-release'; + const osReleaseFile = '/etc/os-release'; + let contents = ''; + if (fs.existsSync(lsbReleaseFile)) { + contents = fs.readFileSync(lsbReleaseFile).toString(); + } + else if (fs.existsSync(osReleaseFile)) { + contents = fs.readFileSync(osReleaseFile).toString(); + } + return contents; +} +exports._readLinuxVersionFile = _readLinuxVersionFile; +//# sourceMappingURL=manifest.js.map + +/***/ }), + +/***/ 279: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.RetryHelper = void 0; +const core = __importStar(__nccwpck_require__(186)); +/** + * Internal class for retries + */ +class RetryHelper { + constructor(maxAttempts, minSeconds, maxSeconds) { + if (maxAttempts < 1) { + throw new Error('max attempts should be greater than or equal to 1'); + } + this.maxAttempts = maxAttempts; + this.minSeconds = Math.floor(minSeconds); + this.maxSeconds = Math.floor(maxSeconds); + if (this.minSeconds > this.maxSeconds) { + throw new Error('min seconds should be less than or equal to max seconds'); + } + } + execute(action, isRetryable) { + return __awaiter(this, void 0, void 0, function* () { + let attempt = 1; + while (attempt < this.maxAttempts) { + // Try + try { + return yield action(); + } + catch (err) { + if (isRetryable && !isRetryable(err)) { + throw err; + } + core.info(err.message); + } + // Sleep + const seconds = this.getSleepAmount(); + core.info(`Waiting ${seconds} seconds before trying again`); + yield this.sleep(seconds); + attempt++; + } + // Last attempt + return yield action(); + }); + } + getSleepAmount() { + return (Math.floor(Math.random() * (this.maxSeconds - this.minSeconds + 1)) + + this.minSeconds); + } + sleep(seconds) { + return __awaiter(this, void 0, void 0, function* () { + return new Promise(resolve => setTimeout(resolve, seconds * 1000)); + }); + } +} +exports.RetryHelper = RetryHelper; +//# sourceMappingURL=retry-helper.js.map + +/***/ }), + +/***/ 784: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { + function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } + return new (P || (P = Promise))(function (resolve, reject) { + function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } + function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } + function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } + step((generator = generator.apply(thisArg, _arguments || [])).next()); + }); +}; +var __importDefault = (this && this.__importDefault) || function (mod) { + return (mod && mod.__esModule) ? mod : { "default": mod }; +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.evaluateVersions = exports.isExplicitVersion = exports.findFromManifest = exports.getManifestFromRepo = exports.findAllVersions = exports.find = exports.cacheFile = exports.cacheDir = exports.extractZip = exports.extractXar = exports.extractTar = exports.extract7z = exports.downloadTool = exports.HTTPError = void 0; +const core = __importStar(__nccwpck_require__(186)); +const io = __importStar(__nccwpck_require__(436)); +const fs = __importStar(__nccwpck_require__(747)); +const mm = __importStar(__nccwpck_require__(473)); +const os = __importStar(__nccwpck_require__(87)); +const path = __importStar(__nccwpck_require__(622)); +const httpm = __importStar(__nccwpck_require__(925)); +const semver = __importStar(__nccwpck_require__(562)); +const stream = __importStar(__nccwpck_require__(413)); +const util = __importStar(__nccwpck_require__(669)); +const v4_1 = __importDefault(__nccwpck_require__(824)); +const exec_1 = __nccwpck_require__(514); +const assert_1 = __nccwpck_require__(357); +const retry_helper_1 = __nccwpck_require__(279); +class HTTPError extends Error { + constructor(httpStatusCode) { + super(`Unexpected HTTP response: ${httpStatusCode}`); + this.httpStatusCode = httpStatusCode; + Object.setPrototypeOf(this, new.target.prototype); + } +} +exports.HTTPError = HTTPError; +const IS_WINDOWS = process.platform === 'win32'; +const IS_MAC = process.platform === 'darwin'; +const userAgent = 'actions/tool-cache'; +/** + * Download a tool from an url and stream it into a file + * + * @param url url of tool to download + * @param dest path to download tool + * @param auth authorization header + * @param headers other headers + * @returns path to downloaded tool + */ +function downloadTool(url, dest, auth, headers) { + return __awaiter(this, void 0, void 0, function* () { + dest = dest || path.join(_getTempDirectory(), v4_1.default()); + yield io.mkdirP(path.dirname(dest)); + core.debug(`Downloading ${url}`); + core.debug(`Destination ${dest}`); + const maxAttempts = 3; + const minSeconds = _getGlobal('TEST_DOWNLOAD_TOOL_RETRY_MIN_SECONDS', 10); + const maxSeconds = _getGlobal('TEST_DOWNLOAD_TOOL_RETRY_MAX_SECONDS', 20); + const retryHelper = new retry_helper_1.RetryHelper(maxAttempts, minSeconds, maxSeconds); + return yield retryHelper.execute(() => __awaiter(this, void 0, void 0, function* () { + return yield downloadToolAttempt(url, dest || '', auth, headers); + }), (err) => { + if (err instanceof HTTPError && err.httpStatusCode) { + // Don't retry anything less than 500, except 408 Request Timeout and 429 Too Many Requests + if (err.httpStatusCode < 500 && + err.httpStatusCode !== 408 && + err.httpStatusCode !== 429) { + return false; + } + } + // Otherwise retry + return true; + }); + }); +} +exports.downloadTool = downloadTool; +function downloadToolAttempt(url, dest, auth, headers) { + return __awaiter(this, void 0, void 0, function* () { + if (fs.existsSync(dest)) { + throw new Error(`Destination file path ${dest} already exists`); + } + // Get the response headers + const http = new httpm.HttpClient(userAgent, [], { + allowRetries: false + }); + if (auth) { + core.debug('set auth'); + if (headers === undefined) { + headers = {}; + } + headers.authorization = auth; + } + const response = yield http.get(url, headers); + if (response.message.statusCode !== 200) { + const err = new HTTPError(response.message.statusCode); + core.debug(`Failed to download from "${url}". Code(${response.message.statusCode}) Message(${response.message.statusMessage})`); + throw err; + } + // Download the response body + const pipeline = util.promisify(stream.pipeline); + const responseMessageFactory = _getGlobal('TEST_DOWNLOAD_TOOL_RESPONSE_MESSAGE_FACTORY', () => response.message); + const readStream = responseMessageFactory(); + let succeeded = false; + try { + yield pipeline(readStream, fs.createWriteStream(dest)); + core.debug('download complete'); + succeeded = true; + return dest; + } + finally { + // Error, delete dest before retry + if (!succeeded) { + core.debug('download failed'); + try { + yield io.rmRF(dest); + } + catch (err) { + core.debug(`Failed to delete '${dest}'. ${err.message}`); + } + } + } + }); +} +/** + * Extract a .7z file + * + * @param file path to the .7z file + * @param dest destination directory. Optional. + * @param _7zPath path to 7zr.exe. Optional, for long path support. Most .7z archives do not have this + * problem. If your .7z archive contains very long paths, you can pass the path to 7zr.exe which will + * gracefully handle long paths. By default 7zdec.exe is used because it is a very small program and is + * bundled with the tool lib. However it does not support long paths. 7zr.exe is the reduced command line + * interface, it is smaller than the full command line interface, and it does support long paths. At the + * time of this writing, it is freely available from the LZMA SDK that is available on the 7zip website. + * Be sure to check the current license agreement. If 7zr.exe is bundled with your action, then the path + * to 7zr.exe can be pass to this function. + * @returns path to the destination directory + */ +function extract7z(file, dest, _7zPath) { + return __awaiter(this, void 0, void 0, function* () { + assert_1.ok(IS_WINDOWS, 'extract7z() not supported on current OS'); + assert_1.ok(file, 'parameter "file" is required'); + dest = yield _createExtractFolder(dest); + const originalCwd = process.cwd(); + process.chdir(dest); + if (_7zPath) { + try { + const logLevel = core.isDebug() ? '-bb1' : '-bb0'; + const args = [ + 'x', + logLevel, + '-bd', + '-sccUTF-8', + file + ]; + const options = { + silent: true + }; + yield exec_1.exec(`"${_7zPath}"`, args, options); + } + finally { + process.chdir(originalCwd); + } + } + else { + const escapedScript = path + .join(__dirname, '..', 'scripts', 'Invoke-7zdec.ps1') + .replace(/'/g, "''") + .replace(/"|\n|\r/g, ''); // double-up single quotes, remove double quotes and newlines + const escapedFile = file.replace(/'/g, "''").replace(/"|\n|\r/g, ''); + const escapedTarget = dest.replace(/'/g, "''").replace(/"|\n|\r/g, ''); + const command = `& '${escapedScript}' -Source '${escapedFile}' -Target '${escapedTarget}'`; + const args = [ + '-NoLogo', + '-Sta', + '-NoProfile', + '-NonInteractive', + '-ExecutionPolicy', + 'Unrestricted', + '-Command', + command + ]; + const options = { + silent: true + }; + try { + const powershellPath = yield io.which('powershell', true); + yield exec_1.exec(`"${powershellPath}"`, args, options); + } + finally { + process.chdir(originalCwd); + } + } + return dest; + }); +} +exports.extract7z = extract7z; +/** + * Extract a compressed tar archive + * + * @param file path to the tar + * @param dest destination directory. Optional. + * @param flags flags for the tar command to use for extraction. Defaults to 'xz' (extracting gzipped tars). Optional. + * @returns path to the destination directory + */ +function extractTar(file, dest, flags = 'xz') { + return __awaiter(this, void 0, void 0, function* () { + if (!file) { + throw new Error("parameter 'file' is required"); + } + // Create dest + dest = yield _createExtractFolder(dest); + // Determine whether GNU tar + core.debug('Checking tar --version'); + let versionOutput = ''; + yield exec_1.exec('tar --version', [], { + ignoreReturnCode: true, + silent: true, + listeners: { + stdout: (data) => (versionOutput += data.toString()), + stderr: (data) => (versionOutput += data.toString()) + } + }); + core.debug(versionOutput.trim()); + const isGnuTar = versionOutput.toUpperCase().includes('GNU TAR'); + // Initialize args + let args; + if (flags instanceof Array) { + args = flags; + } + else { + args = [flags]; + } + if (core.isDebug() && !flags.includes('v')) { + args.push('-v'); + } + let destArg = dest; + let fileArg = file; + if (IS_WINDOWS && isGnuTar) { + args.push('--force-local'); + destArg = dest.replace(/\\/g, '/'); + // Technically only the dest needs to have `/` but for aesthetic consistency + // convert slashes in the file arg too. + fileArg = file.replace(/\\/g, '/'); + } + if (isGnuTar) { + // Suppress warnings when using GNU tar to extract archives created by BSD tar + args.push('--warning=no-unknown-keyword'); + args.push('--overwrite'); + } + args.push('-C', destArg, '-f', fileArg); + yield exec_1.exec(`tar`, args); + return dest; + }); +} +exports.extractTar = extractTar; +/** + * Extract a xar compatible archive + * + * @param file path to the archive + * @param dest destination directory. Optional. + * @param flags flags for the xar. Optional. + * @returns path to the destination directory + */ +function extractXar(file, dest, flags = []) { + return __awaiter(this, void 0, void 0, function* () { + assert_1.ok(IS_MAC, 'extractXar() not supported on current OS'); + assert_1.ok(file, 'parameter "file" is required'); + dest = yield _createExtractFolder(dest); + let args; + if (flags instanceof Array) { + args = flags; + } + else { + args = [flags]; + } + args.push('-x', '-C', dest, '-f', file); + if (core.isDebug()) { + args.push('-v'); + } + const xarPath = yield io.which('xar', true); + yield exec_1.exec(`"${xarPath}"`, _unique(args)); + return dest; + }); +} +exports.extractXar = extractXar; +/** + * Extract a zip + * + * @param file path to the zip + * @param dest destination directory. Optional. + * @returns path to the destination directory + */ +function extractZip(file, dest) { + return __awaiter(this, void 0, void 0, function* () { + if (!file) { + throw new Error("parameter 'file' is required"); + } + dest = yield _createExtractFolder(dest); + if (IS_WINDOWS) { + yield extractZipWin(file, dest); + } + else { + yield extractZipNix(file, dest); + } + return dest; + }); +} +exports.extractZip = extractZip; +function extractZipWin(file, dest) { + return __awaiter(this, void 0, void 0, function* () { + // build the powershell command + const escapedFile = file.replace(/'/g, "''").replace(/"|\n|\r/g, ''); // double-up single quotes, remove double quotes and newlines + const escapedDest = dest.replace(/'/g, "''").replace(/"|\n|\r/g, ''); + const pwshPath = yield io.which('pwsh', false); + //To match the file overwrite behavior on nix systems, we use the overwrite = true flag for ExtractToDirectory + //and the -Force flag for Expand-Archive as a fallback + if (pwshPath) { + //attempt to use pwsh with ExtractToDirectory, if this fails attempt Expand-Archive + const pwshCommand = [ + `$ErrorActionPreference = 'Stop' ;`, + `try { Add-Type -AssemblyName System.IO.Compression.ZipFile } catch { } ;`, + `try { [System.IO.Compression.ZipFile]::ExtractToDirectory('${escapedFile}', '${escapedDest}', $true) }`, + `catch { if (($_.Exception.GetType().FullName -eq 'System.Management.Automation.MethodException') -or ($_.Exception.GetType().FullName -eq 'System.Management.Automation.RuntimeException') ){ Expand-Archive -LiteralPath '${escapedFile}' -DestinationPath '${escapedDest}' -Force } else { throw $_ } } ;` + ].join(' '); + const args = [ + '-NoLogo', + '-NoProfile', + '-NonInteractive', + '-ExecutionPolicy', + 'Unrestricted', + '-Command', + pwshCommand + ]; + core.debug(`Using pwsh at path: ${pwshPath}`); + yield exec_1.exec(`"${pwshPath}"`, args); + } + else { + const powershellCommand = [ + `$ErrorActionPreference = 'Stop' ;`, + `try { Add-Type -AssemblyName System.IO.Compression.FileSystem } catch { } ;`, + `if ((Get-Command -Name Expand-Archive -Module Microsoft.PowerShell.Archive -ErrorAction Ignore)) { Expand-Archive -LiteralPath '${escapedFile}' -DestinationPath '${escapedDest}' -Force }`, + `else {[System.IO.Compression.ZipFile]::ExtractToDirectory('${escapedFile}', '${escapedDest}', $true) }` + ].join(' '); + const args = [ + '-NoLogo', + '-Sta', + '-NoProfile', + '-NonInteractive', + '-ExecutionPolicy', + 'Unrestricted', + '-Command', + powershellCommand + ]; + const powershellPath = yield io.which('powershell', true); + core.debug(`Using powershell at path: ${powershellPath}`); + yield exec_1.exec(`"${powershellPath}"`, args); + } + }); +} +function extractZipNix(file, dest) { + return __awaiter(this, void 0, void 0, function* () { + const unzipPath = yield io.which('unzip', true); + const args = [file]; + if (!core.isDebug()) { + args.unshift('-q'); + } + args.unshift('-o'); //overwrite with -o, otherwise a prompt is shown which freezes the run + yield exec_1.exec(`"${unzipPath}"`, args, { cwd: dest }); + }); +} +/** + * Caches a directory and installs it into the tool cacheDir + * + * @param sourceDir the directory to cache into tools + * @param tool tool name + * @param version version of the tool. semver format + * @param arch architecture of the tool. Optional. Defaults to machine architecture + */ +function cacheDir(sourceDir, tool, version, arch) { + return __awaiter(this, void 0, void 0, function* () { + version = semver.clean(version) || version; + arch = arch || os.arch(); + core.debug(`Caching tool ${tool} ${version} ${arch}`); + core.debug(`source dir: ${sourceDir}`); + if (!fs.statSync(sourceDir).isDirectory()) { + throw new Error('sourceDir is not a directory'); + } + // Create the tool dir + const destPath = yield _createToolPath(tool, version, arch); + // copy each child item. do not move. move can fail on Windows + // due to anti-virus software having an open handle on a file. + for (const itemName of fs.readdirSync(sourceDir)) { + const s = path.join(sourceDir, itemName); + yield io.cp(s, destPath, { recursive: true }); + } + // write .complete + _completeToolPath(tool, version, arch); + return destPath; + }); +} +exports.cacheDir = cacheDir; +/** + * Caches a downloaded file (GUID) and installs it + * into the tool cache with a given targetName + * + * @param sourceFile the file to cache into tools. Typically a result of downloadTool which is a guid. + * @param targetFile the name of the file name in the tools directory + * @param tool tool name + * @param version version of the tool. semver format + * @param arch architecture of the tool. Optional. Defaults to machine architecture + */ +function cacheFile(sourceFile, targetFile, tool, version, arch) { + return __awaiter(this, void 0, void 0, function* () { + version = semver.clean(version) || version; + arch = arch || os.arch(); + core.debug(`Caching tool ${tool} ${version} ${arch}`); + core.debug(`source file: ${sourceFile}`); + if (!fs.statSync(sourceFile).isFile()) { + throw new Error('sourceFile is not a file'); + } + // create the tool dir + const destFolder = yield _createToolPath(tool, version, arch); + // copy instead of move. move can fail on Windows due to + // anti-virus software having an open handle on a file. + const destPath = path.join(destFolder, targetFile); + core.debug(`destination file ${destPath}`); + yield io.cp(sourceFile, destPath); + // write .complete + _completeToolPath(tool, version, arch); + return destFolder; + }); +} +exports.cacheFile = cacheFile; +/** + * Finds the path to a tool version in the local installed tool cache + * + * @param toolName name of the tool + * @param versionSpec version of the tool + * @param arch optional arch. defaults to arch of computer + */ +function find(toolName, versionSpec, arch) { + if (!toolName) { + throw new Error('toolName parameter is required'); + } + if (!versionSpec) { + throw new Error('versionSpec parameter is required'); + } + arch = arch || os.arch(); + // attempt to resolve an explicit version + if (!isExplicitVersion(versionSpec)) { + const localVersions = findAllVersions(toolName, arch); + const match = evaluateVersions(localVersions, versionSpec); + versionSpec = match; + } + // check for the explicit version in the cache + let toolPath = ''; + if (versionSpec) { + versionSpec = semver.clean(versionSpec) || ''; + const cachePath = path.join(_getCacheDirectory(), toolName, versionSpec, arch); + core.debug(`checking cache: ${cachePath}`); + if (fs.existsSync(cachePath) && fs.existsSync(`${cachePath}.complete`)) { + core.debug(`Found tool in cache ${toolName} ${versionSpec} ${arch}`); + toolPath = cachePath; + } + else { + core.debug('not found'); + } + } + return toolPath; +} +exports.find = find; +/** + * Finds the paths to all versions of a tool that are installed in the local tool cache + * + * @param toolName name of the tool + * @param arch optional arch. defaults to arch of computer + */ +function findAllVersions(toolName, arch) { + const versions = []; + arch = arch || os.arch(); + const toolPath = path.join(_getCacheDirectory(), toolName); + if (fs.existsSync(toolPath)) { + const children = fs.readdirSync(toolPath); + for (const child of children) { + if (isExplicitVersion(child)) { + const fullPath = path.join(toolPath, child, arch || ''); + if (fs.existsSync(fullPath) && fs.existsSync(`${fullPath}.complete`)) { + versions.push(child); + } + } + } + } + return versions; +} +exports.findAllVersions = findAllVersions; +function getManifestFromRepo(owner, repo, auth, branch = 'master') { + return __awaiter(this, void 0, void 0, function* () { + let releases = []; + const treeUrl = `https://api.github.com/repos/${owner}/${repo}/git/trees/${branch}`; + const http = new httpm.HttpClient('tool-cache'); + const headers = {}; + if (auth) { + core.debug('set auth'); + headers.authorization = auth; + } + const response = yield http.getJson(treeUrl, headers); + if (!response.result) { + return releases; + } + let manifestUrl = ''; + for (const item of response.result.tree) { + if (item.path === 'versions-manifest.json') { + manifestUrl = item.url; + break; + } + } + headers['accept'] = 'application/vnd.github.VERSION.raw'; + let versionsRaw = yield (yield http.get(manifestUrl, headers)).readBody(); + if (versionsRaw) { + // shouldn't be needed but protects against invalid json saved with BOM + versionsRaw = versionsRaw.replace(/^\uFEFF/, ''); + try { + releases = JSON.parse(versionsRaw); + } + catch (_a) { + core.debug('Invalid json'); + } + } + return releases; + }); +} +exports.getManifestFromRepo = getManifestFromRepo; +function findFromManifest(versionSpec, stable, manifest, archFilter = os.arch()) { + return __awaiter(this, void 0, void 0, function* () { + // wrap the internal impl + const match = yield mm._findMatch(versionSpec, stable, manifest, archFilter); + return match; + }); +} +exports.findFromManifest = findFromManifest; +function _createExtractFolder(dest) { + return __awaiter(this, void 0, void 0, function* () { + if (!dest) { + // create a temp dir + dest = path.join(_getTempDirectory(), v4_1.default()); + } + yield io.mkdirP(dest); + return dest; + }); +} +function _createToolPath(tool, version, arch) { + return __awaiter(this, void 0, void 0, function* () { + const folderPath = path.join(_getCacheDirectory(), tool, semver.clean(version) || version, arch || ''); + core.debug(`destination ${folderPath}`); + const markerPath = `${folderPath}.complete`; + yield io.rmRF(folderPath); + yield io.rmRF(markerPath); + yield io.mkdirP(folderPath); + return folderPath; + }); +} +function _completeToolPath(tool, version, arch) { + const folderPath = path.join(_getCacheDirectory(), tool, semver.clean(version) || version, arch || ''); + const markerPath = `${folderPath}.complete`; + fs.writeFileSync(markerPath, ''); + core.debug('finished caching tool'); +} +/** + * Check if version string is explicit + * + * @param versionSpec version string to check + */ +function isExplicitVersion(versionSpec) { + const c = semver.clean(versionSpec) || ''; + core.debug(`isExplicit: ${c}`); + const valid = semver.valid(c) != null; + core.debug(`explicit? ${valid}`); + return valid; +} +exports.isExplicitVersion = isExplicitVersion; +/** + * Get the highest satisfiying semantic version in `versions` which satisfies `versionSpec` + * + * @param versions array of versions to evaluate + * @param versionSpec semantic version spec to satisfy + */ +function evaluateVersions(versions, versionSpec) { + let version = ''; + core.debug(`evaluating ${versions.length} versions`); + versions = versions.sort((a, b) => { + if (semver.gt(a, b)) { + return 1; + } + return -1; + }); + for (let i = versions.length - 1; i >= 0; i--) { + const potential = versions[i]; + const satisfied = semver.satisfies(potential, versionSpec); + if (satisfied) { + version = potential; + break; + } + } + if (version) { + core.debug(`matched: ${version}`); + } + else { + core.debug('match not found'); + } + return version; +} +exports.evaluateVersions = evaluateVersions; +/** + * Gets RUNNER_TOOL_CACHE + */ +function _getCacheDirectory() { + const cacheDirectory = process.env['RUNNER_TOOL_CACHE'] || ''; + assert_1.ok(cacheDirectory, 'Expected RUNNER_TOOL_CACHE to be defined'); + return cacheDirectory; +} +/** + * Gets RUNNER_TEMP + */ +function _getTempDirectory() { + const tempDirectory = process.env['RUNNER_TEMP'] || ''; + assert_1.ok(tempDirectory, 'Expected RUNNER_TEMP to be defined'); + return tempDirectory; +} +/** + * Gets a global variable + */ +function _getGlobal(key, defaultValue) { + /* eslint-disable @typescript-eslint/no-explicit-any */ + const value = global[key]; + /* eslint-enable @typescript-eslint/no-explicit-any */ + return value !== undefined ? value : defaultValue; +} +/** + * Returns an array of unique values. + * @param values Values to make unique. + */ +function _unique(values) { + return Array.from(new Set(values)); +} +//# sourceMappingURL=tool-cache.js.map + +/***/ }), + +/***/ 562: +/***/ ((module, exports) => { + +exports = module.exports = SemVer + +var debug +/* istanbul ignore next */ +if (typeof process === 'object' && + process.env && + process.env.NODE_DEBUG && + /\bsemver\b/i.test(process.env.NODE_DEBUG)) { + debug = function () { + var args = Array.prototype.slice.call(arguments, 0) + args.unshift('SEMVER') + console.log.apply(console, args) + } +} else { + debug = function () {} +} + +// Note: this is the semver.org version of the spec that it implements +// Not necessarily the package version of this code. +exports.SEMVER_SPEC_VERSION = '2.0.0' + +var MAX_LENGTH = 256 +var MAX_SAFE_INTEGER = Number.MAX_SAFE_INTEGER || + /* istanbul ignore next */ 9007199254740991 + +// Max safe segment length for coercion. +var MAX_SAFE_COMPONENT_LENGTH = 16 + +// The actual regexps go on exports.re +var re = exports.re = [] +var src = exports.src = [] +var t = exports.tokens = {} +var R = 0 + +function tok (n) { + t[n] = R++ +} + +// The following Regular Expressions can be used for tokenizing, +// validating, and parsing SemVer version strings. + +// ## Numeric Identifier +// A single `0`, or a non-zero digit followed by zero or more digits. + +tok('NUMERICIDENTIFIER') +src[t.NUMERICIDENTIFIER] = '0|[1-9]\\d*' +tok('NUMERICIDENTIFIERLOOSE') +src[t.NUMERICIDENTIFIERLOOSE] = '[0-9]+' + +// ## Non-numeric Identifier +// Zero or more digits, followed by a letter or hyphen, and then zero or +// more letters, digits, or hyphens. + +tok('NONNUMERICIDENTIFIER') +src[t.NONNUMERICIDENTIFIER] = '\\d*[a-zA-Z-][a-zA-Z0-9-]*' + +// ## Main Version +// Three dot-separated numeric identifiers. + +tok('MAINVERSION') +src[t.MAINVERSION] = '(' + src[t.NUMERICIDENTIFIER] + ')\\.' + + '(' + src[t.NUMERICIDENTIFIER] + ')\\.' + + '(' + src[t.NUMERICIDENTIFIER] + ')' + +tok('MAINVERSIONLOOSE') +src[t.MAINVERSIONLOOSE] = '(' + src[t.NUMERICIDENTIFIERLOOSE] + ')\\.' + + '(' + src[t.NUMERICIDENTIFIERLOOSE] + ')\\.' + + '(' + src[t.NUMERICIDENTIFIERLOOSE] + ')' + +// ## Pre-release Version Identifier +// A numeric identifier, or a non-numeric identifier. + +tok('PRERELEASEIDENTIFIER') +src[t.PRERELEASEIDENTIFIER] = '(?:' + src[t.NUMERICIDENTIFIER] + + '|' + src[t.NONNUMERICIDENTIFIER] + ')' + +tok('PRERELEASEIDENTIFIERLOOSE') +src[t.PRERELEASEIDENTIFIERLOOSE] = '(?:' + src[t.NUMERICIDENTIFIERLOOSE] + + '|' + src[t.NONNUMERICIDENTIFIER] + ')' + +// ## Pre-release Version +// Hyphen, followed by one or more dot-separated pre-release version +// identifiers. + +tok('PRERELEASE') +src[t.PRERELEASE] = '(?:-(' + src[t.PRERELEASEIDENTIFIER] + + '(?:\\.' + src[t.PRERELEASEIDENTIFIER] + ')*))' + +tok('PRERELEASELOOSE') +src[t.PRERELEASELOOSE] = '(?:-?(' + src[t.PRERELEASEIDENTIFIERLOOSE] + + '(?:\\.' + src[t.PRERELEASEIDENTIFIERLOOSE] + ')*))' + +// ## Build Metadata Identifier +// Any combination of digits, letters, or hyphens. + +tok('BUILDIDENTIFIER') +src[t.BUILDIDENTIFIER] = '[0-9A-Za-z-]+' + +// ## Build Metadata +// Plus sign, followed by one or more period-separated build metadata +// identifiers. + +tok('BUILD') +src[t.BUILD] = '(?:\\+(' + src[t.BUILDIDENTIFIER] + + '(?:\\.' + src[t.BUILDIDENTIFIER] + ')*))' + +// ## Full Version String +// A main version, followed optionally by a pre-release version and +// build metadata. + +// Note that the only major, minor, patch, and pre-release sections of +// the version string are capturing groups. The build metadata is not a +// capturing group, because it should not ever be used in version +// comparison. + +tok('FULL') +tok('FULLPLAIN') +src[t.FULLPLAIN] = 'v?' + src[t.MAINVERSION] + + src[t.PRERELEASE] + '?' + + src[t.BUILD] + '?' + +src[t.FULL] = '^' + src[t.FULLPLAIN] + '$' + +// like full, but allows v1.2.3 and =1.2.3, which people do sometimes. +// also, 1.0.0alpha1 (prerelease without the hyphen) which is pretty +// common in the npm registry. +tok('LOOSEPLAIN') +src[t.LOOSEPLAIN] = '[v=\\s]*' + src[t.MAINVERSIONLOOSE] + + src[t.PRERELEASELOOSE] + '?' + + src[t.BUILD] + '?' + +tok('LOOSE') +src[t.LOOSE] = '^' + src[t.LOOSEPLAIN] + '$' + +tok('GTLT') +src[t.GTLT] = '((?:<|>)?=?)' + +// Something like "2.*" or "1.2.x". +// Note that "x.x" is a valid xRange identifer, meaning "any version" +// Only the first item is strictly required. +tok('XRANGEIDENTIFIERLOOSE') +src[t.XRANGEIDENTIFIERLOOSE] = src[t.NUMERICIDENTIFIERLOOSE] + '|x|X|\\*' +tok('XRANGEIDENTIFIER') +src[t.XRANGEIDENTIFIER] = src[t.NUMERICIDENTIFIER] + '|x|X|\\*' + +tok('XRANGEPLAIN') +src[t.XRANGEPLAIN] = '[v=\\s]*(' + src[t.XRANGEIDENTIFIER] + ')' + + '(?:\\.(' + src[t.XRANGEIDENTIFIER] + ')' + + '(?:\\.(' + src[t.XRANGEIDENTIFIER] + ')' + + '(?:' + src[t.PRERELEASE] + ')?' + + src[t.BUILD] + '?' + + ')?)?' + +tok('XRANGEPLAINLOOSE') +src[t.XRANGEPLAINLOOSE] = '[v=\\s]*(' + src[t.XRANGEIDENTIFIERLOOSE] + ')' + + '(?:\\.(' + src[t.XRANGEIDENTIFIERLOOSE] + ')' + + '(?:\\.(' + src[t.XRANGEIDENTIFIERLOOSE] + ')' + + '(?:' + src[t.PRERELEASELOOSE] + ')?' + + src[t.BUILD] + '?' + + ')?)?' + +tok('XRANGE') +src[t.XRANGE] = '^' + src[t.GTLT] + '\\s*' + src[t.XRANGEPLAIN] + '$' +tok('XRANGELOOSE') +src[t.XRANGELOOSE] = '^' + src[t.GTLT] + '\\s*' + src[t.XRANGEPLAINLOOSE] + '$' + +// Coercion. +// Extract anything that could conceivably be a part of a valid semver +tok('COERCE') +src[t.COERCE] = '(^|[^\\d])' + + '(\\d{1,' + MAX_SAFE_COMPONENT_LENGTH + '})' + + '(?:\\.(\\d{1,' + MAX_SAFE_COMPONENT_LENGTH + '}))?' + + '(?:\\.(\\d{1,' + MAX_SAFE_COMPONENT_LENGTH + '}))?' + + '(?:$|[^\\d])' +tok('COERCERTL') +re[t.COERCERTL] = new RegExp(src[t.COERCE], 'g') + +// Tilde ranges. +// Meaning is "reasonably at or greater than" +tok('LONETILDE') +src[t.LONETILDE] = '(?:~>?)' + +tok('TILDETRIM') +src[t.TILDETRIM] = '(\\s*)' + src[t.LONETILDE] + '\\s+' +re[t.TILDETRIM] = new RegExp(src[t.TILDETRIM], 'g') +var tildeTrimReplace = '$1~' + +tok('TILDE') +src[t.TILDE] = '^' + src[t.LONETILDE] + src[t.XRANGEPLAIN] + '$' +tok('TILDELOOSE') +src[t.TILDELOOSE] = '^' + src[t.LONETILDE] + src[t.XRANGEPLAINLOOSE] + '$' + +// Caret ranges. +// Meaning is "at least and backwards compatible with" +tok('LONECARET') +src[t.LONECARET] = '(?:\\^)' + +tok('CARETTRIM') +src[t.CARETTRIM] = '(\\s*)' + src[t.LONECARET] + '\\s+' +re[t.CARETTRIM] = new RegExp(src[t.CARETTRIM], 'g') +var caretTrimReplace = '$1^' + +tok('CARET') +src[t.CARET] = '^' + src[t.LONECARET] + src[t.XRANGEPLAIN] + '$' +tok('CARETLOOSE') +src[t.CARETLOOSE] = '^' + src[t.LONECARET] + src[t.XRANGEPLAINLOOSE] + '$' + +// A simple gt/lt/eq thing, or just "" to indicate "any version" +tok('COMPARATORLOOSE') +src[t.COMPARATORLOOSE] = '^' + src[t.GTLT] + '\\s*(' + src[t.LOOSEPLAIN] + ')$|^$' +tok('COMPARATOR') +src[t.COMPARATOR] = '^' + src[t.GTLT] + '\\s*(' + src[t.FULLPLAIN] + ')$|^$' + +// An expression to strip any whitespace between the gtlt and the thing +// it modifies, so that `> 1.2.3` ==> `>1.2.3` +tok('COMPARATORTRIM') +src[t.COMPARATORTRIM] = '(\\s*)' + src[t.GTLT] + + '\\s*(' + src[t.LOOSEPLAIN] + '|' + src[t.XRANGEPLAIN] + ')' + +// this one has to use the /g flag +re[t.COMPARATORTRIM] = new RegExp(src[t.COMPARATORTRIM], 'g') +var comparatorTrimReplace = '$1$2$3' + +// Something like `1.2.3 - 1.2.4` +// Note that these all use the loose form, because they'll be +// checked against either the strict or loose comparator form +// later. +tok('HYPHENRANGE') +src[t.HYPHENRANGE] = '^\\s*(' + src[t.XRANGEPLAIN] + ')' + + '\\s+-\\s+' + + '(' + src[t.XRANGEPLAIN] + ')' + + '\\s*$' + +tok('HYPHENRANGELOOSE') +src[t.HYPHENRANGELOOSE] = '^\\s*(' + src[t.XRANGEPLAINLOOSE] + ')' + + '\\s+-\\s+' + + '(' + src[t.XRANGEPLAINLOOSE] + ')' + + '\\s*$' + +// Star ranges basically just allow anything at all. +tok('STAR') +src[t.STAR] = '(<|>)?=?\\s*\\*' + +// Compile to actual regexp objects. +// All are flag-free, unless they were created above with a flag. +for (var i = 0; i < R; i++) { + debug(i, src[i]) + if (!re[i]) { + re[i] = new RegExp(src[i]) + } +} + +exports.parse = parse +function parse (version, options) { + if (!options || typeof options !== 'object') { + options = { + loose: !!options, + includePrerelease: false + } + } + + if (version instanceof SemVer) { + return version + } + + if (typeof version !== 'string') { + return null + } + + if (version.length > MAX_LENGTH) { + return null + } + + var r = options.loose ? re[t.LOOSE] : re[t.FULL] + if (!r.test(version)) { + return null + } + + try { + return new SemVer(version, options) + } catch (er) { + return null + } +} + +exports.valid = valid +function valid (version, options) { + var v = parse(version, options) + return v ? v.version : null +} + +exports.clean = clean +function clean (version, options) { + var s = parse(version.trim().replace(/^[=v]+/, ''), options) + return s ? s.version : null +} + +exports.SemVer = SemVer + +function SemVer (version, options) { + if (!options || typeof options !== 'object') { + options = { + loose: !!options, + includePrerelease: false + } + } + if (version instanceof SemVer) { + if (version.loose === options.loose) { + return version + } else { + version = version.version + } + } else if (typeof version !== 'string') { + throw new TypeError('Invalid Version: ' + version) + } + + if (version.length > MAX_LENGTH) { + throw new TypeError('version is longer than ' + MAX_LENGTH + ' characters') + } + + if (!(this instanceof SemVer)) { + return new SemVer(version, options) + } + + debug('SemVer', version, options) + this.options = options + this.loose = !!options.loose + + var m = version.trim().match(options.loose ? re[t.LOOSE] : re[t.FULL]) + + if (!m) { + throw new TypeError('Invalid Version: ' + version) + } + + this.raw = version + + // these are actually numbers + this.major = +m[1] + this.minor = +m[2] + this.patch = +m[3] + + if (this.major > MAX_SAFE_INTEGER || this.major < 0) { + throw new TypeError('Invalid major version') + } + + if (this.minor > MAX_SAFE_INTEGER || this.minor < 0) { + throw new TypeError('Invalid minor version') + } + + if (this.patch > MAX_SAFE_INTEGER || this.patch < 0) { + throw new TypeError('Invalid patch version') + } + + // numberify any prerelease numeric ids + if (!m[4]) { + this.prerelease = [] + } else { + this.prerelease = m[4].split('.').map(function (id) { + if (/^[0-9]+$/.test(id)) { + var num = +id + if (num >= 0 && num < MAX_SAFE_INTEGER) { + return num + } + } + return id + }) + } + + this.build = m[5] ? m[5].split('.') : [] + this.format() +} + +SemVer.prototype.format = function () { + this.version = this.major + '.' + this.minor + '.' + this.patch + if (this.prerelease.length) { + this.version += '-' + this.prerelease.join('.') + } + return this.version +} + +SemVer.prototype.toString = function () { + return this.version +} + +SemVer.prototype.compare = function (other) { + debug('SemVer.compare', this.version, this.options, other) + if (!(other instanceof SemVer)) { + other = new SemVer(other, this.options) + } + + return this.compareMain(other) || this.comparePre(other) +} + +SemVer.prototype.compareMain = function (other) { + if (!(other instanceof SemVer)) { + other = new SemVer(other, this.options) + } + + return compareIdentifiers(this.major, other.major) || + compareIdentifiers(this.minor, other.minor) || + compareIdentifiers(this.patch, other.patch) +} + +SemVer.prototype.comparePre = function (other) { + if (!(other instanceof SemVer)) { + other = new SemVer(other, this.options) + } + + // NOT having a prerelease is > having one + if (this.prerelease.length && !other.prerelease.length) { + return -1 + } else if (!this.prerelease.length && other.prerelease.length) { + return 1 + } else if (!this.prerelease.length && !other.prerelease.length) { + return 0 + } + + var i = 0 + do { + var a = this.prerelease[i] + var b = other.prerelease[i] + debug('prerelease compare', i, a, b) + if (a === undefined && b === undefined) { + return 0 + } else if (b === undefined) { + return 1 + } else if (a === undefined) { + return -1 + } else if (a === b) { + continue + } else { + return compareIdentifiers(a, b) + } + } while (++i) +} + +SemVer.prototype.compareBuild = function (other) { + if (!(other instanceof SemVer)) { + other = new SemVer(other, this.options) + } + + var i = 0 + do { + var a = this.build[i] + var b = other.build[i] + debug('prerelease compare', i, a, b) + if (a === undefined && b === undefined) { + return 0 + } else if (b === undefined) { + return 1 + } else if (a === undefined) { + return -1 + } else if (a === b) { + continue + } else { + return compareIdentifiers(a, b) + } + } while (++i) +} + +// preminor will bump the version up to the next minor release, and immediately +// down to pre-release. premajor and prepatch work the same way. +SemVer.prototype.inc = function (release, identifier) { + switch (release) { + case 'premajor': + this.prerelease.length = 0 + this.patch = 0 + this.minor = 0 + this.major++ + this.inc('pre', identifier) + break + case 'preminor': + this.prerelease.length = 0 + this.patch = 0 + this.minor++ + this.inc('pre', identifier) + break + case 'prepatch': + // If this is already a prerelease, it will bump to the next version + // drop any prereleases that might already exist, since they are not + // relevant at this point. + this.prerelease.length = 0 + this.inc('patch', identifier) + this.inc('pre', identifier) + break + // If the input is a non-prerelease version, this acts the same as + // prepatch. + case 'prerelease': + if (this.prerelease.length === 0) { + this.inc('patch', identifier) + } + this.inc('pre', identifier) + break + + case 'major': + // If this is a pre-major version, bump up to the same major version. + // Otherwise increment major. + // 1.0.0-5 bumps to 1.0.0 + // 1.1.0 bumps to 2.0.0 + if (this.minor !== 0 || + this.patch !== 0 || + this.prerelease.length === 0) { + this.major++ + } + this.minor = 0 + this.patch = 0 + this.prerelease = [] + break + case 'minor': + // If this is a pre-minor version, bump up to the same minor version. + // Otherwise increment minor. + // 1.2.0-5 bumps to 1.2.0 + // 1.2.1 bumps to 1.3.0 + if (this.patch !== 0 || this.prerelease.length === 0) { + this.minor++ + } + this.patch = 0 + this.prerelease = [] + break + case 'patch': + // If this is not a pre-release version, it will increment the patch. + // If it is a pre-release it will bump up to the same patch version. + // 1.2.0-5 patches to 1.2.0 + // 1.2.0 patches to 1.2.1 + if (this.prerelease.length === 0) { + this.patch++ + } + this.prerelease = [] + break + // This probably shouldn't be used publicly. + // 1.0.0 "pre" would become 1.0.0-0 which is the wrong direction. + case 'pre': + if (this.prerelease.length === 0) { + this.prerelease = [0] + } else { + var i = this.prerelease.length + while (--i >= 0) { + if (typeof this.prerelease[i] === 'number') { + this.prerelease[i]++ + i = -2 + } + } + if (i === -1) { + // didn't increment anything + this.prerelease.push(0) + } + } + if (identifier) { + // 1.2.0-beta.1 bumps to 1.2.0-beta.2, + // 1.2.0-beta.fooblz or 1.2.0-beta bumps to 1.2.0-beta.0 + if (this.prerelease[0] === identifier) { + if (isNaN(this.prerelease[1])) { + this.prerelease = [identifier, 0] + } + } else { + this.prerelease = [identifier, 0] + } + } + break + + default: + throw new Error('invalid increment argument: ' + release) + } + this.format() + this.raw = this.version + return this +} + +exports.inc = inc +function inc (version, release, loose, identifier) { + if (typeof (loose) === 'string') { + identifier = loose + loose = undefined + } + + try { + return new SemVer(version, loose).inc(release, identifier).version + } catch (er) { + return null + } +} + +exports.diff = diff +function diff (version1, version2) { + if (eq(version1, version2)) { + return null + } else { + var v1 = parse(version1) + var v2 = parse(version2) + var prefix = '' + if (v1.prerelease.length || v2.prerelease.length) { + prefix = 'pre' + var defaultResult = 'prerelease' + } + for (var key in v1) { + if (key === 'major' || key === 'minor' || key === 'patch') { + if (v1[key] !== v2[key]) { + return prefix + key + } + } + } + return defaultResult // may be undefined + } +} + +exports.compareIdentifiers = compareIdentifiers + +var numeric = /^[0-9]+$/ +function compareIdentifiers (a, b) { + var anum = numeric.test(a) + var bnum = numeric.test(b) + + if (anum && bnum) { + a = +a + b = +b + } + + return a === b ? 0 + : (anum && !bnum) ? -1 + : (bnum && !anum) ? 1 + : a < b ? -1 + : 1 +} + +exports.rcompareIdentifiers = rcompareIdentifiers +function rcompareIdentifiers (a, b) { + return compareIdentifiers(b, a) +} + +exports.major = major +function major (a, loose) { + return new SemVer(a, loose).major +} + +exports.minor = minor +function minor (a, loose) { + return new SemVer(a, loose).minor +} + +exports.patch = patch +function patch (a, loose) { + return new SemVer(a, loose).patch +} + +exports.compare = compare +function compare (a, b, loose) { + return new SemVer(a, loose).compare(new SemVer(b, loose)) +} + +exports.compareLoose = compareLoose +function compareLoose (a, b) { + return compare(a, b, true) +} + +exports.compareBuild = compareBuild +function compareBuild (a, b, loose) { + var versionA = new SemVer(a, loose) + var versionB = new SemVer(b, loose) + return versionA.compare(versionB) || versionA.compareBuild(versionB) +} + +exports.rcompare = rcompare +function rcompare (a, b, loose) { + return compare(b, a, loose) +} + +exports.sort = sort +function sort (list, loose) { + return list.sort(function (a, b) { + return exports.compareBuild(a, b, loose) + }) +} + +exports.rsort = rsort +function rsort (list, loose) { + return list.sort(function (a, b) { + return exports.compareBuild(b, a, loose) + }) +} + +exports.gt = gt +function gt (a, b, loose) { + return compare(a, b, loose) > 0 +} + +exports.lt = lt +function lt (a, b, loose) { + return compare(a, b, loose) < 0 +} + +exports.eq = eq +function eq (a, b, loose) { + return compare(a, b, loose) === 0 +} + +exports.neq = neq +function neq (a, b, loose) { + return compare(a, b, loose) !== 0 +} + +exports.gte = gte +function gte (a, b, loose) { + return compare(a, b, loose) >= 0 +} + +exports.lte = lte +function lte (a, b, loose) { + return compare(a, b, loose) <= 0 +} + +exports.cmp = cmp +function cmp (a, op, b, loose) { + switch (op) { + case '===': + if (typeof a === 'object') + a = a.version + if (typeof b === 'object') + b = b.version + return a === b + + case '!==': + if (typeof a === 'object') + a = a.version + if (typeof b === 'object') + b = b.version + return a !== b + + case '': + case '=': + case '==': + return eq(a, b, loose) + + case '!=': + return neq(a, b, loose) + + case '>': + return gt(a, b, loose) + + case '>=': + return gte(a, b, loose) + + case '<': + return lt(a, b, loose) + + case '<=': + return lte(a, b, loose) + + default: + throw new TypeError('Invalid operator: ' + op) + } +} + +exports.Comparator = Comparator +function Comparator (comp, options) { + if (!options || typeof options !== 'object') { + options = { + loose: !!options, + includePrerelease: false + } + } + + if (comp instanceof Comparator) { + if (comp.loose === !!options.loose) { + return comp + } else { + comp = comp.value + } + } + + if (!(this instanceof Comparator)) { + return new Comparator(comp, options) + } + + debug('comparator', comp, options) + this.options = options + this.loose = !!options.loose + this.parse(comp) + + if (this.semver === ANY) { + this.value = '' + } else { + this.value = this.operator + this.semver.version + } + + debug('comp', this) +} + +var ANY = {} +Comparator.prototype.parse = function (comp) { + var r = this.options.loose ? re[t.COMPARATORLOOSE] : re[t.COMPARATOR] + var m = comp.match(r) + + if (!m) { + throw new TypeError('Invalid comparator: ' + comp) + } + + this.operator = m[1] !== undefined ? m[1] : '' + if (this.operator === '=') { + this.operator = '' + } + + // if it literally is just '>' or '' then allow anything. + if (!m[2]) { + this.semver = ANY + } else { + this.semver = new SemVer(m[2], this.options.loose) + } +} + +Comparator.prototype.toString = function () { + return this.value +} + +Comparator.prototype.test = function (version) { + debug('Comparator.test', version, this.options.loose) + + if (this.semver === ANY || version === ANY) { + return true + } + + if (typeof version === 'string') { + try { + version = new SemVer(version, this.options) + } catch (er) { + return false + } + } + + return cmp(version, this.operator, this.semver, this.options) +} + +Comparator.prototype.intersects = function (comp, options) { + if (!(comp instanceof Comparator)) { + throw new TypeError('a Comparator is required') + } + + if (!options || typeof options !== 'object') { + options = { + loose: !!options, + includePrerelease: false + } + } + + var rangeTmp + + if (this.operator === '') { + if (this.value === '') { + return true + } + rangeTmp = new Range(comp.value, options) + return satisfies(this.value, rangeTmp, options) + } else if (comp.operator === '') { + if (comp.value === '') { + return true + } + rangeTmp = new Range(this.value, options) + return satisfies(comp.semver, rangeTmp, options) + } + + var sameDirectionIncreasing = + (this.operator === '>=' || this.operator === '>') && + (comp.operator === '>=' || comp.operator === '>') + var sameDirectionDecreasing = + (this.operator === '<=' || this.operator === '<') && + (comp.operator === '<=' || comp.operator === '<') + var sameSemVer = this.semver.version === comp.semver.version + var differentDirectionsInclusive = + (this.operator === '>=' || this.operator === '<=') && + (comp.operator === '>=' || comp.operator === '<=') + var oppositeDirectionsLessThan = + cmp(this.semver, '<', comp.semver, options) && + ((this.operator === '>=' || this.operator === '>') && + (comp.operator === '<=' || comp.operator === '<')) + var oppositeDirectionsGreaterThan = + cmp(this.semver, '>', comp.semver, options) && + ((this.operator === '<=' || this.operator === '<') && + (comp.operator === '>=' || comp.operator === '>')) + + return sameDirectionIncreasing || sameDirectionDecreasing || + (sameSemVer && differentDirectionsInclusive) || + oppositeDirectionsLessThan || oppositeDirectionsGreaterThan +} + +exports.Range = Range +function Range (range, options) { + if (!options || typeof options !== 'object') { + options = { + loose: !!options, + includePrerelease: false + } + } + + if (range instanceof Range) { + if (range.loose === !!options.loose && + range.includePrerelease === !!options.includePrerelease) { + return range + } else { + return new Range(range.raw, options) + } + } + + if (range instanceof Comparator) { + return new Range(range.value, options) + } + + if (!(this instanceof Range)) { + return new Range(range, options) + } + + this.options = options + this.loose = !!options.loose + this.includePrerelease = !!options.includePrerelease + + // First, split based on boolean or || + this.raw = range + this.set = range.split(/\s*\|\|\s*/).map(function (range) { + return this.parseRange(range.trim()) + }, this).filter(function (c) { + // throw out any that are not relevant for whatever reason + return c.length + }) + + if (!this.set.length) { + throw new TypeError('Invalid SemVer Range: ' + range) + } + + this.format() +} + +Range.prototype.format = function () { + this.range = this.set.map(function (comps) { + return comps.join(' ').trim() + }).join('||').trim() + return this.range +} + +Range.prototype.toString = function () { + return this.range +} + +Range.prototype.parseRange = function (range) { + var loose = this.options.loose + range = range.trim() + // `1.2.3 - 1.2.4` => `>=1.2.3 <=1.2.4` + var hr = loose ? re[t.HYPHENRANGELOOSE] : re[t.HYPHENRANGE] + range = range.replace(hr, hyphenReplace) + debug('hyphen replace', range) + // `> 1.2.3 < 1.2.5` => `>1.2.3 <1.2.5` + range = range.replace(re[t.COMPARATORTRIM], comparatorTrimReplace) + debug('comparator trim', range, re[t.COMPARATORTRIM]) + + // `~ 1.2.3` => `~1.2.3` + range = range.replace(re[t.TILDETRIM], tildeTrimReplace) + + // `^ 1.2.3` => `^1.2.3` + range = range.replace(re[t.CARETTRIM], caretTrimReplace) + + // normalize spaces + range = range.split(/\s+/).join(' ') + + // At this point, the range is completely trimmed and + // ready to be split into comparators. + + var compRe = loose ? re[t.COMPARATORLOOSE] : re[t.COMPARATOR] + var set = range.split(' ').map(function (comp) { + return parseComparator(comp, this.options) + }, this).join(' ').split(/\s+/) + if (this.options.loose) { + // in loose mode, throw out any that are not valid comparators + set = set.filter(function (comp) { + return !!comp.match(compRe) + }) + } + set = set.map(function (comp) { + return new Comparator(comp, this.options) + }, this) + + return set +} + +Range.prototype.intersects = function (range, options) { + if (!(range instanceof Range)) { + throw new TypeError('a Range is required') + } + + return this.set.some(function (thisComparators) { + return ( + isSatisfiable(thisComparators, options) && + range.set.some(function (rangeComparators) { + return ( + isSatisfiable(rangeComparators, options) && + thisComparators.every(function (thisComparator) { + return rangeComparators.every(function (rangeComparator) { + return thisComparator.intersects(rangeComparator, options) + }) + }) + ) + }) + ) + }) +} + +// take a set of comparators and determine whether there +// exists a version which can satisfy it +function isSatisfiable (comparators, options) { + var result = true + var remainingComparators = comparators.slice() + var testComparator = remainingComparators.pop() + + while (result && remainingComparators.length) { + result = remainingComparators.every(function (otherComparator) { + return testComparator.intersects(otherComparator, options) + }) + + testComparator = remainingComparators.pop() + } + + return result +} + +// Mostly just for testing and legacy API reasons +exports.toComparators = toComparators +function toComparators (range, options) { + return new Range(range, options).set.map(function (comp) { + return comp.map(function (c) { + return c.value + }).join(' ').trim().split(' ') + }) +} + +// comprised of xranges, tildes, stars, and gtlt's at this point. +// already replaced the hyphen ranges +// turn into a set of JUST comparators. +function parseComparator (comp, options) { + debug('comp', comp, options) + comp = replaceCarets(comp, options) + debug('caret', comp) + comp = replaceTildes(comp, options) + debug('tildes', comp) + comp = replaceXRanges(comp, options) + debug('xrange', comp) + comp = replaceStars(comp, options) + debug('stars', comp) + return comp +} + +function isX (id) { + return !id || id.toLowerCase() === 'x' || id === '*' +} + +// ~, ~> --> * (any, kinda silly) +// ~2, ~2.x, ~2.x.x, ~>2, ~>2.x ~>2.x.x --> >=2.0.0 <3.0.0 +// ~2.0, ~2.0.x, ~>2.0, ~>2.0.x --> >=2.0.0 <2.1.0 +// ~1.2, ~1.2.x, ~>1.2, ~>1.2.x --> >=1.2.0 <1.3.0 +// ~1.2.3, ~>1.2.3 --> >=1.2.3 <1.3.0 +// ~1.2.0, ~>1.2.0 --> >=1.2.0 <1.3.0 +function replaceTildes (comp, options) { + return comp.trim().split(/\s+/).map(function (comp) { + return replaceTilde(comp, options) + }).join(' ') +} + +function replaceTilde (comp, options) { + var r = options.loose ? re[t.TILDELOOSE] : re[t.TILDE] + return comp.replace(r, function (_, M, m, p, pr) { + debug('tilde', comp, _, M, m, p, pr) + var ret + + if (isX(M)) { + ret = '' + } else if (isX(m)) { + ret = '>=' + M + '.0.0 <' + (+M + 1) + '.0.0' + } else if (isX(p)) { + // ~1.2 == >=1.2.0 <1.3.0 + ret = '>=' + M + '.' + m + '.0 <' + M + '.' + (+m + 1) + '.0' + } else if (pr) { + debug('replaceTilde pr', pr) + ret = '>=' + M + '.' + m + '.' + p + '-' + pr + + ' <' + M + '.' + (+m + 1) + '.0' + } else { + // ~1.2.3 == >=1.2.3 <1.3.0 + ret = '>=' + M + '.' + m + '.' + p + + ' <' + M + '.' + (+m + 1) + '.0' + } + + debug('tilde return', ret) + return ret + }) +} + +// ^ --> * (any, kinda silly) +// ^2, ^2.x, ^2.x.x --> >=2.0.0 <3.0.0 +// ^2.0, ^2.0.x --> >=2.0.0 <3.0.0 +// ^1.2, ^1.2.x --> >=1.2.0 <2.0.0 +// ^1.2.3 --> >=1.2.3 <2.0.0 +// ^1.2.0 --> >=1.2.0 <2.0.0 +function replaceCarets (comp, options) { + return comp.trim().split(/\s+/).map(function (comp) { + return replaceCaret(comp, options) + }).join(' ') +} + +function replaceCaret (comp, options) { + debug('caret', comp, options) + var r = options.loose ? re[t.CARETLOOSE] : re[t.CARET] + return comp.replace(r, function (_, M, m, p, pr) { + debug('caret', comp, _, M, m, p, pr) + var ret + + if (isX(M)) { + ret = '' + } else if (isX(m)) { + ret = '>=' + M + '.0.0 <' + (+M + 1) + '.0.0' + } else if (isX(p)) { + if (M === '0') { + ret = '>=' + M + '.' + m + '.0 <' + M + '.' + (+m + 1) + '.0' + } else { + ret = '>=' + M + '.' + m + '.0 <' + (+M + 1) + '.0.0' + } + } else if (pr) { + debug('replaceCaret pr', pr) + if (M === '0') { + if (m === '0') { + ret = '>=' + M + '.' + m + '.' + p + '-' + pr + + ' <' + M + '.' + m + '.' + (+p + 1) + } else { + ret = '>=' + M + '.' + m + '.' + p + '-' + pr + + ' <' + M + '.' + (+m + 1) + '.0' + } + } else { + ret = '>=' + M + '.' + m + '.' + p + '-' + pr + + ' <' + (+M + 1) + '.0.0' + } + } else { + debug('no pr') + if (M === '0') { + if (m === '0') { + ret = '>=' + M + '.' + m + '.' + p + + ' <' + M + '.' + m + '.' + (+p + 1) + } else { + ret = '>=' + M + '.' + m + '.' + p + + ' <' + M + '.' + (+m + 1) + '.0' + } + } else { + ret = '>=' + M + '.' + m + '.' + p + + ' <' + (+M + 1) + '.0.0' + } + } + + debug('caret return', ret) + return ret + }) +} + +function replaceXRanges (comp, options) { + debug('replaceXRanges', comp, options) + return comp.split(/\s+/).map(function (comp) { + return replaceXRange(comp, options) + }).join(' ') +} + +function replaceXRange (comp, options) { + comp = comp.trim() + var r = options.loose ? re[t.XRANGELOOSE] : re[t.XRANGE] + return comp.replace(r, function (ret, gtlt, M, m, p, pr) { + debug('xRange', comp, ret, gtlt, M, m, p, pr) + var xM = isX(M) + var xm = xM || isX(m) + var xp = xm || isX(p) + var anyX = xp + + if (gtlt === '=' && anyX) { + gtlt = '' + } + + // if we're including prereleases in the match, then we need + // to fix this to -0, the lowest possible prerelease value + pr = options.includePrerelease ? '-0' : '' + + if (xM) { + if (gtlt === '>' || gtlt === '<') { + // nothing is allowed + ret = '<0.0.0-0' + } else { + // nothing is forbidden + ret = '*' + } + } else if (gtlt && anyX) { + // we know patch is an x, because we have any x at all. + // replace X with 0 + if (xm) { + m = 0 + } + p = 0 + + if (gtlt === '>') { + // >1 => >=2.0.0 + // >1.2 => >=1.3.0 + // >1.2.3 => >= 1.2.4 + gtlt = '>=' + if (xm) { + M = +M + 1 + m = 0 + p = 0 + } else { + m = +m + 1 + p = 0 + } + } else if (gtlt === '<=') { + // <=0.7.x is actually <0.8.0, since any 0.7.x should + // pass. Similarly, <=7.x is actually <8.0.0, etc. + gtlt = '<' + if (xm) { + M = +M + 1 + } else { + m = +m + 1 + } + } + + ret = gtlt + M + '.' + m + '.' + p + pr + } else if (xm) { + ret = '>=' + M + '.0.0' + pr + ' <' + (+M + 1) + '.0.0' + pr + } else if (xp) { + ret = '>=' + M + '.' + m + '.0' + pr + + ' <' + M + '.' + (+m + 1) + '.0' + pr + } + + debug('xRange return', ret) + + return ret + }) +} + +// Because * is AND-ed with everything else in the comparator, +// and '' means "any version", just remove the *s entirely. +function replaceStars (comp, options) { + debug('replaceStars', comp, options) + // Looseness is ignored here. star is always as loose as it gets! + return comp.trim().replace(re[t.STAR], '') +} + +// This function is passed to string.replace(re[t.HYPHENRANGE]) +// M, m, patch, prerelease, build +// 1.2 - 3.4.5 => >=1.2.0 <=3.4.5 +// 1.2.3 - 3.4 => >=1.2.0 <3.5.0 Any 3.4.x will do +// 1.2 - 3.4 => >=1.2.0 <3.5.0 +function hyphenReplace ($0, + from, fM, fm, fp, fpr, fb, + to, tM, tm, tp, tpr, tb) { + if (isX(fM)) { + from = '' + } else if (isX(fm)) { + from = '>=' + fM + '.0.0' + } else if (isX(fp)) { + from = '>=' + fM + '.' + fm + '.0' + } else { + from = '>=' + from + } + + if (isX(tM)) { + to = '' + } else if (isX(tm)) { + to = '<' + (+tM + 1) + '.0.0' + } else if (isX(tp)) { + to = '<' + tM + '.' + (+tm + 1) + '.0' + } else if (tpr) { + to = '<=' + tM + '.' + tm + '.' + tp + '-' + tpr + } else { + to = '<=' + to + } + + return (from + ' ' + to).trim() +} + +// if ANY of the sets match ALL of its comparators, then pass +Range.prototype.test = function (version) { + if (!version) { + return false + } + + if (typeof version === 'string') { + try { + version = new SemVer(version, this.options) + } catch (er) { + return false + } + } + + for (var i = 0; i < this.set.length; i++) { + if (testSet(this.set[i], version, this.options)) { + return true + } + } + return false +} + +function testSet (set, version, options) { + for (var i = 0; i < set.length; i++) { + if (!set[i].test(version)) { + return false + } + } + + if (version.prerelease.length && !options.includePrerelease) { + // Find the set of versions that are allowed to have prereleases + // For example, ^1.2.3-pr.1 desugars to >=1.2.3-pr.1 <2.0.0 + // That should allow `1.2.3-pr.2` to pass. + // However, `1.2.4-alpha.notready` should NOT be allowed, + // even though it's within the range set by the comparators. + for (i = 0; i < set.length; i++) { + debug(set[i].semver) + if (set[i].semver === ANY) { + continue + } + + if (set[i].semver.prerelease.length > 0) { + var allowed = set[i].semver + if (allowed.major === version.major && + allowed.minor === version.minor && + allowed.patch === version.patch) { + return true + } + } + } + + // Version has a -pre, but it's not one of the ones we like. + return false + } + + return true +} + +exports.satisfies = satisfies +function satisfies (version, range, options) { + try { + range = new Range(range, options) + } catch (er) { + return false + } + return range.test(version) +} + +exports.maxSatisfying = maxSatisfying +function maxSatisfying (versions, range, options) { + var max = null + var maxSV = null + try { + var rangeObj = new Range(range, options) + } catch (er) { + return null + } + versions.forEach(function (v) { + if (rangeObj.test(v)) { + // satisfies(v, range, options) + if (!max || maxSV.compare(v) === -1) { + // compare(max, v, true) + max = v + maxSV = new SemVer(max, options) + } + } + }) + return max +} + +exports.minSatisfying = minSatisfying +function minSatisfying (versions, range, options) { + var min = null + var minSV = null + try { + var rangeObj = new Range(range, options) + } catch (er) { + return null + } + versions.forEach(function (v) { + if (rangeObj.test(v)) { + // satisfies(v, range, options) + if (!min || minSV.compare(v) === 1) { + // compare(min, v, true) + min = v + minSV = new SemVer(min, options) + } + } + }) + return min +} + +exports.minVersion = minVersion +function minVersion (range, loose) { + range = new Range(range, loose) + + var minver = new SemVer('0.0.0') + if (range.test(minver)) { + return minver + } + + minver = new SemVer('0.0.0-0') + if (range.test(minver)) { + return minver + } + + minver = null + for (var i = 0; i < range.set.length; ++i) { + var comparators = range.set[i] + + comparators.forEach(function (comparator) { + // Clone to avoid manipulating the comparator's semver object. + var compver = new SemVer(comparator.semver.version) + switch (comparator.operator) { + case '>': + if (compver.prerelease.length === 0) { + compver.patch++ + } else { + compver.prerelease.push(0) + } + compver.raw = compver.format() + /* fallthrough */ + case '': + case '>=': + if (!minver || gt(minver, compver)) { + minver = compver + } + break + case '<': + case '<=': + /* Ignore maximum versions */ + break + /* istanbul ignore next */ + default: + throw new Error('Unexpected operation: ' + comparator.operator) + } + }) + } + + if (minver && range.test(minver)) { + return minver + } + + return null +} + +exports.validRange = validRange +function validRange (range, options) { + try { + // Return '*' instead of '' so that truthiness works. + // This will throw if it's invalid anyway + return new Range(range, options).range || '*' + } catch (er) { + return null + } +} + +// Determine if version is less than all the versions possible in the range +exports.ltr = ltr +function ltr (version, range, options) { + return outside(version, range, '<', options) +} + +// Determine if version is greater than all the versions possible in the range. +exports.gtr = gtr +function gtr (version, range, options) { + return outside(version, range, '>', options) +} + +exports.outside = outside +function outside (version, range, hilo, options) { + version = new SemVer(version, options) + range = new Range(range, options) + + var gtfn, ltefn, ltfn, comp, ecomp + switch (hilo) { + case '>': + gtfn = gt + ltefn = lte + ltfn = lt + comp = '>' + ecomp = '>=' + break + case '<': + gtfn = lt + ltefn = gte + ltfn = gt + comp = '<' + ecomp = '<=' + break + default: + throw new TypeError('Must provide a hilo val of "<" or ">"') + } + + // If it satisifes the range it is not outside + if (satisfies(version, range, options)) { + return false + } + + // From now on, variable terms are as if we're in "gtr" mode. + // but note that everything is flipped for the "ltr" function. + + for (var i = 0; i < range.set.length; ++i) { + var comparators = range.set[i] + + var high = null + var low = null + + comparators.forEach(function (comparator) { + if (comparator.semver === ANY) { + comparator = new Comparator('>=0.0.0') + } + high = high || comparator + low = low || comparator + if (gtfn(comparator.semver, high.semver, options)) { + high = comparator + } else if (ltfn(comparator.semver, low.semver, options)) { + low = comparator + } + }) + + // If the edge version comparator has a operator then our version + // isn't outside it + if (high.operator === comp || high.operator === ecomp) { + return false + } + + // If the lowest version comparator has an operator and our version + // is less than it then it isn't higher than the range + if ((!low.operator || low.operator === comp) && + ltefn(version, low.semver)) { + return false + } else if (low.operator === ecomp && ltfn(version, low.semver)) { + return false + } + } + return true +} + +exports.prerelease = prerelease +function prerelease (version, options) { + var parsed = parse(version, options) + return (parsed && parsed.prerelease.length) ? parsed.prerelease : null +} + +exports.intersects = intersects +function intersects (r1, r2, options) { + r1 = new Range(r1, options) + r2 = new Range(r2, options) + return r1.intersects(r2) +} + +exports.coerce = coerce +function coerce (version, options) { + if (version instanceof SemVer) { + return version + } + + if (typeof version === 'number') { + version = String(version) + } + + if (typeof version !== 'string') { + return null + } + + options = options || {} + + var match = null + if (!options.rtl) { + match = version.match(re[t.COERCE]) + } else { + // Find the right-most coercible string that does not share + // a terminus with a more left-ward coercible string. + // Eg, '1.2.3.4' wants to coerce '2.3.4', not '3.4' or '4' + // + // Walk through the string checking with a /g regexp + // Manually set the index so as to pick up overlapping matches. + // Stop when we get a match that ends at the string end, since no + // coercible string can be more right-ward without the same terminus. + var next + while ((next = re[t.COERCERTL].exec(version)) && + (!match || match.index + match[0].length !== version.length) + ) { + if (!match || + next.index + next[0].length !== match.index + match[0].length) { + match = next + } + re[t.COERCERTL].lastIndex = next.index + next[1].length + next[2].length + } + // leave it in a clean state + re[t.COERCERTL].lastIndex = -1 + } + + if (match === null) { + return null + } + + return parse(match[2] + + '.' + (match[3] || '0') + + '.' + (match[4] || '0'), options) +} + + +/***/ }), + +/***/ 623: +/***/ (function(module, __unused_webpack_exports, __nccwpck_require__) { + +/* module decorator */ module = __nccwpck_require__.nmd(module); +//! moment.js +//! version : 2.29.1 +//! authors : Tim Wood, Iskren Chernev, Moment.js contributors +//! license : MIT +//! momentjs.com + +;(function (global, factory) { + true ? module.exports = factory() : + 0 +}(this, (function () { 'use strict'; + + var hookCallback; + + function hooks() { + return hookCallback.apply(null, arguments); + } + + // This is done to register the method called with moment() + // without creating circular dependencies. + function setHookCallback(callback) { + hookCallback = callback; + } + + function isArray(input) { + return ( + input instanceof Array || + Object.prototype.toString.call(input) === '[object Array]' + ); + } + + function isObject(input) { + // IE8 will treat undefined and null as object if it wasn't for + // input != null + return ( + input != null && + Object.prototype.toString.call(input) === '[object Object]' + ); + } + + function hasOwnProp(a, b) { + return Object.prototype.hasOwnProperty.call(a, b); + } + + function isObjectEmpty(obj) { + if (Object.getOwnPropertyNames) { + return Object.getOwnPropertyNames(obj).length === 0; + } else { + var k; + for (k in obj) { + if (hasOwnProp(obj, k)) { + return false; + } + } + return true; + } + } + + function isUndefined(input) { + return input === void 0; + } + + function isNumber(input) { + return ( + typeof input === 'number' || + Object.prototype.toString.call(input) === '[object Number]' + ); + } + + function isDate(input) { + return ( + input instanceof Date || + Object.prototype.toString.call(input) === '[object Date]' + ); + } + + function map(arr, fn) { + var res = [], + i; + for (i = 0; i < arr.length; ++i) { + res.push(fn(arr[i], i)); + } + return res; + } + + function extend(a, b) { + for (var i in b) { + if (hasOwnProp(b, i)) { + a[i] = b[i]; + } + } + + if (hasOwnProp(b, 'toString')) { + a.toString = b.toString; + } + + if (hasOwnProp(b, 'valueOf')) { + a.valueOf = b.valueOf; + } + + return a; + } + + function createUTC(input, format, locale, strict) { + return createLocalOrUTC(input, format, locale, strict, true).utc(); + } + + function defaultParsingFlags() { + // We need to deep clone this object. + return { + empty: false, + unusedTokens: [], + unusedInput: [], + overflow: -2, + charsLeftOver: 0, + nullInput: false, + invalidEra: null, + invalidMonth: null, + invalidFormat: false, + userInvalidated: false, + iso: false, + parsedDateParts: [], + era: null, + meridiem: null, + rfc2822: false, + weekdayMismatch: false, + }; + } + + function getParsingFlags(m) { + if (m._pf == null) { + m._pf = defaultParsingFlags(); + } + return m._pf; + } + + var some; + if (Array.prototype.some) { + some = Array.prototype.some; + } else { + some = function (fun) { + var t = Object(this), + len = t.length >>> 0, + i; + + for (i = 0; i < len; i++) { + if (i in t && fun.call(this, t[i], i, t)) { + return true; + } + } + + return false; + }; + } + + function isValid(m) { + if (m._isValid == null) { + var flags = getParsingFlags(m), + parsedParts = some.call(flags.parsedDateParts, function (i) { + return i != null; + }), + isNowValid = + !isNaN(m._d.getTime()) && + flags.overflow < 0 && + !flags.empty && + !flags.invalidEra && + !flags.invalidMonth && + !flags.invalidWeekday && + !flags.weekdayMismatch && + !flags.nullInput && + !flags.invalidFormat && + !flags.userInvalidated && + (!flags.meridiem || (flags.meridiem && parsedParts)); + + if (m._strict) { + isNowValid = + isNowValid && + flags.charsLeftOver === 0 && + flags.unusedTokens.length === 0 && + flags.bigHour === undefined; + } + + if (Object.isFrozen == null || !Object.isFrozen(m)) { + m._isValid = isNowValid; + } else { + return isNowValid; + } + } + return m._isValid; + } + + function createInvalid(flags) { + var m = createUTC(NaN); + if (flags != null) { + extend(getParsingFlags(m), flags); + } else { + getParsingFlags(m).userInvalidated = true; + } + + return m; + } + + // Plugins that add properties should also add the key here (null value), + // so we can properly clone ourselves. + var momentProperties = (hooks.momentProperties = []), + updateInProgress = false; + + function copyConfig(to, from) { + var i, prop, val; + + if (!isUndefined(from._isAMomentObject)) { + to._isAMomentObject = from._isAMomentObject; + } + if (!isUndefined(from._i)) { + to._i = from._i; + } + if (!isUndefined(from._f)) { + to._f = from._f; + } + if (!isUndefined(from._l)) { + to._l = from._l; + } + if (!isUndefined(from._strict)) { + to._strict = from._strict; + } + if (!isUndefined(from._tzm)) { + to._tzm = from._tzm; + } + if (!isUndefined(from._isUTC)) { + to._isUTC = from._isUTC; + } + if (!isUndefined(from._offset)) { + to._offset = from._offset; + } + if (!isUndefined(from._pf)) { + to._pf = getParsingFlags(from); + } + if (!isUndefined(from._locale)) { + to._locale = from._locale; + } + + if (momentProperties.length > 0) { + for (i = 0; i < momentProperties.length; i++) { + prop = momentProperties[i]; + val = from[prop]; + if (!isUndefined(val)) { + to[prop] = val; + } + } + } + + return to; + } + + // Moment prototype object + function Moment(config) { + copyConfig(this, config); + this._d = new Date(config._d != null ? config._d.getTime() : NaN); + if (!this.isValid()) { + this._d = new Date(NaN); + } + // Prevent infinite loop in case updateOffset creates new moment + // objects. + if (updateInProgress === false) { + updateInProgress = true; + hooks.updateOffset(this); + updateInProgress = false; + } + } + + function isMoment(obj) { + return ( + obj instanceof Moment || (obj != null && obj._isAMomentObject != null) + ); + } + + function warn(msg) { + if ( + hooks.suppressDeprecationWarnings === false && + typeof console !== 'undefined' && + console.warn + ) { + console.warn('Deprecation warning: ' + msg); + } + } + + function deprecate(msg, fn) { + var firstTime = true; + + return extend(function () { + if (hooks.deprecationHandler != null) { + hooks.deprecationHandler(null, msg); + } + if (firstTime) { + var args = [], + arg, + i, + key; + for (i = 0; i < arguments.length; i++) { + arg = ''; + if (typeof arguments[i] === 'object') { + arg += '\n[' + i + '] '; + for (key in arguments[0]) { + if (hasOwnProp(arguments[0], key)) { + arg += key + ': ' + arguments[0][key] + ', '; + } + } + arg = arg.slice(0, -2); // Remove trailing comma and space + } else { + arg = arguments[i]; + } + args.push(arg); + } + warn( + msg + + '\nArguments: ' + + Array.prototype.slice.call(args).join('') + + '\n' + + new Error().stack + ); + firstTime = false; + } + return fn.apply(this, arguments); + }, fn); + } + + var deprecations = {}; + + function deprecateSimple(name, msg) { + if (hooks.deprecationHandler != null) { + hooks.deprecationHandler(name, msg); + } + if (!deprecations[name]) { + warn(msg); + deprecations[name] = true; + } + } + + hooks.suppressDeprecationWarnings = false; + hooks.deprecationHandler = null; + + function isFunction(input) { + return ( + (typeof Function !== 'undefined' && input instanceof Function) || + Object.prototype.toString.call(input) === '[object Function]' + ); + } + + function set(config) { + var prop, i; + for (i in config) { + if (hasOwnProp(config, i)) { + prop = config[i]; + if (isFunction(prop)) { + this[i] = prop; + } else { + this['_' + i] = prop; + } + } + } + this._config = config; + // Lenient ordinal parsing accepts just a number in addition to + // number + (possibly) stuff coming from _dayOfMonthOrdinalParse. + // TODO: Remove "ordinalParse" fallback in next major release. + this._dayOfMonthOrdinalParseLenient = new RegExp( + (this._dayOfMonthOrdinalParse.source || this._ordinalParse.source) + + '|' + + /\d{1,2}/.source + ); + } + + function mergeConfigs(parentConfig, childConfig) { + var res = extend({}, parentConfig), + prop; + for (prop in childConfig) { + if (hasOwnProp(childConfig, prop)) { + if (isObject(parentConfig[prop]) && isObject(childConfig[prop])) { + res[prop] = {}; + extend(res[prop], parentConfig[prop]); + extend(res[prop], childConfig[prop]); + } else if (childConfig[prop] != null) { + res[prop] = childConfig[prop]; + } else { + delete res[prop]; + } + } + } + for (prop in parentConfig) { + if ( + hasOwnProp(parentConfig, prop) && + !hasOwnProp(childConfig, prop) && + isObject(parentConfig[prop]) + ) { + // make sure changes to properties don't modify parent config + res[prop] = extend({}, res[prop]); + } + } + return res; + } + + function Locale(config) { + if (config != null) { + this.set(config); + } + } + + var keys; + + if (Object.keys) { + keys = Object.keys; + } else { + keys = function (obj) { + var i, + res = []; + for (i in obj) { + if (hasOwnProp(obj, i)) { + res.push(i); + } + } + return res; + }; + } + + var defaultCalendar = { + sameDay: '[Today at] LT', + nextDay: '[Tomorrow at] LT', + nextWeek: 'dddd [at] LT', + lastDay: '[Yesterday at] LT', + lastWeek: '[Last] dddd [at] LT', + sameElse: 'L', + }; + + function calendar(key, mom, now) { + var output = this._calendar[key] || this._calendar['sameElse']; + return isFunction(output) ? output.call(mom, now) : output; + } + + function zeroFill(number, targetLength, forceSign) { + var absNumber = '' + Math.abs(number), + zerosToFill = targetLength - absNumber.length, + sign = number >= 0; + return ( + (sign ? (forceSign ? '+' : '') : '-') + + Math.pow(10, Math.max(0, zerosToFill)).toString().substr(1) + + absNumber + ); + } + + var formattingTokens = /(\[[^\[]*\])|(\\)?([Hh]mm(ss)?|Mo|MM?M?M?|Do|DDDo|DD?D?D?|ddd?d?|do?|w[o|w]?|W[o|W]?|Qo?|N{1,5}|YYYYYY|YYYYY|YYYY|YY|y{2,4}|yo?|gg(ggg?)?|GG(GGG?)?|e|E|a|A|hh?|HH?|kk?|mm?|ss?|S{1,9}|x|X|zz?|ZZ?|.)/g, + localFormattingTokens = /(\[[^\[]*\])|(\\)?(LTS|LT|LL?L?L?|l{1,4})/g, + formatFunctions = {}, + formatTokenFunctions = {}; + + // token: 'M' + // padded: ['MM', 2] + // ordinal: 'Mo' + // callback: function () { this.month() + 1 } + function addFormatToken(token, padded, ordinal, callback) { + var func = callback; + if (typeof callback === 'string') { + func = function () { + return this[callback](); + }; + } + if (token) { + formatTokenFunctions[token] = func; + } + if (padded) { + formatTokenFunctions[padded[0]] = function () { + return zeroFill(func.apply(this, arguments), padded[1], padded[2]); + }; + } + if (ordinal) { + formatTokenFunctions[ordinal] = function () { + return this.localeData().ordinal( + func.apply(this, arguments), + token + ); + }; + } + } + + function removeFormattingTokens(input) { + if (input.match(/\[[\s\S]/)) { + return input.replace(/^\[|\]$/g, ''); + } + return input.replace(/\\/g, ''); + } + + function makeFormatFunction(format) { + var array = format.match(formattingTokens), + i, + length; + + for (i = 0, length = array.length; i < length; i++) { + if (formatTokenFunctions[array[i]]) { + array[i] = formatTokenFunctions[array[i]]; + } else { + array[i] = removeFormattingTokens(array[i]); + } + } + + return function (mom) { + var output = '', + i; + for (i = 0; i < length; i++) { + output += isFunction(array[i]) + ? array[i].call(mom, format) + : array[i]; + } + return output; + }; + } + + // format date using native date object + function formatMoment(m, format) { + if (!m.isValid()) { + return m.localeData().invalidDate(); + } + + format = expandFormat(format, m.localeData()); + formatFunctions[format] = + formatFunctions[format] || makeFormatFunction(format); + + return formatFunctions[format](m); + } + + function expandFormat(format, locale) { + var i = 5; + + function replaceLongDateFormatTokens(input) { + return locale.longDateFormat(input) || input; + } + + localFormattingTokens.lastIndex = 0; + while (i >= 0 && localFormattingTokens.test(format)) { + format = format.replace( + localFormattingTokens, + replaceLongDateFormatTokens + ); + localFormattingTokens.lastIndex = 0; + i -= 1; + } + + return format; + } + + var defaultLongDateFormat = { + LTS: 'h:mm:ss A', + LT: 'h:mm A', + L: 'MM/DD/YYYY', + LL: 'MMMM D, YYYY', + LLL: 'MMMM D, YYYY h:mm A', + LLLL: 'dddd, MMMM D, YYYY h:mm A', + }; + + function longDateFormat(key) { + var format = this._longDateFormat[key], + formatUpper = this._longDateFormat[key.toUpperCase()]; + + if (format || !formatUpper) { + return format; + } + + this._longDateFormat[key] = formatUpper + .match(formattingTokens) + .map(function (tok) { + if ( + tok === 'MMMM' || + tok === 'MM' || + tok === 'DD' || + tok === 'dddd' + ) { + return tok.slice(1); + } + return tok; + }) + .join(''); + + return this._longDateFormat[key]; + } + + var defaultInvalidDate = 'Invalid date'; + + function invalidDate() { + return this._invalidDate; + } + + var defaultOrdinal = '%d', + defaultDayOfMonthOrdinalParse = /\d{1,2}/; + + function ordinal(number) { + return this._ordinal.replace('%d', number); + } + + var defaultRelativeTime = { + future: 'in %s', + past: '%s ago', + s: 'a few seconds', + ss: '%d seconds', + m: 'a minute', + mm: '%d minutes', + h: 'an hour', + hh: '%d hours', + d: 'a day', + dd: '%d days', + w: 'a week', + ww: '%d weeks', + M: 'a month', + MM: '%d months', + y: 'a year', + yy: '%d years', + }; + + function relativeTime(number, withoutSuffix, string, isFuture) { + var output = this._relativeTime[string]; + return isFunction(output) + ? output(number, withoutSuffix, string, isFuture) + : output.replace(/%d/i, number); + } + + function pastFuture(diff, output) { + var format = this._relativeTime[diff > 0 ? 'future' : 'past']; + return isFunction(format) ? format(output) : format.replace(/%s/i, output); + } + + var aliases = {}; + + function addUnitAlias(unit, shorthand) { + var lowerCase = unit.toLowerCase(); + aliases[lowerCase] = aliases[lowerCase + 's'] = aliases[shorthand] = unit; + } + + function normalizeUnits(units) { + return typeof units === 'string' + ? aliases[units] || aliases[units.toLowerCase()] + : undefined; + } + + function normalizeObjectUnits(inputObject) { + var normalizedInput = {}, + normalizedProp, + prop; + + for (prop in inputObject) { + if (hasOwnProp(inputObject, prop)) { + normalizedProp = normalizeUnits(prop); + if (normalizedProp) { + normalizedInput[normalizedProp] = inputObject[prop]; + } + } + } + + return normalizedInput; + } + + var priorities = {}; + + function addUnitPriority(unit, priority) { + priorities[unit] = priority; + } + + function getPrioritizedUnits(unitsObj) { + var units = [], + u; + for (u in unitsObj) { + if (hasOwnProp(unitsObj, u)) { + units.push({ unit: u, priority: priorities[u] }); + } + } + units.sort(function (a, b) { + return a.priority - b.priority; + }); + return units; + } + + function isLeapYear(year) { + return (year % 4 === 0 && year % 100 !== 0) || year % 400 === 0; + } + + function absFloor(number) { + if (number < 0) { + // -0 -> 0 + return Math.ceil(number) || 0; + } else { + return Math.floor(number); + } + } + + function toInt(argumentForCoercion) { + var coercedNumber = +argumentForCoercion, + value = 0; + + if (coercedNumber !== 0 && isFinite(coercedNumber)) { + value = absFloor(coercedNumber); + } + + return value; + } + + function makeGetSet(unit, keepTime) { + return function (value) { + if (value != null) { + set$1(this, unit, value); + hooks.updateOffset(this, keepTime); + return this; + } else { + return get(this, unit); + } + }; + } + + function get(mom, unit) { + return mom.isValid() + ? mom._d['get' + (mom._isUTC ? 'UTC' : '') + unit]() + : NaN; + } + + function set$1(mom, unit, value) { + if (mom.isValid() && !isNaN(value)) { + if ( + unit === 'FullYear' && + isLeapYear(mom.year()) && + mom.month() === 1 && + mom.date() === 29 + ) { + value = toInt(value); + mom._d['set' + (mom._isUTC ? 'UTC' : '') + unit]( + value, + mom.month(), + daysInMonth(value, mom.month()) + ); + } else { + mom._d['set' + (mom._isUTC ? 'UTC' : '') + unit](value); + } + } + } + + // MOMENTS + + function stringGet(units) { + units = normalizeUnits(units); + if (isFunction(this[units])) { + return this[units](); + } + return this; + } + + function stringSet(units, value) { + if (typeof units === 'object') { + units = normalizeObjectUnits(units); + var prioritized = getPrioritizedUnits(units), + i; + for (i = 0; i < prioritized.length; i++) { + this[prioritized[i].unit](units[prioritized[i].unit]); + } + } else { + units = normalizeUnits(units); + if (isFunction(this[units])) { + return this[units](value); + } + } + return this; + } + + var match1 = /\d/, // 0 - 9 + match2 = /\d\d/, // 00 - 99 + match3 = /\d{3}/, // 000 - 999 + match4 = /\d{4}/, // 0000 - 9999 + match6 = /[+-]?\d{6}/, // -999999 - 999999 + match1to2 = /\d\d?/, // 0 - 99 + match3to4 = /\d\d\d\d?/, // 999 - 9999 + match5to6 = /\d\d\d\d\d\d?/, // 99999 - 999999 + match1to3 = /\d{1,3}/, // 0 - 999 + match1to4 = /\d{1,4}/, // 0 - 9999 + match1to6 = /[+-]?\d{1,6}/, // -999999 - 999999 + matchUnsigned = /\d+/, // 0 - inf + matchSigned = /[+-]?\d+/, // -inf - inf + matchOffset = /Z|[+-]\d\d:?\d\d/gi, // +00:00 -00:00 +0000 -0000 or Z + matchShortOffset = /Z|[+-]\d\d(?::?\d\d)?/gi, // +00 -00 +00:00 -00:00 +0000 -0000 or Z + matchTimestamp = /[+-]?\d+(\.\d{1,3})?/, // 123456789 123456789.123 + // any word (or two) characters or numbers including two/three word month in arabic. + // includes scottish gaelic two word and hyphenated months + matchWord = /[0-9]{0,256}['a-z\u00A0-\u05FF\u0700-\uD7FF\uF900-\uFDCF\uFDF0-\uFF07\uFF10-\uFFEF]{1,256}|[\u0600-\u06FF\/]{1,256}(\s*?[\u0600-\u06FF]{1,256}){1,2}/i, + regexes; + + regexes = {}; + + function addRegexToken(token, regex, strictRegex) { + regexes[token] = isFunction(regex) + ? regex + : function (isStrict, localeData) { + return isStrict && strictRegex ? strictRegex : regex; + }; + } + + function getParseRegexForToken(token, config) { + if (!hasOwnProp(regexes, token)) { + return new RegExp(unescapeFormat(token)); + } + + return regexes[token](config._strict, config._locale); + } + + // Code from http://stackoverflow.com/questions/3561493/is-there-a-regexp-escape-function-in-javascript + function unescapeFormat(s) { + return regexEscape( + s + .replace('\\', '') + .replace(/\\(\[)|\\(\])|\[([^\]\[]*)\]|\\(.)/g, function ( + matched, + p1, + p2, + p3, + p4 + ) { + return p1 || p2 || p3 || p4; + }) + ); + } + + function regexEscape(s) { + return s.replace(/[-\/\\^$*+?.()|[\]{}]/g, '\\$&'); + } + + var tokens = {}; + + function addParseToken(token, callback) { + var i, + func = callback; + if (typeof token === 'string') { + token = [token]; + } + if (isNumber(callback)) { + func = function (input, array) { + array[callback] = toInt(input); + }; + } + for (i = 0; i < token.length; i++) { + tokens[token[i]] = func; + } + } + + function addWeekParseToken(token, callback) { + addParseToken(token, function (input, array, config, token) { + config._w = config._w || {}; + callback(input, config._w, config, token); + }); + } + + function addTimeToArrayFromToken(token, input, config) { + if (input != null && hasOwnProp(tokens, token)) { + tokens[token](input, config._a, config, token); + } + } + + var YEAR = 0, + MONTH = 1, + DATE = 2, + HOUR = 3, + MINUTE = 4, + SECOND = 5, + MILLISECOND = 6, + WEEK = 7, + WEEKDAY = 8; + + function mod(n, x) { + return ((n % x) + x) % x; + } + + var indexOf; + + if (Array.prototype.indexOf) { + indexOf = Array.prototype.indexOf; + } else { + indexOf = function (o) { + // I know + var i; + for (i = 0; i < this.length; ++i) { + if (this[i] === o) { + return i; + } + } + return -1; + }; + } + + function daysInMonth(year, month) { + if (isNaN(year) || isNaN(month)) { + return NaN; + } + var modMonth = mod(month, 12); + year += (month - modMonth) / 12; + return modMonth === 1 + ? isLeapYear(year) + ? 29 + : 28 + : 31 - ((modMonth % 7) % 2); + } + + // FORMATTING + + addFormatToken('M', ['MM', 2], 'Mo', function () { + return this.month() + 1; + }); + + addFormatToken('MMM', 0, 0, function (format) { + return this.localeData().monthsShort(this, format); + }); + + addFormatToken('MMMM', 0, 0, function (format) { + return this.localeData().months(this, format); + }); + + // ALIASES + + addUnitAlias('month', 'M'); + + // PRIORITY + + addUnitPriority('month', 8); + + // PARSING + + addRegexToken('M', match1to2); + addRegexToken('MM', match1to2, match2); + addRegexToken('MMM', function (isStrict, locale) { + return locale.monthsShortRegex(isStrict); + }); + addRegexToken('MMMM', function (isStrict, locale) { + return locale.monthsRegex(isStrict); + }); + + addParseToken(['M', 'MM'], function (input, array) { + array[MONTH] = toInt(input) - 1; + }); + + addParseToken(['MMM', 'MMMM'], function (input, array, config, token) { + var month = config._locale.monthsParse(input, token, config._strict); + // if we didn't find a month name, mark the date as invalid. + if (month != null) { + array[MONTH] = month; + } else { + getParsingFlags(config).invalidMonth = input; + } + }); + + // LOCALES + + var defaultLocaleMonths = 'January_February_March_April_May_June_July_August_September_October_November_December'.split( + '_' + ), + defaultLocaleMonthsShort = 'Jan_Feb_Mar_Apr_May_Jun_Jul_Aug_Sep_Oct_Nov_Dec'.split( + '_' + ), + MONTHS_IN_FORMAT = /D[oD]?(\[[^\[\]]*\]|\s)+MMMM?/, + defaultMonthsShortRegex = matchWord, + defaultMonthsRegex = matchWord; + + function localeMonths(m, format) { + if (!m) { + return isArray(this._months) + ? this._months + : this._months['standalone']; + } + return isArray(this._months) + ? this._months[m.month()] + : this._months[ + (this._months.isFormat || MONTHS_IN_FORMAT).test(format) + ? 'format' + : 'standalone' + ][m.month()]; + } + + function localeMonthsShort(m, format) { + if (!m) { + return isArray(this._monthsShort) + ? this._monthsShort + : this._monthsShort['standalone']; + } + return isArray(this._monthsShort) + ? this._monthsShort[m.month()] + : this._monthsShort[ + MONTHS_IN_FORMAT.test(format) ? 'format' : 'standalone' + ][m.month()]; + } + + function handleStrictParse(monthName, format, strict) { + var i, + ii, + mom, + llc = monthName.toLocaleLowerCase(); + if (!this._monthsParse) { + // this is not used + this._monthsParse = []; + this._longMonthsParse = []; + this._shortMonthsParse = []; + for (i = 0; i < 12; ++i) { + mom = createUTC([2000, i]); + this._shortMonthsParse[i] = this.monthsShort( + mom, + '' + ).toLocaleLowerCase(); + this._longMonthsParse[i] = this.months(mom, '').toLocaleLowerCase(); + } + } + + if (strict) { + if (format === 'MMM') { + ii = indexOf.call(this._shortMonthsParse, llc); + return ii !== -1 ? ii : null; + } else { + ii = indexOf.call(this._longMonthsParse, llc); + return ii !== -1 ? ii : null; + } + } else { + if (format === 'MMM') { + ii = indexOf.call(this._shortMonthsParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._longMonthsParse, llc); + return ii !== -1 ? ii : null; + } else { + ii = indexOf.call(this._longMonthsParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._shortMonthsParse, llc); + return ii !== -1 ? ii : null; + } + } + } + + function localeMonthsParse(monthName, format, strict) { + var i, mom, regex; + + if (this._monthsParseExact) { + return handleStrictParse.call(this, monthName, format, strict); + } + + if (!this._monthsParse) { + this._monthsParse = []; + this._longMonthsParse = []; + this._shortMonthsParse = []; + } + + // TODO: add sorting + // Sorting makes sure if one month (or abbr) is a prefix of another + // see sorting in computeMonthsParse + for (i = 0; i < 12; i++) { + // make the regex if we don't have it already + mom = createUTC([2000, i]); + if (strict && !this._longMonthsParse[i]) { + this._longMonthsParse[i] = new RegExp( + '^' + this.months(mom, '').replace('.', '') + '$', + 'i' + ); + this._shortMonthsParse[i] = new RegExp( + '^' + this.monthsShort(mom, '').replace('.', '') + '$', + 'i' + ); + } + if (!strict && !this._monthsParse[i]) { + regex = + '^' + this.months(mom, '') + '|^' + this.monthsShort(mom, ''); + this._monthsParse[i] = new RegExp(regex.replace('.', ''), 'i'); + } + // test the regex + if ( + strict && + format === 'MMMM' && + this._longMonthsParse[i].test(monthName) + ) { + return i; + } else if ( + strict && + format === 'MMM' && + this._shortMonthsParse[i].test(monthName) + ) { + return i; + } else if (!strict && this._monthsParse[i].test(monthName)) { + return i; + } + } + } + + // MOMENTS + + function setMonth(mom, value) { + var dayOfMonth; + + if (!mom.isValid()) { + // No op + return mom; + } + + if (typeof value === 'string') { + if (/^\d+$/.test(value)) { + value = toInt(value); + } else { + value = mom.localeData().monthsParse(value); + // TODO: Another silent failure? + if (!isNumber(value)) { + return mom; + } + } + } + + dayOfMonth = Math.min(mom.date(), daysInMonth(mom.year(), value)); + mom._d['set' + (mom._isUTC ? 'UTC' : '') + 'Month'](value, dayOfMonth); + return mom; + } + + function getSetMonth(value) { + if (value != null) { + setMonth(this, value); + hooks.updateOffset(this, true); + return this; + } else { + return get(this, 'Month'); + } + } + + function getDaysInMonth() { + return daysInMonth(this.year(), this.month()); + } + + function monthsShortRegex(isStrict) { + if (this._monthsParseExact) { + if (!hasOwnProp(this, '_monthsRegex')) { + computeMonthsParse.call(this); + } + if (isStrict) { + return this._monthsShortStrictRegex; + } else { + return this._monthsShortRegex; + } + } else { + if (!hasOwnProp(this, '_monthsShortRegex')) { + this._monthsShortRegex = defaultMonthsShortRegex; + } + return this._monthsShortStrictRegex && isStrict + ? this._monthsShortStrictRegex + : this._monthsShortRegex; + } + } + + function monthsRegex(isStrict) { + if (this._monthsParseExact) { + if (!hasOwnProp(this, '_monthsRegex')) { + computeMonthsParse.call(this); + } + if (isStrict) { + return this._monthsStrictRegex; + } else { + return this._monthsRegex; + } + } else { + if (!hasOwnProp(this, '_monthsRegex')) { + this._monthsRegex = defaultMonthsRegex; + } + return this._monthsStrictRegex && isStrict + ? this._monthsStrictRegex + : this._monthsRegex; + } + } + + function computeMonthsParse() { + function cmpLenRev(a, b) { + return b.length - a.length; + } + + var shortPieces = [], + longPieces = [], + mixedPieces = [], + i, + mom; + for (i = 0; i < 12; i++) { + // make the regex if we don't have it already + mom = createUTC([2000, i]); + shortPieces.push(this.monthsShort(mom, '')); + longPieces.push(this.months(mom, '')); + mixedPieces.push(this.months(mom, '')); + mixedPieces.push(this.monthsShort(mom, '')); + } + // Sorting makes sure if one month (or abbr) is a prefix of another it + // will match the longer piece. + shortPieces.sort(cmpLenRev); + longPieces.sort(cmpLenRev); + mixedPieces.sort(cmpLenRev); + for (i = 0; i < 12; i++) { + shortPieces[i] = regexEscape(shortPieces[i]); + longPieces[i] = regexEscape(longPieces[i]); + } + for (i = 0; i < 24; i++) { + mixedPieces[i] = regexEscape(mixedPieces[i]); + } + + this._monthsRegex = new RegExp('^(' + mixedPieces.join('|') + ')', 'i'); + this._monthsShortRegex = this._monthsRegex; + this._monthsStrictRegex = new RegExp( + '^(' + longPieces.join('|') + ')', + 'i' + ); + this._monthsShortStrictRegex = new RegExp( + '^(' + shortPieces.join('|') + ')', + 'i' + ); + } + + // FORMATTING + + addFormatToken('Y', 0, 0, function () { + var y = this.year(); + return y <= 9999 ? zeroFill(y, 4) : '+' + y; + }); + + addFormatToken(0, ['YY', 2], 0, function () { + return this.year() % 100; + }); + + addFormatToken(0, ['YYYY', 4], 0, 'year'); + addFormatToken(0, ['YYYYY', 5], 0, 'year'); + addFormatToken(0, ['YYYYYY', 6, true], 0, 'year'); + + // ALIASES + + addUnitAlias('year', 'y'); + + // PRIORITIES + + addUnitPriority('year', 1); + + // PARSING + + addRegexToken('Y', matchSigned); + addRegexToken('YY', match1to2, match2); + addRegexToken('YYYY', match1to4, match4); + addRegexToken('YYYYY', match1to6, match6); + addRegexToken('YYYYYY', match1to6, match6); + + addParseToken(['YYYYY', 'YYYYYY'], YEAR); + addParseToken('YYYY', function (input, array) { + array[YEAR] = + input.length === 2 ? hooks.parseTwoDigitYear(input) : toInt(input); + }); + addParseToken('YY', function (input, array) { + array[YEAR] = hooks.parseTwoDigitYear(input); + }); + addParseToken('Y', function (input, array) { + array[YEAR] = parseInt(input, 10); + }); + + // HELPERS + + function daysInYear(year) { + return isLeapYear(year) ? 366 : 365; + } + + // HOOKS + + hooks.parseTwoDigitYear = function (input) { + return toInt(input) + (toInt(input) > 68 ? 1900 : 2000); + }; + + // MOMENTS + + var getSetYear = makeGetSet('FullYear', true); + + function getIsLeapYear() { + return isLeapYear(this.year()); + } + + function createDate(y, m, d, h, M, s, ms) { + // can't just apply() to create a date: + // https://stackoverflow.com/q/181348 + var date; + // the date constructor remaps years 0-99 to 1900-1999 + if (y < 100 && y >= 0) { + // preserve leap years using a full 400 year cycle, then reset + date = new Date(y + 400, m, d, h, M, s, ms); + if (isFinite(date.getFullYear())) { + date.setFullYear(y); + } + } else { + date = new Date(y, m, d, h, M, s, ms); + } + + return date; + } + + function createUTCDate(y) { + var date, args; + // the Date.UTC function remaps years 0-99 to 1900-1999 + if (y < 100 && y >= 0) { + args = Array.prototype.slice.call(arguments); + // preserve leap years using a full 400 year cycle, then reset + args[0] = y + 400; + date = new Date(Date.UTC.apply(null, args)); + if (isFinite(date.getUTCFullYear())) { + date.setUTCFullYear(y); + } + } else { + date = new Date(Date.UTC.apply(null, arguments)); + } + + return date; + } + + // start-of-first-week - start-of-year + function firstWeekOffset(year, dow, doy) { + var // first-week day -- which january is always in the first week (4 for iso, 1 for other) + fwd = 7 + dow - doy, + // first-week day local weekday -- which local weekday is fwd + fwdlw = (7 + createUTCDate(year, 0, fwd).getUTCDay() - dow) % 7; + + return -fwdlw + fwd - 1; + } + + // https://en.wikipedia.org/wiki/ISO_week_date#Calculating_a_date_given_the_year.2C_week_number_and_weekday + function dayOfYearFromWeeks(year, week, weekday, dow, doy) { + var localWeekday = (7 + weekday - dow) % 7, + weekOffset = firstWeekOffset(year, dow, doy), + dayOfYear = 1 + 7 * (week - 1) + localWeekday + weekOffset, + resYear, + resDayOfYear; + + if (dayOfYear <= 0) { + resYear = year - 1; + resDayOfYear = daysInYear(resYear) + dayOfYear; + } else if (dayOfYear > daysInYear(year)) { + resYear = year + 1; + resDayOfYear = dayOfYear - daysInYear(year); + } else { + resYear = year; + resDayOfYear = dayOfYear; + } + + return { + year: resYear, + dayOfYear: resDayOfYear, + }; + } + + function weekOfYear(mom, dow, doy) { + var weekOffset = firstWeekOffset(mom.year(), dow, doy), + week = Math.floor((mom.dayOfYear() - weekOffset - 1) / 7) + 1, + resWeek, + resYear; + + if (week < 1) { + resYear = mom.year() - 1; + resWeek = week + weeksInYear(resYear, dow, doy); + } else if (week > weeksInYear(mom.year(), dow, doy)) { + resWeek = week - weeksInYear(mom.year(), dow, doy); + resYear = mom.year() + 1; + } else { + resYear = mom.year(); + resWeek = week; + } + + return { + week: resWeek, + year: resYear, + }; + } + + function weeksInYear(year, dow, doy) { + var weekOffset = firstWeekOffset(year, dow, doy), + weekOffsetNext = firstWeekOffset(year + 1, dow, doy); + return (daysInYear(year) - weekOffset + weekOffsetNext) / 7; + } + + // FORMATTING + + addFormatToken('w', ['ww', 2], 'wo', 'week'); + addFormatToken('W', ['WW', 2], 'Wo', 'isoWeek'); + + // ALIASES + + addUnitAlias('week', 'w'); + addUnitAlias('isoWeek', 'W'); + + // PRIORITIES + + addUnitPriority('week', 5); + addUnitPriority('isoWeek', 5); + + // PARSING + + addRegexToken('w', match1to2); + addRegexToken('ww', match1to2, match2); + addRegexToken('W', match1to2); + addRegexToken('WW', match1to2, match2); + + addWeekParseToken(['w', 'ww', 'W', 'WW'], function ( + input, + week, + config, + token + ) { + week[token.substr(0, 1)] = toInt(input); + }); + + // HELPERS + + // LOCALES + + function localeWeek(mom) { + return weekOfYear(mom, this._week.dow, this._week.doy).week; + } + + var defaultLocaleWeek = { + dow: 0, // Sunday is the first day of the week. + doy: 6, // The week that contains Jan 6th is the first week of the year. + }; + + function localeFirstDayOfWeek() { + return this._week.dow; + } + + function localeFirstDayOfYear() { + return this._week.doy; + } + + // MOMENTS + + function getSetWeek(input) { + var week = this.localeData().week(this); + return input == null ? week : this.add((input - week) * 7, 'd'); + } + + function getSetISOWeek(input) { + var week = weekOfYear(this, 1, 4).week; + return input == null ? week : this.add((input - week) * 7, 'd'); + } + + // FORMATTING + + addFormatToken('d', 0, 'do', 'day'); + + addFormatToken('dd', 0, 0, function (format) { + return this.localeData().weekdaysMin(this, format); + }); + + addFormatToken('ddd', 0, 0, function (format) { + return this.localeData().weekdaysShort(this, format); + }); + + addFormatToken('dddd', 0, 0, function (format) { + return this.localeData().weekdays(this, format); + }); + + addFormatToken('e', 0, 0, 'weekday'); + addFormatToken('E', 0, 0, 'isoWeekday'); + + // ALIASES + + addUnitAlias('day', 'd'); + addUnitAlias('weekday', 'e'); + addUnitAlias('isoWeekday', 'E'); + + // PRIORITY + addUnitPriority('day', 11); + addUnitPriority('weekday', 11); + addUnitPriority('isoWeekday', 11); + + // PARSING + + addRegexToken('d', match1to2); + addRegexToken('e', match1to2); + addRegexToken('E', match1to2); + addRegexToken('dd', function (isStrict, locale) { + return locale.weekdaysMinRegex(isStrict); + }); + addRegexToken('ddd', function (isStrict, locale) { + return locale.weekdaysShortRegex(isStrict); + }); + addRegexToken('dddd', function (isStrict, locale) { + return locale.weekdaysRegex(isStrict); + }); + + addWeekParseToken(['dd', 'ddd', 'dddd'], function (input, week, config, token) { + var weekday = config._locale.weekdaysParse(input, token, config._strict); + // if we didn't get a weekday name, mark the date as invalid + if (weekday != null) { + week.d = weekday; + } else { + getParsingFlags(config).invalidWeekday = input; + } + }); + + addWeekParseToken(['d', 'e', 'E'], function (input, week, config, token) { + week[token] = toInt(input); + }); + + // HELPERS + + function parseWeekday(input, locale) { + if (typeof input !== 'string') { + return input; + } + + if (!isNaN(input)) { + return parseInt(input, 10); + } + + input = locale.weekdaysParse(input); + if (typeof input === 'number') { + return input; + } + + return null; + } + + function parseIsoWeekday(input, locale) { + if (typeof input === 'string') { + return locale.weekdaysParse(input) % 7 || 7; + } + return isNaN(input) ? null : input; + } + + // LOCALES + function shiftWeekdays(ws, n) { + return ws.slice(n, 7).concat(ws.slice(0, n)); + } + + var defaultLocaleWeekdays = 'Sunday_Monday_Tuesday_Wednesday_Thursday_Friday_Saturday'.split( + '_' + ), + defaultLocaleWeekdaysShort = 'Sun_Mon_Tue_Wed_Thu_Fri_Sat'.split('_'), + defaultLocaleWeekdaysMin = 'Su_Mo_Tu_We_Th_Fr_Sa'.split('_'), + defaultWeekdaysRegex = matchWord, + defaultWeekdaysShortRegex = matchWord, + defaultWeekdaysMinRegex = matchWord; + + function localeWeekdays(m, format) { + var weekdays = isArray(this._weekdays) + ? this._weekdays + : this._weekdays[ + m && m !== true && this._weekdays.isFormat.test(format) + ? 'format' + : 'standalone' + ]; + return m === true + ? shiftWeekdays(weekdays, this._week.dow) + : m + ? weekdays[m.day()] + : weekdays; + } + + function localeWeekdaysShort(m) { + return m === true + ? shiftWeekdays(this._weekdaysShort, this._week.dow) + : m + ? this._weekdaysShort[m.day()] + : this._weekdaysShort; + } + + function localeWeekdaysMin(m) { + return m === true + ? shiftWeekdays(this._weekdaysMin, this._week.dow) + : m + ? this._weekdaysMin[m.day()] + : this._weekdaysMin; + } + + function handleStrictParse$1(weekdayName, format, strict) { + var i, + ii, + mom, + llc = weekdayName.toLocaleLowerCase(); + if (!this._weekdaysParse) { + this._weekdaysParse = []; + this._shortWeekdaysParse = []; + this._minWeekdaysParse = []; + + for (i = 0; i < 7; ++i) { + mom = createUTC([2000, 1]).day(i); + this._minWeekdaysParse[i] = this.weekdaysMin( + mom, + '' + ).toLocaleLowerCase(); + this._shortWeekdaysParse[i] = this.weekdaysShort( + mom, + '' + ).toLocaleLowerCase(); + this._weekdaysParse[i] = this.weekdays(mom, '').toLocaleLowerCase(); + } + } + + if (strict) { + if (format === 'dddd') { + ii = indexOf.call(this._weekdaysParse, llc); + return ii !== -1 ? ii : null; + } else if (format === 'ddd') { + ii = indexOf.call(this._shortWeekdaysParse, llc); + return ii !== -1 ? ii : null; + } else { + ii = indexOf.call(this._minWeekdaysParse, llc); + return ii !== -1 ? ii : null; + } + } else { + if (format === 'dddd') { + ii = indexOf.call(this._weekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._shortWeekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._minWeekdaysParse, llc); + return ii !== -1 ? ii : null; + } else if (format === 'ddd') { + ii = indexOf.call(this._shortWeekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._weekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._minWeekdaysParse, llc); + return ii !== -1 ? ii : null; + } else { + ii = indexOf.call(this._minWeekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._weekdaysParse, llc); + if (ii !== -1) { + return ii; + } + ii = indexOf.call(this._shortWeekdaysParse, llc); + return ii !== -1 ? ii : null; + } + } + } + + function localeWeekdaysParse(weekdayName, format, strict) { + var i, mom, regex; + + if (this._weekdaysParseExact) { + return handleStrictParse$1.call(this, weekdayName, format, strict); + } + + if (!this._weekdaysParse) { + this._weekdaysParse = []; + this._minWeekdaysParse = []; + this._shortWeekdaysParse = []; + this._fullWeekdaysParse = []; + } + + for (i = 0; i < 7; i++) { + // make the regex if we don't have it already + + mom = createUTC([2000, 1]).day(i); + if (strict && !this._fullWeekdaysParse[i]) { + this._fullWeekdaysParse[i] = new RegExp( + '^' + this.weekdays(mom, '').replace('.', '\\.?') + '$', + 'i' + ); + this._shortWeekdaysParse[i] = new RegExp( + '^' + this.weekdaysShort(mom, '').replace('.', '\\.?') + '$', + 'i' + ); + this._minWeekdaysParse[i] = new RegExp( + '^' + this.weekdaysMin(mom, '').replace('.', '\\.?') + '$', + 'i' + ); + } + if (!this._weekdaysParse[i]) { + regex = + '^' + + this.weekdays(mom, '') + + '|^' + + this.weekdaysShort(mom, '') + + '|^' + + this.weekdaysMin(mom, ''); + this._weekdaysParse[i] = new RegExp(regex.replace('.', ''), 'i'); + } + // test the regex + if ( + strict && + format === 'dddd' && + this._fullWeekdaysParse[i].test(weekdayName) + ) { + return i; + } else if ( + strict && + format === 'ddd' && + this._shortWeekdaysParse[i].test(weekdayName) + ) { + return i; + } else if ( + strict && + format === 'dd' && + this._minWeekdaysParse[i].test(weekdayName) + ) { + return i; + } else if (!strict && this._weekdaysParse[i].test(weekdayName)) { + return i; + } + } + } + + // MOMENTS + + function getSetDayOfWeek(input) { + if (!this.isValid()) { + return input != null ? this : NaN; + } + var day = this._isUTC ? this._d.getUTCDay() : this._d.getDay(); + if (input != null) { + input = parseWeekday(input, this.localeData()); + return this.add(input - day, 'd'); + } else { + return day; + } + } + + function getSetLocaleDayOfWeek(input) { + if (!this.isValid()) { + return input != null ? this : NaN; + } + var weekday = (this.day() + 7 - this.localeData()._week.dow) % 7; + return input == null ? weekday : this.add(input - weekday, 'd'); + } + + function getSetISODayOfWeek(input) { + if (!this.isValid()) { + return input != null ? this : NaN; + } + + // behaves the same as moment#day except + // as a getter, returns 7 instead of 0 (1-7 range instead of 0-6) + // as a setter, sunday should belong to the previous week. + + if (input != null) { + var weekday = parseIsoWeekday(input, this.localeData()); + return this.day(this.day() % 7 ? weekday : weekday - 7); + } else { + return this.day() || 7; + } + } + + function weekdaysRegex(isStrict) { + if (this._weekdaysParseExact) { + if (!hasOwnProp(this, '_weekdaysRegex')) { + computeWeekdaysParse.call(this); + } + if (isStrict) { + return this._weekdaysStrictRegex; + } else { + return this._weekdaysRegex; + } + } else { + if (!hasOwnProp(this, '_weekdaysRegex')) { + this._weekdaysRegex = defaultWeekdaysRegex; + } + return this._weekdaysStrictRegex && isStrict + ? this._weekdaysStrictRegex + : this._weekdaysRegex; + } + } + + function weekdaysShortRegex(isStrict) { + if (this._weekdaysParseExact) { + if (!hasOwnProp(this, '_weekdaysRegex')) { + computeWeekdaysParse.call(this); + } + if (isStrict) { + return this._weekdaysShortStrictRegex; + } else { + return this._weekdaysShortRegex; + } + } else { + if (!hasOwnProp(this, '_weekdaysShortRegex')) { + this._weekdaysShortRegex = defaultWeekdaysShortRegex; + } + return this._weekdaysShortStrictRegex && isStrict + ? this._weekdaysShortStrictRegex + : this._weekdaysShortRegex; + } + } + + function weekdaysMinRegex(isStrict) { + if (this._weekdaysParseExact) { + if (!hasOwnProp(this, '_weekdaysRegex')) { + computeWeekdaysParse.call(this); + } + if (isStrict) { + return this._weekdaysMinStrictRegex; + } else { + return this._weekdaysMinRegex; + } + } else { + if (!hasOwnProp(this, '_weekdaysMinRegex')) { + this._weekdaysMinRegex = defaultWeekdaysMinRegex; + } + return this._weekdaysMinStrictRegex && isStrict + ? this._weekdaysMinStrictRegex + : this._weekdaysMinRegex; + } + } + + function computeWeekdaysParse() { + function cmpLenRev(a, b) { + return b.length - a.length; + } + + var minPieces = [], + shortPieces = [], + longPieces = [], + mixedPieces = [], + i, + mom, + minp, + shortp, + longp; + for (i = 0; i < 7; i++) { + // make the regex if we don't have it already + mom = createUTC([2000, 1]).day(i); + minp = regexEscape(this.weekdaysMin(mom, '')); + shortp = regexEscape(this.weekdaysShort(mom, '')); + longp = regexEscape(this.weekdays(mom, '')); + minPieces.push(minp); + shortPieces.push(shortp); + longPieces.push(longp); + mixedPieces.push(minp); + mixedPieces.push(shortp); + mixedPieces.push(longp); + } + // Sorting makes sure if one weekday (or abbr) is a prefix of another it + // will match the longer piece. + minPieces.sort(cmpLenRev); + shortPieces.sort(cmpLenRev); + longPieces.sort(cmpLenRev); + mixedPieces.sort(cmpLenRev); + + this._weekdaysRegex = new RegExp('^(' + mixedPieces.join('|') + ')', 'i'); + this._weekdaysShortRegex = this._weekdaysRegex; + this._weekdaysMinRegex = this._weekdaysRegex; + + this._weekdaysStrictRegex = new RegExp( + '^(' + longPieces.join('|') + ')', + 'i' + ); + this._weekdaysShortStrictRegex = new RegExp( + '^(' + shortPieces.join('|') + ')', + 'i' + ); + this._weekdaysMinStrictRegex = new RegExp( + '^(' + minPieces.join('|') + ')', + 'i' + ); + } + + // FORMATTING + + function hFormat() { + return this.hours() % 12 || 12; + } + + function kFormat() { + return this.hours() || 24; + } + + addFormatToken('H', ['HH', 2], 0, 'hour'); + addFormatToken('h', ['hh', 2], 0, hFormat); + addFormatToken('k', ['kk', 2], 0, kFormat); + + addFormatToken('hmm', 0, 0, function () { + return '' + hFormat.apply(this) + zeroFill(this.minutes(), 2); + }); + + addFormatToken('hmmss', 0, 0, function () { + return ( + '' + + hFormat.apply(this) + + zeroFill(this.minutes(), 2) + + zeroFill(this.seconds(), 2) + ); + }); + + addFormatToken('Hmm', 0, 0, function () { + return '' + this.hours() + zeroFill(this.minutes(), 2); + }); + + addFormatToken('Hmmss', 0, 0, function () { + return ( + '' + + this.hours() + + zeroFill(this.minutes(), 2) + + zeroFill(this.seconds(), 2) + ); + }); + + function meridiem(token, lowercase) { + addFormatToken(token, 0, 0, function () { + return this.localeData().meridiem( + this.hours(), + this.minutes(), + lowercase + ); + }); + } + + meridiem('a', true); + meridiem('A', false); + + // ALIASES + + addUnitAlias('hour', 'h'); + + // PRIORITY + addUnitPriority('hour', 13); + + // PARSING + + function matchMeridiem(isStrict, locale) { + return locale._meridiemParse; + } + + addRegexToken('a', matchMeridiem); + addRegexToken('A', matchMeridiem); + addRegexToken('H', match1to2); + addRegexToken('h', match1to2); + addRegexToken('k', match1to2); + addRegexToken('HH', match1to2, match2); + addRegexToken('hh', match1to2, match2); + addRegexToken('kk', match1to2, match2); + + addRegexToken('hmm', match3to4); + addRegexToken('hmmss', match5to6); + addRegexToken('Hmm', match3to4); + addRegexToken('Hmmss', match5to6); + + addParseToken(['H', 'HH'], HOUR); + addParseToken(['k', 'kk'], function (input, array, config) { + var kInput = toInt(input); + array[HOUR] = kInput === 24 ? 0 : kInput; + }); + addParseToken(['a', 'A'], function (input, array, config) { + config._isPm = config._locale.isPM(input); + config._meridiem = input; + }); + addParseToken(['h', 'hh'], function (input, array, config) { + array[HOUR] = toInt(input); + getParsingFlags(config).bigHour = true; + }); + addParseToken('hmm', function (input, array, config) { + var pos = input.length - 2; + array[HOUR] = toInt(input.substr(0, pos)); + array[MINUTE] = toInt(input.substr(pos)); + getParsingFlags(config).bigHour = true; + }); + addParseToken('hmmss', function (input, array, config) { + var pos1 = input.length - 4, + pos2 = input.length - 2; + array[HOUR] = toInt(input.substr(0, pos1)); + array[MINUTE] = toInt(input.substr(pos1, 2)); + array[SECOND] = toInt(input.substr(pos2)); + getParsingFlags(config).bigHour = true; + }); + addParseToken('Hmm', function (input, array, config) { + var pos = input.length - 2; + array[HOUR] = toInt(input.substr(0, pos)); + array[MINUTE] = toInt(input.substr(pos)); + }); + addParseToken('Hmmss', function (input, array, config) { + var pos1 = input.length - 4, + pos2 = input.length - 2; + array[HOUR] = toInt(input.substr(0, pos1)); + array[MINUTE] = toInt(input.substr(pos1, 2)); + array[SECOND] = toInt(input.substr(pos2)); + }); + + // LOCALES + + function localeIsPM(input) { + // IE8 Quirks Mode & IE7 Standards Mode do not allow accessing strings like arrays + // Using charAt should be more compatible. + return (input + '').toLowerCase().charAt(0) === 'p'; + } + + var defaultLocaleMeridiemParse = /[ap]\.?m?\.?/i, + // Setting the hour should keep the time, because the user explicitly + // specified which hour they want. So trying to maintain the same hour (in + // a new timezone) makes sense. Adding/subtracting hours does not follow + // this rule. + getSetHour = makeGetSet('Hours', true); + + function localeMeridiem(hours, minutes, isLower) { + if (hours > 11) { + return isLower ? 'pm' : 'PM'; + } else { + return isLower ? 'am' : 'AM'; + } + } + + var baseConfig = { + calendar: defaultCalendar, + longDateFormat: defaultLongDateFormat, + invalidDate: defaultInvalidDate, + ordinal: defaultOrdinal, + dayOfMonthOrdinalParse: defaultDayOfMonthOrdinalParse, + relativeTime: defaultRelativeTime, + + months: defaultLocaleMonths, + monthsShort: defaultLocaleMonthsShort, + + week: defaultLocaleWeek, + + weekdays: defaultLocaleWeekdays, + weekdaysMin: defaultLocaleWeekdaysMin, + weekdaysShort: defaultLocaleWeekdaysShort, + + meridiemParse: defaultLocaleMeridiemParse, + }; + + // internal storage for locale config files + var locales = {}, + localeFamilies = {}, + globalLocale; + + function commonPrefix(arr1, arr2) { + var i, + minl = Math.min(arr1.length, arr2.length); + for (i = 0; i < minl; i += 1) { + if (arr1[i] !== arr2[i]) { + return i; + } + } + return minl; + } + + function normalizeLocale(key) { + return key ? key.toLowerCase().replace('_', '-') : key; + } + + // pick the locale from the array + // try ['en-au', 'en-gb'] as 'en-au', 'en-gb', 'en', as in move through the list trying each + // substring from most specific to least, but move to the next array item if it's a more specific variant than the current root + function chooseLocale(names) { + var i = 0, + j, + next, + locale, + split; + + while (i < names.length) { + split = normalizeLocale(names[i]).split('-'); + j = split.length; + next = normalizeLocale(names[i + 1]); + next = next ? next.split('-') : null; + while (j > 0) { + locale = loadLocale(split.slice(0, j).join('-')); + if (locale) { + return locale; + } + if ( + next && + next.length >= j && + commonPrefix(split, next) >= j - 1 + ) { + //the next array item is better than a shallower substring of this one + break; + } + j--; + } + i++; + } + return globalLocale; + } + + function loadLocale(name) { + var oldLocale = null, + aliasedRequire; + // TODO: Find a better way to register and load all the locales in Node + if ( + locales[name] === undefined && + "object" !== 'undefined' && + module && + module.exports + ) { + try { + oldLocale = globalLocale._abbr; + aliasedRequire = require; + aliasedRequire('./locale/' + name); + getSetGlobalLocale(oldLocale); + } catch (e) { + // mark as not found to avoid repeating expensive file require call causing high CPU + // when trying to find en-US, en_US, en-us for every format call + locales[name] = null; // null means not found + } + } + return locales[name]; + } + + // This function will load locale and then set the global locale. If + // no arguments are passed in, it will simply return the current global + // locale key. + function getSetGlobalLocale(key, values) { + var data; + if (key) { + if (isUndefined(values)) { + data = getLocale(key); + } else { + data = defineLocale(key, values); + } + + if (data) { + // moment.duration._locale = moment._locale = data; + globalLocale = data; + } else { + if (typeof console !== 'undefined' && console.warn) { + //warn user if arguments are passed but the locale could not be set + console.warn( + 'Locale ' + key + ' not found. Did you forget to load it?' + ); + } + } + } + + return globalLocale._abbr; + } + + function defineLocale(name, config) { + if (config !== null) { + var locale, + parentConfig = baseConfig; + config.abbr = name; + if (locales[name] != null) { + deprecateSimple( + 'defineLocaleOverride', + 'use moment.updateLocale(localeName, config) to change ' + + 'an existing locale. moment.defineLocale(localeName, ' + + 'config) should only be used for creating a new locale ' + + 'See http://momentjs.com/guides/#/warnings/define-locale/ for more info.' + ); + parentConfig = locales[name]._config; + } else if (config.parentLocale != null) { + if (locales[config.parentLocale] != null) { + parentConfig = locales[config.parentLocale]._config; + } else { + locale = loadLocale(config.parentLocale); + if (locale != null) { + parentConfig = locale._config; + } else { + if (!localeFamilies[config.parentLocale]) { + localeFamilies[config.parentLocale] = []; + } + localeFamilies[config.parentLocale].push({ + name: name, + config: config, + }); + return null; + } + } + } + locales[name] = new Locale(mergeConfigs(parentConfig, config)); + + if (localeFamilies[name]) { + localeFamilies[name].forEach(function (x) { + defineLocale(x.name, x.config); + }); + } + + // backwards compat for now: also set the locale + // make sure we set the locale AFTER all child locales have been + // created, so we won't end up with the child locale set. + getSetGlobalLocale(name); + + return locales[name]; + } else { + // useful for testing + delete locales[name]; + return null; + } + } + + function updateLocale(name, config) { + if (config != null) { + var locale, + tmpLocale, + parentConfig = baseConfig; + + if (locales[name] != null && locales[name].parentLocale != null) { + // Update existing child locale in-place to avoid memory-leaks + locales[name].set(mergeConfigs(locales[name]._config, config)); + } else { + // MERGE + tmpLocale = loadLocale(name); + if (tmpLocale != null) { + parentConfig = tmpLocale._config; + } + config = mergeConfigs(parentConfig, config); + if (tmpLocale == null) { + // updateLocale is called for creating a new locale + // Set abbr so it will have a name (getters return + // undefined otherwise). + config.abbr = name; + } + locale = new Locale(config); + locale.parentLocale = locales[name]; + locales[name] = locale; + } + + // backwards compat for now: also set the locale + getSetGlobalLocale(name); + } else { + // pass null for config to unupdate, useful for tests + if (locales[name] != null) { + if (locales[name].parentLocale != null) { + locales[name] = locales[name].parentLocale; + if (name === getSetGlobalLocale()) { + getSetGlobalLocale(name); + } + } else if (locales[name] != null) { + delete locales[name]; + } + } + } + return locales[name]; + } + + // returns locale data + function getLocale(key) { + var locale; + + if (key && key._locale && key._locale._abbr) { + key = key._locale._abbr; + } + + if (!key) { + return globalLocale; + } + + if (!isArray(key)) { + //short-circuit everything else + locale = loadLocale(key); + if (locale) { + return locale; + } + key = [key]; + } + + return chooseLocale(key); + } + + function listLocales() { + return keys(locales); + } + + function checkOverflow(m) { + var overflow, + a = m._a; + + if (a && getParsingFlags(m).overflow === -2) { + overflow = + a[MONTH] < 0 || a[MONTH] > 11 + ? MONTH + : a[DATE] < 1 || a[DATE] > daysInMonth(a[YEAR], a[MONTH]) + ? DATE + : a[HOUR] < 0 || + a[HOUR] > 24 || + (a[HOUR] === 24 && + (a[MINUTE] !== 0 || + a[SECOND] !== 0 || + a[MILLISECOND] !== 0)) + ? HOUR + : a[MINUTE] < 0 || a[MINUTE] > 59 + ? MINUTE + : a[SECOND] < 0 || a[SECOND] > 59 + ? SECOND + : a[MILLISECOND] < 0 || a[MILLISECOND] > 999 + ? MILLISECOND + : -1; + + if ( + getParsingFlags(m)._overflowDayOfYear && + (overflow < YEAR || overflow > DATE) + ) { + overflow = DATE; + } + if (getParsingFlags(m)._overflowWeeks && overflow === -1) { + overflow = WEEK; + } + if (getParsingFlags(m)._overflowWeekday && overflow === -1) { + overflow = WEEKDAY; + } + + getParsingFlags(m).overflow = overflow; + } + + return m; + } + + // iso 8601 regex + // 0000-00-00 0000-W00 or 0000-W00-0 + T + 00 or 00:00 or 00:00:00 or 00:00:00.000 + +00:00 or +0000 or +00) + var extendedIsoRegex = /^\s*((?:[+-]\d{6}|\d{4})-(?:\d\d-\d\d|W\d\d-\d|W\d\d|\d\d\d|\d\d))(?:(T| )(\d\d(?::\d\d(?::\d\d(?:[.,]\d+)?)?)?)([+-]\d\d(?::?\d\d)?|\s*Z)?)?$/, + basicIsoRegex = /^\s*((?:[+-]\d{6}|\d{4})(?:\d\d\d\d|W\d\d\d|W\d\d|\d\d\d|\d\d|))(?:(T| )(\d\d(?:\d\d(?:\d\d(?:[.,]\d+)?)?)?)([+-]\d\d(?::?\d\d)?|\s*Z)?)?$/, + tzRegex = /Z|[+-]\d\d(?::?\d\d)?/, + isoDates = [ + ['YYYYYY-MM-DD', /[+-]\d{6}-\d\d-\d\d/], + ['YYYY-MM-DD', /\d{4}-\d\d-\d\d/], + ['GGGG-[W]WW-E', /\d{4}-W\d\d-\d/], + ['GGGG-[W]WW', /\d{4}-W\d\d/, false], + ['YYYY-DDD', /\d{4}-\d{3}/], + ['YYYY-MM', /\d{4}-\d\d/, false], + ['YYYYYYMMDD', /[+-]\d{10}/], + ['YYYYMMDD', /\d{8}/], + ['GGGG[W]WWE', /\d{4}W\d{3}/], + ['GGGG[W]WW', /\d{4}W\d{2}/, false], + ['YYYYDDD', /\d{7}/], + ['YYYYMM', /\d{6}/, false], + ['YYYY', /\d{4}/, false], + ], + // iso time formats and regexes + isoTimes = [ + ['HH:mm:ss.SSSS', /\d\d:\d\d:\d\d\.\d+/], + ['HH:mm:ss,SSSS', /\d\d:\d\d:\d\d,\d+/], + ['HH:mm:ss', /\d\d:\d\d:\d\d/], + ['HH:mm', /\d\d:\d\d/], + ['HHmmss.SSSS', /\d\d\d\d\d\d\.\d+/], + ['HHmmss,SSSS', /\d\d\d\d\d\d,\d+/], + ['HHmmss', /\d\d\d\d\d\d/], + ['HHmm', /\d\d\d\d/], + ['HH', /\d\d/], + ], + aspNetJsonRegex = /^\/?Date\((-?\d+)/i, + // RFC 2822 regex: For details see https://tools.ietf.org/html/rfc2822#section-3.3 + rfc2822 = /^(?:(Mon|Tue|Wed|Thu|Fri|Sat|Sun),?\s)?(\d{1,2})\s(Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec)\s(\d{2,4})\s(\d\d):(\d\d)(?::(\d\d))?\s(?:(UT|GMT|[ECMP][SD]T)|([Zz])|([+-]\d{4}))$/, + obsOffsets = { + UT: 0, + GMT: 0, + EDT: -4 * 60, + EST: -5 * 60, + CDT: -5 * 60, + CST: -6 * 60, + MDT: -6 * 60, + MST: -7 * 60, + PDT: -7 * 60, + PST: -8 * 60, + }; + + // date from iso format + function configFromISO(config) { + var i, + l, + string = config._i, + match = extendedIsoRegex.exec(string) || basicIsoRegex.exec(string), + allowTime, + dateFormat, + timeFormat, + tzFormat; + + if (match) { + getParsingFlags(config).iso = true; + + for (i = 0, l = isoDates.length; i < l; i++) { + if (isoDates[i][1].exec(match[1])) { + dateFormat = isoDates[i][0]; + allowTime = isoDates[i][2] !== false; + break; + } + } + if (dateFormat == null) { + config._isValid = false; + return; + } + if (match[3]) { + for (i = 0, l = isoTimes.length; i < l; i++) { + if (isoTimes[i][1].exec(match[3])) { + // match[2] should be 'T' or space + timeFormat = (match[2] || ' ') + isoTimes[i][0]; + break; + } + } + if (timeFormat == null) { + config._isValid = false; + return; + } + } + if (!allowTime && timeFormat != null) { + config._isValid = false; + return; + } + if (match[4]) { + if (tzRegex.exec(match[4])) { + tzFormat = 'Z'; + } else { + config._isValid = false; + return; + } + } + config._f = dateFormat + (timeFormat || '') + (tzFormat || ''); + configFromStringAndFormat(config); + } else { + config._isValid = false; + } + } + + function extractFromRFC2822Strings( + yearStr, + monthStr, + dayStr, + hourStr, + minuteStr, + secondStr + ) { + var result = [ + untruncateYear(yearStr), + defaultLocaleMonthsShort.indexOf(monthStr), + parseInt(dayStr, 10), + parseInt(hourStr, 10), + parseInt(minuteStr, 10), + ]; + + if (secondStr) { + result.push(parseInt(secondStr, 10)); + } + + return result; + } + + function untruncateYear(yearStr) { + var year = parseInt(yearStr, 10); + if (year <= 49) { + return 2000 + year; + } else if (year <= 999) { + return 1900 + year; + } + return year; + } + + function preprocessRFC2822(s) { + // Remove comments and folding whitespace and replace multiple-spaces with a single space + return s + .replace(/\([^)]*\)|[\n\t]/g, ' ') + .replace(/(\s\s+)/g, ' ') + .replace(/^\s\s*/, '') + .replace(/\s\s*$/, ''); + } + + function checkWeekday(weekdayStr, parsedInput, config) { + if (weekdayStr) { + // TODO: Replace the vanilla JS Date object with an independent day-of-week check. + var weekdayProvided = defaultLocaleWeekdaysShort.indexOf(weekdayStr), + weekdayActual = new Date( + parsedInput[0], + parsedInput[1], + parsedInput[2] + ).getDay(); + if (weekdayProvided !== weekdayActual) { + getParsingFlags(config).weekdayMismatch = true; + config._isValid = false; + return false; + } + } + return true; + } + + function calculateOffset(obsOffset, militaryOffset, numOffset) { + if (obsOffset) { + return obsOffsets[obsOffset]; + } else if (militaryOffset) { + // the only allowed military tz is Z + return 0; + } else { + var hm = parseInt(numOffset, 10), + m = hm % 100, + h = (hm - m) / 100; + return h * 60 + m; + } + } + + // date and time from ref 2822 format + function configFromRFC2822(config) { + var match = rfc2822.exec(preprocessRFC2822(config._i)), + parsedArray; + if (match) { + parsedArray = extractFromRFC2822Strings( + match[4], + match[3], + match[2], + match[5], + match[6], + match[7] + ); + if (!checkWeekday(match[1], parsedArray, config)) { + return; + } + + config._a = parsedArray; + config._tzm = calculateOffset(match[8], match[9], match[10]); + + config._d = createUTCDate.apply(null, config._a); + config._d.setUTCMinutes(config._d.getUTCMinutes() - config._tzm); + + getParsingFlags(config).rfc2822 = true; + } else { + config._isValid = false; + } + } + + // date from 1) ASP.NET, 2) ISO, 3) RFC 2822 formats, or 4) optional fallback if parsing isn't strict + function configFromString(config) { + var matched = aspNetJsonRegex.exec(config._i); + if (matched !== null) { + config._d = new Date(+matched[1]); + return; + } + + configFromISO(config); + if (config._isValid === false) { + delete config._isValid; + } else { + return; + } + + configFromRFC2822(config); + if (config._isValid === false) { + delete config._isValid; + } else { + return; + } + + if (config._strict) { + config._isValid = false; + } else { + // Final attempt, use Input Fallback + hooks.createFromInputFallback(config); + } + } + + hooks.createFromInputFallback = deprecate( + 'value provided is not in a recognized RFC2822 or ISO format. moment construction falls back to js Date(), ' + + 'which is not reliable across all browsers and versions. Non RFC2822/ISO date formats are ' + + 'discouraged. Please refer to http://momentjs.com/guides/#/warnings/js-date/ for more info.', + function (config) { + config._d = new Date(config._i + (config._useUTC ? ' UTC' : '')); + } + ); + + // Pick the first defined of two or three arguments. + function defaults(a, b, c) { + if (a != null) { + return a; + } + if (b != null) { + return b; + } + return c; + } + + function currentDateArray(config) { + // hooks is actually the exported moment object + var nowValue = new Date(hooks.now()); + if (config._useUTC) { + return [ + nowValue.getUTCFullYear(), + nowValue.getUTCMonth(), + nowValue.getUTCDate(), + ]; + } + return [nowValue.getFullYear(), nowValue.getMonth(), nowValue.getDate()]; + } + + // convert an array to a date. + // the array should mirror the parameters below + // note: all values past the year are optional and will default to the lowest possible value. + // [year, month, day , hour, minute, second, millisecond] + function configFromArray(config) { + var i, + date, + input = [], + currentDate, + expectedWeekday, + yearToUse; + + if (config._d) { + return; + } + + currentDate = currentDateArray(config); + + //compute day of the year from weeks and weekdays + if (config._w && config._a[DATE] == null && config._a[MONTH] == null) { + dayOfYearFromWeekInfo(config); + } + + //if the day of the year is set, figure out what it is + if (config._dayOfYear != null) { + yearToUse = defaults(config._a[YEAR], currentDate[YEAR]); + + if ( + config._dayOfYear > daysInYear(yearToUse) || + config._dayOfYear === 0 + ) { + getParsingFlags(config)._overflowDayOfYear = true; + } + + date = createUTCDate(yearToUse, 0, config._dayOfYear); + config._a[MONTH] = date.getUTCMonth(); + config._a[DATE] = date.getUTCDate(); + } + + // Default to current date. + // * if no year, month, day of month are given, default to today + // * if day of month is given, default month and year + // * if month is given, default only year + // * if year is given, don't default anything + for (i = 0; i < 3 && config._a[i] == null; ++i) { + config._a[i] = input[i] = currentDate[i]; + } + + // Zero out whatever was not defaulted, including time + for (; i < 7; i++) { + config._a[i] = input[i] = + config._a[i] == null ? (i === 2 ? 1 : 0) : config._a[i]; + } + + // Check for 24:00:00.000 + if ( + config._a[HOUR] === 24 && + config._a[MINUTE] === 0 && + config._a[SECOND] === 0 && + config._a[MILLISECOND] === 0 + ) { + config._nextDay = true; + config._a[HOUR] = 0; + } + + config._d = (config._useUTC ? createUTCDate : createDate).apply( + null, + input + ); + expectedWeekday = config._useUTC + ? config._d.getUTCDay() + : config._d.getDay(); + + // Apply timezone offset from input. The actual utcOffset can be changed + // with parseZone. + if (config._tzm != null) { + config._d.setUTCMinutes(config._d.getUTCMinutes() - config._tzm); + } + + if (config._nextDay) { + config._a[HOUR] = 24; + } + + // check for mismatching day of week + if ( + config._w && + typeof config._w.d !== 'undefined' && + config._w.d !== expectedWeekday + ) { + getParsingFlags(config).weekdayMismatch = true; + } + } + + function dayOfYearFromWeekInfo(config) { + var w, weekYear, week, weekday, dow, doy, temp, weekdayOverflow, curWeek; + + w = config._w; + if (w.GG != null || w.W != null || w.E != null) { + dow = 1; + doy = 4; + + // TODO: We need to take the current isoWeekYear, but that depends on + // how we interpret now (local, utc, fixed offset). So create + // a now version of current config (take local/utc/offset flags, and + // create now). + weekYear = defaults( + w.GG, + config._a[YEAR], + weekOfYear(createLocal(), 1, 4).year + ); + week = defaults(w.W, 1); + weekday = defaults(w.E, 1); + if (weekday < 1 || weekday > 7) { + weekdayOverflow = true; + } + } else { + dow = config._locale._week.dow; + doy = config._locale._week.doy; + + curWeek = weekOfYear(createLocal(), dow, doy); + + weekYear = defaults(w.gg, config._a[YEAR], curWeek.year); + + // Default to current week. + week = defaults(w.w, curWeek.week); + + if (w.d != null) { + // weekday -- low day numbers are considered next week + weekday = w.d; + if (weekday < 0 || weekday > 6) { + weekdayOverflow = true; + } + } else if (w.e != null) { + // local weekday -- counting starts from beginning of week + weekday = w.e + dow; + if (w.e < 0 || w.e > 6) { + weekdayOverflow = true; + } + } else { + // default to beginning of week + weekday = dow; + } + } + if (week < 1 || week > weeksInYear(weekYear, dow, doy)) { + getParsingFlags(config)._overflowWeeks = true; + } else if (weekdayOverflow != null) { + getParsingFlags(config)._overflowWeekday = true; + } else { + temp = dayOfYearFromWeeks(weekYear, week, weekday, dow, doy); + config._a[YEAR] = temp.year; + config._dayOfYear = temp.dayOfYear; + } + } + + // constant that refers to the ISO standard + hooks.ISO_8601 = function () {}; + + // constant that refers to the RFC 2822 form + hooks.RFC_2822 = function () {}; + + // date from string and format string + function configFromStringAndFormat(config) { + // TODO: Move this to another part of the creation flow to prevent circular deps + if (config._f === hooks.ISO_8601) { + configFromISO(config); + return; + } + if (config._f === hooks.RFC_2822) { + configFromRFC2822(config); + return; + } + config._a = []; + getParsingFlags(config).empty = true; + + // This array is used to make a Date, either with `new Date` or `Date.UTC` + var string = '' + config._i, + i, + parsedInput, + tokens, + token, + skipped, + stringLength = string.length, + totalParsedInputLength = 0, + era; + + tokens = + expandFormat(config._f, config._locale).match(formattingTokens) || []; + + for (i = 0; i < tokens.length; i++) { + token = tokens[i]; + parsedInput = (string.match(getParseRegexForToken(token, config)) || + [])[0]; + if (parsedInput) { + skipped = string.substr(0, string.indexOf(parsedInput)); + if (skipped.length > 0) { + getParsingFlags(config).unusedInput.push(skipped); + } + string = string.slice( + string.indexOf(parsedInput) + parsedInput.length + ); + totalParsedInputLength += parsedInput.length; + } + // don't parse if it's not a known token + if (formatTokenFunctions[token]) { + if (parsedInput) { + getParsingFlags(config).empty = false; + } else { + getParsingFlags(config).unusedTokens.push(token); + } + addTimeToArrayFromToken(token, parsedInput, config); + } else if (config._strict && !parsedInput) { + getParsingFlags(config).unusedTokens.push(token); + } + } + + // add remaining unparsed input length to the string + getParsingFlags(config).charsLeftOver = + stringLength - totalParsedInputLength; + if (string.length > 0) { + getParsingFlags(config).unusedInput.push(string); + } + + // clear _12h flag if hour is <= 12 + if ( + config._a[HOUR] <= 12 && + getParsingFlags(config).bigHour === true && + config._a[HOUR] > 0 + ) { + getParsingFlags(config).bigHour = undefined; + } + + getParsingFlags(config).parsedDateParts = config._a.slice(0); + getParsingFlags(config).meridiem = config._meridiem; + // handle meridiem + config._a[HOUR] = meridiemFixWrap( + config._locale, + config._a[HOUR], + config._meridiem + ); + + // handle era + era = getParsingFlags(config).era; + if (era !== null) { + config._a[YEAR] = config._locale.erasConvertYear(era, config._a[YEAR]); + } + + configFromArray(config); + checkOverflow(config); + } + + function meridiemFixWrap(locale, hour, meridiem) { + var isPm; + + if (meridiem == null) { + // nothing to do + return hour; + } + if (locale.meridiemHour != null) { + return locale.meridiemHour(hour, meridiem); + } else if (locale.isPM != null) { + // Fallback + isPm = locale.isPM(meridiem); + if (isPm && hour < 12) { + hour += 12; + } + if (!isPm && hour === 12) { + hour = 0; + } + return hour; + } else { + // this is not supposed to happen + return hour; + } + } + + // date from string and array of format strings + function configFromStringAndArray(config) { + var tempConfig, + bestMoment, + scoreToBeat, + i, + currentScore, + validFormatFound, + bestFormatIsValid = false; + + if (config._f.length === 0) { + getParsingFlags(config).invalidFormat = true; + config._d = new Date(NaN); + return; + } + + for (i = 0; i < config._f.length; i++) { + currentScore = 0; + validFormatFound = false; + tempConfig = copyConfig({}, config); + if (config._useUTC != null) { + tempConfig._useUTC = config._useUTC; + } + tempConfig._f = config._f[i]; + configFromStringAndFormat(tempConfig); + + if (isValid(tempConfig)) { + validFormatFound = true; + } + + // if there is any input that was not parsed add a penalty for that format + currentScore += getParsingFlags(tempConfig).charsLeftOver; + + //or tokens + currentScore += getParsingFlags(tempConfig).unusedTokens.length * 10; + + getParsingFlags(tempConfig).score = currentScore; + + if (!bestFormatIsValid) { + if ( + scoreToBeat == null || + currentScore < scoreToBeat || + validFormatFound + ) { + scoreToBeat = currentScore; + bestMoment = tempConfig; + if (validFormatFound) { + bestFormatIsValid = true; + } + } + } else { + if (currentScore < scoreToBeat) { + scoreToBeat = currentScore; + bestMoment = tempConfig; + } + } + } + + extend(config, bestMoment || tempConfig); + } + + function configFromObject(config) { + if (config._d) { + return; + } + + var i = normalizeObjectUnits(config._i), + dayOrDate = i.day === undefined ? i.date : i.day; + config._a = map( + [i.year, i.month, dayOrDate, i.hour, i.minute, i.second, i.millisecond], + function (obj) { + return obj && parseInt(obj, 10); + } + ); + + configFromArray(config); + } + + function createFromConfig(config) { + var res = new Moment(checkOverflow(prepareConfig(config))); + if (res._nextDay) { + // Adding is smart enough around DST + res.add(1, 'd'); + res._nextDay = undefined; + } + + return res; + } + + function prepareConfig(config) { + var input = config._i, + format = config._f; + + config._locale = config._locale || getLocale(config._l); + + if (input === null || (format === undefined && input === '')) { + return createInvalid({ nullInput: true }); + } + + if (typeof input === 'string') { + config._i = input = config._locale.preparse(input); + } + + if (isMoment(input)) { + return new Moment(checkOverflow(input)); + } else if (isDate(input)) { + config._d = input; + } else if (isArray(format)) { + configFromStringAndArray(config); + } else if (format) { + configFromStringAndFormat(config); + } else { + configFromInput(config); + } + + if (!isValid(config)) { + config._d = null; + } + + return config; + } + + function configFromInput(config) { + var input = config._i; + if (isUndefined(input)) { + config._d = new Date(hooks.now()); + } else if (isDate(input)) { + config._d = new Date(input.valueOf()); + } else if (typeof input === 'string') { + configFromString(config); + } else if (isArray(input)) { + config._a = map(input.slice(0), function (obj) { + return parseInt(obj, 10); + }); + configFromArray(config); + } else if (isObject(input)) { + configFromObject(config); + } else if (isNumber(input)) { + // from milliseconds + config._d = new Date(input); + } else { + hooks.createFromInputFallback(config); + } + } + + function createLocalOrUTC(input, format, locale, strict, isUTC) { + var c = {}; + + if (format === true || format === false) { + strict = format; + format = undefined; + } + + if (locale === true || locale === false) { + strict = locale; + locale = undefined; + } + + if ( + (isObject(input) && isObjectEmpty(input)) || + (isArray(input) && input.length === 0) + ) { + input = undefined; + } + // object construction must be done this way. + // https://github.com/moment/moment/issues/1423 + c._isAMomentObject = true; + c._useUTC = c._isUTC = isUTC; + c._l = locale; + c._i = input; + c._f = format; + c._strict = strict; + + return createFromConfig(c); + } + + function createLocal(input, format, locale, strict) { + return createLocalOrUTC(input, format, locale, strict, false); + } + + var prototypeMin = deprecate( + 'moment().min is deprecated, use moment.max instead. http://momentjs.com/guides/#/warnings/min-max/', + function () { + var other = createLocal.apply(null, arguments); + if (this.isValid() && other.isValid()) { + return other < this ? this : other; + } else { + return createInvalid(); + } + } + ), + prototypeMax = deprecate( + 'moment().max is deprecated, use moment.min instead. http://momentjs.com/guides/#/warnings/min-max/', + function () { + var other = createLocal.apply(null, arguments); + if (this.isValid() && other.isValid()) { + return other > this ? this : other; + } else { + return createInvalid(); + } + } + ); + + // Pick a moment m from moments so that m[fn](other) is true for all + // other. This relies on the function fn to be transitive. + // + // moments should either be an array of moment objects or an array, whose + // first element is an array of moment objects. + function pickBy(fn, moments) { + var res, i; + if (moments.length === 1 && isArray(moments[0])) { + moments = moments[0]; + } + if (!moments.length) { + return createLocal(); + } + res = moments[0]; + for (i = 1; i < moments.length; ++i) { + if (!moments[i].isValid() || moments[i][fn](res)) { + res = moments[i]; + } + } + return res; + } + + // TODO: Use [].sort instead? + function min() { + var args = [].slice.call(arguments, 0); + + return pickBy('isBefore', args); + } + + function max() { + var args = [].slice.call(arguments, 0); + + return pickBy('isAfter', args); + } + + var now = function () { + return Date.now ? Date.now() : +new Date(); + }; + + var ordering = [ + 'year', + 'quarter', + 'month', + 'week', + 'day', + 'hour', + 'minute', + 'second', + 'millisecond', + ]; + + function isDurationValid(m) { + var key, + unitHasDecimal = false, + i; + for (key in m) { + if ( + hasOwnProp(m, key) && + !( + indexOf.call(ordering, key) !== -1 && + (m[key] == null || !isNaN(m[key])) + ) + ) { + return false; + } + } + + for (i = 0; i < ordering.length; ++i) { + if (m[ordering[i]]) { + if (unitHasDecimal) { + return false; // only allow non-integers for smallest unit + } + if (parseFloat(m[ordering[i]]) !== toInt(m[ordering[i]])) { + unitHasDecimal = true; + } + } + } + + return true; + } + + function isValid$1() { + return this._isValid; + } + + function createInvalid$1() { + return createDuration(NaN); + } + + function Duration(duration) { + var normalizedInput = normalizeObjectUnits(duration), + years = normalizedInput.year || 0, + quarters = normalizedInput.quarter || 0, + months = normalizedInput.month || 0, + weeks = normalizedInput.week || normalizedInput.isoWeek || 0, + days = normalizedInput.day || 0, + hours = normalizedInput.hour || 0, + minutes = normalizedInput.minute || 0, + seconds = normalizedInput.second || 0, + milliseconds = normalizedInput.millisecond || 0; + + this._isValid = isDurationValid(normalizedInput); + + // representation for dateAddRemove + this._milliseconds = + +milliseconds + + seconds * 1e3 + // 1000 + minutes * 6e4 + // 1000 * 60 + hours * 1000 * 60 * 60; //using 1000 * 60 * 60 instead of 36e5 to avoid floating point rounding errors https://github.com/moment/moment/issues/2978 + // Because of dateAddRemove treats 24 hours as different from a + // day when working around DST, we need to store them separately + this._days = +days + weeks * 7; + // It is impossible to translate months into days without knowing + // which months you are are talking about, so we have to store + // it separately. + this._months = +months + quarters * 3 + years * 12; + + this._data = {}; + + this._locale = getLocale(); + + this._bubble(); + } + + function isDuration(obj) { + return obj instanceof Duration; + } + + function absRound(number) { + if (number < 0) { + return Math.round(-1 * number) * -1; + } else { + return Math.round(number); + } + } + + // compare two arrays, return the number of differences + function compareArrays(array1, array2, dontConvert) { + var len = Math.min(array1.length, array2.length), + lengthDiff = Math.abs(array1.length - array2.length), + diffs = 0, + i; + for (i = 0; i < len; i++) { + if ( + (dontConvert && array1[i] !== array2[i]) || + (!dontConvert && toInt(array1[i]) !== toInt(array2[i])) + ) { + diffs++; + } + } + return diffs + lengthDiff; + } + + // FORMATTING + + function offset(token, separator) { + addFormatToken(token, 0, 0, function () { + var offset = this.utcOffset(), + sign = '+'; + if (offset < 0) { + offset = -offset; + sign = '-'; + } + return ( + sign + + zeroFill(~~(offset / 60), 2) + + separator + + zeroFill(~~offset % 60, 2) + ); + }); + } + + offset('Z', ':'); + offset('ZZ', ''); + + // PARSING + + addRegexToken('Z', matchShortOffset); + addRegexToken('ZZ', matchShortOffset); + addParseToken(['Z', 'ZZ'], function (input, array, config) { + config._useUTC = true; + config._tzm = offsetFromString(matchShortOffset, input); + }); + + // HELPERS + + // timezone chunker + // '+10:00' > ['10', '00'] + // '-1530' > ['-15', '30'] + var chunkOffset = /([\+\-]|\d\d)/gi; + + function offsetFromString(matcher, string) { + var matches = (string || '').match(matcher), + chunk, + parts, + minutes; + + if (matches === null) { + return null; + } + + chunk = matches[matches.length - 1] || []; + parts = (chunk + '').match(chunkOffset) || ['-', 0, 0]; + minutes = +(parts[1] * 60) + toInt(parts[2]); + + return minutes === 0 ? 0 : parts[0] === '+' ? minutes : -minutes; + } + + // Return a moment from input, that is local/utc/zone equivalent to model. + function cloneWithOffset(input, model) { + var res, diff; + if (model._isUTC) { + res = model.clone(); + diff = + (isMoment(input) || isDate(input) + ? input.valueOf() + : createLocal(input).valueOf()) - res.valueOf(); + // Use low-level api, because this fn is low-level api. + res._d.setTime(res._d.valueOf() + diff); + hooks.updateOffset(res, false); + return res; + } else { + return createLocal(input).local(); + } + } + + function getDateOffset(m) { + // On Firefox.24 Date#getTimezoneOffset returns a floating point. + // https://github.com/moment/moment/pull/1871 + return -Math.round(m._d.getTimezoneOffset()); + } + + // HOOKS + + // This function will be called whenever a moment is mutated. + // It is intended to keep the offset in sync with the timezone. + hooks.updateOffset = function () {}; + + // MOMENTS + + // keepLocalTime = true means only change the timezone, without + // affecting the local hour. So 5:31:26 +0300 --[utcOffset(2, true)]--> + // 5:31:26 +0200 It is possible that 5:31:26 doesn't exist with offset + // +0200, so we adjust the time as needed, to be valid. + // + // Keeping the time actually adds/subtracts (one hour) + // from the actual represented time. That is why we call updateOffset + // a second time. In case it wants us to change the offset again + // _changeInProgress == true case, then we have to adjust, because + // there is no such time in the given timezone. + function getSetOffset(input, keepLocalTime, keepMinutes) { + var offset = this._offset || 0, + localAdjust; + if (!this.isValid()) { + return input != null ? this : NaN; + } + if (input != null) { + if (typeof input === 'string') { + input = offsetFromString(matchShortOffset, input); + if (input === null) { + return this; + } + } else if (Math.abs(input) < 16 && !keepMinutes) { + input = input * 60; + } + if (!this._isUTC && keepLocalTime) { + localAdjust = getDateOffset(this); + } + this._offset = input; + this._isUTC = true; + if (localAdjust != null) { + this.add(localAdjust, 'm'); + } + if (offset !== input) { + if (!keepLocalTime || this._changeInProgress) { + addSubtract( + this, + createDuration(input - offset, 'm'), + 1, + false + ); + } else if (!this._changeInProgress) { + this._changeInProgress = true; + hooks.updateOffset(this, true); + this._changeInProgress = null; + } + } + return this; + } else { + return this._isUTC ? offset : getDateOffset(this); + } + } + + function getSetZone(input, keepLocalTime) { + if (input != null) { + if (typeof input !== 'string') { + input = -input; + } + + this.utcOffset(input, keepLocalTime); + + return this; + } else { + return -this.utcOffset(); + } + } + + function setOffsetToUTC(keepLocalTime) { + return this.utcOffset(0, keepLocalTime); + } + + function setOffsetToLocal(keepLocalTime) { + if (this._isUTC) { + this.utcOffset(0, keepLocalTime); + this._isUTC = false; + + if (keepLocalTime) { + this.subtract(getDateOffset(this), 'm'); + } + } + return this; + } + + function setOffsetToParsedOffset() { + if (this._tzm != null) { + this.utcOffset(this._tzm, false, true); + } else if (typeof this._i === 'string') { + var tZone = offsetFromString(matchOffset, this._i); + if (tZone != null) { + this.utcOffset(tZone); + } else { + this.utcOffset(0, true); + } + } + return this; + } + + function hasAlignedHourOffset(input) { + if (!this.isValid()) { + return false; + } + input = input ? createLocal(input).utcOffset() : 0; + + return (this.utcOffset() - input) % 60 === 0; + } + + function isDaylightSavingTime() { + return ( + this.utcOffset() > this.clone().month(0).utcOffset() || + this.utcOffset() > this.clone().month(5).utcOffset() + ); + } + + function isDaylightSavingTimeShifted() { + if (!isUndefined(this._isDSTShifted)) { + return this._isDSTShifted; + } + + var c = {}, + other; + + copyConfig(c, this); + c = prepareConfig(c); + + if (c._a) { + other = c._isUTC ? createUTC(c._a) : createLocal(c._a); + this._isDSTShifted = + this.isValid() && compareArrays(c._a, other.toArray()) > 0; + } else { + this._isDSTShifted = false; + } + + return this._isDSTShifted; + } + + function isLocal() { + return this.isValid() ? !this._isUTC : false; + } + + function isUtcOffset() { + return this.isValid() ? this._isUTC : false; + } + + function isUtc() { + return this.isValid() ? this._isUTC && this._offset === 0 : false; + } + + // ASP.NET json date format regex + var aspNetRegex = /^(-|\+)?(?:(\d*)[. ])?(\d+):(\d+)(?::(\d+)(\.\d*)?)?$/, + // from http://docs.closure-library.googlecode.com/git/closure_goog_date_date.js.source.html + // somewhat more in line with 4.4.3.2 2004 spec, but allows decimal anywhere + // and further modified to allow for strings containing both week and day + isoRegex = /^(-|\+)?P(?:([-+]?[0-9,.]*)Y)?(?:([-+]?[0-9,.]*)M)?(?:([-+]?[0-9,.]*)W)?(?:([-+]?[0-9,.]*)D)?(?:T(?:([-+]?[0-9,.]*)H)?(?:([-+]?[0-9,.]*)M)?(?:([-+]?[0-9,.]*)S)?)?$/; + + function createDuration(input, key) { + var duration = input, + // matching against regexp is expensive, do it on demand + match = null, + sign, + ret, + diffRes; + + if (isDuration(input)) { + duration = { + ms: input._milliseconds, + d: input._days, + M: input._months, + }; + } else if (isNumber(input) || !isNaN(+input)) { + duration = {}; + if (key) { + duration[key] = +input; + } else { + duration.milliseconds = +input; + } + } else if ((match = aspNetRegex.exec(input))) { + sign = match[1] === '-' ? -1 : 1; + duration = { + y: 0, + d: toInt(match[DATE]) * sign, + h: toInt(match[HOUR]) * sign, + m: toInt(match[MINUTE]) * sign, + s: toInt(match[SECOND]) * sign, + ms: toInt(absRound(match[MILLISECOND] * 1000)) * sign, // the millisecond decimal point is included in the match + }; + } else if ((match = isoRegex.exec(input))) { + sign = match[1] === '-' ? -1 : 1; + duration = { + y: parseIso(match[2], sign), + M: parseIso(match[3], sign), + w: parseIso(match[4], sign), + d: parseIso(match[5], sign), + h: parseIso(match[6], sign), + m: parseIso(match[7], sign), + s: parseIso(match[8], sign), + }; + } else if (duration == null) { + // checks for null or undefined + duration = {}; + } else if ( + typeof duration === 'object' && + ('from' in duration || 'to' in duration) + ) { + diffRes = momentsDifference( + createLocal(duration.from), + createLocal(duration.to) + ); + + duration = {}; + duration.ms = diffRes.milliseconds; + duration.M = diffRes.months; + } + + ret = new Duration(duration); + + if (isDuration(input) && hasOwnProp(input, '_locale')) { + ret._locale = input._locale; + } + + if (isDuration(input) && hasOwnProp(input, '_isValid')) { + ret._isValid = input._isValid; + } + + return ret; + } + + createDuration.fn = Duration.prototype; + createDuration.invalid = createInvalid$1; + + function parseIso(inp, sign) { + // We'd normally use ~~inp for this, but unfortunately it also + // converts floats to ints. + // inp may be undefined, so careful calling replace on it. + var res = inp && parseFloat(inp.replace(',', '.')); + // apply sign while we're at it + return (isNaN(res) ? 0 : res) * sign; + } + + function positiveMomentsDifference(base, other) { + var res = {}; + + res.months = + other.month() - base.month() + (other.year() - base.year()) * 12; + if (base.clone().add(res.months, 'M').isAfter(other)) { + --res.months; + } + + res.milliseconds = +other - +base.clone().add(res.months, 'M'); + + return res; + } + + function momentsDifference(base, other) { + var res; + if (!(base.isValid() && other.isValid())) { + return { milliseconds: 0, months: 0 }; + } + + other = cloneWithOffset(other, base); + if (base.isBefore(other)) { + res = positiveMomentsDifference(base, other); + } else { + res = positiveMomentsDifference(other, base); + res.milliseconds = -res.milliseconds; + res.months = -res.months; + } + + return res; + } + + // TODO: remove 'name' arg after deprecation is removed + function createAdder(direction, name) { + return function (val, period) { + var dur, tmp; + //invert the arguments, but complain about it + if (period !== null && !isNaN(+period)) { + deprecateSimple( + name, + 'moment().' + + name + + '(period, number) is deprecated. Please use moment().' + + name + + '(number, period). ' + + 'See http://momentjs.com/guides/#/warnings/add-inverted-param/ for more info.' + ); + tmp = val; + val = period; + period = tmp; + } + + dur = createDuration(val, period); + addSubtract(this, dur, direction); + return this; + }; + } + + function addSubtract(mom, duration, isAdding, updateOffset) { + var milliseconds = duration._milliseconds, + days = absRound(duration._days), + months = absRound(duration._months); + + if (!mom.isValid()) { + // No op + return; + } + + updateOffset = updateOffset == null ? true : updateOffset; + + if (months) { + setMonth(mom, get(mom, 'Month') + months * isAdding); + } + if (days) { + set$1(mom, 'Date', get(mom, 'Date') + days * isAdding); + } + if (milliseconds) { + mom._d.setTime(mom._d.valueOf() + milliseconds * isAdding); + } + if (updateOffset) { + hooks.updateOffset(mom, days || months); + } + } + + var add = createAdder(1, 'add'), + subtract = createAdder(-1, 'subtract'); + + function isString(input) { + return typeof input === 'string' || input instanceof String; + } + + // type MomentInput = Moment | Date | string | number | (number | string)[] | MomentInputObject | void; // null | undefined + function isMomentInput(input) { + return ( + isMoment(input) || + isDate(input) || + isString(input) || + isNumber(input) || + isNumberOrStringArray(input) || + isMomentInputObject(input) || + input === null || + input === undefined + ); + } + + function isMomentInputObject(input) { + var objectTest = isObject(input) && !isObjectEmpty(input), + propertyTest = false, + properties = [ + 'years', + 'year', + 'y', + 'months', + 'month', + 'M', + 'days', + 'day', + 'd', + 'dates', + 'date', + 'D', + 'hours', + 'hour', + 'h', + 'minutes', + 'minute', + 'm', + 'seconds', + 'second', + 's', + 'milliseconds', + 'millisecond', + 'ms', + ], + i, + property; + + for (i = 0; i < properties.length; i += 1) { + property = properties[i]; + propertyTest = propertyTest || hasOwnProp(input, property); + } + + return objectTest && propertyTest; + } + + function isNumberOrStringArray(input) { + var arrayTest = isArray(input), + dataTypeTest = false; + if (arrayTest) { + dataTypeTest = + input.filter(function (item) { + return !isNumber(item) && isString(input); + }).length === 0; + } + return arrayTest && dataTypeTest; + } + + function isCalendarSpec(input) { + var objectTest = isObject(input) && !isObjectEmpty(input), + propertyTest = false, + properties = [ + 'sameDay', + 'nextDay', + 'lastDay', + 'nextWeek', + 'lastWeek', + 'sameElse', + ], + i, + property; + + for (i = 0; i < properties.length; i += 1) { + property = properties[i]; + propertyTest = propertyTest || hasOwnProp(input, property); + } + + return objectTest && propertyTest; + } + + function getCalendarFormat(myMoment, now) { + var diff = myMoment.diff(now, 'days', true); + return diff < -6 + ? 'sameElse' + : diff < -1 + ? 'lastWeek' + : diff < 0 + ? 'lastDay' + : diff < 1 + ? 'sameDay' + : diff < 2 + ? 'nextDay' + : diff < 7 + ? 'nextWeek' + : 'sameElse'; + } + + function calendar$1(time, formats) { + // Support for single parameter, formats only overload to the calendar function + if (arguments.length === 1) { + if (!arguments[0]) { + time = undefined; + formats = undefined; + } else if (isMomentInput(arguments[0])) { + time = arguments[0]; + formats = undefined; + } else if (isCalendarSpec(arguments[0])) { + formats = arguments[0]; + time = undefined; + } + } + // We want to compare the start of today, vs this. + // Getting start-of-today depends on whether we're local/utc/offset or not. + var now = time || createLocal(), + sod = cloneWithOffset(now, this).startOf('day'), + format = hooks.calendarFormat(this, sod) || 'sameElse', + output = + formats && + (isFunction(formats[format]) + ? formats[format].call(this, now) + : formats[format]); + + return this.format( + output || this.localeData().calendar(format, this, createLocal(now)) + ); + } + + function clone() { + return new Moment(this); + } + + function isAfter(input, units) { + var localInput = isMoment(input) ? input : createLocal(input); + if (!(this.isValid() && localInput.isValid())) { + return false; + } + units = normalizeUnits(units) || 'millisecond'; + if (units === 'millisecond') { + return this.valueOf() > localInput.valueOf(); + } else { + return localInput.valueOf() < this.clone().startOf(units).valueOf(); + } + } + + function isBefore(input, units) { + var localInput = isMoment(input) ? input : createLocal(input); + if (!(this.isValid() && localInput.isValid())) { + return false; + } + units = normalizeUnits(units) || 'millisecond'; + if (units === 'millisecond') { + return this.valueOf() < localInput.valueOf(); + } else { + return this.clone().endOf(units).valueOf() < localInput.valueOf(); + } + } + + function isBetween(from, to, units, inclusivity) { + var localFrom = isMoment(from) ? from : createLocal(from), + localTo = isMoment(to) ? to : createLocal(to); + if (!(this.isValid() && localFrom.isValid() && localTo.isValid())) { + return false; + } + inclusivity = inclusivity || '()'; + return ( + (inclusivity[0] === '(' + ? this.isAfter(localFrom, units) + : !this.isBefore(localFrom, units)) && + (inclusivity[1] === ')' + ? this.isBefore(localTo, units) + : !this.isAfter(localTo, units)) + ); + } + + function isSame(input, units) { + var localInput = isMoment(input) ? input : createLocal(input), + inputMs; + if (!(this.isValid() && localInput.isValid())) { + return false; + } + units = normalizeUnits(units) || 'millisecond'; + if (units === 'millisecond') { + return this.valueOf() === localInput.valueOf(); + } else { + inputMs = localInput.valueOf(); + return ( + this.clone().startOf(units).valueOf() <= inputMs && + inputMs <= this.clone().endOf(units).valueOf() + ); + } + } + + function isSameOrAfter(input, units) { + return this.isSame(input, units) || this.isAfter(input, units); + } + + function isSameOrBefore(input, units) { + return this.isSame(input, units) || this.isBefore(input, units); + } + + function diff(input, units, asFloat) { + var that, zoneDelta, output; + + if (!this.isValid()) { + return NaN; + } + + that = cloneWithOffset(input, this); + + if (!that.isValid()) { + return NaN; + } + + zoneDelta = (that.utcOffset() - this.utcOffset()) * 6e4; + + units = normalizeUnits(units); + + switch (units) { + case 'year': + output = monthDiff(this, that) / 12; + break; + case 'month': + output = monthDiff(this, that); + break; + case 'quarter': + output = monthDiff(this, that) / 3; + break; + case 'second': + output = (this - that) / 1e3; + break; // 1000 + case 'minute': + output = (this - that) / 6e4; + break; // 1000 * 60 + case 'hour': + output = (this - that) / 36e5; + break; // 1000 * 60 * 60 + case 'day': + output = (this - that - zoneDelta) / 864e5; + break; // 1000 * 60 * 60 * 24, negate dst + case 'week': + output = (this - that - zoneDelta) / 6048e5; + break; // 1000 * 60 * 60 * 24 * 7, negate dst + default: + output = this - that; + } + + return asFloat ? output : absFloor(output); + } + + function monthDiff(a, b) { + if (a.date() < b.date()) { + // end-of-month calculations work correct when the start month has more + // days than the end month. + return -monthDiff(b, a); + } + // difference in months + var wholeMonthDiff = (b.year() - a.year()) * 12 + (b.month() - a.month()), + // b is in (anchor - 1 month, anchor + 1 month) + anchor = a.clone().add(wholeMonthDiff, 'months'), + anchor2, + adjust; + + if (b - anchor < 0) { + anchor2 = a.clone().add(wholeMonthDiff - 1, 'months'); + // linear across the month + adjust = (b - anchor) / (anchor - anchor2); + } else { + anchor2 = a.clone().add(wholeMonthDiff + 1, 'months'); + // linear across the month + adjust = (b - anchor) / (anchor2 - anchor); + } + + //check for negative zero, return zero if negative zero + return -(wholeMonthDiff + adjust) || 0; + } + + hooks.defaultFormat = 'YYYY-MM-DDTHH:mm:ssZ'; + hooks.defaultFormatUtc = 'YYYY-MM-DDTHH:mm:ss[Z]'; + + function toString() { + return this.clone().locale('en').format('ddd MMM DD YYYY HH:mm:ss [GMT]ZZ'); + } + + function toISOString(keepOffset) { + if (!this.isValid()) { + return null; + } + var utc = keepOffset !== true, + m = utc ? this.clone().utc() : this; + if (m.year() < 0 || m.year() > 9999) { + return formatMoment( + m, + utc + ? 'YYYYYY-MM-DD[T]HH:mm:ss.SSS[Z]' + : 'YYYYYY-MM-DD[T]HH:mm:ss.SSSZ' + ); + } + if (isFunction(Date.prototype.toISOString)) { + // native implementation is ~50x faster, use it when we can + if (utc) { + return this.toDate().toISOString(); + } else { + return new Date(this.valueOf() + this.utcOffset() * 60 * 1000) + .toISOString() + .replace('Z', formatMoment(m, 'Z')); + } + } + return formatMoment( + m, + utc ? 'YYYY-MM-DD[T]HH:mm:ss.SSS[Z]' : 'YYYY-MM-DD[T]HH:mm:ss.SSSZ' + ); + } + + /** + * Return a human readable representation of a moment that can + * also be evaluated to get a new moment which is the same + * + * @link https://nodejs.org/dist/latest/docs/api/util.html#util_custom_inspect_function_on_objects + */ + function inspect() { + if (!this.isValid()) { + return 'moment.invalid(/* ' + this._i + ' */)'; + } + var func = 'moment', + zone = '', + prefix, + year, + datetime, + suffix; + if (!this.isLocal()) { + func = this.utcOffset() === 0 ? 'moment.utc' : 'moment.parseZone'; + zone = 'Z'; + } + prefix = '[' + func + '("]'; + year = 0 <= this.year() && this.year() <= 9999 ? 'YYYY' : 'YYYYYY'; + datetime = '-MM-DD[T]HH:mm:ss.SSS'; + suffix = zone + '[")]'; + + return this.format(prefix + year + datetime + suffix); + } + + function format(inputString) { + if (!inputString) { + inputString = this.isUtc() + ? hooks.defaultFormatUtc + : hooks.defaultFormat; + } + var output = formatMoment(this, inputString); + return this.localeData().postformat(output); + } + + function from(time, withoutSuffix) { + if ( + this.isValid() && + ((isMoment(time) && time.isValid()) || createLocal(time).isValid()) + ) { + return createDuration({ to: this, from: time }) + .locale(this.locale()) + .humanize(!withoutSuffix); + } else { + return this.localeData().invalidDate(); + } + } + + function fromNow(withoutSuffix) { + return this.from(createLocal(), withoutSuffix); + } + + function to(time, withoutSuffix) { + if ( + this.isValid() && + ((isMoment(time) && time.isValid()) || createLocal(time).isValid()) + ) { + return createDuration({ from: this, to: time }) + .locale(this.locale()) + .humanize(!withoutSuffix); + } else { + return this.localeData().invalidDate(); + } + } + + function toNow(withoutSuffix) { + return this.to(createLocal(), withoutSuffix); + } + + // If passed a locale key, it will set the locale for this + // instance. Otherwise, it will return the locale configuration + // variables for this instance. + function locale(key) { + var newLocaleData; + + if (key === undefined) { + return this._locale._abbr; + } else { + newLocaleData = getLocale(key); + if (newLocaleData != null) { + this._locale = newLocaleData; + } + return this; + } + } + + var lang = deprecate( + 'moment().lang() is deprecated. Instead, use moment().localeData() to get the language configuration. Use moment().locale() to change languages.', + function (key) { + if (key === undefined) { + return this.localeData(); + } else { + return this.locale(key); + } + } + ); + + function localeData() { + return this._locale; + } + + var MS_PER_SECOND = 1000, + MS_PER_MINUTE = 60 * MS_PER_SECOND, + MS_PER_HOUR = 60 * MS_PER_MINUTE, + MS_PER_400_YEARS = (365 * 400 + 97) * 24 * MS_PER_HOUR; + + // actual modulo - handles negative numbers (for dates before 1970): + function mod$1(dividend, divisor) { + return ((dividend % divisor) + divisor) % divisor; + } + + function localStartOfDate(y, m, d) { + // the date constructor remaps years 0-99 to 1900-1999 + if (y < 100 && y >= 0) { + // preserve leap years using a full 400 year cycle, then reset + return new Date(y + 400, m, d) - MS_PER_400_YEARS; + } else { + return new Date(y, m, d).valueOf(); + } + } + + function utcStartOfDate(y, m, d) { + // Date.UTC remaps years 0-99 to 1900-1999 + if (y < 100 && y >= 0) { + // preserve leap years using a full 400 year cycle, then reset + return Date.UTC(y + 400, m, d) - MS_PER_400_YEARS; + } else { + return Date.UTC(y, m, d); + } + } + + function startOf(units) { + var time, startOfDate; + units = normalizeUnits(units); + if (units === undefined || units === 'millisecond' || !this.isValid()) { + return this; + } + + startOfDate = this._isUTC ? utcStartOfDate : localStartOfDate; + + switch (units) { + case 'year': + time = startOfDate(this.year(), 0, 1); + break; + case 'quarter': + time = startOfDate( + this.year(), + this.month() - (this.month() % 3), + 1 + ); + break; + case 'month': + time = startOfDate(this.year(), this.month(), 1); + break; + case 'week': + time = startOfDate( + this.year(), + this.month(), + this.date() - this.weekday() + ); + break; + case 'isoWeek': + time = startOfDate( + this.year(), + this.month(), + this.date() - (this.isoWeekday() - 1) + ); + break; + case 'day': + case 'date': + time = startOfDate(this.year(), this.month(), this.date()); + break; + case 'hour': + time = this._d.valueOf(); + time -= mod$1( + time + (this._isUTC ? 0 : this.utcOffset() * MS_PER_MINUTE), + MS_PER_HOUR + ); + break; + case 'minute': + time = this._d.valueOf(); + time -= mod$1(time, MS_PER_MINUTE); + break; + case 'second': + time = this._d.valueOf(); + time -= mod$1(time, MS_PER_SECOND); + break; + } + + this._d.setTime(time); + hooks.updateOffset(this, true); + return this; + } + + function endOf(units) { + var time, startOfDate; + units = normalizeUnits(units); + if (units === undefined || units === 'millisecond' || !this.isValid()) { + return this; + } + + startOfDate = this._isUTC ? utcStartOfDate : localStartOfDate; + + switch (units) { + case 'year': + time = startOfDate(this.year() + 1, 0, 1) - 1; + break; + case 'quarter': + time = + startOfDate( + this.year(), + this.month() - (this.month() % 3) + 3, + 1 + ) - 1; + break; + case 'month': + time = startOfDate(this.year(), this.month() + 1, 1) - 1; + break; + case 'week': + time = + startOfDate( + this.year(), + this.month(), + this.date() - this.weekday() + 7 + ) - 1; + break; + case 'isoWeek': + time = + startOfDate( + this.year(), + this.month(), + this.date() - (this.isoWeekday() - 1) + 7 + ) - 1; + break; + case 'day': + case 'date': + time = startOfDate(this.year(), this.month(), this.date() + 1) - 1; + break; + case 'hour': + time = this._d.valueOf(); + time += + MS_PER_HOUR - + mod$1( + time + (this._isUTC ? 0 : this.utcOffset() * MS_PER_MINUTE), + MS_PER_HOUR + ) - + 1; + break; + case 'minute': + time = this._d.valueOf(); + time += MS_PER_MINUTE - mod$1(time, MS_PER_MINUTE) - 1; + break; + case 'second': + time = this._d.valueOf(); + time += MS_PER_SECOND - mod$1(time, MS_PER_SECOND) - 1; + break; + } + + this._d.setTime(time); + hooks.updateOffset(this, true); + return this; + } + + function valueOf() { + return this._d.valueOf() - (this._offset || 0) * 60000; + } + + function unix() { + return Math.floor(this.valueOf() / 1000); + } + + function toDate() { + return new Date(this.valueOf()); + } + + function toArray() { + var m = this; + return [ + m.year(), + m.month(), + m.date(), + m.hour(), + m.minute(), + m.second(), + m.millisecond(), + ]; + } + + function toObject() { + var m = this; + return { + years: m.year(), + months: m.month(), + date: m.date(), + hours: m.hours(), + minutes: m.minutes(), + seconds: m.seconds(), + milliseconds: m.milliseconds(), + }; + } + + function toJSON() { + // new Date(NaN).toJSON() === null + return this.isValid() ? this.toISOString() : null; + } + + function isValid$2() { + return isValid(this); + } + + function parsingFlags() { + return extend({}, getParsingFlags(this)); + } + + function invalidAt() { + return getParsingFlags(this).overflow; + } + + function creationData() { + return { + input: this._i, + format: this._f, + locale: this._locale, + isUTC: this._isUTC, + strict: this._strict, + }; + } + + addFormatToken('N', 0, 0, 'eraAbbr'); + addFormatToken('NN', 0, 0, 'eraAbbr'); + addFormatToken('NNN', 0, 0, 'eraAbbr'); + addFormatToken('NNNN', 0, 0, 'eraName'); + addFormatToken('NNNNN', 0, 0, 'eraNarrow'); + + addFormatToken('y', ['y', 1], 'yo', 'eraYear'); + addFormatToken('y', ['yy', 2], 0, 'eraYear'); + addFormatToken('y', ['yyy', 3], 0, 'eraYear'); + addFormatToken('y', ['yyyy', 4], 0, 'eraYear'); + + addRegexToken('N', matchEraAbbr); + addRegexToken('NN', matchEraAbbr); + addRegexToken('NNN', matchEraAbbr); + addRegexToken('NNNN', matchEraName); + addRegexToken('NNNNN', matchEraNarrow); + + addParseToken(['N', 'NN', 'NNN', 'NNNN', 'NNNNN'], function ( + input, + array, + config, + token + ) { + var era = config._locale.erasParse(input, token, config._strict); + if (era) { + getParsingFlags(config).era = era; + } else { + getParsingFlags(config).invalidEra = input; + } + }); + + addRegexToken('y', matchUnsigned); + addRegexToken('yy', matchUnsigned); + addRegexToken('yyy', matchUnsigned); + addRegexToken('yyyy', matchUnsigned); + addRegexToken('yo', matchEraYearOrdinal); + + addParseToken(['y', 'yy', 'yyy', 'yyyy'], YEAR); + addParseToken(['yo'], function (input, array, config, token) { + var match; + if (config._locale._eraYearOrdinalRegex) { + match = input.match(config._locale._eraYearOrdinalRegex); + } + + if (config._locale.eraYearOrdinalParse) { + array[YEAR] = config._locale.eraYearOrdinalParse(input, match); + } else { + array[YEAR] = parseInt(input, 10); + } + }); + + function localeEras(m, format) { + var i, + l, + date, + eras = this._eras || getLocale('en')._eras; + for (i = 0, l = eras.length; i < l; ++i) { + switch (typeof eras[i].since) { + case 'string': + // truncate time + date = hooks(eras[i].since).startOf('day'); + eras[i].since = date.valueOf(); + break; + } + + switch (typeof eras[i].until) { + case 'undefined': + eras[i].until = +Infinity; + break; + case 'string': + // truncate time + date = hooks(eras[i].until).startOf('day').valueOf(); + eras[i].until = date.valueOf(); + break; + } + } + return eras; + } + + function localeErasParse(eraName, format, strict) { + var i, + l, + eras = this.eras(), + name, + abbr, + narrow; + eraName = eraName.toUpperCase(); + + for (i = 0, l = eras.length; i < l; ++i) { + name = eras[i].name.toUpperCase(); + abbr = eras[i].abbr.toUpperCase(); + narrow = eras[i].narrow.toUpperCase(); + + if (strict) { + switch (format) { + case 'N': + case 'NN': + case 'NNN': + if (abbr === eraName) { + return eras[i]; + } + break; + + case 'NNNN': + if (name === eraName) { + return eras[i]; + } + break; + + case 'NNNNN': + if (narrow === eraName) { + return eras[i]; + } + break; + } + } else if ([name, abbr, narrow].indexOf(eraName) >= 0) { + return eras[i]; + } + } + } + + function localeErasConvertYear(era, year) { + var dir = era.since <= era.until ? +1 : -1; + if (year === undefined) { + return hooks(era.since).year(); + } else { + return hooks(era.since).year() + (year - era.offset) * dir; + } + } + + function getEraName() { + var i, + l, + val, + eras = this.localeData().eras(); + for (i = 0, l = eras.length; i < l; ++i) { + // truncate time + val = this.clone().startOf('day').valueOf(); + + if (eras[i].since <= val && val <= eras[i].until) { + return eras[i].name; + } + if (eras[i].until <= val && val <= eras[i].since) { + return eras[i].name; + } + } + + return ''; + } + + function getEraNarrow() { + var i, + l, + val, + eras = this.localeData().eras(); + for (i = 0, l = eras.length; i < l; ++i) { + // truncate time + val = this.clone().startOf('day').valueOf(); + + if (eras[i].since <= val && val <= eras[i].until) { + return eras[i].narrow; + } + if (eras[i].until <= val && val <= eras[i].since) { + return eras[i].narrow; + } + } + + return ''; + } + + function getEraAbbr() { + var i, + l, + val, + eras = this.localeData().eras(); + for (i = 0, l = eras.length; i < l; ++i) { + // truncate time + val = this.clone().startOf('day').valueOf(); + + if (eras[i].since <= val && val <= eras[i].until) { + return eras[i].abbr; + } + if (eras[i].until <= val && val <= eras[i].since) { + return eras[i].abbr; + } + } + + return ''; + } + + function getEraYear() { + var i, + l, + dir, + val, + eras = this.localeData().eras(); + for (i = 0, l = eras.length; i < l; ++i) { + dir = eras[i].since <= eras[i].until ? +1 : -1; + + // truncate time + val = this.clone().startOf('day').valueOf(); + + if ( + (eras[i].since <= val && val <= eras[i].until) || + (eras[i].until <= val && val <= eras[i].since) + ) { + return ( + (this.year() - hooks(eras[i].since).year()) * dir + + eras[i].offset + ); + } + } + + return this.year(); + } + + function erasNameRegex(isStrict) { + if (!hasOwnProp(this, '_erasNameRegex')) { + computeErasParse.call(this); + } + return isStrict ? this._erasNameRegex : this._erasRegex; + } + + function erasAbbrRegex(isStrict) { + if (!hasOwnProp(this, '_erasAbbrRegex')) { + computeErasParse.call(this); + } + return isStrict ? this._erasAbbrRegex : this._erasRegex; + } + + function erasNarrowRegex(isStrict) { + if (!hasOwnProp(this, '_erasNarrowRegex')) { + computeErasParse.call(this); + } + return isStrict ? this._erasNarrowRegex : this._erasRegex; + } + + function matchEraAbbr(isStrict, locale) { + return locale.erasAbbrRegex(isStrict); + } + + function matchEraName(isStrict, locale) { + return locale.erasNameRegex(isStrict); + } + + function matchEraNarrow(isStrict, locale) { + return locale.erasNarrowRegex(isStrict); + } + + function matchEraYearOrdinal(isStrict, locale) { + return locale._eraYearOrdinalRegex || matchUnsigned; + } + + function computeErasParse() { + var abbrPieces = [], + namePieces = [], + narrowPieces = [], + mixedPieces = [], + i, + l, + eras = this.eras(); + + for (i = 0, l = eras.length; i < l; ++i) { + namePieces.push(regexEscape(eras[i].name)); + abbrPieces.push(regexEscape(eras[i].abbr)); + narrowPieces.push(regexEscape(eras[i].narrow)); + + mixedPieces.push(regexEscape(eras[i].name)); + mixedPieces.push(regexEscape(eras[i].abbr)); + mixedPieces.push(regexEscape(eras[i].narrow)); + } + + this._erasRegex = new RegExp('^(' + mixedPieces.join('|') + ')', 'i'); + this._erasNameRegex = new RegExp('^(' + namePieces.join('|') + ')', 'i'); + this._erasAbbrRegex = new RegExp('^(' + abbrPieces.join('|') + ')', 'i'); + this._erasNarrowRegex = new RegExp( + '^(' + narrowPieces.join('|') + ')', + 'i' + ); + } + + // FORMATTING + + addFormatToken(0, ['gg', 2], 0, function () { + return this.weekYear() % 100; + }); + + addFormatToken(0, ['GG', 2], 0, function () { + return this.isoWeekYear() % 100; + }); + + function addWeekYearFormatToken(token, getter) { + addFormatToken(0, [token, token.length], 0, getter); + } + + addWeekYearFormatToken('gggg', 'weekYear'); + addWeekYearFormatToken('ggggg', 'weekYear'); + addWeekYearFormatToken('GGGG', 'isoWeekYear'); + addWeekYearFormatToken('GGGGG', 'isoWeekYear'); + + // ALIASES + + addUnitAlias('weekYear', 'gg'); + addUnitAlias('isoWeekYear', 'GG'); + + // PRIORITY + + addUnitPriority('weekYear', 1); + addUnitPriority('isoWeekYear', 1); + + // PARSING + + addRegexToken('G', matchSigned); + addRegexToken('g', matchSigned); + addRegexToken('GG', match1to2, match2); + addRegexToken('gg', match1to2, match2); + addRegexToken('GGGG', match1to4, match4); + addRegexToken('gggg', match1to4, match4); + addRegexToken('GGGGG', match1to6, match6); + addRegexToken('ggggg', match1to6, match6); + + addWeekParseToken(['gggg', 'ggggg', 'GGGG', 'GGGGG'], function ( + input, + week, + config, + token + ) { + week[token.substr(0, 2)] = toInt(input); + }); + + addWeekParseToken(['gg', 'GG'], function (input, week, config, token) { + week[token] = hooks.parseTwoDigitYear(input); + }); + + // MOMENTS + + function getSetWeekYear(input) { + return getSetWeekYearHelper.call( + this, + input, + this.week(), + this.weekday(), + this.localeData()._week.dow, + this.localeData()._week.doy + ); + } + + function getSetISOWeekYear(input) { + return getSetWeekYearHelper.call( + this, + input, + this.isoWeek(), + this.isoWeekday(), + 1, + 4 + ); + } + + function getISOWeeksInYear() { + return weeksInYear(this.year(), 1, 4); + } + + function getISOWeeksInISOWeekYear() { + return weeksInYear(this.isoWeekYear(), 1, 4); + } + + function getWeeksInYear() { + var weekInfo = this.localeData()._week; + return weeksInYear(this.year(), weekInfo.dow, weekInfo.doy); + } + + function getWeeksInWeekYear() { + var weekInfo = this.localeData()._week; + return weeksInYear(this.weekYear(), weekInfo.dow, weekInfo.doy); + } + + function getSetWeekYearHelper(input, week, weekday, dow, doy) { + var weeksTarget; + if (input == null) { + return weekOfYear(this, dow, doy).year; + } else { + weeksTarget = weeksInYear(input, dow, doy); + if (week > weeksTarget) { + week = weeksTarget; + } + return setWeekAll.call(this, input, week, weekday, dow, doy); + } + } + + function setWeekAll(weekYear, week, weekday, dow, doy) { + var dayOfYearData = dayOfYearFromWeeks(weekYear, week, weekday, dow, doy), + date = createUTCDate(dayOfYearData.year, 0, dayOfYearData.dayOfYear); + + this.year(date.getUTCFullYear()); + this.month(date.getUTCMonth()); + this.date(date.getUTCDate()); + return this; + } + + // FORMATTING + + addFormatToken('Q', 0, 'Qo', 'quarter'); + + // ALIASES + + addUnitAlias('quarter', 'Q'); + + // PRIORITY + + addUnitPriority('quarter', 7); + + // PARSING + + addRegexToken('Q', match1); + addParseToken('Q', function (input, array) { + array[MONTH] = (toInt(input) - 1) * 3; + }); + + // MOMENTS + + function getSetQuarter(input) { + return input == null + ? Math.ceil((this.month() + 1) / 3) + : this.month((input - 1) * 3 + (this.month() % 3)); + } + + // FORMATTING + + addFormatToken('D', ['DD', 2], 'Do', 'date'); + + // ALIASES + + addUnitAlias('date', 'D'); + + // PRIORITY + addUnitPriority('date', 9); + + // PARSING + + addRegexToken('D', match1to2); + addRegexToken('DD', match1to2, match2); + addRegexToken('Do', function (isStrict, locale) { + // TODO: Remove "ordinalParse" fallback in next major release. + return isStrict + ? locale._dayOfMonthOrdinalParse || locale._ordinalParse + : locale._dayOfMonthOrdinalParseLenient; + }); + + addParseToken(['D', 'DD'], DATE); + addParseToken('Do', function (input, array) { + array[DATE] = toInt(input.match(match1to2)[0]); + }); + + // MOMENTS + + var getSetDayOfMonth = makeGetSet('Date', true); + + // FORMATTING + + addFormatToken('DDD', ['DDDD', 3], 'DDDo', 'dayOfYear'); + + // ALIASES + + addUnitAlias('dayOfYear', 'DDD'); + + // PRIORITY + addUnitPriority('dayOfYear', 4); + + // PARSING + + addRegexToken('DDD', match1to3); + addRegexToken('DDDD', match3); + addParseToken(['DDD', 'DDDD'], function (input, array, config) { + config._dayOfYear = toInt(input); + }); + + // HELPERS + + // MOMENTS + + function getSetDayOfYear(input) { + var dayOfYear = + Math.round( + (this.clone().startOf('day') - this.clone().startOf('year')) / 864e5 + ) + 1; + return input == null ? dayOfYear : this.add(input - dayOfYear, 'd'); + } + + // FORMATTING + + addFormatToken('m', ['mm', 2], 0, 'minute'); + + // ALIASES + + addUnitAlias('minute', 'm'); + + // PRIORITY + + addUnitPriority('minute', 14); + + // PARSING + + addRegexToken('m', match1to2); + addRegexToken('mm', match1to2, match2); + addParseToken(['m', 'mm'], MINUTE); + + // MOMENTS + + var getSetMinute = makeGetSet('Minutes', false); + + // FORMATTING + + addFormatToken('s', ['ss', 2], 0, 'second'); + + // ALIASES + + addUnitAlias('second', 's'); + + // PRIORITY + + addUnitPriority('second', 15); + + // PARSING + + addRegexToken('s', match1to2); + addRegexToken('ss', match1to2, match2); + addParseToken(['s', 'ss'], SECOND); + + // MOMENTS + + var getSetSecond = makeGetSet('Seconds', false); + + // FORMATTING + + addFormatToken('S', 0, 0, function () { + return ~~(this.millisecond() / 100); + }); + + addFormatToken(0, ['SS', 2], 0, function () { + return ~~(this.millisecond() / 10); + }); + + addFormatToken(0, ['SSS', 3], 0, 'millisecond'); + addFormatToken(0, ['SSSS', 4], 0, function () { + return this.millisecond() * 10; + }); + addFormatToken(0, ['SSSSS', 5], 0, function () { + return this.millisecond() * 100; + }); + addFormatToken(0, ['SSSSSS', 6], 0, function () { + return this.millisecond() * 1000; + }); + addFormatToken(0, ['SSSSSSS', 7], 0, function () { + return this.millisecond() * 10000; + }); + addFormatToken(0, ['SSSSSSSS', 8], 0, function () { + return this.millisecond() * 100000; + }); + addFormatToken(0, ['SSSSSSSSS', 9], 0, function () { + return this.millisecond() * 1000000; + }); + + // ALIASES + + addUnitAlias('millisecond', 'ms'); + + // PRIORITY + + addUnitPriority('millisecond', 16); + + // PARSING + + addRegexToken('S', match1to3, match1); + addRegexToken('SS', match1to3, match2); + addRegexToken('SSS', match1to3, match3); + + var token, getSetMillisecond; + for (token = 'SSSS'; token.length <= 9; token += 'S') { + addRegexToken(token, matchUnsigned); + } + + function parseMs(input, array) { + array[MILLISECOND] = toInt(('0.' + input) * 1000); + } + + for (token = 'S'; token.length <= 9; token += 'S') { + addParseToken(token, parseMs); + } + + getSetMillisecond = makeGetSet('Milliseconds', false); + + // FORMATTING + + addFormatToken('z', 0, 0, 'zoneAbbr'); + addFormatToken('zz', 0, 0, 'zoneName'); + + // MOMENTS + + function getZoneAbbr() { + return this._isUTC ? 'UTC' : ''; + } + + function getZoneName() { + return this._isUTC ? 'Coordinated Universal Time' : ''; + } + + var proto = Moment.prototype; + + proto.add = add; + proto.calendar = calendar$1; + proto.clone = clone; + proto.diff = diff; + proto.endOf = endOf; + proto.format = format; + proto.from = from; + proto.fromNow = fromNow; + proto.to = to; + proto.toNow = toNow; + proto.get = stringGet; + proto.invalidAt = invalidAt; + proto.isAfter = isAfter; + proto.isBefore = isBefore; + proto.isBetween = isBetween; + proto.isSame = isSame; + proto.isSameOrAfter = isSameOrAfter; + proto.isSameOrBefore = isSameOrBefore; + proto.isValid = isValid$2; + proto.lang = lang; + proto.locale = locale; + proto.localeData = localeData; + proto.max = prototypeMax; + proto.min = prototypeMin; + proto.parsingFlags = parsingFlags; + proto.set = stringSet; + proto.startOf = startOf; + proto.subtract = subtract; + proto.toArray = toArray; + proto.toObject = toObject; + proto.toDate = toDate; + proto.toISOString = toISOString; + proto.inspect = inspect; + if (typeof Symbol !== 'undefined' && Symbol.for != null) { + proto[Symbol.for('nodejs.util.inspect.custom')] = function () { + return 'Moment<' + this.format() + '>'; + }; + } + proto.toJSON = toJSON; + proto.toString = toString; + proto.unix = unix; + proto.valueOf = valueOf; + proto.creationData = creationData; + proto.eraName = getEraName; + proto.eraNarrow = getEraNarrow; + proto.eraAbbr = getEraAbbr; + proto.eraYear = getEraYear; + proto.year = getSetYear; + proto.isLeapYear = getIsLeapYear; + proto.weekYear = getSetWeekYear; + proto.isoWeekYear = getSetISOWeekYear; + proto.quarter = proto.quarters = getSetQuarter; + proto.month = getSetMonth; + proto.daysInMonth = getDaysInMonth; + proto.week = proto.weeks = getSetWeek; + proto.isoWeek = proto.isoWeeks = getSetISOWeek; + proto.weeksInYear = getWeeksInYear; + proto.weeksInWeekYear = getWeeksInWeekYear; + proto.isoWeeksInYear = getISOWeeksInYear; + proto.isoWeeksInISOWeekYear = getISOWeeksInISOWeekYear; + proto.date = getSetDayOfMonth; + proto.day = proto.days = getSetDayOfWeek; + proto.weekday = getSetLocaleDayOfWeek; + proto.isoWeekday = getSetISODayOfWeek; + proto.dayOfYear = getSetDayOfYear; + proto.hour = proto.hours = getSetHour; + proto.minute = proto.minutes = getSetMinute; + proto.second = proto.seconds = getSetSecond; + proto.millisecond = proto.milliseconds = getSetMillisecond; + proto.utcOffset = getSetOffset; + proto.utc = setOffsetToUTC; + proto.local = setOffsetToLocal; + proto.parseZone = setOffsetToParsedOffset; + proto.hasAlignedHourOffset = hasAlignedHourOffset; + proto.isDST = isDaylightSavingTime; + proto.isLocal = isLocal; + proto.isUtcOffset = isUtcOffset; + proto.isUtc = isUtc; + proto.isUTC = isUtc; + proto.zoneAbbr = getZoneAbbr; + proto.zoneName = getZoneName; + proto.dates = deprecate( + 'dates accessor is deprecated. Use date instead.', + getSetDayOfMonth + ); + proto.months = deprecate( + 'months accessor is deprecated. Use month instead', + getSetMonth + ); + proto.years = deprecate( + 'years accessor is deprecated. Use year instead', + getSetYear + ); + proto.zone = deprecate( + 'moment().zone is deprecated, use moment().utcOffset instead. http://momentjs.com/guides/#/warnings/zone/', + getSetZone + ); + proto.isDSTShifted = deprecate( + 'isDSTShifted is deprecated. See http://momentjs.com/guides/#/warnings/dst-shifted/ for more information', + isDaylightSavingTimeShifted + ); + + function createUnix(input) { + return createLocal(input * 1000); + } + + function createInZone() { + return createLocal.apply(null, arguments).parseZone(); + } + + function preParsePostFormat(string) { + return string; + } + + var proto$1 = Locale.prototype; + + proto$1.calendar = calendar; + proto$1.longDateFormat = longDateFormat; + proto$1.invalidDate = invalidDate; + proto$1.ordinal = ordinal; + proto$1.preparse = preParsePostFormat; + proto$1.postformat = preParsePostFormat; + proto$1.relativeTime = relativeTime; + proto$1.pastFuture = pastFuture; + proto$1.set = set; + proto$1.eras = localeEras; + proto$1.erasParse = localeErasParse; + proto$1.erasConvertYear = localeErasConvertYear; + proto$1.erasAbbrRegex = erasAbbrRegex; + proto$1.erasNameRegex = erasNameRegex; + proto$1.erasNarrowRegex = erasNarrowRegex; + + proto$1.months = localeMonths; + proto$1.monthsShort = localeMonthsShort; + proto$1.monthsParse = localeMonthsParse; + proto$1.monthsRegex = monthsRegex; + proto$1.monthsShortRegex = monthsShortRegex; + proto$1.week = localeWeek; + proto$1.firstDayOfYear = localeFirstDayOfYear; + proto$1.firstDayOfWeek = localeFirstDayOfWeek; + + proto$1.weekdays = localeWeekdays; + proto$1.weekdaysMin = localeWeekdaysMin; + proto$1.weekdaysShort = localeWeekdaysShort; + proto$1.weekdaysParse = localeWeekdaysParse; + + proto$1.weekdaysRegex = weekdaysRegex; + proto$1.weekdaysShortRegex = weekdaysShortRegex; + proto$1.weekdaysMinRegex = weekdaysMinRegex; + + proto$1.isPM = localeIsPM; + proto$1.meridiem = localeMeridiem; + + function get$1(format, index, field, setter) { + var locale = getLocale(), + utc = createUTC().set(setter, index); + return locale[field](utc, format); + } + + function listMonthsImpl(format, index, field) { + if (isNumber(format)) { + index = format; + format = undefined; + } + + format = format || ''; + + if (index != null) { + return get$1(format, index, field, 'month'); + } + + var i, + out = []; + for (i = 0; i < 12; i++) { + out[i] = get$1(format, i, field, 'month'); + } + return out; + } + + // () + // (5) + // (fmt, 5) + // (fmt) + // (true) + // (true, 5) + // (true, fmt, 5) + // (true, fmt) + function listWeekdaysImpl(localeSorted, format, index, field) { + if (typeof localeSorted === 'boolean') { + if (isNumber(format)) { + index = format; + format = undefined; + } + + format = format || ''; + } else { + format = localeSorted; + index = format; + localeSorted = false; + + if (isNumber(format)) { + index = format; + format = undefined; + } + + format = format || ''; + } + + var locale = getLocale(), + shift = localeSorted ? locale._week.dow : 0, + i, + out = []; + + if (index != null) { + return get$1(format, (index + shift) % 7, field, 'day'); + } + + for (i = 0; i < 7; i++) { + out[i] = get$1(format, (i + shift) % 7, field, 'day'); + } + return out; + } + + function listMonths(format, index) { + return listMonthsImpl(format, index, 'months'); + } + + function listMonthsShort(format, index) { + return listMonthsImpl(format, index, 'monthsShort'); + } + + function listWeekdays(localeSorted, format, index) { + return listWeekdaysImpl(localeSorted, format, index, 'weekdays'); + } + + function listWeekdaysShort(localeSorted, format, index) { + return listWeekdaysImpl(localeSorted, format, index, 'weekdaysShort'); + } + + function listWeekdaysMin(localeSorted, format, index) { + return listWeekdaysImpl(localeSorted, format, index, 'weekdaysMin'); + } + + getSetGlobalLocale('en', { + eras: [ + { + since: '0001-01-01', + until: +Infinity, + offset: 1, + name: 'Anno Domini', + narrow: 'AD', + abbr: 'AD', + }, + { + since: '0000-12-31', + until: -Infinity, + offset: 1, + name: 'Before Christ', + narrow: 'BC', + abbr: 'BC', + }, + ], + dayOfMonthOrdinalParse: /\d{1,2}(th|st|nd|rd)/, + ordinal: function (number) { + var b = number % 10, + output = + toInt((number % 100) / 10) === 1 + ? 'th' + : b === 1 + ? 'st' + : b === 2 + ? 'nd' + : b === 3 + ? 'rd' + : 'th'; + return number + output; + }, + }); + + // Side effect imports + + hooks.lang = deprecate( + 'moment.lang is deprecated. Use moment.locale instead.', + getSetGlobalLocale + ); + hooks.langData = deprecate( + 'moment.langData is deprecated. Use moment.localeData instead.', + getLocale + ); + + var mathAbs = Math.abs; + + function abs() { + var data = this._data; + + this._milliseconds = mathAbs(this._milliseconds); + this._days = mathAbs(this._days); + this._months = mathAbs(this._months); + + data.milliseconds = mathAbs(data.milliseconds); + data.seconds = mathAbs(data.seconds); + data.minutes = mathAbs(data.minutes); + data.hours = mathAbs(data.hours); + data.months = mathAbs(data.months); + data.years = mathAbs(data.years); + + return this; + } + + function addSubtract$1(duration, input, value, direction) { + var other = createDuration(input, value); + + duration._milliseconds += direction * other._milliseconds; + duration._days += direction * other._days; + duration._months += direction * other._months; + + return duration._bubble(); + } + + // supports only 2.0-style add(1, 's') or add(duration) + function add$1(input, value) { + return addSubtract$1(this, input, value, 1); + } + + // supports only 2.0-style subtract(1, 's') or subtract(duration) + function subtract$1(input, value) { + return addSubtract$1(this, input, value, -1); + } + + function absCeil(number) { + if (number < 0) { + return Math.floor(number); + } else { + return Math.ceil(number); + } + } + + function bubble() { + var milliseconds = this._milliseconds, + days = this._days, + months = this._months, + data = this._data, + seconds, + minutes, + hours, + years, + monthsFromDays; + + // if we have a mix of positive and negative values, bubble down first + // check: https://github.com/moment/moment/issues/2166 + if ( + !( + (milliseconds >= 0 && days >= 0 && months >= 0) || + (milliseconds <= 0 && days <= 0 && months <= 0) + ) + ) { + milliseconds += absCeil(monthsToDays(months) + days) * 864e5; + days = 0; + months = 0; + } + + // The following code bubbles up values, see the tests for + // examples of what that means. + data.milliseconds = milliseconds % 1000; + + seconds = absFloor(milliseconds / 1000); + data.seconds = seconds % 60; + + minutes = absFloor(seconds / 60); + data.minutes = minutes % 60; + + hours = absFloor(minutes / 60); + data.hours = hours % 24; + + days += absFloor(hours / 24); + + // convert days to months + monthsFromDays = absFloor(daysToMonths(days)); + months += monthsFromDays; + days -= absCeil(monthsToDays(monthsFromDays)); + + // 12 months -> 1 year + years = absFloor(months / 12); + months %= 12; + + data.days = days; + data.months = months; + data.years = years; + + return this; + } + + function daysToMonths(days) { + // 400 years have 146097 days (taking into account leap year rules) + // 400 years have 12 months === 4800 + return (days * 4800) / 146097; + } + + function monthsToDays(months) { + // the reverse of daysToMonths + return (months * 146097) / 4800; + } + + function as(units) { + if (!this.isValid()) { + return NaN; + } + var days, + months, + milliseconds = this._milliseconds; + + units = normalizeUnits(units); + + if (units === 'month' || units === 'quarter' || units === 'year') { + days = this._days + milliseconds / 864e5; + months = this._months + daysToMonths(days); + switch (units) { + case 'month': + return months; + case 'quarter': + return months / 3; + case 'year': + return months / 12; + } + } else { + // handle milliseconds separately because of floating point math errors (issue #1867) + days = this._days + Math.round(monthsToDays(this._months)); + switch (units) { + case 'week': + return days / 7 + milliseconds / 6048e5; + case 'day': + return days + milliseconds / 864e5; + case 'hour': + return days * 24 + milliseconds / 36e5; + case 'minute': + return days * 1440 + milliseconds / 6e4; + case 'second': + return days * 86400 + milliseconds / 1000; + // Math.floor prevents floating point math errors here + case 'millisecond': + return Math.floor(days * 864e5) + milliseconds; + default: + throw new Error('Unknown unit ' + units); + } + } + } + + // TODO: Use this.as('ms')? + function valueOf$1() { + if (!this.isValid()) { + return NaN; + } + return ( + this._milliseconds + + this._days * 864e5 + + (this._months % 12) * 2592e6 + + toInt(this._months / 12) * 31536e6 + ); + } + + function makeAs(alias) { + return function () { + return this.as(alias); + }; + } + + var asMilliseconds = makeAs('ms'), + asSeconds = makeAs('s'), + asMinutes = makeAs('m'), + asHours = makeAs('h'), + asDays = makeAs('d'), + asWeeks = makeAs('w'), + asMonths = makeAs('M'), + asQuarters = makeAs('Q'), + asYears = makeAs('y'); + + function clone$1() { + return createDuration(this); + } + + function get$2(units) { + units = normalizeUnits(units); + return this.isValid() ? this[units + 's']() : NaN; + } + + function makeGetter(name) { + return function () { + return this.isValid() ? this._data[name] : NaN; + }; + } + + var milliseconds = makeGetter('milliseconds'), + seconds = makeGetter('seconds'), + minutes = makeGetter('minutes'), + hours = makeGetter('hours'), + days = makeGetter('days'), + months = makeGetter('months'), + years = makeGetter('years'); + + function weeks() { + return absFloor(this.days() / 7); + } + + var round = Math.round, + thresholds = { + ss: 44, // a few seconds to seconds + s: 45, // seconds to minute + m: 45, // minutes to hour + h: 22, // hours to day + d: 26, // days to month/week + w: null, // weeks to month + M: 11, // months to year + }; + + // helper function for moment.fn.from, moment.fn.fromNow, and moment.duration.fn.humanize + function substituteTimeAgo(string, number, withoutSuffix, isFuture, locale) { + return locale.relativeTime(number || 1, !!withoutSuffix, string, isFuture); + } + + function relativeTime$1(posNegDuration, withoutSuffix, thresholds, locale) { + var duration = createDuration(posNegDuration).abs(), + seconds = round(duration.as('s')), + minutes = round(duration.as('m')), + hours = round(duration.as('h')), + days = round(duration.as('d')), + months = round(duration.as('M')), + weeks = round(duration.as('w')), + years = round(duration.as('y')), + a = + (seconds <= thresholds.ss && ['s', seconds]) || + (seconds < thresholds.s && ['ss', seconds]) || + (minutes <= 1 && ['m']) || + (minutes < thresholds.m && ['mm', minutes]) || + (hours <= 1 && ['h']) || + (hours < thresholds.h && ['hh', hours]) || + (days <= 1 && ['d']) || + (days < thresholds.d && ['dd', days]); + + if (thresholds.w != null) { + a = + a || + (weeks <= 1 && ['w']) || + (weeks < thresholds.w && ['ww', weeks]); + } + a = a || + (months <= 1 && ['M']) || + (months < thresholds.M && ['MM', months]) || + (years <= 1 && ['y']) || ['yy', years]; + + a[2] = withoutSuffix; + a[3] = +posNegDuration > 0; + a[4] = locale; + return substituteTimeAgo.apply(null, a); + } + + // This function allows you to set the rounding function for relative time strings + function getSetRelativeTimeRounding(roundingFunction) { + if (roundingFunction === undefined) { + return round; + } + if (typeof roundingFunction === 'function') { + round = roundingFunction; + return true; + } + return false; + } + + // This function allows you to set a threshold for relative time strings + function getSetRelativeTimeThreshold(threshold, limit) { + if (thresholds[threshold] === undefined) { + return false; + } + if (limit === undefined) { + return thresholds[threshold]; + } + thresholds[threshold] = limit; + if (threshold === 's') { + thresholds.ss = limit - 1; + } + return true; + } + + function humanize(argWithSuffix, argThresholds) { + if (!this.isValid()) { + return this.localeData().invalidDate(); + } + + var withSuffix = false, + th = thresholds, + locale, + output; + + if (typeof argWithSuffix === 'object') { + argThresholds = argWithSuffix; + argWithSuffix = false; + } + if (typeof argWithSuffix === 'boolean') { + withSuffix = argWithSuffix; + } + if (typeof argThresholds === 'object') { + th = Object.assign({}, thresholds, argThresholds); + if (argThresholds.s != null && argThresholds.ss == null) { + th.ss = argThresholds.s - 1; + } + } + + locale = this.localeData(); + output = relativeTime$1(this, !withSuffix, th, locale); + + if (withSuffix) { + output = locale.pastFuture(+this, output); + } + + return locale.postformat(output); + } + + var abs$1 = Math.abs; + + function sign(x) { + return (x > 0) - (x < 0) || +x; + } + + function toISOString$1() { + // for ISO strings we do not use the normal bubbling rules: + // * milliseconds bubble up until they become hours + // * days do not bubble at all + // * months bubble up until they become years + // This is because there is no context-free conversion between hours and days + // (think of clock changes) + // and also not between days and months (28-31 days per month) + if (!this.isValid()) { + return this.localeData().invalidDate(); + } + + var seconds = abs$1(this._milliseconds) / 1000, + days = abs$1(this._days), + months = abs$1(this._months), + minutes, + hours, + years, + s, + total = this.asSeconds(), + totalSign, + ymSign, + daysSign, + hmsSign; + + if (!total) { + // this is the same as C#'s (Noda) and python (isodate)... + // but not other JS (goog.date) + return 'P0D'; + } + + // 3600 seconds -> 60 minutes -> 1 hour + minutes = absFloor(seconds / 60); + hours = absFloor(minutes / 60); + seconds %= 60; + minutes %= 60; + + // 12 months -> 1 year + years = absFloor(months / 12); + months %= 12; + + // inspired by https://github.com/dordille/moment-isoduration/blob/master/moment.isoduration.js + s = seconds ? seconds.toFixed(3).replace(/\.?0+$/, '') : ''; + + totalSign = total < 0 ? '-' : ''; + ymSign = sign(this._months) !== sign(total) ? '-' : ''; + daysSign = sign(this._days) !== sign(total) ? '-' : ''; + hmsSign = sign(this._milliseconds) !== sign(total) ? '-' : ''; + + return ( + totalSign + + 'P' + + (years ? ymSign + years + 'Y' : '') + + (months ? ymSign + months + 'M' : '') + + (days ? daysSign + days + 'D' : '') + + (hours || minutes || seconds ? 'T' : '') + + (hours ? hmsSign + hours + 'H' : '') + + (minutes ? hmsSign + minutes + 'M' : '') + + (seconds ? hmsSign + s + 'S' : '') + ); + } + + var proto$2 = Duration.prototype; + + proto$2.isValid = isValid$1; + proto$2.abs = abs; + proto$2.add = add$1; + proto$2.subtract = subtract$1; + proto$2.as = as; + proto$2.asMilliseconds = asMilliseconds; + proto$2.asSeconds = asSeconds; + proto$2.asMinutes = asMinutes; + proto$2.asHours = asHours; + proto$2.asDays = asDays; + proto$2.asWeeks = asWeeks; + proto$2.asMonths = asMonths; + proto$2.asQuarters = asQuarters; + proto$2.asYears = asYears; + proto$2.valueOf = valueOf$1; + proto$2._bubble = bubble; + proto$2.clone = clone$1; + proto$2.get = get$2; + proto$2.milliseconds = milliseconds; + proto$2.seconds = seconds; + proto$2.minutes = minutes; + proto$2.hours = hours; + proto$2.days = days; + proto$2.weeks = weeks; + proto$2.months = months; + proto$2.years = years; + proto$2.humanize = humanize; + proto$2.toISOString = toISOString$1; + proto$2.toString = toISOString$1; + proto$2.toJSON = toISOString$1; + proto$2.locale = locale; + proto$2.localeData = localeData; + + proto$2.toIsoString = deprecate( + 'toIsoString() is deprecated. Please use toISOString() instead (notice the capitals)', + toISOString$1 + ); + proto$2.lang = lang; + + // FORMATTING + + addFormatToken('X', 0, 0, 'unix'); + addFormatToken('x', 0, 0, 'valueOf'); + + // PARSING + + addRegexToken('x', matchSigned); + addRegexToken('X', matchTimestamp); + addParseToken('X', function (input, array, config) { + config._d = new Date(parseFloat(input) * 1000); + }); + addParseToken('x', function (input, array, config) { + config._d = new Date(toInt(input)); + }); + + //! moment.js + + hooks.version = '2.29.1'; + + setHookCallback(createLocal); + + hooks.fn = proto; + hooks.min = min; + hooks.max = max; + hooks.now = now; + hooks.utc = createUTC; + hooks.unix = createUnix; + hooks.months = listMonths; + hooks.isDate = isDate; + hooks.locale = getSetGlobalLocale; + hooks.invalid = createInvalid; + hooks.duration = createDuration; + hooks.isMoment = isMoment; + hooks.weekdays = listWeekdays; + hooks.parseZone = createInZone; + hooks.localeData = getLocale; + hooks.isDuration = isDuration; + hooks.monthsShort = listMonthsShort; + hooks.weekdaysMin = listWeekdaysMin; + hooks.defineLocale = defineLocale; + hooks.updateLocale = updateLocale; + hooks.locales = listLocales; + hooks.weekdaysShort = listWeekdaysShort; + hooks.normalizeUnits = normalizeUnits; + hooks.relativeTimeRounding = getSetRelativeTimeRounding; + hooks.relativeTimeThreshold = getSetRelativeTimeThreshold; + hooks.calendarFormat = getCalendarFormat; + hooks.prototype = proto; + + // currently HTML5 input type only supports 24-hour formats + hooks.HTML5_FMT = { + DATETIME_LOCAL: 'YYYY-MM-DDTHH:mm', // + DATETIME_LOCAL_SECONDS: 'YYYY-MM-DDTHH:mm:ss', // + DATETIME_LOCAL_MS: 'YYYY-MM-DDTHH:mm:ss.SSS', // + DATE: 'YYYY-MM-DD', // + TIME: 'HH:mm', // + TIME_SECONDS: 'HH:mm:ss', // + TIME_MS: 'HH:mm:ss.SSS', // + WEEK: 'GGGG-[W]WW', // + MONTH: 'YYYY-MM', // + }; + + return hooks; + +}))); + + +/***/ }), + +/***/ 294: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +module.exports = __nccwpck_require__(219); + + +/***/ }), + +/***/ 219: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + + +var net = __nccwpck_require__(631); +var tls = __nccwpck_require__(16); +var http = __nccwpck_require__(605); +var https = __nccwpck_require__(211); +var events = __nccwpck_require__(614); +var assert = __nccwpck_require__(357); +var util = __nccwpck_require__(669); + + +exports.httpOverHttp = httpOverHttp; +exports.httpsOverHttp = httpsOverHttp; +exports.httpOverHttps = httpOverHttps; +exports.httpsOverHttps = httpsOverHttps; + + +function httpOverHttp(options) { + var agent = new TunnelingAgent(options); + agent.request = http.request; + return agent; +} + +function httpsOverHttp(options) { + var agent = new TunnelingAgent(options); + agent.request = http.request; + agent.createSocket = createSecureSocket; + agent.defaultPort = 443; + return agent; +} + +function httpOverHttps(options) { + var agent = new TunnelingAgent(options); + agent.request = https.request; + return agent; +} + +function httpsOverHttps(options) { + var agent = new TunnelingAgent(options); + agent.request = https.request; + agent.createSocket = createSecureSocket; + agent.defaultPort = 443; + return agent; +} + + +function TunnelingAgent(options) { + var self = this; + self.options = options || {}; + self.proxyOptions = self.options.proxy || {}; + self.maxSockets = self.options.maxSockets || http.Agent.defaultMaxSockets; + self.requests = []; + self.sockets = []; + + self.on('free', function onFree(socket, host, port, localAddress) { + var options = toOptions(host, port, localAddress); + for (var i = 0, len = self.requests.length; i < len; ++i) { + var pending = self.requests[i]; + if (pending.host === options.host && pending.port === options.port) { + // Detect the request to connect same origin server, + // reuse the connection. + self.requests.splice(i, 1); + pending.request.onSocket(socket); + return; + } + } + socket.destroy(); + self.removeSocket(socket); + }); +} +util.inherits(TunnelingAgent, events.EventEmitter); + +TunnelingAgent.prototype.addRequest = function addRequest(req, host, port, localAddress) { + var self = this; + var options = mergeOptions({request: req}, self.options, toOptions(host, port, localAddress)); + + if (self.sockets.length >= this.maxSockets) { + // We are over limit so we'll add it to the queue. + self.requests.push(options); + return; + } + + // If we are under maxSockets create a new one. + self.createSocket(options, function(socket) { + socket.on('free', onFree); + socket.on('close', onCloseOrRemove); + socket.on('agentRemove', onCloseOrRemove); + req.onSocket(socket); + + function onFree() { + self.emit('free', socket, options); + } + + function onCloseOrRemove(err) { + self.removeSocket(socket); + socket.removeListener('free', onFree); + socket.removeListener('close', onCloseOrRemove); + socket.removeListener('agentRemove', onCloseOrRemove); + } + }); +}; + +TunnelingAgent.prototype.createSocket = function createSocket(options, cb) { + var self = this; + var placeholder = {}; + self.sockets.push(placeholder); + + var connectOptions = mergeOptions({}, self.proxyOptions, { + method: 'CONNECT', + path: options.host + ':' + options.port, + agent: false, + headers: { + host: options.host + ':' + options.port + } + }); + if (options.localAddress) { + connectOptions.localAddress = options.localAddress; + } + if (connectOptions.proxyAuth) { + connectOptions.headers = connectOptions.headers || {}; + connectOptions.headers['Proxy-Authorization'] = 'Basic ' + + new Buffer(connectOptions.proxyAuth).toString('base64'); + } + + debug('making CONNECT request'); + var connectReq = self.request(connectOptions); + connectReq.useChunkedEncodingByDefault = false; // for v0.6 + connectReq.once('response', onResponse); // for v0.6 + connectReq.once('upgrade', onUpgrade); // for v0.6 + connectReq.once('connect', onConnect); // for v0.7 or later + connectReq.once('error', onError); + connectReq.end(); + + function onResponse(res) { + // Very hacky. This is necessary to avoid http-parser leaks. + res.upgrade = true; + } + + function onUpgrade(res, socket, head) { + // Hacky. + process.nextTick(function() { + onConnect(res, socket, head); + }); + } + + function onConnect(res, socket, head) { + connectReq.removeAllListeners(); + socket.removeAllListeners(); + + if (res.statusCode !== 200) { + debug('tunneling socket could not be established, statusCode=%d', + res.statusCode); + socket.destroy(); + var error = new Error('tunneling socket could not be established, ' + + 'statusCode=' + res.statusCode); + error.code = 'ECONNRESET'; + options.request.emit('error', error); + self.removeSocket(placeholder); + return; + } + if (head.length > 0) { + debug('got illegal response body from proxy'); + socket.destroy(); + var error = new Error('got illegal response body from proxy'); + error.code = 'ECONNRESET'; + options.request.emit('error', error); + self.removeSocket(placeholder); + return; + } + debug('tunneling connection has established'); + self.sockets[self.sockets.indexOf(placeholder)] = socket; + return cb(socket); + } + + function onError(cause) { + connectReq.removeAllListeners(); + + debug('tunneling socket could not be established, cause=%s\n', + cause.message, cause.stack); + var error = new Error('tunneling socket could not be established, ' + + 'cause=' + cause.message); + error.code = 'ECONNRESET'; + options.request.emit('error', error); + self.removeSocket(placeholder); + } +}; + +TunnelingAgent.prototype.removeSocket = function removeSocket(socket) { + var pos = this.sockets.indexOf(socket) + if (pos === -1) { + return; + } + this.sockets.splice(pos, 1); + + var pending = this.requests.shift(); + if (pending) { + // If we have pending requests and a socket gets closed a new one + // needs to be created to take over in the pool for the one that closed. + this.createSocket(pending, function(socket) { + pending.request.onSocket(socket); + }); + } +}; + +function createSecureSocket(options, cb) { + var self = this; + TunnelingAgent.prototype.createSocket.call(self, options, function(socket) { + var hostHeader = options.request.getHeader('host'); + var tlsOptions = mergeOptions({}, self.options, { + socket: socket, + servername: hostHeader ? hostHeader.replace(/:.*$/, '') : options.host + }); + + // 0 is dummy port for v0.6 + var secureSocket = tls.connect(0, tlsOptions); + self.sockets[self.sockets.indexOf(socket)] = secureSocket; + cb(secureSocket); + }); +} + + +function toOptions(host, port, localAddress) { + if (typeof host === 'string') { // since v0.10 + return { + host: host, + port: port, + localAddress: localAddress + }; + } + return host; // for v0.11 or later +} + +function mergeOptions(target) { + for (var i = 1, len = arguments.length; i < len; ++i) { + var overrides = arguments[i]; + if (typeof overrides === 'object') { + var keys = Object.keys(overrides); + for (var j = 0, keyLen = keys.length; j < keyLen; ++j) { + var k = keys[j]; + if (overrides[k] !== undefined) { + target[k] = overrides[k]; + } + } + } + } + return target; +} + + +var debug; +if (process.env.NODE_DEBUG && /\btunnel\b/.test(process.env.NODE_DEBUG)) { + debug = function() { + var args = Array.prototype.slice.call(arguments); + if (typeof args[0] === 'string') { + args[0] = 'TUNNEL: ' + args[0]; + } else { + args.unshift('TUNNEL:'); + } + console.error.apply(console, args); + } +} else { + debug = function() {}; +} +exports.debug = debug; // for test + + +/***/ }), + +/***/ 707: +/***/ ((module) => { + +/** + * Convert array of 16 byte values to UUID string format of the form: + * XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX + */ +var byteToHex = []; +for (var i = 0; i < 256; ++i) { + byteToHex[i] = (i + 0x100).toString(16).substr(1); +} + +function bytesToUuid(buf, offset) { + var i = offset || 0; + var bth = byteToHex; + // join used to fix memory issue caused by concatenation: https://bugs.chromium.org/p/v8/issues/detail?id=3175#c4 + return ([ + bth[buf[i++]], bth[buf[i++]], + bth[buf[i++]], bth[buf[i++]], '-', + bth[buf[i++]], bth[buf[i++]], '-', + bth[buf[i++]], bth[buf[i++]], '-', + bth[buf[i++]], bth[buf[i++]], '-', + bth[buf[i++]], bth[buf[i++]], + bth[buf[i++]], bth[buf[i++]], + bth[buf[i++]], bth[buf[i++]] + ]).join(''); +} + +module.exports = bytesToUuid; + + +/***/ }), + +/***/ 859: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +// Unique ID creation requires a high quality random # generator. In node.js +// this is pretty straight-forward - we use the crypto API. + +var crypto = __nccwpck_require__(417); + +module.exports = function nodeRNG() { + return crypto.randomBytes(16); +}; + + +/***/ }), + +/***/ 824: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +var rng = __nccwpck_require__(859); +var bytesToUuid = __nccwpck_require__(707); + +function v4(options, buf, offset) { + var i = buf && offset || 0; + + if (typeof(options) == 'string') { + buf = options === 'binary' ? new Array(16) : null; + options = null; + } + options = options || {}; + + var rnds = options.random || (options.rng || rng)(); + + // Per 4.4, set bits for version and `clock_seq_hi_and_reserved` + rnds[6] = (rnds[6] & 0x0f) | 0x40; + rnds[8] = (rnds[8] & 0x3f) | 0x80; + + // Copy bytes to buffer, if provided + if (buf) { + for (var ii = 0; ii < 16; ++ii) { + buf[i + ii] = rnds[ii]; + } + } + + return buf || bytesToUuid(rnds); +} + +module.exports = v4; + + +/***/ }), + +/***/ 571: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +const fs = __nccwpck_require__(747); +const moment = __nccwpck_require__(623) + +const kicsLogo = "https://user-images.githubusercontent.com/75368139/136991766-a4e5bc8b-63db-48f7-9384-740e9f15c9f6.png" +const severityOrder = ["HIGH", "MEDIUM", "LOW", "INFO", "TRACE"]; +const severityIcons = { + "HIGH": "https://user-images.githubusercontent.com/23239410/92157087-97285600-ee32-11ea-988f-0aca12c4c126.png", + "MEDIUM": "https://user-images.githubusercontent.com/23239410/92157093-98598300-ee32-11ea-83d7-af52251a011b.png", + "LOW": "https://user-images.githubusercontent.com/23239410/92157091-98598300-ee32-11ea-8498-19bd7d62019b.png", + "INFO": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png", + "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png" +} + + +function readJSON(filename) { + const rawdata = fs.readFileSync(filename); + const parsedJSON = JSON.parse(rawdata.toString()); + return parsedJSON; +} + +function createComment(results) { + let message = "![kics-logo](" + kicsLogo + ")\n"; + + message += "---"; + message += `\n**KICS version: ${results['kics_version']}**\n` + message += "\n**Total Results: " + results['total_counter'] + "**\n\n"; + message += "| | Category | Results |\n"; + message += "| --- |--- | --- |\n"; + let severityCounters = results['severity_counters'] + for (let severity of severityOrder) { + if (severity in severityCounters) { + message += "| ![" + severity + "](" + severityIcons[severity] + ") |" + severity.toUpperCase() + " | " + severityCounters[severity.toUpperCase()] + " |\n"; + } + } + + message += "\n**Scan Metrics**\n\n"; + message += "| Metric | Values |\n"; + message += "| --- | --- |\n"; + message += "| Files scanned | " + results['files_scanned'] + "\n"; + message += "| Files parsed | " + results['files_parsed'] + "\n"; + message += "| Files failed to scan | " + results['files_failed_to_scan'] + "\n"; + message += "| Total queries | " + results['queries_total'] + "\n"; + message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; + + let executionTime = moment(results['end']).diff(moment(results['start']), 'seconds'); + + message += "| Execution time | " + executionTime + "s\n"; + + return message; +} + +async function postPRComment(repo, prNumber) { + const githubToken = core.getInput("token"); + const octokit = github.getOctokit(githubToken); + const results = readJSON("results.json"); + const message = createComment(results); + console.log(message); + + const { data: comments } = await octokit.rest.issues.listComments({ + ...repo, + issue_number: prNumber, + }); + + const comment = comments.find((comment) => { + return ( + comment.user.login === "github-actions[bot]" && + comment.body.startsWith("![kics-logo](" + kicsLogo + ")\n") + ); + }); + + if (comment) { + await octokit.rest.issues.updateComment({ + ...repo, + comment_id: comment.id, + body: message + }); + } else { + await octokit.rest.issues.createComment({ + ...repo, + issue_number: prNumber, + body: message + }); + } +} + +module.exports = { + postPRComment +}; + +/***/ }), + +/***/ 430: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +const https = __nccwpck_require__(211) +const filepath = __nccwpck_require__(622); +const tc = __nccwpck_require__(784); +//const releaseDownloader = require('@fohlen/github-release-downloader'); +const os = __nccwpck_require__(87); +//const decompress = require('decompress'); +//const decompressTargz = require('decompress-targz'); + +function getVersion(version) { + let path = '' + if (version == "latest") { + path = '/repos/checkmarx/kics/releases/latest' + } else { + path = '/repos/checkmarx/kics/releases/tags/' + version + } + const options = { + hostname: 'api.github.com', + port: 443, + path: path, + headers: { + 'User-Agent': 'node.js' + }, + method: 'GET' + } + return new Promise((resolve, reject) => { + const req = https.get(options, (resp) => { + console.log(`${options.method} https://${options.hostname}${options.path} ${resp.statusCode}`) + let rawData = ''; + resp.on('data', (d) => { + rawData += d; + }); + resp.on('end', () => { + try { + const parsedData = JSON.parse(rawData); + resolve(parsedData); + } catch (e) { + reject(e); + } + }); + }) + + req.on('error', (error) => { + reject(error); + }) + }) +} + +function getReleaseInfo(release) { + const assets = release.assets || []; + const os = process.platform; + const arch = process.arch; + let targetAsset; + switch (os) { + case 'darwin': + targetAsset = assets.filter((asset) => asset.name.indexOf('darwin') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + case 'linux': + targetAsset = assets.filter((asset) => asset.name.indexOf('linux') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + case 'win32': + targetAsset = assets.filter((asset) => asset.name.indexOf('windows') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + default: + targetAsset = { size: 0, browser_download_url: '' }; + } + return { size: targetAsset.size, browser_download_url: targetAsset.browser_download_url, version: targetAsset.name }; +} + +// async function downloadReleaseFile(releaseAsset) { +// const dest = os.homedir(); +// const releaseURL = releaseAsset.browser_download_url; + +// console.log("Downloading", releaseURL); +// const baseName = releaseURL.substr(releaseURL.lastIndexOf("/") + 1); +// return releaseDownloader.downloadAsset(releaseURL, baseName, dest, () => { +// process.stdout.write("."); +// }); +// } + +// function decompressRelease(path) { +// const dest = os.homedir(); +// return decompress(path, filepath.join(dest, 'kics'), { +// plugins: [ +// decompressTargz() +// ] +// }); +// } + +// function getExecutableName() { +// const os = process.platform; +// switch (os) { +// case 'darwin': +// case 'linux': +// return 'kics'; +// case 'win32': +// return 'kics.exe'; +// default: +// return 'kics'; +// } +// } + +async function installKICS(kicsVersion) { + let release = {}; + if (!kicsVersion || kicsVersion == "latest") { + release = await getVersion("latest"); + } else { + release = await getVersion(kicsVersion); + } + const releaseInfo = getReleaseInfo(release) + + const kicsDownloadPath = await tc.downloadTool(releaseInfo.browser_download_url); + const kicsExtractedFolder = await tc.extractTar(kicsDownloadPath, filepath.join(os.homedir(), 'kics', releaseInfo.version)); + const cachedPath = await tc.cacheDir(kicsExtractedFolder, 'kics', releaseInfo.version); + core.addPath(cachedPath); + + // const releasePath = await downloadReleaseFile(releaseAsset, "./") + // console.log('\nDownloaded KICS release', releasePath); + // const files = await decompressRelease(releasePath); + // console.log('\nDecompressed KICS release', files.map(f => f.path)); + + // const kicsPath = filepath.join(os.homedir(), 'kics', getExecutableName()); + // console.log('\nInstalling KICS to', kicsPath); + return kicsPath; +} + +module.exports = { + installKICS +} + +/***/ }), + +/***/ 157: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +const exec = __nccwpck_require__(514); + +const core = __nccwpck_require__(186); + +const kicsInputs = { + path: { flag: '--path', value: core.getInput('path') }, + ignore_on_exit: { flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, + fail_on: { flag: '--fail-on', value: core.getInput('fail_on') }, + timeout: { flag: '--timeout', value: core.getInput('timeout') }, + profiling: { flag: '--profiling', value: core.getInput('profiling') }, + config_path: { flag: '--config', value: core.getInput('config_path') }, + payload_path: { flag: '--payload-path', value: core.getInput('payload_path') }, + exclude_paths: { flag: '--exclude-paths', value: core.getInput('exclude_paths') }, + exclude_queries: { flag: '--exclude-queries', value: core.getInput('exclude_queries') }, + exclude_categories: { flag: '--exclude-categories', value: core.getInput('exclude_categories') }, + exclude_results: { flag: '--exclude-results', value: core.getInput('exclude_results') }, + output_formats: { flag: '--report-formats', value: core.getInput('output_formats') }, + output_path: { flag: '--output-path', value: core.getInput('output_path') }, + queries: { flag: '--queries-path', value: core.getInput('queries') }, + verbose: { flag: '--verbose', value: core.getInput('verbose') }, + secrets_regexes_path: { flag: '--secrets-regexes-path', value: core.getInput('secrets_regexes_path') }, + libraries_path: { flag: '--libraries-path', value: core.getInput('libraries-path') }, + disable_secrets: { flag: '--disable-secrets', value: core.getInput('disable_secrets') }, + disable_full_descriptions: { flag: '--disable-full-descriptions', value: core.getInput('disable_full_descriptions') }, + types: { flag: '--types', value: core.getInput('types') }, + bom: { flag: '--bom', value: core.getInput('bom') }, +}; + +async function scanWithKICS(kicsPath) { + let statusCode = 0; + if (kicsInputs.config_path.value) { + statusCode = await exec.exec(`${kicsPath} scan ${kicsInputs.config_path.flag} ${kicsInputs.config_path.value}`); + } +} + +module.exports = { + scanWithKICS +}; + +/***/ }), + +/***/ 357: +/***/ ((module) => { + +"use strict"; +module.exports = require("assert"); + +/***/ }), + +/***/ 129: +/***/ ((module) => { + +"use strict"; +module.exports = require("child_process"); + +/***/ }), + +/***/ 417: +/***/ ((module) => { + +"use strict"; +module.exports = require("crypto"); + +/***/ }), + +/***/ 614: +/***/ ((module) => { + +"use strict"; +module.exports = require("events"); + +/***/ }), + +/***/ 747: +/***/ ((module) => { + +"use strict"; +module.exports = require("fs"); + +/***/ }), + +/***/ 605: +/***/ ((module) => { + +"use strict"; +module.exports = require("http"); + +/***/ }), + +/***/ 211: +/***/ ((module) => { + +"use strict"; +module.exports = require("https"); + +/***/ }), + +/***/ 631: +/***/ ((module) => { + +"use strict"; +module.exports = require("net"); + +/***/ }), + +/***/ 87: +/***/ ((module) => { + +"use strict"; +module.exports = require("os"); + +/***/ }), + +/***/ 622: +/***/ ((module) => { + +"use strict"; +module.exports = require("path"); + +/***/ }), + +/***/ 413: +/***/ ((module) => { + +"use strict"; +module.exports = require("stream"); + +/***/ }), + +/***/ 304: +/***/ ((module) => { + +"use strict"; +module.exports = require("string_decoder"); + +/***/ }), + +/***/ 213: +/***/ ((module) => { + +"use strict"; +module.exports = require("timers"); + +/***/ }), + +/***/ 16: +/***/ ((module) => { + +"use strict"; +module.exports = require("tls"); + +/***/ }), + +/***/ 669: +/***/ ((module) => { + +"use strict"; +module.exports = require("util"); + +/***/ }) + +/******/ }); +/************************************************************************/ +/******/ // The module cache +/******/ var __webpack_module_cache__ = {}; +/******/ +/******/ // The require function +/******/ function __nccwpck_require__(moduleId) { +/******/ // Check if module is in cache +/******/ var cachedModule = __webpack_module_cache__[moduleId]; +/******/ if (cachedModule !== undefined) { +/******/ return cachedModule.exports; +/******/ } +/******/ // Create a new module (and put it into the cache) +/******/ var module = __webpack_module_cache__[moduleId] = { +/******/ id: moduleId, +/******/ loaded: false, +/******/ exports: {} +/******/ }; +/******/ +/******/ // Execute the module function +/******/ var threw = true; +/******/ try { +/******/ __webpack_modules__[moduleId].call(module.exports, module, module.exports, __nccwpck_require__); +/******/ threw = false; +/******/ } finally { +/******/ if(threw) delete __webpack_module_cache__[moduleId]; +/******/ } +/******/ +/******/ // Flag the module as loaded +/******/ module.loaded = true; +/******/ +/******/ // Return the exports of the module +/******/ return module.exports; +/******/ } +/******/ +/************************************************************************/ +/******/ /* webpack/runtime/node module decorator */ +/******/ (() => { +/******/ __nccwpck_require__.nmd = (module) => { +/******/ module.paths = []; +/******/ if (!module.children) module.children = []; +/******/ return module; +/******/ }; +/******/ })(); +/******/ +/******/ /* webpack/runtime/compat */ +/******/ +/******/ if (typeof __nccwpck_require__ !== 'undefined') __nccwpck_require__.ab = __dirname + "/"; +/******/ +/************************************************************************/ +var __webpack_exports__ = {}; +// This entry need to be wrapped in an IIFE because it need to be isolated against other modules in the chunk. +(() => { +const install = __nccwpck_require__(430); +const commenter = __nccwpck_require__(571); +const scanner = __nccwpck_require__(157); +const core = __nccwpck_require__(186); + +const actionInputs = { + kics_version: { value: core.getInput('kics_version') }, + enable_pr_comments: { value: core.getInput('enable_pr_comments') }, +} + +async function main() { + console.log("Running KICS action..."); + try { + // const context = github.context; + // const repository = context.repo; + // const pullRequestNumber = context.payload.pull_request.number; + const kicsPath = await install.installKICS(actionInputs.kics_version.value); + console.log("KICS installed at: " + kicsPath); + //await scanner.scanWithKICS(kicsPath); + // if (actionInputs.enable_pr_comments.value === "true") { + // await commenter.commentOnPullRequest(repository, pullRequestNumber); + // } + } catch (e) { + console.error(e); + core.setFailed(e.message); + } +} + +main(); +})(); + +module.exports = __webpack_exports__; +/******/ })() +; \ No newline at end of file diff --git a/entrypoint.sh b/entrypoint.sh index 273f192..82c4d24 100644 --- a/entrypoint.sh +++ b/entrypoint.sh @@ -1,5 +1,5 @@ -#!/bin/ash -DATETIME="`date '+%H:%M'`" +#!/bin/bash +DATETIME=$(date '+%H:%M') if [ -z "$INPUT_PATH" ] then @@ -9,30 +9,30 @@ else INPUT_PARAM="-p $INPUT_PATH" fi -[[ ! -z "$INPUT_OUTPUT_PATH" ]] && OUTPUT_PATH_PARAM="-o $INPUT_OUTPUT_PATH" -[[ ! -z "$INPUT_PAYLOAD_PATH" ]] && PAYLOAD_PATH_PARAM="-d $INPUT_PAYLOAD_PATH" -[[ ! -z "$INPUT_CONFIG_PATH" ]] && CONFIG_PATH_PARAM="--config $INPUT_CONFIG_PATH" -[[ ! -z "$INPUT_EXCLUDE_PATHS" ]] && EXCLUDE_PATHS_PARAM="-e $INPUT_EXCLUDE_PATHS" -[[ ! -z "$INPUT_EXCLUDE_RESULTS" ]] && EXCLUDE_RESULTS_PARAM="-x $INPUT_EXCLUDE_RESULTS" -[[ ! -z "$INPUT_EXCLUDE_QUERIES" ]] && EXCLUDE_QUERIES_PARAM="--exclude-queries $INPUT_EXCLUDE_QUERIES" -[[ ! -z "$INPUT_EXCLUDE_CATEGORIES" ]] && EXCLUDE_CATEGORIES_PARAM="--exclude-categories $INPUT_EXCLUDE_CATEGORIES" -[[ ! -z "$INPUT_OUTPUT_FORMATS" ]] && OUTPUT_FORMATS_PARAM="--report-formats $INPUT_OUTPUT_FORMATS" -[[ ! -z "$INPUT_PLATFORM_TYPE" ]] && PLATFORM_TYPE_PARAM="--type $INPUT_PLATFORM_TYPE" -[[ ! -z "$INPUT_IGNORE_ON_EXIT" ]] && IGNORE_ON_EXIT_PARAM="--ignore-on-exit $INPUT_IGNORE_ON_EXIT" -[[ ! -z "$INPUT_FAIL_ON" ]] && FAIL_ON_PARAM="--fail-on $INPUT_FAIL_ON" -[[ ! -z "$INPUT_TIMEOUT" ]] && TIMEOUT_PARAM="--timeout $INPUT_TIMEOUT" -[[ ! -z "$INPUT_PROFILING" ]] && PROFILING_PARAM="--profiling $INPUT_PROFILING" +[[ -n "$INPUT_OUTPUT_PATH" ]] && OUTPUT_PATH_PARAM="-o $INPUT_OUTPUT_PATH" +[[ -n "$INPUT_PAYLOAD_PATH" ]] && PAYLOAD_PATH_PARAM="-d $INPUT_PAYLOAD_PATH" +[[ -n "$INPUT_CONFIG_PATH" ]] && CONFIG_PATH_PARAM="--config $INPUT_CONFIG_PATH" +[[ -n "$INPUT_EXCLUDE_PATHS" ]] && EXCLUDE_PATHS_PARAM="-e $INPUT_EXCLUDE_PATHS" +[[ -n "$INPUT_EXCLUDE_RESULTS" ]] && EXCLUDE_RESULTS_PARAM="-x $INPUT_EXCLUDE_RESULTS" +[[ -n "$INPUT_EXCLUDE_QUERIES" ]] && EXCLUDE_QUERIES_PARAM="--exclude-queries $INPUT_EXCLUDE_QUERIES" +[[ -n "$INPUT_EXCLUDE_CATEGORIES" ]] && EXCLUDE_CATEGORIES_PARAM="--exclude-categories $INPUT_EXCLUDE_CATEGORIES" +[[ -n "$INPUT_OUTPUT_FORMATS" ]] && OUTPUT_FORMATS_PARAM="--report-formats $INPUT_OUTPUT_FORMATS" +[[ -n "$INPUT_PLATFORM_TYPE" ]] && PLATFORM_TYPE_PARAM="--type $INPUT_PLATFORM_TYPE" +[[ -n "$INPUT_IGNORE_ON_EXIT" ]] && IGNORE_ON_EXIT_PARAM="--ignore-on-exit $INPUT_IGNORE_ON_EXIT" +[[ -n "$INPUT_FAIL_ON" ]] && FAIL_ON_PARAM="--fail-on $INPUT_FAIL_ON" +[[ -n "$INPUT_TIMEOUT" ]] && TIMEOUT_PARAM="--timeout $INPUT_TIMEOUT" +[[ -n "$INPUT_PROFILING" ]] && PROFILING_PARAM="--profiling $INPUT_PROFILING" -[[ ! -z "$INPUT_VERBOSE" ]] && VERBOSE_PARAM="-v" +[[ -n "$INPUT_VERBOSE" ]] && VERBOSE_PARAM="-v" -if [ ! -z "$INPUT_QUERIES" ] +if [ -n "$INPUT_QUERIES" ] then QUERIES_PARAM="-q $INPUT_QUERIES" else QUERIES_PARAM="-q /app/bin/assets/queries" fi -cd $GITHUB_WORKSPACE +cd "$GITHUB_WORKSPACE" || exit 1 echo "${DATETIME} - INF : about to scan directory $INPUT_PATH" echo "${DATETIME} - INF : kics command kics $INPUT_PARAM $OUTPUT_PATH_PARAM $OUTPUT_FORMATS_PARAM $PLATFORM_TYPE_PARAM $PAYLOAD_PATH_PARAM $CONFIG_PATH_PARAM $EXCLUDE_PATHS_PARAM $EXCLUDE_CATEGORIES_PARAM $EXCLUDE_RESULTS_PARAM $EXCLUDE_QUERIES_PARAM $QUERIES_PARAM $VERBOSE_PARAM $IGNORE_ON_EXIT_PARAM $FAIL_ON_PARAM $TIMEOUT_PARAM $PROFILING_PARAM" -/app/bin/kics scan --no-progress $INPUT_PARAM $OUTPUT_PATH_PARAM $OUTPUT_FORMATS_PARAM $PLATFORM_TYPE_PARAM $PAYLOAD_PATH_PARAM $CONFIG_PATH_PARAM $EXCLUDE_PATHS_PARAM $EXCLUDE_CATEGORIES_PARAM $EXCLUDE_RESULTS_PARAM $EXCLUDE_QUERIES_PARAM $QUERIES_PARAM $VERBOSE_PARAM $IGNORE_ON_EXIT_PARAM $FAIL_ON_PARAM $TIMEOUT_PARAM $PROFILING_PARAM \ No newline at end of file +/app/bin/kics scan --no-progress "$INPUT_PARAM" "$OUTPUT_PATH_PARAM" "$OUTPUT_FORMATS_PARAM" "$PLATFORM_TYPE_PARAM" "$PAYLOAD_PATH_PARAM" "$CONFIG_PATH_PARAM" "$EXCLUDE_PATHS_PARAM" "$EXCLUDE_CATEGORIES_PARAM" "$EXCLUDE_RESULTS_PARAM" "$EXCLUDE_QUERIES_PARAM" "$QUERIES_PARAM" "$VERBOSE_PARAM" "$IGNORE_ON_EXIT_PARAM" "$FAIL_ON_PARAM" "$TIMEOUT_PARAM" "$PROFILING_PARAM" \ No newline at end of file diff --git a/package-lock.json b/package-lock.json new file mode 100644 index 0000000..4aa2710 --- /dev/null +++ b/package-lock.json @@ -0,0 +1,542 @@ +{ + "name": "kics-github-action", + "version": "1.0.0", + "lockfileVersion": 2, + "requires": true, + "packages": { + "": { + "name": "kics-github-action", + "version": "1.0.0", + "license": "GNU GENERAL PUBLIC LICENSE", + "dependencies": { + "@actions/core": "^1.6.0", + "@actions/exec": "^1.1.0", + "@actions/github": "^5.0.0", + "@actions/tool-cache": "^1.7.1", + "moment": "^2.29.1" + }, + "devDependencies": { + "@vercel/ncc": "^0.31.1", + "prettier": "^2.4.1" + } + }, + "node_modules/@actions/core": { + "version": "1.6.0", + "resolved": "https://registry.npmjs.org/@actions/core/-/core-1.6.0.tgz", + "integrity": "sha512-NB1UAZomZlCV/LmJqkLhNTqtKfFXJZAUPcfl/zqG7EfsQdeUJtaWO98SGbuQ3pydJ3fHl2CvI/51OKYlCYYcaw==", + "dependencies": { + "@actions/http-client": "^1.0.11" + } + }, + "node_modules/@actions/exec": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/@actions/exec/-/exec-1.1.0.tgz", + "integrity": "sha512-LImpN9AY0J1R1mEYJjVJfSZWU4zYOlEcwSTgPve1rFQqK5AwrEs6uWW5Rv70gbDIQIAUwI86z6B+9mPK4w9Sbg==", + "dependencies": { + "@actions/io": "^1.0.1" + } + }, + "node_modules/@actions/github": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/@actions/github/-/github-5.0.0.tgz", + "integrity": "sha512-QvE9eAAfEsS+yOOk0cylLBIO/d6WyWIOvsxxzdrPFaud39G6BOkUwScXZn1iBzQzHyu9SBkkLSWlohDWdsasAQ==", + "dependencies": { + "@actions/http-client": "^1.0.11", + "@octokit/core": "^3.4.0", + "@octokit/plugin-paginate-rest": "^2.13.3", + "@octokit/plugin-rest-endpoint-methods": "^5.1.1" + } + }, + "node_modules/@actions/http-client": { + "version": "1.0.11", + "resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-1.0.11.tgz", + "integrity": "sha512-VRYHGQV1rqnROJqdMvGUbY/Kn8vriQe/F9HR2AlYHzmKuM/p3kjNuXhmdBfcVgsvRWTz5C5XW5xvndZrVBuAYg==", + "dependencies": { + "tunnel": "0.0.6" + } + }, + "node_modules/@actions/io": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/@actions/io/-/io-1.1.1.tgz", + "integrity": "sha512-Qi4JoKXjmE0O67wAOH6y0n26QXhMKMFo7GD/4IXNVcrtLjUlGjGuVys6pQgwF3ArfGTQu0XpqaNr0YhED2RaRA==" + }, + "node_modules/@actions/tool-cache": { + "version": "1.7.1", + "resolved": "https://registry.npmjs.org/@actions/tool-cache/-/tool-cache-1.7.1.tgz", + "integrity": "sha512-y1xxxOhXaBUIUit3lhepmu/0xdgiTMpnZRLmVdtF0hTm521doi+MdRRRP62czHvM7wxH6epj4JPNJQ3iJpOrkQ==", + "dependencies": { + "@actions/core": "^1.2.6", + "@actions/exec": "^1.0.0", + "@actions/http-client": "^1.0.8", + "@actions/io": "^1.1.1", + "semver": "^6.1.0", + "uuid": "^3.3.2" + } + }, + "node_modules/@actions/tool-cache/node_modules/semver": { + "version": "6.3.0", + "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz", + "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw==", + "bin": { + "semver": "bin/semver.js" + } + }, + "node_modules/@octokit/auth-token": { + "version": "2.5.0", + "resolved": "https://registry.npmjs.org/@octokit/auth-token/-/auth-token-2.5.0.tgz", + "integrity": "sha512-r5FVUJCOLl19AxiuZD2VRZ/ORjp/4IN98Of6YJoJOkY75CIBuYfmiNHGrDwXr+aLGG55igl9QrxX3hbiXlLb+g==", + "dependencies": { + "@octokit/types": "^6.0.3" + } + }, + "node_modules/@octokit/core": { + "version": "3.5.1", + "resolved": "https://registry.npmjs.org/@octokit/core/-/core-3.5.1.tgz", + "integrity": "sha512-omncwpLVxMP+GLpLPgeGJBF6IWJFjXDS5flY5VbppePYX9XehevbDykRH9PdCdvqt9TS5AOTiDide7h0qrkHjw==", + "dependencies": { + "@octokit/auth-token": "^2.4.4", + "@octokit/graphql": "^4.5.8", + "@octokit/request": "^5.6.0", + "@octokit/request-error": "^2.0.5", + "@octokit/types": "^6.0.3", + "before-after-hook": "^2.2.0", + "universal-user-agent": "^6.0.0" + } + }, + "node_modules/@octokit/endpoint": { + "version": "6.0.12", + "resolved": "https://registry.npmjs.org/@octokit/endpoint/-/endpoint-6.0.12.tgz", + "integrity": "sha512-lF3puPwkQWGfkMClXb4k/eUT/nZKQfxinRWJrdZaJO85Dqwo/G0yOC434Jr2ojwafWJMYqFGFa5ms4jJUgujdA==", + "dependencies": { + "@octokit/types": "^6.0.3", + "is-plain-object": "^5.0.0", + "universal-user-agent": "^6.0.0" + } + }, + "node_modules/@octokit/graphql": { + "version": "4.8.0", + "resolved": "https://registry.npmjs.org/@octokit/graphql/-/graphql-4.8.0.tgz", + "integrity": "sha512-0gv+qLSBLKF0z8TKaSKTsS39scVKF9dbMxJpj3U0vC7wjNWFuIpL/z76Qe2fiuCbDRcJSavkXsVtMS6/dtQQsg==", + "dependencies": { + "@octokit/request": "^5.6.0", + "@octokit/types": "^6.0.3", + "universal-user-agent": "^6.0.0" + } + }, + "node_modules/@octokit/openapi-types": { + "version": "11.2.0", + "resolved": "https://registry.npmjs.org/@octokit/openapi-types/-/openapi-types-11.2.0.tgz", + "integrity": "sha512-PBsVO+15KSlGmiI8QAzaqvsNlZlrDlyAJYcrXBCvVUxCp7VnXjkwPoFHgjEJXx3WF9BAwkA6nfCUA7i9sODzKA==" + }, + "node_modules/@octokit/plugin-paginate-rest": { + "version": "2.17.0", + "resolved": "https://registry.npmjs.org/@octokit/plugin-paginate-rest/-/plugin-paginate-rest-2.17.0.tgz", + "integrity": "sha512-tzMbrbnam2Mt4AhuyCHvpRkS0oZ5MvwwcQPYGtMv4tUa5kkzG58SVB0fcsLulOZQeRnOgdkZWkRUiyBlh0Bkyw==", + "dependencies": { + "@octokit/types": "^6.34.0" + }, + "peerDependencies": { + "@octokit/core": ">=2" + } + }, + "node_modules/@octokit/plugin-rest-endpoint-methods": { + "version": "5.13.0", + "resolved": "https://registry.npmjs.org/@octokit/plugin-rest-endpoint-methods/-/plugin-rest-endpoint-methods-5.13.0.tgz", + "integrity": "sha512-uJjMTkN1KaOIgNtUPMtIXDOjx6dGYysdIFhgA52x4xSadQCz3b/zJexvITDVpANnfKPW/+E0xkOvLntqMYpviA==", + "dependencies": { + "@octokit/types": "^6.34.0", + "deprecation": "^2.3.1" + }, + "peerDependencies": { + "@octokit/core": ">=3" + } + }, + "node_modules/@octokit/request": { + "version": "5.6.2", + "resolved": "https://registry.npmjs.org/@octokit/request/-/request-5.6.2.tgz", + "integrity": "sha512-je66CvSEVf0jCpRISxkUcCa0UkxmFs6eGDRSbfJtAVwbLH5ceqF+YEyC8lj8ystKyZTy8adWr0qmkY52EfOeLA==", + "dependencies": { + "@octokit/endpoint": "^6.0.1", + "@octokit/request-error": "^2.1.0", + "@octokit/types": "^6.16.1", + "is-plain-object": "^5.0.0", + "node-fetch": "^2.6.1", + "universal-user-agent": "^6.0.0" + } + }, + "node_modules/@octokit/request-error": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@octokit/request-error/-/request-error-2.1.0.tgz", + "integrity": "sha512-1VIvgXxs9WHSjicsRwq8PlR2LR2x6DwsJAaFgzdi0JfJoGSO8mYI/cHJQ+9FbN21aa+DrgNLnwObmyeSC8Rmpg==", + "dependencies": { + "@octokit/types": "^6.0.3", + "deprecation": "^2.0.0", + "once": "^1.4.0" + } + }, + "node_modules/@octokit/types": { + "version": "6.34.0", + "resolved": "https://registry.npmjs.org/@octokit/types/-/types-6.34.0.tgz", + "integrity": "sha512-s1zLBjWhdEI2zwaoSgyOFoKSl109CUcVBCc7biPJ3aAf6LGLU6szDvi31JPU7bxfla2lqfhjbbg/5DdFNxOwHw==", + "dependencies": { + "@octokit/openapi-types": "^11.2.0" + } + }, + "node_modules/@vercel/ncc": { + "version": "0.31.1", + "resolved": "https://registry.npmjs.org/@vercel/ncc/-/ncc-0.31.1.tgz", + "integrity": "sha512-g0FAxwdViI6UzsiVz5HssIHqjcPa1EHL6h+2dcJD893SoCJaGdqqgUF09xnMW6goWnnhbLvgiKlgJWrJa+7qYA==", + "dev": true, + "bin": { + "ncc": "dist/ncc/cli.js" + } + }, + "node_modules/before-after-hook": { + "version": "2.2.2", + "resolved": "https://registry.npmjs.org/before-after-hook/-/before-after-hook-2.2.2.tgz", + "integrity": "sha512-3pZEU3NT5BFUo/AD5ERPWOgQOCZITni6iavr5AUw5AUwQjMlI0kzu5btnyD39AF0gUEsDPwJT+oY1ORBJijPjQ==" + }, + "node_modules/deprecation": { + "version": "2.3.1", + "resolved": "https://registry.npmjs.org/deprecation/-/deprecation-2.3.1.tgz", + "integrity": "sha512-xmHIy4F3scKVwMsQ4WnVaS8bHOx0DmVwRywosKhaILI0ywMDWPtBSku2HNxRvF7jtwDRsoEwYQSfbxj8b7RlJQ==" + }, + "node_modules/is-plain-object": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/is-plain-object/-/is-plain-object-5.0.0.tgz", + "integrity": "sha512-VRSzKkbMm5jMDoKLbltAkFQ5Qr7VDiTFGXxYFXXowVj387GeGNOCsOH6Msy00SGZ3Fp84b1Naa1psqgcCIEP5Q==", + "engines": { + "node": ">=0.10.0" + } + }, + "node_modules/moment": { + "version": "2.29.1", + "resolved": "https://registry.npmjs.org/moment/-/moment-2.29.1.tgz", + "integrity": "sha512-kHmoybcPV8Sqy59DwNDY3Jefr64lK/by/da0ViFcuA4DH0vQg5Q6Ze5VimxkfQNSC+Mls/Kx53s7TjP1RhFEDQ==", + "engines": { + "node": "*" + } + }, + "node_modules/node-fetch": { + "version": "2.6.5", + "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.5.tgz", + "integrity": "sha512-mmlIVHJEu5rnIxgEgez6b9GgWXbkZj5YZ7fx+2r94a2E+Uirsp6HsPTPlomfdHtpt/B0cdKviwkoaM6pyvUOpQ==", + "dependencies": { + "whatwg-url": "^5.0.0" + }, + "engines": { + "node": "4.x || >=6.0.0" + } + }, + "node_modules/once": { + "version": "1.4.0", + "resolved": "https://registry.npmjs.org/once/-/once-1.4.0.tgz", + "integrity": "sha1-WDsap3WWHUsROsF9nFC6753Xa9E=", + "dependencies": { + "wrappy": "1" + } + }, + "node_modules/prettier": { + "version": "2.4.1", + "resolved": "https://registry.npmjs.org/prettier/-/prettier-2.4.1.tgz", + "integrity": "sha512-9fbDAXSBcc6Bs1mZrDYb3XKzDLm4EXXL9sC1LqKP5rZkT6KRr/rf9amVUcODVXgguK/isJz0d0hP72WeaKWsvA==", + "dev": true, + "bin": { + "prettier": "bin-prettier.js" + }, + "engines": { + "node": ">=10.13.0" + } + }, + "node_modules/tr46": { + "version": "0.0.3", + "resolved": "https://registry.npmjs.org/tr46/-/tr46-0.0.3.tgz", + "integrity": "sha1-gYT9NH2snNwYWZLzpmIuFLnZq2o=" + }, + "node_modules/tunnel": { + "version": "0.0.6", + "resolved": "https://registry.npmjs.org/tunnel/-/tunnel-0.0.6.tgz", + "integrity": "sha512-1h/Lnq9yajKY2PEbBadPXj3VxsDDu844OnaAo52UVmIzIvwwtBPIuNvkjuzBlTWpfJyUbG3ez0KSBibQkj4ojg==", + "engines": { + "node": ">=0.6.11 <=0.7.0 || >=0.7.3" + } + }, + "node_modules/universal-user-agent": { + "version": "6.0.0", + "resolved": "https://registry.npmjs.org/universal-user-agent/-/universal-user-agent-6.0.0.tgz", + "integrity": "sha512-isyNax3wXoKaulPDZWHQqbmIx1k2tb9fb3GGDBRxCscfYV2Ch7WxPArBsFEG8s/safwXTT7H4QGhaIkTp9447w==" + }, + "node_modules/uuid": { + "version": "3.4.0", + "resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz", + "integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A==", + "deprecated": "Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details.", + "bin": { + "uuid": "bin/uuid" + } + }, + "node_modules/webidl-conversions": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/webidl-conversions/-/webidl-conversions-3.0.1.tgz", + "integrity": "sha1-JFNCdeKnvGvnvIZhHMFq4KVlSHE=" + }, + "node_modules/whatwg-url": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/whatwg-url/-/whatwg-url-5.0.0.tgz", + "integrity": "sha1-lmRU6HZUYuN2RNNib2dCzotwll0=", + "dependencies": { + "tr46": "~0.0.3", + "webidl-conversions": "^3.0.0" + } + }, + "node_modules/wrappy": { + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/wrappy/-/wrappy-1.0.2.tgz", + "integrity": "sha1-tSQ9jz7BqjXxNkYFvA0QNuMKtp8=" + } + }, + "dependencies": { + "@actions/core": { + "version": "1.6.0", + "resolved": "https://registry.npmjs.org/@actions/core/-/core-1.6.0.tgz", + "integrity": "sha512-NB1UAZomZlCV/LmJqkLhNTqtKfFXJZAUPcfl/zqG7EfsQdeUJtaWO98SGbuQ3pydJ3fHl2CvI/51OKYlCYYcaw==", + "requires": { + "@actions/http-client": "^1.0.11" + } + }, + "@actions/exec": { + "version": "1.1.0", + "resolved": "https://registry.npmjs.org/@actions/exec/-/exec-1.1.0.tgz", + "integrity": "sha512-LImpN9AY0J1R1mEYJjVJfSZWU4zYOlEcwSTgPve1rFQqK5AwrEs6uWW5Rv70gbDIQIAUwI86z6B+9mPK4w9Sbg==", + "requires": { + "@actions/io": "^1.0.1" + } + }, + "@actions/github": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/@actions/github/-/github-5.0.0.tgz", + "integrity": "sha512-QvE9eAAfEsS+yOOk0cylLBIO/d6WyWIOvsxxzdrPFaud39G6BOkUwScXZn1iBzQzHyu9SBkkLSWlohDWdsasAQ==", + "requires": { + "@actions/http-client": "^1.0.11", + "@octokit/core": "^3.4.0", + "@octokit/plugin-paginate-rest": "^2.13.3", + "@octokit/plugin-rest-endpoint-methods": "^5.1.1" + } + }, + "@actions/http-client": { + "version": "1.0.11", + "resolved": "https://registry.npmjs.org/@actions/http-client/-/http-client-1.0.11.tgz", + "integrity": "sha512-VRYHGQV1rqnROJqdMvGUbY/Kn8vriQe/F9HR2AlYHzmKuM/p3kjNuXhmdBfcVgsvRWTz5C5XW5xvndZrVBuAYg==", + "requires": { + "tunnel": "0.0.6" + } + }, + "@actions/io": { + "version": "1.1.1", + "resolved": "https://registry.npmjs.org/@actions/io/-/io-1.1.1.tgz", + "integrity": "sha512-Qi4JoKXjmE0O67wAOH6y0n26QXhMKMFo7GD/4IXNVcrtLjUlGjGuVys6pQgwF3ArfGTQu0XpqaNr0YhED2RaRA==" + }, + "@actions/tool-cache": { + "version": "1.7.1", + "resolved": "https://registry.npmjs.org/@actions/tool-cache/-/tool-cache-1.7.1.tgz", + "integrity": "sha512-y1xxxOhXaBUIUit3lhepmu/0xdgiTMpnZRLmVdtF0hTm521doi+MdRRRP62czHvM7wxH6epj4JPNJQ3iJpOrkQ==", + "requires": { + "@actions/core": "^1.2.6", + "@actions/exec": "^1.0.0", + "@actions/http-client": "^1.0.8", + "@actions/io": "^1.1.1", + "semver": "^6.1.0", + "uuid": "^3.3.2" + }, + "dependencies": { + "semver": { + "version": "6.3.0", + "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz", + "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw==" + } + } + }, + "@octokit/auth-token": { + "version": "2.5.0", + "resolved": "https://registry.npmjs.org/@octokit/auth-token/-/auth-token-2.5.0.tgz", + "integrity": "sha512-r5FVUJCOLl19AxiuZD2VRZ/ORjp/4IN98Of6YJoJOkY75CIBuYfmiNHGrDwXr+aLGG55igl9QrxX3hbiXlLb+g==", + "requires": { + "@octokit/types": "^6.0.3" + } + }, + "@octokit/core": { + "version": "3.5.1", + "resolved": "https://registry.npmjs.org/@octokit/core/-/core-3.5.1.tgz", + "integrity": "sha512-omncwpLVxMP+GLpLPgeGJBF6IWJFjXDS5flY5VbppePYX9XehevbDykRH9PdCdvqt9TS5AOTiDide7h0qrkHjw==", + "requires": { + "@octokit/auth-token": "^2.4.4", + "@octokit/graphql": "^4.5.8", + "@octokit/request": "^5.6.0", + "@octokit/request-error": "^2.0.5", + "@octokit/types": "^6.0.3", + "before-after-hook": "^2.2.0", + "universal-user-agent": "^6.0.0" + } + }, + "@octokit/endpoint": { + "version": "6.0.12", + "resolved": "https://registry.npmjs.org/@octokit/endpoint/-/endpoint-6.0.12.tgz", + "integrity": "sha512-lF3puPwkQWGfkMClXb4k/eUT/nZKQfxinRWJrdZaJO85Dqwo/G0yOC434Jr2ojwafWJMYqFGFa5ms4jJUgujdA==", + "requires": { + "@octokit/types": "^6.0.3", + "is-plain-object": "^5.0.0", + "universal-user-agent": "^6.0.0" + } + }, + "@octokit/graphql": { + "version": "4.8.0", + "resolved": "https://registry.npmjs.org/@octokit/graphql/-/graphql-4.8.0.tgz", + "integrity": "sha512-0gv+qLSBLKF0z8TKaSKTsS39scVKF9dbMxJpj3U0vC7wjNWFuIpL/z76Qe2fiuCbDRcJSavkXsVtMS6/dtQQsg==", + "requires": { + "@octokit/request": "^5.6.0", + "@octokit/types": "^6.0.3", + "universal-user-agent": "^6.0.0" + } + }, + "@octokit/openapi-types": { + "version": "11.2.0", + "resolved": "https://registry.npmjs.org/@octokit/openapi-types/-/openapi-types-11.2.0.tgz", + "integrity": "sha512-PBsVO+15KSlGmiI8QAzaqvsNlZlrDlyAJYcrXBCvVUxCp7VnXjkwPoFHgjEJXx3WF9BAwkA6nfCUA7i9sODzKA==" + }, + "@octokit/plugin-paginate-rest": { + "version": "2.17.0", + "resolved": "https://registry.npmjs.org/@octokit/plugin-paginate-rest/-/plugin-paginate-rest-2.17.0.tgz", + "integrity": "sha512-tzMbrbnam2Mt4AhuyCHvpRkS0oZ5MvwwcQPYGtMv4tUa5kkzG58SVB0fcsLulOZQeRnOgdkZWkRUiyBlh0Bkyw==", + "requires": { + "@octokit/types": "^6.34.0" + } + }, + "@octokit/plugin-rest-endpoint-methods": { + "version": "5.13.0", + "resolved": "https://registry.npmjs.org/@octokit/plugin-rest-endpoint-methods/-/plugin-rest-endpoint-methods-5.13.0.tgz", + "integrity": "sha512-uJjMTkN1KaOIgNtUPMtIXDOjx6dGYysdIFhgA52x4xSadQCz3b/zJexvITDVpANnfKPW/+E0xkOvLntqMYpviA==", + "requires": { + "@octokit/types": "^6.34.0", + "deprecation": "^2.3.1" + } + }, + "@octokit/request": { + "version": "5.6.2", + "resolved": "https://registry.npmjs.org/@octokit/request/-/request-5.6.2.tgz", + "integrity": "sha512-je66CvSEVf0jCpRISxkUcCa0UkxmFs6eGDRSbfJtAVwbLH5ceqF+YEyC8lj8ystKyZTy8adWr0qmkY52EfOeLA==", + "requires": { + "@octokit/endpoint": "^6.0.1", + "@octokit/request-error": "^2.1.0", + "@octokit/types": "^6.16.1", + "is-plain-object": "^5.0.0", + "node-fetch": "^2.6.1", + "universal-user-agent": "^6.0.0" + } + }, + "@octokit/request-error": { + "version": "2.1.0", + "resolved": "https://registry.npmjs.org/@octokit/request-error/-/request-error-2.1.0.tgz", + "integrity": "sha512-1VIvgXxs9WHSjicsRwq8PlR2LR2x6DwsJAaFgzdi0JfJoGSO8mYI/cHJQ+9FbN21aa+DrgNLnwObmyeSC8Rmpg==", + "requires": { + "@octokit/types": "^6.0.3", + "deprecation": "^2.0.0", + "once": "^1.4.0" + } + }, + "@octokit/types": { + "version": "6.34.0", + "resolved": "https://registry.npmjs.org/@octokit/types/-/types-6.34.0.tgz", + "integrity": "sha512-s1zLBjWhdEI2zwaoSgyOFoKSl109CUcVBCc7biPJ3aAf6LGLU6szDvi31JPU7bxfla2lqfhjbbg/5DdFNxOwHw==", + "requires": { + "@octokit/openapi-types": "^11.2.0" + } + }, + "@vercel/ncc": { + "version": "0.31.1", + "resolved": "https://registry.npmjs.org/@vercel/ncc/-/ncc-0.31.1.tgz", + "integrity": "sha512-g0FAxwdViI6UzsiVz5HssIHqjcPa1EHL6h+2dcJD893SoCJaGdqqgUF09xnMW6goWnnhbLvgiKlgJWrJa+7qYA==", + "dev": true + }, + "before-after-hook": { + "version": "2.2.2", + "resolved": "https://registry.npmjs.org/before-after-hook/-/before-after-hook-2.2.2.tgz", + "integrity": "sha512-3pZEU3NT5BFUo/AD5ERPWOgQOCZITni6iavr5AUw5AUwQjMlI0kzu5btnyD39AF0gUEsDPwJT+oY1ORBJijPjQ==" + }, + "deprecation": { + "version": "2.3.1", + "resolved": "https://registry.npmjs.org/deprecation/-/deprecation-2.3.1.tgz", + "integrity": "sha512-xmHIy4F3scKVwMsQ4WnVaS8bHOx0DmVwRywosKhaILI0ywMDWPtBSku2HNxRvF7jtwDRsoEwYQSfbxj8b7RlJQ==" + }, + "is-plain-object": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/is-plain-object/-/is-plain-object-5.0.0.tgz", + "integrity": "sha512-VRSzKkbMm5jMDoKLbltAkFQ5Qr7VDiTFGXxYFXXowVj387GeGNOCsOH6Msy00SGZ3Fp84b1Naa1psqgcCIEP5Q==" + }, + "moment": { + "version": "2.29.1", + "resolved": "https://registry.npmjs.org/moment/-/moment-2.29.1.tgz", + "integrity": "sha512-kHmoybcPV8Sqy59DwNDY3Jefr64lK/by/da0ViFcuA4DH0vQg5Q6Ze5VimxkfQNSC+Mls/Kx53s7TjP1RhFEDQ==" + }, + "node-fetch": { + "version": "2.6.5", + "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.5.tgz", + "integrity": "sha512-mmlIVHJEu5rnIxgEgez6b9GgWXbkZj5YZ7fx+2r94a2E+Uirsp6HsPTPlomfdHtpt/B0cdKviwkoaM6pyvUOpQ==", + "requires": { + "whatwg-url": "^5.0.0" + } + }, + "once": { + "version": "1.4.0", + "resolved": "https://registry.npmjs.org/once/-/once-1.4.0.tgz", + "integrity": "sha1-WDsap3WWHUsROsF9nFC6753Xa9E=", + "requires": { + "wrappy": "1" + } + }, + "prettier": { + "version": "2.4.1", + "resolved": "https://registry.npmjs.org/prettier/-/prettier-2.4.1.tgz", + "integrity": "sha512-9fbDAXSBcc6Bs1mZrDYb3XKzDLm4EXXL9sC1LqKP5rZkT6KRr/rf9amVUcODVXgguK/isJz0d0hP72WeaKWsvA==", + "dev": true + }, + "tr46": { + "version": "0.0.3", + "resolved": "https://registry.npmjs.org/tr46/-/tr46-0.0.3.tgz", + "integrity": "sha1-gYT9NH2snNwYWZLzpmIuFLnZq2o=" + }, + "tunnel": { + "version": "0.0.6", + "resolved": "https://registry.npmjs.org/tunnel/-/tunnel-0.0.6.tgz", + "integrity": "sha512-1h/Lnq9yajKY2PEbBadPXj3VxsDDu844OnaAo52UVmIzIvwwtBPIuNvkjuzBlTWpfJyUbG3ez0KSBibQkj4ojg==" + }, + "universal-user-agent": { + "version": "6.0.0", + "resolved": "https://registry.npmjs.org/universal-user-agent/-/universal-user-agent-6.0.0.tgz", + "integrity": "sha512-isyNax3wXoKaulPDZWHQqbmIx1k2tb9fb3GGDBRxCscfYV2Ch7WxPArBsFEG8s/safwXTT7H4QGhaIkTp9447w==" + }, + "uuid": { + "version": "3.4.0", + "resolved": "https://registry.npmjs.org/uuid/-/uuid-3.4.0.tgz", + "integrity": "sha512-HjSDRw6gZE5JMggctHBcjVak08+KEVhSIiDzFnT9S9aegmp85S/bReBVTb4QTFaRNptJ9kuYaNhnbNEOkbKb/A==" + }, + "webidl-conversions": { + "version": "3.0.1", + "resolved": "https://registry.npmjs.org/webidl-conversions/-/webidl-conversions-3.0.1.tgz", + "integrity": "sha1-JFNCdeKnvGvnvIZhHMFq4KVlSHE=" + }, + "whatwg-url": { + "version": "5.0.0", + "resolved": "https://registry.npmjs.org/whatwg-url/-/whatwg-url-5.0.0.tgz", + "integrity": "sha1-lmRU6HZUYuN2RNNib2dCzotwll0=", + "requires": { + "tr46": "~0.0.3", + "webidl-conversions": "^3.0.0" + } + }, + "wrappy": { + "version": "1.0.2", + "resolved": "https://registry.npmjs.org/wrappy/-/wrappy-1.0.2.tgz", + "integrity": "sha1-tSQ9jz7BqjXxNkYFvA0QNuMKtp8=" + } + } +} diff --git a/package.json b/package.json new file mode 100644 index 0000000..7a3b060 --- /dev/null +++ b/package.json @@ -0,0 +1,32 @@ +{ + "name": "kics-github-action", + "version": "1.0.0", + "description": "[![License: GPL-3.0](https://img.shields.io/badge/License-GPL3.0-yellow.svg)](https://www.gnu.org/licenses) [![Latest Release](https://img.shields.io/github/v/release/checkmarx/kics-github-action)](https://github.com/checkmarx/kics-github-action/releases) [![Open Issues](https://img.shields.io/github/issues-raw/checkmarx/kics-github-action)](https://github.com/checkmarx/kics-github-action/issues)", + "main": "index.js", + "scripts": { + "build": "ncc build src/main.js", + "format": "prettier --write **/*.ts" + }, + "repository": { + "type": "git", + "url": "git+https://github.com/Checkmarx/kics-github-action.git" + }, + "keywords": [], + "author": "", + "license": "GNU GENERAL PUBLIC LICENSE", + "bugs": { + "url": "https://github.com/Checkmarx/kics-github-action/issues" + }, + "homepage": "https://github.com/Checkmarx/kics-github-action#readme", + "dependencies": { + "@actions/core": "^1.6.0", + "@actions/exec": "^1.1.0", + "@actions/github": "^5.0.0", + "@actions/tool-cache": "^1.7.1", + "moment": "^2.29.1" + }, + "devDependencies": { + "@vercel/ncc": "^0.31.1", + "prettier": "^2.4.1" + } +} \ No newline at end of file diff --git a/positive.tf b/positive.tf new file mode 100644 index 0000000..21eee44 --- /dev/null +++ b/positive.tf @@ -0,0 +1,21 @@ +resource "azurerm_resource_group" "positive1" { + name = "acceptanceTestResourceGroup1" + location = "West US" +} + +resource "azurerm_sql_server" "positive2" { + name = "mysqlserver1" + resource_group_name = "acceptanceTestResourceGroup1" + location = "West US" + version = "12.0" + administrator_login = "4dm1n157r470r" + administrator_login_password = "4-v3ry-53cr37-p455w0rd" +} + +resource "azurerm_sql_active_directory_administrator" "positive3" { + server_name = "mysqlserver2" + resource_group_name = "acceptanceTestResourceGroup1" + login = "sqladmin" + tenant_id = data.azurerm_client_config.current.tenant_id + object_id = data.azurerm_client_config.current.object_id +} diff --git a/results.json b/results.json new file mode 100644 index 0000000..5375d64 --- /dev/null +++ b/results.json @@ -0,0 +1,27008 @@ +{ + "kics_version": "development", + "files_scanned": 843, + "files_parsed": 843, + "files_failed_to_scan": 0, + "queries_total": 91, + "queries_failed_to_execute": 0, + "queries_failed_to_compute_similarity_id": 0, + "scan_id": "console", + "severity_counters": { + "HIGH": 0, + "INFO": 1628, + "LOW": 708, + "MEDIUM": 0, + "TRACE": 62 + }, + "total_counter": 2336, + "total_bom_resources": 62, + "start": "2021-10-12T12:59:43.666198+01:00", + "end": "2021-10-12T12:59:49.056688+01:00", + "paths": [ + "assets/queries/terraform/aws" + ], + "queries": [ + { + "query_name": "ALB Deletion Protection Disabled", + "query_id": "afecd1f1-6378-4f7e-bb3b-60c35801fdd4", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lb#enable_deletion_protection", + "severity": "LOW", + "platform": "Terraform", + "category": "Insecure Configurations", + "description": "Application Load Balancer should have deletion protection enabled", + "description_id": "224b3c6f", + "files": [ + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative1.tf", + "similarity_id": "6e41b4c14440fc42d084ec54de37649d7dff0731870ba949cd6e5a7308df0173", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[enabled]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive6.tf", + "similarity_id": "0586b1fcf7fc544b156c7f766990df91d44b25e59e367f9847e0be38efae6ef9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive1.tf", + "similarity_id": "00c7a5de0048d51284592f915eedcc9b4f3f0acde8c657d8622c9bc97a76ed12", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[disabled_2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_is_not_integrated_with_waf/test/negative.tf", + "similarity_id": "347945dbe47e4dd647bf7069eaef81d45d804976b3663d456e4e876bba2b68d1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[foo33]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", + "similarity_id": "8e2c4790ddcf078f5ee3ccda51f61eccef8540d1c248ab17c3fb5aafe0f80434", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[disabled_1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive6.tf", + "similarity_id": "1020cc6e107aa3e0f06c7a62da1120481a3ab91e74de9370dc72ce9d5c6a5167", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative4.tf", + "similarity_id": "9b8627cd2f542bfc8cd4c46ce61f9f8a3566cff28b186244cfc929ec8d9bbffa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive4.tf", + "similarity_id": "79107a63984e85c1e602bf9b2bad95fe737e1f1b3e79d473213ef281f81f03f8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", + "similarity_id": "37bc9fa516485cccd6089a02271256d8afcf2afcf3f8e17ea383631c7556c6f1", + "line": 28, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive3.tf", + "similarity_id": "79fe377af1d9a8099b871e93b737e0e49eddaff8f565431ce509e19d4b87d304", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_lb[positive3].enable_deletion_protection", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is set to true", + "actual_value": "'enable_deletion_protection' is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive1.tf", + "similarity_id": "b5df7b7fa7f7822a7387fb9ee48544ffbe128e24c9871fc0a4a999477746d2cc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[disabled_1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive4.tf", + "similarity_id": "f9548e390f291fa2aaf8fe8b9cb58e63ba54a949004008f87c5ee75eb8cb864d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "e1a97baefce0eeb08fbb74630e5bed8f7773d733b83ced9d19b30a38436589e5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", + "similarity_id": "ab2dbfcc0ec7097f3905f2971a280f85d22a09ac3fdf534a29069bf7e6f41ad9", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[disabled_2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", + "similarity_id": "36f76cafe1b909883c7de8d12e50bc280c2b59e189891ec73d382000b8ae06ad", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[disabled_1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive1.tf", + "similarity_id": "5605a2534f408e017b591a2b5ca499cd089001f0f1d71dae13e970d309145cb9", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_alb[positive1].enable_deletion_protection", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is set to true", + "actual_value": "'enable_deletion_protection' is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative1.tf", + "similarity_id": "f41a22332bc00c57fe53adeabed25c7f99b93d89251a1d6ce36a17f22677b273", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test33]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", + "similarity_id": "2e6c1ce04a1d0b42ebdc5020a6ce9b0ac90f37b5b6d72535e22c643cc97a5ec4", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[enabled]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative5.tf", + "similarity_id": "a749007a35221207e5f9c8e8a8166a636abf5e54f9370883f41044fa2cdd965d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive5.tf", + "similarity_id": "e9445c6f8155c2dacf56f8747bd8feb08cf1addeb801a25e238412ba29e24840", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[alb]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive1.tf", + "similarity_id": "20ac402e382fa0888bae94571a65b0f05c9c721ed031b51eaa8f71c710063215", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test3]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_is_not_integrated_with_waf/test/positive.tf", + "similarity_id": "e28effb6d1c26cd009d583dcb96405be6e9bc2f42aac2bb100d2997314f1b456", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "7b1810d5e9ed391821c0fa2bc5aab8bdaa40ffc9ed1bd362ecd15da6c5446fcb", + "line": 49, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive2.tf", + "similarity_id": "637ffc6e1680617cc97ac2479450372317f6df5d5acb2df28ef4cab678f4c1ca", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive5.tf", + "similarity_id": "df08dd37db81ade124c03a36e2b9d4e4eb54a748ad6e68b33b3dbf205df4b7b1", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module[alb].enable_deletion_protection", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is set to true", + "actual_value": "'enable_deletion_protection' is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "1830dce5112123f8856e94cf507209143e25443676ec469084ddc37a8f2bce24", + "line": 49, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[test]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", + "similarity_id": "6d3061d0d0de149f7e52bcc08629463415e3c0a86989ffe81369400188cf3372", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[disabled_2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", + "similarity_id": "c79eae1b40a57e59fa0e322b919ccc70ea09bcc4422e32c29735aa095b6b6b19", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_alb[enabled]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative2.tf", + "similarity_id": "eafafcd9b805eb6442ceb40c1ae54e1e68223a9bc22d397b38a13e540bf46143", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[enabled]", + "search_line": 0, + "search_value": "", + "expected_value": "'enable_deletion_protection' is defined and set to true", + "actual_value": "'enable_deletion_protection' is undefined or null" + } + ] + }, + { + "query_name": "API Gateway Deployment Without API Gateway UsagePlan Associated", + "query_id": "b3a59b8e-94a3-403e-b6e2-527abaf12034", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_deployment", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "API Gateway Deployment should have API Gateway UsagePlan defined and associated.", + "description_id": "a5480b6e", + "files": [ + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", + "similarity_id": "315245822a4dc6f97239990f1a8fadee201edb066587086ba3d0ae1aa5e73b49", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[example3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[example3] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[example3] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "e7cad90a71cb564c2a229023b511c18cb3a94117fdc350d3e8d90d129cd340a8", + "line": 38, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[api_gw_deploy]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[api_gw_deploy] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[api_gw_deploy] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "014887ac8a52789a764bbec5ff9c952c0c99622958512a84d85c2090a7c23e99", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "121e5015a86c3ebf9c6c8b0ce0ec2686edcbbf7b1ccfb6bbd7788ebbc0d433ef", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", + "similarity_id": "0557c925f271b9ecb14693a38bd826d755479fcd9a54f20aaa04070c38b619aa", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[example5]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[example5] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[example5] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", + "similarity_id": "fe046182e3c25d5bb59028a62d80d7bfa82f1f2f01334802556b4d4c48ef6405", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[examplee]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[examplee] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[examplee] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", + "similarity_id": "801181d9fc5f41b964e09afb3af9f3f516cb0ffc5bd734ea02ef41bd3b58355c", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_deployment[example4]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_deployment[example4] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_deployment[example4] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + } + ] + }, + { + "query_name": "API Gateway Stage Without API Gateway UsagePlan Associated", + "query_id": "c999cf62-0920-40f8-8dda-0caccd66ed7e", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_stage", + "severity": "LOW", + "platform": "Terraform", + "category": "Resource Management", + "description": "API Gateway Stage should have API Gateway UsagePlan defined and associated.", + "description_id": "72d08d94", + "files": [ + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", + "similarity_id": "ba8fafdf15c4fbfc8194b4c709d01e767f5ec665ec35df243593b62b45007231", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/positive.tf", + "similarity_id": "7290a4d8d2c7bed78dbea097027a0465cdb6f78bfeacc102bd2d10922ac8bbd1", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", + "similarity_id": "30911dee2e97d890162bae4f3896b7eb7f7833a3b4fb9102f76ef6dcee10d743", + "line": 11, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example0]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example0] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example0] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", + "similarity_id": "d025d9988281a2f1f4e12c09e918f8c6f2197cfd3f4303c5f37b9f9fd8d4af7c", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "a17fa417702ebb855c29eac44ecf5dfe9f0a58878bf82f8402dbff64c721aca8", + "line": 72, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[api_gw_stage]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[api_gw_stage] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[api_gw_stage] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", + "similarity_id": "ede6130eace2da0b1b478ba65c005386911acef1ef358a846e5b22b3d67a7b19", + "line": 25, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/negative.tf", + "similarity_id": "e5fcbba9c9307caa16b33c2e174aff2163e6bfb4d9697eb0301d2c7816617324", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", + "similarity_id": "9dcefcee24bda40bd556195645dd87e4b8a2d76c6b38ad55be3eae13433fa620", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example000]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example000] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example000] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", + "similarity_id": "3278c02e08e01be35d5bdd2e3759d263c62c828e34575336d975961f3acb93ee", + "line": 25, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", + "similarity_id": "d2d56759b8a97d15cb9a54e80e02516c6cc1be6714fa63d00ac6e755d4a37355", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", + "similarity_id": "6c8ecef8f3c058e048123f1a01981e31abf1b8b2785f08d6731b10cc8b8cc437", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example0000]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example0000] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example0000] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "4177c00fe8e290d6685d5f059a2bbbffa018444d9f18cdd3e9767b109a0a4fa9", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/negative.tf", + "similarity_id": "b574b6f19ca5a42f9d251f0ae4a047aca822bdd1058a53886a0a9c4dd9752395", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", + "similarity_id": "364c3a493b69e6ef422f918abca0ecfecfdc8d2d2a4bb07dad11779e1277d37d", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[example00]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[example00] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[example00] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", + "similarity_id": "82bf61396f5968348529fd295b861b8281cf657c2b9d3880b1bba2982902a1aa", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[postive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[postive1] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[postive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "fdb3ad0c037b1bf4d9e6b3b9c0331067d78cf75b3b917f7a6027fe5a7f4a2b15", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_stage[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", + "actual_value": "aws_api_gateway_stage[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." + } + ] + }, + { + "query_name": "Autoscaling Groups Supply Tags", + "query_id": "ba48df05-eaa1-4d64-905e-4a4b051e7587", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/autoscaling_group#tag-and-tags", + "severity": "LOW", + "platform": "Terraform", + "category": "Availability", + "description": "Autoscaling groups should supply tags to configurate", + "description_id": "83cb6386", + "files": [ + { + "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive2.tf", + "similarity_id": "4b64336cb86910fd3b0ec7df632b9c21325b4cc3cf09b79ed6109a9dc54fe697", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[asg]", + "search_line": 0, + "search_value": "", + "expected_value": "'tags' is defined and not null", + "actual_value": "'tags' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive1.tf", + "similarity_id": "e4eac97be633ce885a0622e2a8f446dc9c27bd961fdebafa0202475c3c2df8ac", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[bar]", + "search_line": 0, + "search_value": "", + "expected_value": "'tags' or 'tag' are defined and not null", + "actual_value": "'tags' and 'tag' are undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/negative1.tf", + "similarity_id": "a9f0a7cb5b3de45f09f331b99d7df70d4ad4984fc647de044421fac9b46ea121", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[bar3]", + "search_line": 0, + "search_value": "", + "expected_value": "'tags' or 'tag' are defined and not null", + "actual_value": "'tags' and 'tag' are undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive1.tf", + "similarity_id": "e3d2b17430bfcc7aa31ec8cddede4d099f60b4ce56c137c4a06c4b3157d0aacc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'tags' or 'tag' are defined and not null", + "actual_value": "'tags' and 'tag' are undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive2.tf", + "similarity_id": "855ccf9d37c241f1f932c3a9497082bec7de9e77618541262116e4dce4892f49", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'tags' or 'tag' are defined and not null", + "actual_value": "'tags' and 'tag' are undefined or null" + } + ] + }, + { + "query_name": "CDN Configuration Is Missing", + "query_id": "1bc367f6-901d-4870-ad0c-71d79762ef52", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution", + "severity": "LOW", + "platform": "Terraform", + "category": "Best Practices", + "description": "Content Delivery Network (CDN) service is used within an AWS account to secure and accelerate the delivery of websites. The use of a CDN can provide a layer of security between your origin content and the destination.", + "description_id": "1b311401", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "a50999b453c2a91e688f200ed03da738eaecf52b045e309fbd8362d9ad020f57", + "line": 11, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudfront_distribution[positive1].enabled", + "search_line": 0, + "search_value": "", + "expected_value": "resource.aws_cloudfront_distribution[positive1].enabled is set to 'true'", + "actual_value": "resource.aws_cloudfront_distribution[positive1].enabled is configured as 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "19c7b053e95a18ffd075c07c51db2befd75a489bff933004a81ff386710ef96d", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "resource.aws_cloudfront_distribution[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "resource.aws_cloudfront_distribution[positive2].origin is defined", + "actual_value": "resource.aws_cloudfront_distribution[positive2].origin is not defined" + } + ] + }, + { + "query_name": "CloudTrail Log File Validation Disabled", + "query_id": "52ffcfa6-6c70-4ea6-8376-d828d3961669", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#enable_log_file_validation", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "CloudTrail log file validation should be enabled", + "description_id": "1d528dfd", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive3.tf", + "similarity_id": "a644ff00b637d969d67c1ff91dcd2180accff0bfe3e8857a5a3c25dcbf7711fd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive3].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive3].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "76336683b96b3742355aa571b6ca0cffe892c99f391d70bc92552d4f7c7fcc50", + "line": 60, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "61d53a9f6fedd7bed8f878030a1fda24e3a81cc70b86b7e88a28298e23cebb4f", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[foobar]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", + "similarity_id": "c7fa60d2f6768a67312d4ebb3f9465c8d9ccccff513e840291b467b747e8c0a4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", + "similarity_id": "8d9b7ccb5c82e7f9905af895b1fa86f25da01bb09ba3a9bc30033c6790e9689f", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[foobar]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", + "similarity_id": "008058f43801fa2b8fa1b92a01cc24b355920d7957090072970c42e09a9d017b", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[foobar]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", + "similarity_id": "db916720db93863f94607917068ec869ac3b500271ea13f854ef32d977f7d1e8", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[example]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[example].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[example].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "ce483994d3ccef6e0ac93fdf809153723d388ce73e29fdb8f9d1fde7469fa0ad", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/positive.tf", + "similarity_id": "fdd5821e0c98579b4cf5ee75faa7f5e434a6aaf61aa05a65b4b48090e2d2fd86", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive1.tf", + "similarity_id": "0011f0ca60acd3ebbc298f6f6104fc924841d9246018fdc9ac265262534f1f04", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "79e3be003184d4c0dc2ff15c32d9b826757c1b7645a286d844911749ba528718", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", + "similarity_id": "b7abb2b55853ff94df0666bb3a67e22f1c8169c749044a3f2b65983d42c76341", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive2.tf", + "similarity_id": "75923477f39ba943d5f2649335e245bcfcf85d68630357379d21c9a79db36242", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/negative.tf", + "similarity_id": "1aa5a74fd5e820cd5efdbaf5399c2d67e240e884ab74c98b9b570ac1f030f712", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/positive.tf", + "similarity_id": "29f29b9ca0551f596f5a10c202b23d067a1a0f9cab337ea750005d97bc245eec", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "a670b0a5c796f9c50012b8971d72b52ce7ee766020e7752ef25b0eb561bfe57d", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[foobar2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "ee8ce3974034ba131e8ed0fccd9ac5b8c53b9bc60c5d62d8df65857f543fe769", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[example3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[example3].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[example3].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/negative.tf", + "similarity_id": "db1b16c2d9f79c9c8d68042a82cf6e1872c5a29f6ab155482a9c1dcc3f25f848", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "d0fd62bcc627a4a265dbcf526a93ca11b6a1d60892512ee05dc633f99d4e405c", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[foobar2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/negative.tf", + "similarity_id": "5e3a274b03e3eb27e9faab53b36703bb57917e05b8695a4deffb06b162798f3f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", + "similarity_id": "15206ad120a03c8fd30ddb618bdbb98012dd6a71d949ecf1a073280d2ed3193b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", + "similarity_id": "ff65a715f530ab65b9ebc3247755baf7b51ff16e7e5f44851bc8b1ec3a40e223", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_cloudtrail[positive2].enable_log_file_validation", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is true", + "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is false" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive2.tf", + "similarity_id": "df887b84fdea925c13acd9ae76de9f88cda905b713f4f9286e29e86cdd6a8216", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[example2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[example2].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[example2].enable_log_file_validation' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", + "similarity_id": "6242d5ee925cfc828ac3814c0c30c3ece06bebebda18f581d0fe58b9fda73ce0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", + "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" + } + ] + }, + { + "query_name": "CloudWatch AWS Config Configuration Changes Alarm Missing", + "query_id": "5b8d7527-de8e-4114-b9dd-9d988f1f418f", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Ensure a log metric filter and alarm exist for AWS Config configuration changes", + "description_id": "698457eb", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "28f87bb0f29a1c98757f28b377a63b8314b918e3e975eba584744032c95c2e57", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "2e076476ecf6a3f22f3403f73506d504a9aa9a53db3dcbe75e33baa57313543c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "59b3ec0f7fdd6a31c942cbca94e6a997dfe0e770b5db89bc742842a87d0030ae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "074d53bb2102b9871082ade06d2c663285c0f6bb5105a81abeefa0140282df6f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "c94d127e3ed0c1572e0cf28a3cedf2b8fb012b324f9dcb93f3e255039c4caade", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "b62912d4a0d653b3859e256d083f82e889b2e98094fd55a3b76f6be718577c0f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "ccaa6439cd0fcc70434fc1484404cd2a18aa02df306f5ccaf71ebf8ff702f9b3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "9cd4244c2691de9b6ceadd71653340414d841446960942ea2ed470c136807e8d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "c6333e70a3f9835e5e9651674e5c1a800e6cc512d5e4c9fafe2ff0fbccfdd3a2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "ecefc086516cdce3a07e986022ad62b2df13a5e532fd75611d9dde322ba15908", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "b4ca7a986f97b9b166b0123d5ded78f3e475601365e5a049c061856d2142c413", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "b276336bdf94aa4eb10581351004ae6b00b74a1d0fd7545a16bda080e612f944", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "e412e90921de50cfb66b29448c6363e1e62d2ee0fdf27e1409f1e387b4365a81", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "65b4a94cbb3aa115a625e23a2f15ead1e443255c1aca3c2f69b59d6df5715343", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "a834e8872e49b3a752827b6f04ce83c4b87071401563c99fda0990bb99f92b90", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "0d226ae52afd4ce3df7f683f6bd3b23ef90690958379d349d277cac18f442943", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "44f5013ed83bd2ab95752d150a45c3611566646bf021fd9e07635557ff7f33fc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", + "similarity_id": "a6269e470632414562ab4177408397cce637fc6702d293780458439ec7f54599", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "335cc2a7fcb18aefd2d8fb960bf5ad3a38f367499cbb74a6c0962095525fbc26", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "6ae20fa38ff7e1c97c2d046589a45c6b74c1e4cfd2e27feb4cab66204b930a60", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "a21f8539e1028b57564ab81ef706d0f757fd6668c6a2503c89b67d18cdb2a099", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "65a39bf06af3d685acef8c2b4b109951d483c63160ceb4b14ad591f18d2d6b6f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "043a223432dfa607862f178ee01b5de3523b883150f86c3201d48f06625557c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "fcb8555af68319cd26d1cb7269597c11b88b767f61aec40540a8386a9c894061", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "7c1a73d47fe7dcca24abd8250612afc66acfa873198a6e085cebb2808c4ba52c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "5b5e7e1ce37cb5537749613c15002a89b5cf3afe32fc9e5c013009bb47e4b8ab", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", + "similarity_id": "04e9b1ba138b3afb3a1b7957d5745cdff05d32800d951f884db8eb79d4d09193", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "55ccfdb69438e2f921f85d9574a2f1318cddca42240d17edc1598470342539f8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "7cb19bad2001702b2b3a74a1b88fc09380ca5872b07361f9392586a68c6ea32e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "da6c720072286d021cbe6aaa6a86d316971819c43193bb62f0c8b4373e5d4781", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "b93c9b9f92fd3a703e9cd883479625d8a96834b08fc422dd32e8aa3cb0366cfb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "7529218b0891ec78e6d2d0feed8a28804c6d7362af163818a104f8e9a385e497", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "74671108c5a4c16a44d5ddd213aac8335882d66e56fea9f5a7696474f8055c62", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "f12c8016108020ecab5441d6d6c57e5390f0dcc6b34d8e3450c247928f5b6063", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "2c740cc1300c105688774751c276fbd5b850c66fe6bbdb7a5b53c50a55852b76", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "b1ac557a63053a01dfe8b382280a37ca1f71de8d3f640fe82ce274c307a6c609", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "2f39af1c579386638e083768d08dc27669271bb77159056b5fd8c8e978197263", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "1fcc438f115fdcc4c4754acaaf3b8c2e3dc07287500dccb02ef95b71f4cd233d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "02b8f48a29d1c0e79e3a6089b74518dab3065d8bf653ae42a4c030c284029c59", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "b300a1b2d46e4fd672fa8e71a773e10cea6e61f6cba2a2a13690e04c2be3c563", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "f3e520e4560f6259264fa7d38501fc7cab4bf57ed620c9f8cc4686068ea5e4bd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "9081c8bef2daa3bf24ae285d9f4d95b3653b80569d293493a63aa23dc87048e6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "fa442d97d2facfbb9435046e640ace7af831b786f82eb492e22b8e6da169deb9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "7e1ed3f47b10346218be2a1dfbb39cf5898f221ebd5412ff339ea76dc0e80c3a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "b6d6912628dd64fda3d1ea8577682bc6d077b371854a23a42101eaef09b45b9c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "274df2558ff5ef7226542716f620e3178781b226ed625c035bdff8a951746f90", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "d8ae9645e2c534b4eaaf76fb7ea2af32775d088b36809660c963766c028bcf39", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "f8405e844341b177a1383ebe7b749235ca60b7f03794e34b1f736de35a7ab772", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "9a2adc925423e4ab36d70969ad0a2ca2f12594e9eba011334ae620cca52d6e4a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "0277550cfa8d9f99d9ce3ac56754cf18a58cebeb04279748df8de210d52c30cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "ecc26d71ccc531303fbf652725b25fd84afbdb4b79f248d76ae147e5d8fc5003", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "88b2014ac2f47ac791682cf1c2ca53822d16f19ad6f3dc36661ec01eea55b05d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "4685abb28751888cd15122fa27ee1831636a7da404828faf024befac00e88966", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "a83c37218caccd906f54028f77f80f57c84e3230a390ac238a8a1661c9581677", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "42db9b5953ffd4ce0f43bba9ae43dc47554d7a3030d2df77a3bc68ea0fa9ce27", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "86180f0cd176e1fd3f1e75ac049556dac6016c46ff891fd6081fd0374bf00971", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "7752aa5a9968c1ad337779ea051b4a90c4e14b55f7d948d04ae2b97b6c29cece", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "8d9e5a04a5ba7f75c0b0ce8c5815fdcfe5af2dfe6472403d30fe85ba8ed41f6c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "049693902d84a83a657cb7e204806c9e88c5b57569283dc50648f0d6de07c39e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "55f260444f9b71bfb45f22c8c9d259360fae4cc2679ae7dcedf3d0d860dbb8d4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "1252ead1dc8b9b681b9ec987437bf5dcdf8d73b6621ad11de5276e782da8faf7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "647389548c331aea315d77f17a2ab165dda086d471d294e0e20165f9fba271cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" + } + ] + }, + { + "query_name": "CloudWatch Changes To NACL Alarm Missing", + "query_id": "0a8e8dc5-b6fc-44fc-b5a1-969ec950f9b0", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Ensure a log metric filter and alarm exist for changes to NACL", + "description_id": "0a8e8dc5", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "6903debe27292f8b3c0a424a2597e9be6573dd2cd0aa36fa8f609d48912dbcba", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "485745ba95ec0a8997592fe4f47701ba55225e1b7b694763f2cdb2d9bf173bc5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "249352fc5abd4e080e58c75e6f86388079749c863e45a9ea977c7ee92af10668", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "d93c96fb13ae98878e434649c183d291d26423a361d1d358e2f49ad7795b058f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "65845737215fadc5dd2643d2e8948371b7357d5510a4277e5589df18adfb2f63", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "b92d35e9ded8e4d5ecad815f861f57d208830465e15785a40e449fbf7aa57c07", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "be76d95f00873a3b109046fb88cae8f4f93d356175cbb884fcf716e451cebfdd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "2307e0a5d574326cb23eb9511ccecc35ccdf134d402da6f0950cea9708f24937", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "94f4efaab306065c84eb1c7a9321d7d80254988f1bc7b40fa956e1dcbb9e8552", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "9ae953e7c2a5c4adc7b5ba35f232b0c71774fb74326a594516d16c6a31f5cc6c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "1433a773893e6eab9b5f3641245e35b9c2b48458d19a6cc184ce9fcc82f5a3a2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "9e157e89bfee691e474555ea313473faf0bd400f12c0a7b2c86a11404b83f8bb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "a844b32718ea690fdfd052a25fed490bd355e5aaf2e6cb1fefbbbf15eed09048", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "f9a50789122dfcce1819d1f826db0fd2de1f69ad922b4f01043658a63251a900", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "70b614d2064abcdc579b73ddd4c14539d241e7bd22f65fb2d7d66e3288dca931", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "6323b4c11ea7b1919b4f01d003c81635f415e17bca3be8fa8d4b89b419015f4d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", + "similarity_id": "a7f7e4882e792cdfdbf05bddfb7e23ba51c4838d2b5c1cef1fc88c529b6fb76c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "159d125f26b67eb1859093536e003aa91b0942a199b17811fd5bb4ba66d9976e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "f8b527a9d9be588b6045d24ea1e2d204df7fad8d158f3d1942852784d9c7b571", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", + "similarity_id": "71c4bd33bedaf8b90d98e1fd763d2a221285f1a3d8eae7e6ce80adf4edc62f0b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "7958aee25634b1b364c256b800df93bb8f912ceb42c9eb0fbef45f1749c504cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "05f279e147a429dec1aec7efb2c3b71fcc24bb3533c178fbe5fdcc164cc3f451", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "b714c77fa2f094d9b788b0b01896ff7ef3bdba01611fbebb3b6b098c80b5beb3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "465558f068b5c835eb1f7dcc68bbe5260c4434c283d2ee29f02717d02f2c0c68", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "b281b765980341e64a53da3483b543a1257f16ea3781eb54f786acf9f0ce5805", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "98a798f9e4f69097fdb1f53a2a43e4cf2e259deef094f28faa4ae844b991134d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "2f55fa58ea005a436fbb461a9e29d93d8b48fc41b136dcb19e15f7445ea47363", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "3f65270c622b900fa56da691dc85ad8542053e3f450b0e5eec1afe073dafc38c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "037110ae7740689f8d70973200f808ce3b6df9138fb4704356ac1984a2cea84b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "652229c4fb678aa74cbbdf379ae864e5c9cac99dcd7debc1d7d6277cf64bcaa2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "7a2b1dfd6aaa24a3633d750fde31ecbb6f1f45b8fe0cd40d1843ef1338f5bf01", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "1ff9187a94b9eb1b57a641b399804ed95ec1fa100bc776de6040ff03d2de5ac3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "bf0ac8dcdf6ee7525f7acfee11b66dfdc31b2f59f58a96c26163afdeee105318", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "689986cc262ffd0b41b1ec127317ea1862b4e5712060e492e1343b9bb4b34d96", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "df1ffb23b4fd72edbb9abc58f3cb6a971c69fc9bb0e1feb8fb8d4e1c02c0aea1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "b5cc6bdc84f7c0120c4876348826cdcd0ed29f64d05251de9cbf7526c0086aab", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "12477a036b22810870095fcd2650c3ec463536f7a035caa7446580655379200e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "2672d93331e77df454da295ad66151d5d163fb9c2f9beb9c2ee68627a5ec9b78", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "291299fe4a86c7f6bc03ec8a12bfeff6f0394da259a33ff06649aa9522910897", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "0994a5bbfc9f71c539061df8cfb663bdbc26aff30ca4d96a85046fc47e680522", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "1075895c6e5ca3185b3e7eaa8f67d5b131ddb6021ba901fe4504745c8437eb28", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "5d5c03f6c5810ea5eddde285e6d214b3f96f76c7f6394fcc3c38edf1f00a4c73", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "d5be0cefcc8a54578269bcfa43552d3f786d58d0080173cac06f9cc04958ca5b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "c77a4887f7efc62d54e65bbde23162a68698576fc16307e8483c93eead158152", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "648d6c84aae55e0cf6e43c642c77c539ead27730668166dceca10c2e1b4d7f96", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "834310e001b17c9e3c20b118c28a0cb2af4c75680096b58f75f8a5acd319e517", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "dfdb1caff5bfcf063775e47bc3489fd5d44e1435739e5b587916560afdb72e3b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "dd66f94a42a0e11a06b28d64ef9bacd9ff2c2f4370e75c397aca9e9902a2e603", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "463fa47b5589756f95711cc14ace2b5bbe6735f986ab021434c2fd58388909b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "b3bd5928e92f1a88fd2b79867da95120314d24de8ecd61d0bcac98d9a8914459", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "e9249b9bec36c56155b2a31240e8ce4da6a71583c0795cc43efc7e2f16bbb5b3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "291adb3d12d2527aa0ab1c6352aa4df64aa7bec549385fbf4eded296e1d7e398", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "9aa19a3c50addb7f6e3cd910aa7c0df76b9a95428de4502e189ee9cddd0bc00d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "6764112c98ed214c8fafa07c98f78e8361672d7d8d02e4d2278732cde894aa30", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "feb61d9212b82c4f0a8b26ce2a6732e338bfb30b7ae0958e219a415ab131cc9a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "ba017180f52f3205ac4a95a0dccb8d9ef7b9e91f465136c5020b92f87b67ae60", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "b2046312cd53cb96dbc6e4f03e68813cdb3e45033fc4396e71d50070f65418fe", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "ade7006ffbdddf8a86374dcd4f9e6ba5e6ada45d6680263004f9f458988a2d44", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "d672914d3abe349fae6f44fce8e3207696137b0ef7253fa26456793024f9a399", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "cc69dffa94d82474ed937d70bd84582846c69aea8eb156a0de3e836e4e90da58", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "91a5667d72ba097455047c306e8f1c3fc15aef712396476eb8027a2c12b481cc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "be22f6deefaa0648c755ac4d9df6b693552676b562cdfc0444577f717b75952d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" + } + ] + }, + { + "query_name": "CloudWatch Network Gateways Changes Alarm Missing", + "query_id": "6b6874fe-4c2f-4eea-8b90-7cceaa4a125e", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Ensure a log metric filter and alarm exist for network gateways changes", + "description_id": "aa3e331d", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "3b23051ef50faeb0b44ffe056697c4f9534cfe36ee95a797a6dcfaaca11b65d3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "72eb98c2d2e83856ebc61685892701facaeaf3333a68601d8801d8798585300e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "336eeb58d45806d01927fa831e1e6438b6105a8d1205bfa2edf979b634e61be3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "6948b44813ff70d53b626d93cda53332f572be68cfcfd3ae54a863a7a49a0279", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "f156927b8f94fed6c5d07af2620a53c278441cb1c66e9862b687d8d40abb4285", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "b70fa2bf38bf27c514359c6c451b902be1a348f27688fa6953b6ac537050a793", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "58ac88b9422f86def946c1cce50cee5e86287d88a3ff0e00623dac784a3dbda2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "3b0d523a12cbceffaa4b2e933ed1dc37601a5c2c2ae5ab9af6f04667618a3a85", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "5f041053857cadb0774e8e8e1fa83001df3b204fd5227542925f3d666fd34ce7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "401d4110b6d1657a4db7bfd73f5b33be2cfac98f346667611ab3183e561e391a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "c93f9e28643027830395e95a6e1ec88523c65ae458de2b5d91d372e5f0fa398c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "5fc1cecfaa01a5ba4319bc40f74126209c5f6359c311598b59d4897eb035818f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "74e8c7a5f913805c1c3120cb8ca323b683ad3911acc7e136aca206ba88eb9d10", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "41a04c0d0892ac538682268f35850eca087895a6de3651b0b5c59b5abfbea6d1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "200a8bf334ca6bd48a2cb467bd12457dfe5293079963e67df042f3b562a23ee1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "c142860e6a4720f16956d9089f7335eeb38aff66e9909f2752b36ed7a5cca024", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "874bdfeb4d4c377caad144c24759530aeb9c868e05d9c0395c39cc29788abc21", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "dd840fdc51271dbc29fc6d639f68c8b917687726f23f5568ee9e5fe6830f4e82", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "728fbe9f99d91aadffd4a604026001f54e54afb2f8eb907182d5e5c9ae1801d3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "28be4d164a460322039b32ae22839e3e05239d3384eab3274c53e982b2ea642f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "bdc8427bfbcaf28d8056c0dde93ab3e61f271a93c1fd82286030764f37a11009", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "bb9e798bc79c461d373bf3495826e6d2cf3758a76e83b8d73452dffacced96b6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "632002730849b6dde19e1f95fcedae79fe2b446fd9fe6467fb992c23dad07e40", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "c1ac16b479874f7eb9750f0c4c03848f7dbb2fff563581a3650de74a533795e4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "ac42875da20a5dca32ca257af03c8ddd776bf2d40904f6a730220082933d3f68", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "d447febd06bd32d027b3116466b5e41f4d26975a305b0a8d91afd0ae3eeb10f5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "09f83dc75b82b907d540ba959a3241d2cdc5a9609f59fd95c85d1cb49c4ceaa1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "42a0056bf2810b9f2f23926da45240d646f39dc848e218169fe3554368d36e1f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "7cbd47b5e6bac6df1e7cd8aa2556dc977381dea6c222cafa19f28f96b0694944", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "910ca628294f24f35e935b83e45a9bed21d8dc0df1c648688147f2d5096d63d2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "385f84c9a828eefb9866de2d4ba6c159e2694ed1550a709b05270aa89d9e8d77", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "fcc6c07f8ad7d0d415d6d37c584bc0c1857c4b92e2f1f8d90019736b86042a21", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "665038c4b61988f3c75cb397c06946d787823eff54afa9247e2a87e4d790479f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "8fa4184becce81c1a8712a8424fccbb2209cc32c499b0760be24ab6b7bc36c8b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "b57e7f711e5288c7e68bb748f25ed7ee1c18dad137ddc4700276fbbae4d9509c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", + "similarity_id": "c1dacad7a3b1e22ae90cee4a9acb7b6200d3dda20aded774a0cae23b4cc2c6b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "c9133dba00e783e02621aab9ae721e38c5e2feaa5d023505807b690a8f78738f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "951ecb0bcb86b80de8e2535813e4060a14279914f3d789b4249dc1c569d62f67", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "b945f43cfa089d8ad757d1fc3df7994c9a14023c81e5675df6399276f1e73419", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "85f0cbca7d629baf95da3463a31d11dfa3da24ab7e3899192082661db11cdc48", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "65611ed109b8c52fed5f6ab3c242be0dd510c9fa8a8540ea8c5c7c1c465810ec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "f8cec98b168eecb15f2d691010096a785e33ce6a52dc8ff678a26054b47a59c9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "edabe700b3bad1be302d6fd547c8f137d44947a8030c21d8b83f88c9a9427997", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "c2f89b882f00d3a20fe3181e881758dbdcb5ddd94a4b5f2db2e83542b992b55c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "b44d3211e8ac140ad48b30f1406a07c08f6d5288793756d35fcadf2f8e9fb4f9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "e827f68c19ff9a19243d5f79dce8781505fc34232c31f6eca43071bf4a39aca2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "5294b0970d4ee5046af4bba0608fb620c24a593c168205fdda84100c6980a7d0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "869bb74e042641698a9e7df1675f5903207e1d588ee5babafa72a573e07a9516", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "4a53fcad0c85593ef2bfbe82526e4e172307ea6be50bea5f247f0a6da6f73973", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "6f3127d45094652a171a0cbf10819d296645397d4b641f57fd5535920c365408", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "e5cf9d34b2f053c7a473a6a9fba41d29f512a46e70020b5447558ca25e911851", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "e1e179f493fbfd9c7017ef570dd253f1f8fe9336962af467a925ba875b1e3075", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "5dcb6d07e329415a468aed124837a2bc32033b9a0d0ecf204d41788dcae893ec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "a72df7df02e361991c3a2e11969dc6e1aac724bcd165e201c13be1f563171596", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "36e1ba47ebd74af7a70aae8b49f7afb2702b9d1159e394fc8db8d58d521b4b59", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "84a55b5f1ca8ff66610cf824cb204d5e23484c0166152fc60df88f7674da131f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "ad248dd8fc79b68eaa1ab978d53ddb62242a937fb0a91d57a5365a2468a97d83", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "b7a4fa2b37836d1d5a6bc6406e4ead9f195fc71a15e25af3e36d209c023d4de2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "66bf5935a275d3549a384506e7907a773410fb137ed7a99746c048a889e8ef0d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "b11a7784b2e4e061be0bc6bf6d010fee5af6f0834d07e2dfc0c6fa8a18763d42", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "4270ec6885597c3b4eaa91a0e1718b92a380c2be79d674745d04bed83737a536", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "264d50985cfee37b425d82f87e07d904a6f0df08fbfca0f1fd2ac4173d3918c5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" + } + ] + }, + { + "query_name": "CloudWatch Route Table Changes Alarm Missing", + "query_id": "2285e608-ddbc-47f3-ba54-ce7121e31216", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Ensure a log metric filter and alarm exist for route table changes", + "description_id": "de601959", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "5f4de854b65c2f67683eaac8f6780fa56fb102c267982ce4280f2c30a7910c89", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "3fc8da94a2be9d30ca3cb2f03a6451d5523aaa373521d041e81b29c1889168d1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "8d5792151098a66a1aa429d7ad4a3f69a7d531f30319a36de2acd80d22b6ba03", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "9b6417e4e20eacd7ef4ca63399721bcfcb618825881856e250cf1761294ce887", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "744004275ac12a397e73ad98b64a5cd8c3b9ff618d9a1d4271225e8d02af2cd6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "9010c5d88f95cf61813737a6be3c2343ec1f8e9312edb0fa5e251c5274660ead", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "fcca10ec92cb5db4284e2ec27e6d37a41193111579754c5b369531c563fd8f86", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "dc2ec4c61a39af10312fa4204c06967c8752eb128e0a7efd34ea8eee8b84af6d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "e85ee6b2c7910d2b1e16daef14afd4327a9e7c227f5cf692b59cede6b8e3bb45", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "4408b8fe65e29d894f70352519bcbec360cb750aca4c70480be652167ebc4a75", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "299cfb68d22bef4f83c848a7a4b94304b55a164b3ff29d3bb68a16de33586c6e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "f3f91fa8fbfd3392008c6862290df9f83c645e81667dc99ffb6195f78ac2ebe0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "818879350d986f73b41becddc585d19bc13b2f6fb78a2997d81c7ba2bcf252d1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "ce09dc668248c96186d24abf7905f43e53e0852feb4cd52ca5577d9a72713c84", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "fbff85124c847bf9a5a6cfb847ac2a2cdcee5a7e825e245479504d18d3bf526c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "8768dfa6fd9811f173cfb1db02dd8dfbf1fe6b48af944d6b72f6766fb25f1ecb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "408fbeb6c77dfa85b16efc3671db86f145a24c09266370a0148738515768cd18", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "43479d6fea094c3a706b398ec57d24ac7fdde35bb06a69e762a4822ae4649559", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "a5154b5e8653743c074ead09516866dcde8e4799ea6cbc44b3d5a2b0057be7ae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "a898a7ef8fa71f4da5408b8ad7c78af82528fdbb5c1d44e9d6decdf686bfe102", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "bb67d5d84aab9dafa4b197421386056f13c14b4e6f329b52866157eff061e52d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "382a860570bc6cba4f8eb326c4046c1477bb1708c31afa90afdd32c2a99571fa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "c51474f8a7f6853d09b919fc90a88d48fb8b23def94f563c306623f043af7f54", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "09a16093c3109ee2cff2c98b289325cd8036fb8fc2602c21b1d7bd761fd97550", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "68b9a7df12ce98bb30c54a92eab0424eec55074c704d5d6de565dfbed90f52a2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "d573532eb89d2ddf8a48a7f221f7dac0e5ac26264a33a31f7631152c4c593abf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "3f9dae31110032114c585de5b64363a1c91afa6fec91f56e4ae8c2ea7b444c16", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", + "similarity_id": "8fe37bf227ce3525cd879f89a31a02ea131a25d682b9659205dc0da19992001a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "1346d996ef997a03fbab68e90c6b3a56a324e52af6898509c4fd478888f2752e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "7521c790f8078a7cb377623e783f103d392dfa5fc911e066f989f7ca56ec1c4b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "782615d3c12204944dd01793feb71678fcf038a50d61382f0039be4a0a5a8faa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "58f395815f35e5edeebe7c8ad1bcbcb96a7ad1b43e0805e04f047510f6ebb95c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "54cb927716e2e78f8abe277f1b63e1f261a3b53096935b1394aa5e062af28a90", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "7f2d6e125af065b98c1706512f9592821638c70f7f3193dd45e83d5c58429bd3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "bfc011b73cba3e2415398c442629aeeb3feb435e7757e27d72a24ca43ab56b80", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "85807e5bd8ae70da946d69b52883008be232c84536f9ba7abae56a35b214152c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "4a824d05364ddcfffb9f1519ef230759527e14564a9364f1f95d8957ebc893d1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "8304bb77d73cb94b7dab02387d5f72a42d396a0ea3810b72124dd3e1ea6ad816", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "8a5abde40e2c5082485b9aa07bf9790d7bfc79574fafdd933c19722520cf9522", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "42dbe9c5904dbb08473cd0e66b2c31e3e4efd2aa24f78751eb5f38d9ad46ec74", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "274c213fe5ba284dfe630b901b949ffbc3f5e57c025dd608da1e5f11a47a72ef", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "b6dcb9d5dedf19bdaff7106a5b11c0a2a13afb11240e32247d28afc5818939cb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "3e35a47d4d4d42ff76ea022597476a247967de21f9059c90d00d3e43bd6992be", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "18c17b09f2aea09de7ab2490d8276d36cae7e80f12f7dc248ca1266265662652", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "0dc872dd2c1e46d3532c5031ed8bfb552987ea3001b8e9ade07d726cd00fc26b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "b478f7cc1cfb08f95ff8b2248e9f0072844fcb876ee7f7cd8a452c7f13fde6b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "d418fd73f9e54cd84b5a3861e394348803c5d41935952217d825b9b3beac632e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "24ec9eb2d1b4d2ffb0d4bff6e140b603321fccd840b471ca893b98f2323cd7e3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "c31cd39b7fe08018896cea9dd4abd72fd25f1f10102cd02795827958f562b394", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "9a7a046f057673c9ee9d61cffc4082d8f5f2880b233ebabe0f73b4fc1d746842", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "fbd3e216c154ed0b7d4ef71c6ce0f83fcb9d468c44fc32e61252dbd1cc8a0bdb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "ddcb2be72c6172120455bae21d1a2df73c56337aacd35829917da6351b4b416d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "7d6b5e8b4c7205adb3debafafbe424a43664e9270d98b2333d91d50cc357161d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "be7e0430dd9d7d8cda1fd68465f958c6fa08f92cc543c60c506ed98c1ae93806", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "4e8ac4f969157ba544337ae63db2b05c54ae32f709aacf4ab2e4c84dc79fc542", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "a2845656a46d520d08f05cca7d4e18edf5122da36d648e7f26562f48fb6d1d49", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "c8d228540fd790bc85d4631b3fad2d576112bd40856901e80487aeaeb6b3c4ce", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "16ff25fe1c0d12c809b2513f66e868295448666c1998aa44a5e288b16578e77d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "35b04d8a9f78ff67b42b747ee870db727dac015805c7b4f6e6bc730d09731321", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "9b7d2bdcc84f0d91ee7e17a1631e4282954f1e92381283b7806bfcd120bd80a3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "08bdd5f12695ad3fa4c759e50f952c0264ef5a264f807f8a01d730b8b061fbb1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "9c8ba3055a2aa1d520fd5dc051b959e8d4451b078fc05e8b10a52bcc1c1f9cc4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" + } + ] + }, + { + "query_name": "CloudWatch VPC Changes Alarm Missing", + "query_id": "9d0d4512-1959-43a2-a17f-72360ff06d1b", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Ensure a log metric filter and alarm exist for VPC changes", + "description_id": "6159556d", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "f78c4387e5a3d3c800b90bb179938fa2a00a902a2b6d141629d6710a1a15a3c5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "3eb6be622cd81951dd69546d846297283a8048094af0c466a96999e4268dd310", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "9b12d1e66bc898859bd8d6ca5f91ce8d4c180f298b59708c4a0b90219c565d15", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "93929468076cef9bc2dd1f31dfcf1fcf4407a88c1e2b5b09e9257ef60e9529a1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "aabf760db73489e89f5a362d649bbdaafd55c508c2d61bfcdde07a18da5d6c01", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "fc1773e959a8190b2cd1750a833864aa436600d8c0805ee124d481e7c80ff8ca", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "235ef3c222b16c81d2f1a5b501b998f69d3e8f8e744e828eb58d97c295e52d01", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "71eb4314bc802ecd15f9a58b153e157bb2fe946c263a17a85d5049104aa80ed2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "8075e728d058c0f7f98cb65180beef6636fb788339c58b9699de5c2b76b89705", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "e57d99f09101aa8733a3fcf31c3238c3ac965e13e60c218c808c9bfecd78066b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "62b3b1f39ef150054e8576d5acb9529b1fdecc921a0533c2d4fdfb1a90b1e3f3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "f7f31cd7837eb069c7840749615ce89c4c72a8b3bd7c81a7f3b570abdd91a3aa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "41e1a5a2b98d81369f7266fa736ac8cc4fe4a1f0db99ee2cfa9664eced06df39", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "43da36605491c399f3d009e25bf77db4572ba20c84825b0b296bbe145f8d6d3b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "ca4fb6a5313179fad4fd8afd7a7f467a16f4294ad86b47d17aec972127406788", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "30a647a4997f43851b5e73006547a61a7df8f601850feb1e2812ddf23c498acb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "1f1fdf2736d9401518c6705556d366a07ecff33e4d220715dd1a1017084ee8cf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "d87dff25ea446205eff3bce27baa6083ba82d8a7c283ae9c7aff4f0c15ab0382", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "2d8cb2554affefc7fadaedc282082eb5e12fb635c0dafcb59604355f4e74374a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "f5495de9230c5ad8adccfa79a3f05b27904720b95d2f92a451d356ef856bd5b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "b2dc1cadcc721c30bdd3bd331105f6f10b58177a8dc0cc5a6d3ebe497468aa0e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "8bdea07bfec18400f9f5606ff8c51d4e5205d43cd92341a8c67098d6053d0eda", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "ed47ae20c9b65e049849d6de52d8c98eed9e56cfd5d2543c30ad8fb1d9adb59a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "ed19fd4ba86ee48e3e331b7c7a84a32c69b3c066e89ce86a55e7c2d9ea1a48b7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "3c6a380b65379e454579905cb146839aec504dc65851ca38e0ee4f28a5682403", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "8a11c75c62da0b3e476b15fa285b6e9ab0ab15d7c09ea87c3e8e917c48fe4974", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "1677ff343f734c85312f5271b3b458f8ab35cb5c180cfae65b0a715c7d657b74", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "82bd442524d21326497c31080dfec42cd908fb679e3e4f446ed3b46c07c6ca43", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "5035d36d56444f548960427a10a0b8e19ef36d58c643d75ec907ad4ae0bce75b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "154d640130fa237b2a736372e9e435563e38420c126b43274ed973dcbe8495c0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "72df2ec0c46e40447b2d415f559521b078753f15a77d322688d24c05583810d7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "f8c4b0583d63bb7e1003c39946bb1dee502782d2234c4ebe636784513c2a439a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "0b9cb397e700c0bae275fd6cc0e3a07ebc180761bdf245eeef8d8da348b5519a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "b9ce2007d1ef3f76125e7a6e1fa34712e959a18be2f616089801cc0223c9a33a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "771c92742ecb061b7622dd5a00e156b5336339276bc0a28944e4cffe6328f9ae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "abe8f41d49fac229bdf379fad6145ba95a8ab80a6a841c63e36633d23587c0e5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "19104bd661e8e1a4be741f6db3c057c4d105929dd01d6e652f481af71ba29972", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "98d62797501e521825edd8fd730c8bb014cb23d6c10ef0e93ff1e9ea518e2324", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "68cc9c5e7d311b50531816623bfc2ff99d5e1cda0df1ddee7c3ebc19a73c4cdc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "7a1ec01d5ad2f9c26989664f0dbbc6d0995a015d78192e568f29265eabd8a0e4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "bb5bccf311faeb93a7231f345e83f4a8cbeaa9a502bf5fe09a68520dfdb941cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "d3ff8a30e1a04eebef8b36665c016818c403661f1f450fd89d4af4f030179826", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "3ed651176f008e3fcfcc3b0b44475b6162818db767d56f9757a745a78553d0ac", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "6921930607adf03a8fb84dafaa23cf6e4f01b644538b419d56f4be6da4499e61", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "5f63a8330663349641ae2ba4717ff116c26798b2c2099f2e2a6a3c30f3445cb0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "ea9794bc190133c33f31e2961690fa5369a79e9c98693924f419682d2416d10a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", + "similarity_id": "f8409fef601d328265f9c8595d78f3697966b327198543e1dfe74e564f0f09da", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", + "similarity_id": "4de7ec03f90a1a0ab5c4dc30fca41900429e65318542032631370079069da1b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "4d3548f002c256cb97d6edbcce6c838f53c1c0b959fb32f682a7a262a9e3f837", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "e59fbbaa754ac18e15835af9cc0f983ca3ad6231f9737794f38e8902179c9dc4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "856cd1946e9fffd710aa6544894cf316e7ba68ffe28474326674df86862d18e8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "f02c446f87b5dcb41cfdae80cbad8a1002a652a235976efedb06811c07e4f711", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "28b6b122ca98316681a2ca6434b10b82a3fab327214faa7140426637adf89443", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "f247aa47069ccfe50fce9945e4efa95a157e8c3cf087612ee11458c0a9ddf49d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "933ae9755689363c0ac942297991008be76f532c4f8d67e4514deac1ebf6815c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "d9ea1dbad6228d3ff28802bb4c4befd739ff5bb6b224200420201fb77746777c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "307cbc80158aedd51634508b0b9f661610131d2ccf5c1621e22951fc3ea2c3d3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "0c845d82315f1b992b49ff4940d80377bc165f2c19073e459b9242e532e7b9ba", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "3809462c9f6aa7145329e83e7ae4660c86181907e963802f4762ef092f001450", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "84f8c06f130b93e09dd4785ae74f25512999582d1781a3551da76ba32df96c21", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "c5e252fc71a3990d7f0bc27b8cba855f26a20389fbf0f5890088d66d69c4b2cb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "017ab77d147cfe88489aa58ae9a12e14fc69176d5347d483c9f5c3dd2f2cf29c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "resource", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", + "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" + } + ] + }, + { + "query_name": "Cloudfront Without WAF", + "query_id": "1419b4c6-6d5c-4534-9cf6-6a5266085333", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution", + "severity": "LOW", + "platform": "Terraform", + "category": "Networking and Firewall", + "description": "All AWS CloudFront distributions should be integrated with the Web Application Firewall (AWS WAF) service", + "description_id": "8fa5ef1b", + "files": [ + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "614ba989c920734697749e1246a49e9b09d9db8eaaead0134c48035869e6fced", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive3].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/negative.tf", + "similarity_id": "74e5b1ac6610157f9753860776e3f2bb26aae3d70ffebd5c978f7409c412dc30", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/positive.tf", + "similarity_id": "8fd5d3f1e64c52c665b91ce0ad5c24b1c2d45cc2f59e6689228e64bb22e9a50a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", + "similarity_id": "e61ce49e54b2e99fff2e4d13dec99fbe9f0119c03c3bc1bb122f225e5a02ba16", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "94ce01e7edb2ddddd7727bd1e8b7a4e8d026685da1e2fcb525c4b77eacd2433a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/positive.tf", + "similarity_id": "637892cd770753a39b05f680e94569adb73dd3880e475c7534cc35ddb4413238", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/negative.tf", + "similarity_id": "11112b047d2b794a69d3d92b67d95448f58c3ee5ef592304d70eac0f70bea1cf", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_waf/test/positive.tf", + "similarity_id": "e54b8771b654e3506c1649c60d713aeaeb0cb20d50dc8f79cdbfa23f647436b1", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/negative.tf", + "similarity_id": "3c97a44d4372669f0bb1ade1e55e160643edcc4544c26a6e3baf6cfb0708c45a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "0ed44be96870c83d8f3ff83f0ed56b2cb50a221cf7383abc70b6f41a7ee121f1", + "line": 93, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive4].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "f69b0a30cb7cd2aa05cf24afba01584fdd00ea4d6d83b9123e7590b861bb8ff7", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "decdc872d4373042167414f3eb04e440954c03da7a00298ce1ee45d639f5e943", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", + "similarity_id": "dab7339ffcedf08d0a9f9c035892fb47e421ff6a49ff842ea019c403eb76c012", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", + "similarity_id": "2890871bf4c747cfe2a40230381fd3fc41f94e714278da51418138604a2dbad3", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", + "similarity_id": "b57fcbc3947500adb08854118b601a4fd53312e5bf71d4f3ab5ab04f9e406970", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "c24f3424dcf5440647d32ca99826c718099f0387d6df2a9e5a9b2e585407025e", + "line": 52, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive3].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "3a1fea1ab92c64433b9744422188808531d5d557758d5c3104ea89a1cd6a6efb", + "line": 108, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive5].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "0b651b88654cdeb77c694c5d866fbcfd70e486fc7790e1373c76aa5032205ecf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", + "similarity_id": "651aaca58a1616f445eadc407753e6f5ee3234622043dbc2909e4d87aafbf1ee", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "ea2436a00b727f768b593c8066f78f12ec11ca02aa507a9cccf5a4d51104264b", + "line": 24, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative2.tf", + "similarity_id": "89b11af93e7499b0fdef7ab3b7dc499646c39536dd9ba00131fa1cc95626b97a", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative1.tf", + "similarity_id": "ee07c0db46cda988efc438b430114a881c47629ef376a0050bf7e86104641e57", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "c197cc682669f747680473fc43f47c02634c6f4b04bfde2ed97fd9dd30d7de15", + "line": 80, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[positive4].web_acl_id", + "search_line": 0, + "search_value": "", + "expected_value": "'web_acl_id' exists", + "actual_value": "'web_acl_id' is missing" + } + ] + }, + { + "query_name": "DocDB Logging Is Disabled", + "query_id": "56f6a008-1b14-4af4-b9b2-ab7cf7e27641", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/docdb_cluster#enabled_cloudwatch_logs_exports", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "DocDB logging should be enabled", + "description_id": "7a864a61", + "files": [ + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/positive.tf", + "similarity_id": "8f12796b960e04e4f65cf18cf8cc84471173946efac2720160c616a69e74910e", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "874f5afbad57a39b95efd136528556452f0f9dbb9958976dcdc2a67a884f4723", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive3.tf", + "similarity_id": "45a315e81ffcef96e753ab25c26e9683775bf58e89fbfe041d4a2ace5bfeabd1", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_docdb_cluster[{{positive3}}].enabled_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports has the following missing values: audit" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive1.tf", + "similarity_id": "98893f97db03b6aad45ffa7ae146dad1a7351000186f08255c2461ccb17c40b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/positive1.tf", + "similarity_id": "61cb676a01e8f49da419c2dcc14c68da0bbc4f4bcaa5bb6ddf0f9a281c7d0977", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive2.tf", + "similarity_id": "859e9b8b1bb4442c840d58a5f63358a5cc363ec4dd44f99b377e99e99f60601b", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_docdb_cluster[{{positive2}}].enabled_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is empty" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/negative1.tf", + "similarity_id": "2e78978fbab4c93daa78087d6e937893d52cac0c3c626db8dcb10dbfd4a244b8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "8ecbd41282330a2ab81733ee362b72448ce57bd6cc3d0e4236fc03505f96ba4c", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{test22}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "756b22ceb308d139e2080fa707269acd4e4b9a90219039a8254d47722018c707", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive4.tf", + "similarity_id": "bc3f1b2c18ca435da800633338d7d4cb48a7e4ef20c9fdfbb4aef26b71322fa4", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_docdb_cluster[{{positive4}}].enabled_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports has the following missing values: profiler" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/negative1.tf", + "similarity_id": "38b3732e02cd499832a6b29818dae2aa145c4ccfa32321925deec5ff43495b62", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", + "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" + } + ] + }, + { + "query_name": "EC2 Instance Using API Keys", + "query_id": "0b93729a-d882-4803-bdc3-ac429a21f158", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#iam_instance_profile", + "severity": "LOW", + "platform": "Terraform", + "category": "Access Control", + "description": "EC2 instances should use roles to be granted access to other AWS services", + "description_id": "ffd8ce80", + "files": [ + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "3b9048ec403ca5568afcd7009c62f7818c33de5e3c54bbbc22ebe70b03008213", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "aws_instance[positive9].provisioner", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive9].provisioner.remote-exec is being used to configure AWS API keys", + "actual_value": "aws_instance[positive9] should be using iam_instance_profile to assign a role with permissions" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", + "similarity_id": "1d31d8fd477624e1b2bec35b5f2dbdb2e0a2952d6932d97c9e5accc7e1dc6ac6", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive4] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive4].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", + "similarity_id": "8b960cbb8314ac6223873176945424304c4bdf8895a46b3c6ed31bc27e20c582", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[negative1] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[negative1].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", + "similarity_id": "217c237e4fedb4f26901ac634a77fa3f5a038f77e281e20262c4227a375f5246", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive5]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive5] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive5].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", + "similarity_id": "b25dc52221b54a4d444722c6c1426ea2600b883e3a8902d2103b0ad67cd7fb39", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", + "similarity_id": "f0b088791ecd7665268128f96ce073fe3bf5770caf641d632f5a919cd72bbaae", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive3] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive3].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "66a635b9822727e7f632d75ecaa2e8f433f02707a34b66803d159d83d8c3af23", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive1] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive1].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", + "similarity_id": "2a04a674a6521a4d42415d33d3c4dfa5da68ae752bf96e7e6d63961ed032cd02", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", + "similarity_id": "84d74e39b8bfa3b2d7126265dcd281d632737137db2309bd687414473a055f76", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive1] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive1].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "06b2706778746d1f6a328132e6c8b0d7a591d5e3b7095a553b5f48954e7ede4a", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "aws_instance[positive7].provisioner", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive7].provisioner.remote-exec is being used to configure AWS API keys", + "actual_value": "aws_instance[positive7] should be using iam_instance_profile to assign a role with permissions" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", + "similarity_id": "7cbad8835bcf7c1a276767bfb2f12ecc7c4a82821becc219509a56941c184161", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive2] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive2].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", + "similarity_id": "e172b01cb18ce6733142f2b15df47b8abadc50dd7049712f835b5d4cb8758411", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "aws_instance[positive8].provisioner", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive8].provisioner.file is being used to configure AWS API keys", + "actual_value": "aws_instance[positive8] should be using iam_instance_profile to assign a role with permissions" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", + "similarity_id": "510a8aba1db8ca85d154d119507f1071ca6d17f53c55920ff20152ec51674cc6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", + "similarity_id": "239ad16a6d0ec2682d109bf01a62eee515b0f6402dc6a645e55acb33c022d54d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", + "similarity_id": "4d02e13e7176172a01c31ebe82649c010717abf870eb661d2497a6641ae161ab", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[positive6]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[positive6] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "aws_instance[positive6].user_data is being used to configure AWS API keys" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", + "similarity_id": "50259ca980dd7c2fcdb79a83a03b8b0664db76b63e673184508bbc2b24df3a79", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", + "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" + } + ] + }, + { + "query_name": "ECR Repository Without Policy", + "query_id": "69e7c320-b65d-41bb-be02-d63ecc0bcc9d", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecr_repository_policy", + "severity": "LOW", + "platform": "Terraform", + "category": "Best Practices", + "description": "ECR Repository should have Policies attached to it", + "description_id": "cb9636f6", + "files": [ + { + "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive1.tf", + "similarity_id": "61f8661cbfe9003245484573a2b55043d4746658682994710279d0012ae554bc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo] has policies attached", + "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", + "similarity_id": "fcfc88f5d76e524fe25d71598bcd01ec6e7c8e22c325d32e5f1e2e074223810c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo2] has policies attached", + "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/negative.tf", + "similarity_id": "eecb04681d7dbe9dda52097a1f00e2ad386f4d087eeb0158379b08748bf2a8ba", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo] has policies attached", + "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/negative.tf", + "similarity_id": "7eab93cb1a5b09b51350948962465e8b963389e244438fcc02ea3a88510c255a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[negative1] has policies attached", + "actual_value": "aws_ecr_repository[negative1] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive2.tf", + "similarity_id": "76cc7a9461ccae1d77aabc54d2144139a0b701363a0072ff1672d0f293f9f76b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo2] has policies attached", + "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", + "similarity_id": "ab39e455167805805c4cdb1f557862c901655f74dfc3b59e8e1cfcbaae11a2df", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[positive2] has policies attached", + "actual_value": "aws_ecr_repository[positive2] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", + "similarity_id": "41d8b392ad235c3edc21ad1949cb2dea672f8b2eb66f34c6aa034806305fa8d1", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo3] has policies attached", + "actual_value": "aws_ecr_repository[foo3] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/negative.tf", + "similarity_id": "ecd63d0819ee39da31f410c815a244766cf42f32cfe0cb4c2236ec19db2b3259", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[negative1] has policies attached", + "actual_value": "aws_ecr_repository[negative1] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/negative.tf", + "similarity_id": "92a07dc4b4c5d1ff71a7894317c5ec66fc318281499385282fc6ae148012ee48", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo2] has policies attached", + "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/positive.tf", + "similarity_id": "a3a3b0ddb0c3347f42fbbdd1a3df6a05be7fc4641821b5b94df24172713e7a39", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[positive1] has policies attached", + "actual_value": "aws_ecr_repository[positive1] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/positive.tf", + "similarity_id": "6e70fd5a74b4785fb59ad8ade508ffcb22add60de80d56738dd010ef90d79f8e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[foo] has policies attached", + "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", + "similarity_id": "928eb27755a917965f50bc22837bd086a9720e3a3b408cd92028b49246daea36", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[positive1] has policies attached", + "actual_value": "aws_ecr_repository[positive1] doesn't have policies attached" + } + ] + }, + { + "query_name": "ECS Cluster with Container Insights Disabled", + "query_id": "97cb0688-369a-4d26-b1f7-86c4c91231bc", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_cluster#setting", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "ECS Cluster should enable container insights", + "description_id": "b48a7a70", + "files": [ + { + "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/positive.tf", + "similarity_id": "fd7ce63ec0c27eede371cd75faa44d20b7857668219142aa30643548b1ce7a46", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_ecs_cluster[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_ecs_cluster[foo].setting.name' is set to 'containerInsights' and 'aws_ecs_cluster[foo].setting.value' is set to 'enabled'", + "actual_value": "'aws_ecs_cluster[foo].setting.name' is not set to 'containerInsights' and/or 'aws_ecs_cluster[foo].setting.value' is not set to 'enabled'" + } + ] + }, + { + "query_name": "EKS cluster logging is not enabled", + "query_id": "37304d3f-f852-40b8-ae3f-725e87a7cedf", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_cluster#enabled_cluster_log_types", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Amazon EKS control plane logging is not enabled", + "description_id": "80a41f88", + "files": [ + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", + "similarity_id": "ea23cd17cdc6af671a04d24087afdb603c526339b6bbc49b3a050ce1a479953a", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", + "similarity_id": "9af86bc9ad868c65f393ea73969843547349912266ffaf73998cb7bbddf1c300", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", + "similarity_id": "5ef537c677a6afba218fbb49a0d2912a9ca4421dbd290905794a4fca73d147c5", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", + "similarity_id": "aa38638821da64182ba6325b3108229b568f6fc86d8e34bf4cb54f712ecd3e64", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", + "similarity_id": "12e2f7ef77d7217d1efac4505c8f6ffd3dd1bf7f74da0ea29feaabf853a5cec8", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", + "similarity_id": "474ec310269cb47c2e8c502f9780dd00c88229c360f81bf46098b61de4b09566", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", + "similarity_id": "acf0d6fe41f3ee63b4cdd8dfd44c11daeda14f66851c0fa4a923a108f5f4311f", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "506a86eef7b5f37f51868cd6b50172d6676e2ba4e9fa298ddb40b2474ac12b13", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "7952c870e2b60992948cb69971ebf217cd3bbd3ffa20d1aef570779e7b4c6c3e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' is defined and not null", + "actual_value": "'enabled_cluster_log_types' is undefined or null" + } + ] + }, + { + "query_name": "Global Accelerator Flow Logs Disabled", + "query_id": "96e8183b-e985-457b-90cd-61c0503a3369", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/globalaccelerator_accelerator#flow_logs_enabled", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Global Accelerator should have flow logs enabled", + "description_id": "3670731d", + "files": [ + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive3.tf", + "similarity_id": "5062e9e4c9a1fd516ce32e402bc055890601539522e8e9970dd89b7d16609e7e", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled is true", + "actual_value": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled is false" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive2.tf", + "similarity_id": "d3974b027b3698a009d0c9fad7eb69e174b34f2e530ef08f9025cf0303e21a89", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{positive2}}].attributes", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive2}}].flow_logs_enabled is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{positive2}}].flow_logs_enabled is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive1.tf", + "similarity_id": "7b17dea423272ac3111dd9c1defb6a5cb28358653af1b6766c2571474fbf0289", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive1}}].flow_logs_enabled is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{positive1}}].flow_logs_enabled is undefined or null" + } + ] + }, + { + "query_name": "Hardcoded AWS Access Key", + "query_id": "d7b9d850-3e06-4a75-852f-c46c2e92240b", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance", + "severity": "LOW", + "platform": "Terraform", + "category": "Secret Management", + "description": "Hard-coded AWS access key / secret key exists in EC2 user data", + "description_id": "9e8cbdfb", + "files": [ + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", + "similarity_id": "386eb6c894a751bb4c089aa6904a34450480e1be590711023a2a68ee14da0796", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "module[ec2_instance].user_data", + "search_line": 0, + "search_value": "", + "expected_value": "'user_data' doesn't contain hardcoded access key", + "actual_value": "'user_data' contains hardcoded access key" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "28ca023b3095df8bcdd8113702d7b4e7e6d7565bbcfdf27b4a8b0320b95299c9", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "aws_instance[positive1].user_data", + "search_line": 0, + "search_value": "", + "expected_value": "'user_data' doesn't contain hardcoded access key", + "actual_value": "'user_data' contains hardcoded access key" + } + ] + }, + { + "query_name": "IAM Group Without Users", + "query_id": "fc101ca7-c9dd-4198-a1eb-0fbe92e80044", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_membership#users", + "severity": "LOW", + "platform": "Terraform", + "category": "Access Control", + "description": "IAM Group should have at least one user associated", + "description_id": "c5730db9", + "files": [ + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", + "similarity_id": "285761394d82852ad596055c04de19f70aaf315c615e1076931a22a9073a79eb", + "line": 33, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_group[group3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_group[group3] is associated with an aws_iam_group_membership that has at least one user set", + "actual_value": "aws_iam_group[group3] is not associated with an aws_iam_group_membership that has at least one user set" + }, + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", + "similarity_id": "805610ace38cf5a2e87c2ef32b969ac655106aa0fbfbad6b1dd257dec660c6ae", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_group[group2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_group[group2] is associated with an aws_iam_group_membership that has at least one user set", + "actual_value": "aws_iam_group[group2] is not associated with an aws_iam_group_membership that has at least one user set" + } + ] + }, + { + "query_name": "IAM Policies Attached To User", + "query_id": "b4378389-a9aa-44ee-91e7-ef183f11079e", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment", + "severity": "LOW", + "platform": "Terraform", + "category": "Best Practices", + "description": "IAM policies should be attached only to groups or roles", + "description_id": "32ec58ec", + "files": [ + { + "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/positive.tf", + "similarity_id": "4619351e06f1202125fc936249bf43cd1ff9f8aa11aa8cf5c2aebbfe70366175", + "line": 16, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive1.tf", + "similarity_id": "679e2c76614e5e49869059447940cc5e3165f92a31f48ade26047523c14fda95", + "line": 21, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive1}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", + "similarity_id": "1b1a88ebb0d04ce7b81d092077fc19c5bc8b0adc573cfd58ef281b72f254ad8d", + "line": 16, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{negative3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", + "similarity_id": "1bf8f2601c8486a9708416092f309ea29a76b7cf51ef881d796ba9c7f1b793bd", + "line": 18, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{negative3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", + "similarity_id": "6419b72051973e4c00d7d54b48f55c34c1cfca8bf8c75fd495d41b5747f04328", + "line": 18, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive2_3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", + "similarity_id": "6fe36dca7250fca742b2bd26a5cf6d1f181d7718357d641fe1ce1571b0cf3c36", + "line": 14, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive5}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", + "similarity_id": "1448f6502362444803952fac7aa4babd5c2e85d8bb7978861404a2d1f4c3e93e", + "line": 14, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive4}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", + "similarity_id": "d3dc6076fb6b17fbb5ba5f8c0696525805a43326323500b351eb474286337656", + "line": 18, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", + "similarity_id": "52e90dd603b1b654528c98bd55be8a6165eb0db29d1a4160f5741bfbd7ea547e", + "line": 41, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{negative4}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", + "similarity_id": "b0eec0b0ac66adb9d0af4160872d383af75648d0ef158c475eb861a72bc3d2d4", + "line": 18, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_policy_attachment[{{positive1_3}}].users", + "search_line": 0, + "search_value": "", + "expected_value": "'users' is redundant", + "actual_value": "'users' exists" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", + "similarity_id": "16394178b78c3b4d7fec4930b6a69874934510ee21d280106ef3d21ac31cad5d", + "line": 27, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy_attachment[{{test-attach}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive2.tf", + "similarity_id": "cdaf19088a4051d29f0ebc58892b68aa195bd43b1ff5429b60e07eee8fbb3663", + "line": 17, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{positive2}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", + "similarity_id": "640d8318e35394c2680e0d8a3abda32dc62fc3b523acd771c26346edbe721838", + "line": 14, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{negative3}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/negative.tf", + "similarity_id": "0027672efbb7f9c72af92fcfdb70fde73a68685dcdf81354b5bb5c30d00004ed", + "line": 21, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_user_policy[{{negative1}}].user", + "search_line": 0, + "search_value": "", + "expected_value": "'user' is redundant", + "actual_value": "'user' exists" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", + "similarity_id": "67dc74aaa73e6f5da59f0d8f445dcfd966fd7c16aa365f4b5af2013497a6baad", + "line": 51, + "issue_type": "RedundantAttribute", + "search_key": "aws_iam_policy_attachment[{{test-attach}}].users", + "search_line": 0, + "search_value": "", + "expected_value": "'users' is redundant", + "actual_value": "'users' exists" + } + ] + }, + { + "query_name": "IAM Policy Grants 'AssumeRole' Permission Across All Services", + "query_id": "bcdcbdc6-a350-4855-ae7c-d1e6436f7c97", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role", + "severity": "LOW", + "platform": "Terraform", + "category": "Access Control", + "description": "IAM role allows All services or principals to assume it", + "description_id": "948aa2ac", + "files": [ + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "a8586916c33865b58fdc9484bca98bc9f510eb2858b0a32abf2ca2f6f612b89c", + "line": 70, + "issue_type": "IncorrectValue", + "search_key": "aws_iam_role[positive2].assume_role_policy", + "search_line": 0, + "search_value": "", + "expected_value": "'assume_role_policy.Statement.Principal' doesn't contain '*'", + "actual_value": "'assume_role_policy.Statement.Principal' contains '*'" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "2b9c4a71c4d061182cf960f68ccedd0222857f876febf7fbc615a39d81c230fd", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_iam_role[positive1].assume_role_policy", + "search_line": 0, + "search_value": "", + "expected_value": "'assume_role_policy.Statement.Principal' doesn't contain '*'", + "actual_value": "'assume_role_policy.Statement.Principal' contains '*'" + } + ] + }, + { + "query_name": "IAM Role Allows All Principals To Assume", + "query_id": "12b7e704-37f0-4d1e-911a-44bf60c48c21", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role", + "severity": "LOW", + "platform": "Terraform", + "category": "Access Control", + "description": "IAM role allows all services or principals to assume it", + "description_id": "a54d0d27", + "files": [ + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", + "similarity_id": "c394fc4d53436ed1caef5982a81ff45e0700de56565da09f93f3ab704199195c", + "line": 37, + "issue_type": "IncorrectValue", + "search_key": "aws_iam_role[positive2].assume_role_policy.Principal.AWS", + "search_line": 0, + "search_value": "", + "expected_value": "'assume_role_policy.Statement.Principal.AWS' does not contain ':root'", + "actual_value": "'assume_role_policy.Statement.Principal.AWS' contains ':root'" + } + ] + }, + { + "query_name": "Lambda Functions Without X-Ray Tracing", + "query_id": "8152e0cf-d2f0-47ad-96d5-d003a76eabd1", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function#tracing_config", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "AWS Lambda functions should have TracingConfig enabled. For this, property 'tracing_Config.mode' should have the value 'Active'", + "description_id": "2f90e1e9", + "files": [ + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", + "similarity_id": "90c962f52ea5fed37397420fb45e01ab7d02ee5d6707eb50f951ccbdf1a9e0e9", + "line": 42, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[positive3].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[positive3].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/positive.tf", + "similarity_id": "221c1316482638700a2f8404f25ec36edf60cf4788960eaffbbd4e2cb6e19619", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[example]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[example].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[example].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", + "similarity_id": "879dd6eaf9117579e428fd7c9764df817b53612e481a9701cac2fef30a866eaa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[negative1].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[negative1].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", + "similarity_id": "f9a59c4f008029eb7cafa5be32b4bcdfce73aa126222b82f5fd1795a638f9570", + "line": 45, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[test_lambda3]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[test_lambda3].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[test_lambda3].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/positive.tf", + "similarity_id": "da77dde7226b2785bb929bd0569096bbf06dfed82552a22db0f0269ed02e4d0a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[positive1].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[positive1].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", + "similarity_id": "e267a4abe1ea25b3bcd73fe6c1032c04a2f98c5396b792ad8df4c83c8a554956", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[negative2].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[negative2].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/negative.tf", + "similarity_id": "1ae5ef4c9c9b4fbe3a29775913c97c179493c7fa2056cffd7613d6197a888ff4", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[example]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[example].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[example].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", + "similarity_id": "9c97c2999f97ddefa91676d42f4fc80fa0ece58b5d3aad894168e51b3f0676ac", + "line": 28, + "issue_type": "IncorrectValue", + "search_key": "aws_lambda_function[test_lambda2].tracing_config.mode", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[test_lambda2].tracing_config.mode is set to 'Active'", + "actual_value": "aws_lambda_function[test_lambda2].tracing_config.mode is set to 'PassThrough'" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "c36c67bbf19e43571a3f0c25cd25d8a0d02b75f347310432f0235f9f577dca51", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[my-lambda]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[my-lambda].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[my-lambda].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", + "similarity_id": "4281231e68cfa1f32f1d8548bb255521f0556a0590581b416a20ac4c11449fb4", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[positive2].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[positive2].tracing_config is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", + "similarity_id": "2ccbdaf936a8640323ff8f4571e340c35b10b037a4acecb72967560db09213fe", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[test_lambda]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[test_lambda].tracing_config is defined and not null", + "actual_value": "aws_lambda_function[test_lambda].tracing_config is undefined or null" + } + ] + }, + { + "query_name": "Lambda Permission Misconfigured", + "query_id": "75ec6890-83af-4bf1-9f16-e83726df0bd0", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission", + "severity": "LOW", + "platform": "Terraform", + "category": "Best Practices", + "description": "Lambda permission may be misconfigured if the action field is not filled in by 'lambda:InvokeFunction'", + "description_id": "8fb6f06e", + "files": [ + { + "file_name": "assets/queries/terraform/aws/lambda_permission_misconfigured/test/positive.tf", + "similarity_id": "b8cc9c2cf47dbd3e2763ae84228a73c6e4d8f1b1372d1df2e530bc0ca1a645a0", + "line": 2, + "issue_type": "IncorrectValue", + "search_key": "aws_lambda_permission[positive1].action", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_permission[name].action is 'lambda:InvokeFunction'%!(EXTRA string=positive1)", + "actual_value": "aws_lambda_permission[name].action is positive1%!(EXTRA string=lambda:DeleteFunction)" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "7de0da40985af94826cf7e9ac79ceebe2450d6023499fe28ae74f514e2e60955", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "aws_lambda_permission[all].action", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_permission[name].action is 'lambda:InvokeFunction'%!(EXTRA string=all)", + "actual_value": "aws_lambda_permission[name].action is all%!(EXTRA string=lambda:*)" + } + ] + }, + { + "query_name": "Missing Cluster Log Types", + "query_id": "66f130d9-b81d-4e8e-9b08-da74b9c891df", + "query_url": "https://www.terraform.io/docs/providers/aws/r/eks_cluster.html", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "Amazon EKS control plane logging don't enabled for all log types", + "description_id": "e89d4ffb", + "files": [ + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", + "similarity_id": "29c1c63896bc934cb28fc15f46bd6b5b3e0503472fcc18a0684a51906332225f", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_eks_cluster[positive1].enabled_cluster_log_types", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cluster_log_types' has all log types", + "actual_value": "'enabled_cluster_log_types' has missing log types" + } + ] + }, + { + "query_name": "Open Access To Resources Through API", + "query_id": "108aa260-6dab-4a75-ae3f-de917d634840", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_method", + "severity": "LOW", + "platform": "Terraform", + "category": "Insecure Configurations", + "description": "Open access to back-end resources through API", + "description_id": "13e1db34", + "files": [ + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/positive.tf", + "similarity_id": "b5186c7355c674a759a119eadf0ea62d9e92b31f634d6ecca779fbdaa91e0410", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[positive1].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + }, + { + "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/positive.tf", + "similarity_id": "7fc688aee3afc1726301df553ea23582bd273e8d5da9efcc6c0faad15668d10e", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[positive3].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/positive.tf", + "similarity_id": "a604af7dbec02fc8fe1003ea1b5d40ef5af5f2a992926ff84de55b87cadd3c44", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[positive1].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/negative.tf", + "similarity_id": "e1422fdec41b14fbe25c139e7d3afe1230e677fa2493c7c63885ef292fa8d368", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[negative1].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/positive.tf", + "similarity_id": "428222b967fd3426fb88fd8b8dffe7bea17c413eb467ace7881de81cc32896c0", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[positive2].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "479900699128eaabffa3c92959cb9f0abca3d57479dd45d55385d3f9fb745274", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "aws_api_gateway_method[api_gw_method].authorization", + "search_line": 0, + "search_value": "", + "expected_value": "'authorization' is not equal 'NONE'", + "actual_value": "'authorization' is equal 'NONE'" + } + ] + }, + { + "query_name": "S3 Bucket Logging Disabled", + "query_id": "f861041c-8c9f-4156-acfc-5e6e524f5884", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket", + "severity": "LOW", + "platform": "Terraform", + "category": "Observability", + "description": "S3 bucket without logging", + "description_id": "fa5c7c72", + "files": [ + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", + "similarity_id": "0915aa52adbb371bb4a7488155e4ef394d35f37ed1c890a4f8f12f1f186c8752", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", + "similarity_id": "cc9bf4dae29fd0f2bc32e10d8d92e1912ee7c4fd592b08539b0336d6d3ed22d6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "08d2f1ba393b422a98ae80ecb6474eb1ac6fee1fa8eb9f19bf4510a9296409bf", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative2.tf", + "similarity_id": "81ac236433d26b714167f13fd591d8a3ad06464d31d765fbd872ef39335c3ee5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative2.tf", + "similarity_id": "73d4acf2a493d9205572152fa1ae35fe19df7217bee1c155bdc768f5821142d9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive2.tf", + "similarity_id": "72527cd0cae9f92f3bfe3288682e583b00c131e969c03fd54ffc328f1087c5e4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive2.tf", + "similarity_id": "7d7d60194b30a7ba7c453791434402407a8b6401f1573a70d9fda7ae436f3c41", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", + "similarity_id": "681c66faf22b5e1e1e967afa02622bdafa82545607fe5cf81641b4bc3657549e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", + "similarity_id": "8d0898acec0a1ba12648a3b4d44702f66878f2795166157fd319ca1ca42142aa", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive3.tf", + "similarity_id": "c0d8b47c8bd16658a8446cbeb7146fb7ad4320b8d03b79a4c52ad3ab6ed3b7e0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", + "similarity_id": "d94db8aac11974b9d146f092656796518f48ccce376e51f8b9623802921c7a24", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive2.tf", + "similarity_id": "1dd387eb9dff7e7dcf6f1d587943420283e10d846cf4c193c79f2b20f4d35593", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", + "similarity_id": "03cee6b520cecf1a644965448af933afc876c602f901b1b3fe5c634ffd3d5b67", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[examplebucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative2.tf", + "similarity_id": "6a33cd534b0a399020fec16e495133041119626663561f662edda39679589f7b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", + "similarity_id": "ec018561940182f367feed6138921073f5dac046ba59c870555859e171c83d2a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", + "similarity_id": "8477c4328c2315f099d0ff9e1a0545f9b95393f78c76ad712f7a32e94340093d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", + "similarity_id": "f4c9b343b949dc66ce7458589cc6f5e2462b69bd31ae61a6852fe659270d1114", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "deb195785555f0c7744824380d5fd584f0241f64bd66d3f0ba6b0389ea838714", + "line": 20, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[foo3]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", + "similarity_id": "6aa4bc5549c7e8abc450cf57da0b34bdcae87d5167bda63cb64618b6454e36d2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive2.tf", + "similarity_id": "15c731818a0518c1cbd40cfd9a081f21672f9df569b04f43b6ac5f3ce21c184a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", + "similarity_id": "fe333664110b55936296c58e8f0dd89292300a89cf18a5e08927ee4b6f652876", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive2.tf", + "similarity_id": "f88320680c17805355e0ba4d193f0799d9500db8965342087ea0663b38ae0b89", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", + "similarity_id": "1ed6def5a4f456db5c42e770f725f9167ca4512256e86d7bfafbdb2e6bbf28fc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[examplebucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive3.tf", + "similarity_id": "0f45afc602dc017e4d3d51b3e3d457c3ba3d14df77dadd4f14d41d02b483af89", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", + "similarity_id": "a1787bcb105b7d684f4d275c74708a5f4bcfc9172025de79c7832df2feae319e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", + "similarity_id": "70095ecc46abad3919fe45647a7ef9dbe372e3be0b578ab590add42a1319e82e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive6.tf", + "similarity_id": "9d4be52e420a24181dfb42916f1f7ddaeb7bf4fc86c942aa081684ff48fa416c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive6.tf", + "similarity_id": "8065e73c191fe04b214bcee64205162309d146debceafb9c6f1f2fd205cc4708", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative2.tf", + "similarity_id": "41de94e33d79f2f5ceb94789cb2266dc502f6237b08814d3dc1fa641bcc1a9da", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/negative2.tf", + "similarity_id": "3ab80c87b6a52b8f6ea28304a0aa5e66e7fff00b3f68ab2525ded6bc96be0f1f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", + "similarity_id": "39aaecdf77977a57260bab5f6eb8e175a8835477dc7d6802456ac8153c2295b1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", + "similarity_id": "260607d6f88cba8d3758db9d6c48ed9c9f77675557a600e78751f1a506606795", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", + "similarity_id": "b9c22b6443fb1c72003d54b42ce03b29ab342831be3c8fef591e2069a49bc9b5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[hoge]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive3.tf", + "similarity_id": "1ca1a3389568cd4a212e00b24d6815592d41128a893f4a981c71e409b1138fc1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive4.tf", + "similarity_id": "3b86147e87ac88cd34567124e616ab4272f1aee209abf5dbfbb559d542a1c389", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", + "similarity_id": "d9df5ecb82ba61b3b1f4d11c2a835f8a6d6ec6f2abf72553094a643f9d1c1d96", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative2.tf", + "similarity_id": "b902ca93d0dd65dec9401d421fc8551ce95b9e01fe376fd1c63dc289b49964ca", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", + "similarity_id": "0315960ed11da1920ddcd1c88590284897e8960428dc3f9029fb54c8682a64fa", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[public-bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "ea12bb651a66eb7ef1ef19e1cf74888cf9939eafda0595c20c38733554cb4d6a", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative2.tf", + "similarity_id": "634cb860e1eb17b6b2ea7823138f533ed1de06e73a6f8211630b60dc993dbc2b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive2.tf", + "similarity_id": "ab2c99c73f0517c204ef944863cfc24a334d7decae6a278c026c88c452a4ae9c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive5.tf", + "similarity_id": "2573b12ac2dbdf6ea55ea97db3082db15a486d7874205d3155562eb5a7ce0605", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative2.tf", + "similarity_id": "a3a0615a6c74c17c71e86faab892abae8abe4f564142ad45743549e62ebc95cf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive5.tf", + "similarity_id": "3988d7d4b1e7c3f11f8982e6710721bf80fdadc5b3935de4dfa569440fee00c7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", + "similarity_id": "9aa262582ff7169dd37bf14666416bfcade926adf997a9cb66c6f4a0b3b215f1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/positive3.tf", + "similarity_id": "dbd6f9d2ef166a294a9716425ae89bd7dddccf9dffeaa1da594f949bb8664364", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "7d7b7fdd970ce0417c7e568ba68c96e67b301cf998d8da975cee54d95e3fc0f5", + "line": 69, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", + "similarity_id": "01ebbbc0814026249abe28d344f7c9685a2cfdc3f7da904b04ac5e81a331e3ee", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", + "similarity_id": "b75cb331e1a12cb3c57313e105d1fa3f18fd95336be85b1461eca2ed3c6ee7fa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", + "similarity_id": "d7807cdc2179397472f3afc58aae2b649abc46bc9dfc91f467d4565b86b4d6e7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "6df8fa568d393e4afaa9ef9f0c68db065e79edd30269354a4aead732b78351e5", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", + "similarity_id": "daabe0b8ab0b25989d23980f116645dd15ffadafd6b2dc87f3425040fb3a765f", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", + "similarity_id": "54bb5a2e86fb1ef979a54344d1cf84af0d3b3d2db5333e2c93b8558c353b56e0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", + "similarity_id": "d4ebc6b252560b21b287c3cf9dca6241be0c4212d96c66d3de450ea9d5cfc32b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", + "similarity_id": "c9797a7a687eb64048e7a67e177250875cafd9d8f20ddbc2ec911cd4997b1e47", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", + "similarity_id": "ac31511dfa5fcd27c24e6785143f4b997d3f83d0f29c58c4ebf6f2d112722f39", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", + "similarity_id": "9afe4fd52fb3e57d863b9c43c4a4053017a8f750cb7cf082d48adf1dbbae8f6b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative2.tf", + "similarity_id": "023e1312fa46619b8e401bb8088657f70ae7eecefad946566e4b8e3131c9f649", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive2.tf", + "similarity_id": "6ae7fe45f53495b56d1bbf45cb61f185bac67a03754f0d69115f9590a86449a0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", + "similarity_id": "39a30aa9b09b75a2ecbc508760f6e68d2f1757a70463a061137ded98c0520842", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", + "similarity_id": "8eb933ca43156e90261b896b7b181596e56a174b61d7c73af3c785f2f91cb298", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", + "similarity_id": "8e16d8e4c29e049641699297906e71b844137a471c31f72d5bf8ccd0ad39f936", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[public-bucket2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", + "similarity_id": "0dc544083130ec1fcaa0db8fc0ff334ee442e1b65fb7258ccb5524d2e344cb19", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive2.tf", + "similarity_id": "4e636d1f97e1f2cfa3c0db39a86ab833e2048cb602cfbeed5e69db546ec480a6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive2.tf", + "similarity_id": "b6bd290c669cc5a290e14a6f8b13e94c800b12fdc5f6c8b274be7b20cd820d43", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", + "similarity_id": "9dd31e0d0c17a9a1f42e674d7a6266d0f295a080ae9db3d008c7082a7373b7e1", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", + "similarity_id": "6b7e683a6c4ad57226d6cccc8a3a3567cda15bee638dfd9ec532f55416de9a32", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", + "similarity_id": "4fcfb8b719aa40a89a931533f00d6c1ea7e4c9b56eb2f4db31ccc1e25f68cf85", + "line": 19, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", + "similarity_id": "7d1fc5e13ce4debd7e306fd9fd67af6f8f9f1b6d59141b6ac4bc8f2aa77a9c0a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", + "similarity_id": "e3c2491f7b9e0558bb0dfa1766243416afcab98ab4414eeba9294ac7dcbd5a5c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/negative2.tf", + "similarity_id": "37d1f089b978b8f000c435d2c195ec194ff7d1e9e7b9b918a2088dffc0684de3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", + "similarity_id": "ebe16727aad9266db3881f15d4683c3b9459db73ec614e6522c4a339c6fb092b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive3.tf", + "similarity_id": "00bafa01ec47e3a3437979f8b1ee6533d0b82b65bade3a2c5d08fea5954acbc3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative2.tf", + "similarity_id": "dce28f927cade1cd6db83ea98553e0cd9b206eaffd6dbe2691c32ed5b2f0e189", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive4.tf", + "similarity_id": "03c6bca4573b6e5586d17b38878736a0d6bf7dd4f7fe15f1e6636c2eb9b7f8a9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative2.tf", + "similarity_id": "4c100307872c0e696614334030b726cbcc9e07007b32adb684669ee2c8e6e4d0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive4.tf", + "similarity_id": "067cbba611660ee39e3093b4de55bb6630a896f84eaed9e1bbd39f08c1a15470", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "f56a895cb2703452e851707aa1ccbff17f64973332310afebeca0fa063435156", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[log_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", + "similarity_id": "56321e63cf9bf7e585aa5b32cf746a9a472182a42179f5b6b44a7168a572eff4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive2.tf", + "similarity_id": "1eef054ca8c0cf3fb61e3f544cf8969bac8ec118b1e1afc953ac295797341989", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative3.tf", + "similarity_id": "b2be7114050039888ec68b11df402591620cb364530d1469ab8ea385dfe3cd98", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive8.tf", + "similarity_id": "d0e495aa3e76a7f477c0a16fdbb23d9529908c14b369d9b4008be62691f0445f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/positive3.tf", + "similarity_id": "e46490a206cfeb7922bdcb6de0cefd97494201d0b0b7a502a610951ca64b08d0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative2.tf", + "similarity_id": "acdf13f0aba1f64a6ec3cd2c5d0fccea45bf730ba0644c3791ac486144b5d9c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", + "similarity_id": "bb0a883ebd72676d1d7eeff73de387ebbd2ea56e41ec1e9e1dc8fad88fab7d34", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative2.tf", + "similarity_id": "96a715108c28aa063a3696d9d7187b18203b780a99306c68943a67e88000dcd7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/negative2.tf", + "similarity_id": "17ab3cebb90e1ac64eea3309d43af7759795bdb7060e7d923bdf714b12d8a1d8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", + "similarity_id": "61150f3e4862e130dc7225977347f17fafbc02f909c47585010fd36073e56f4a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative2.tf", + "similarity_id": "4d142c7a002de3bccdbd4da870de9247d5b64df77923b7c77e3fcd22dbf2e164", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", + "similarity_id": "330d36cefe4844ed71344daabb7dcc6706ba82c35eb00fea6455445352609767", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative2.tf", + "similarity_id": "51f3df7d783896f1cf3b10f737d51a336a0ff74579aacceaf3556661e1168620", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive3.tf", + "similarity_id": "0adb6b9837255be0951c00d3718d8d7846144ff58a9467ff49600f8b01ee4711", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", + "similarity_id": "0bf0e1e971097873aae8479f04d743c4ba60023a97252e07a71d4012c187bec6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive7.tf", + "similarity_id": "1449495796406077b9f7f690f44a390a6e6a2d6bca2fb0d53761d4b0d58830c8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive2.tf", + "similarity_id": "e094d4e7d171f8a25830bbf4f7b3a95b6e337408d8ce41eb39ac9393d28769ec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", + "similarity_id": "966c610ebfd12af0d920d1b8b166631b63efd91220d0d3fb96823f87f01c1b2a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/positive3.tf", + "similarity_id": "b04a5521901963ceeb3e93a2ffad00547327f2a0e1b822b7414263f7e30a31c6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", + "similarity_id": "e272197b04b7353b2be59f77993911d206294ffbc1420751b9bed03c130e53d2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", + "similarity_id": "06c253e54a7686d7d133993da0083c138e9278b226dde197bade410a3f53c0eb", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive5.tf", + "similarity_id": "742b12b99176590a7589937d6ef5c5472e1aec9e5ec957a85b3de0bd12b72fc8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", + "similarity_id": "3c4fa30a384038c4cad1c1b9376fa405b809672d9197a5b5ccb25f8e847990a2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive3.tf", + "similarity_id": "743b530244ca7c8a84ac4edf504ac3ddbb12ab46ad4c8ac07538a22960b80da8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/negative2.tf", + "similarity_id": "3cf673c5a977f281054d6d4156be0e7596da5f884d4f0e395276c8e7b90d9ab2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", + "similarity_id": "b5e83aa4afb5444142b4f791cdc2bf09d76595e2731815e1b6aef6519fa4b7b5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive3.tf", + "similarity_id": "ed137e59345e2b22f2e276ce551e52704fc4bd48cd3659533ebfe9d869054941", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", + "similarity_id": "50c0f28599265a6084545cf5ecdb8a168a759c9bc1d1416a171767eeb0fd8de2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative2.tf", + "similarity_id": "fe6705cd4526a5ef249287c724128ba030604f3e06dc2a98fb29e2830ddb97e4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", + "similarity_id": "aea43cd2159af3ccc0a42473849b9253a35889663cd42c48ed64ba235e9e457a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive4.tf", + "similarity_id": "7ce19aff3cccb4db66e6bf98e01f3907da2ea7cdee5a39fd031a9e91aab33ca6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/positive2.tf", + "similarity_id": "6542f539810975fd03fce457f6c126b121bc275fe28708e6015436cecf39d9d9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative2.tf", + "similarity_id": "c217babd1d0774280821f86c9a119648c254964ebd695e122c9d24193ab93348", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/positive3.tf", + "similarity_id": "18f347bba0943b04a2e48e68db2da150081d0ccc8416735f3887f1ae976b48e6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", + "similarity_id": "7092ea9109a6c514ed12b6a4dcd850fb2fc453a495e7f36f7a2b3a1e78af98b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative2.tf", + "similarity_id": "e6121dd5493655a20f002518e02c3e55f3eb943250e7245b0e252a9a77a508d0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", + "similarity_id": "941c933f29b056495bb058522503c56a5632faab1df651c74ce5cdd153808087", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", + "similarity_id": "42beaffbf742cd3f21e9efa2585aa345621a52a8a25b4b190e2b6f2a4875d8c5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[hoge]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "be9044d72e3bdf08621a66a937a4986f6c27abbc00f0f153241cd00731a2fd49", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive2.tf", + "similarity_id": "e41aa28a2426f4eafb157734d27c9df647e58fc424bab89506e77e9be3cbcc93", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", + "similarity_id": "d6894906f876bc3344b4f5a3dff58286f2532322be0234814ed4124f556a2a0d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive2.tf", + "similarity_id": "15108fc8dd8d99782c479ec16bac84ccc0297ed32cd61e66891151cb974a9092", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive6.tf", + "similarity_id": "ef3e4154565720db79a1b6164fea48d1de681f7078cd5da14e617d4be2b2ba38", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative2.tf", + "similarity_id": "26278fba0f567aa336d0ef2bfee84346f1e43b5b037575d888829a85cf62ea88", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'logging' is defined and not null", + "actual_value": "'logging' is undefined or null" + } + ] + }, + { + "query_name": "S3 Bucket Public ACL Overridden By Public Access Block", + "query_id": "bf878b1a-7418-4de3-b13c-3a86cf894920", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block#bucket", + "severity": "LOW", + "platform": "Terraform", + "category": "Access Control", + "description": "S3 bucket public access is overridden by S3 bucket Public Access Block when the following attributes are set to true - 'block_public_acls', 'block_public_policy', 'ignore_public_acls', and 'restrict_public_buckets'", + "description_id": "aa9967ef", + "files": [ + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive2.tf", + "similarity_id": "70c4308ef7d7d89ef019a60b350e28a0cf7c43e4faf5a891bfa62c5dee98f721", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "module[s3_bucket].acl", + "search_line": 0, + "search_value": "", + "expected_value": "S3 Bucket public ACL is not overridden by public access block", + "actual_value": "S3 Bucket public ACL is overridden by public access block" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", + "similarity_id": "63e90b0b56709120009dab93e51095797b39bce1092455cd41fcf56e10db417e", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket[public-bucket].acl", + "search_line": 0, + "search_value": "", + "expected_value": "S3 Bucket public ACL is not overridden by S3 bucket Public Access Block", + "actual_value": "S3 Bucket public ACL is overridden by S3 bucket Public Access Block" + } + ] + }, + { + "query_name": "S3 Bucket Without Ignore Public ACL", + "query_id": "4fa66806-0dd9-4f8d-9480-3174d39c7c91", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block", + "severity": "LOW", + "platform": "Terraform", + "category": "Insecure Configurations", + "description": "S3 bucket without ignore public ACL", + "description_id": "28aa7150", + "files": [ + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive3.tf", + "similarity_id": "46421a142917c62555a69bd425075d2431dc40f63b57eaed61de4282be4e9758", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", + "similarity_id": "9b3730e745dc2f4baedc0855136a9ac80ad27367d6982c79646e1360bd3ef900", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive4.tf", + "similarity_id": "ab2e0b6739193c438e2bec7cfb8295e3ddc27e60ddca4e60dbbf9ac10a375837", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", + "similarity_id": "bbb6913a9203d9970df63e616286f66d320ef7b21afd69dbf55c54cb058c4df3", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[negative2].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive6.tf", + "similarity_id": "09d8ef7cbf80f91167e216be04a4354c46d652cc67b81ace9bc2869a692242c0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative2.tf", + "similarity_id": "3824f67d6190058404e60d9067d8524a7095f909383225db6476cba83d06f12a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive6.tf", + "similarity_id": "9174f3924a58fb4a5e0e51cf61a8a7e1accd1ead1097aa46f22b8d1b2bf72684", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative2.tf", + "similarity_id": "13c92f771db0b436736f34566562ab99b565d1e3fb37c16828c2355c1664a845", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative2.tf", + "similarity_id": "d1be204edb752c652abada7bb3bf5a891cd2f73d46bdf04b7514a466bef544ca", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive2.tf", + "similarity_id": "82166a5963fef238452e22e78ccbecf9f44dcfc8cb365d168c9a386c673df9ee", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive2.tf", + "similarity_id": "794e073f1b34dc13bfcff4a33fbc7ddbde933949bde0a8d263c07ad605742c3f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", + "similarity_id": "4062d0be8cd3e56430b79319928ee478dff050ece61e0917128e0786e578a842", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", + "similarity_id": "7106bfbd12b4ac15bbab4f3e09a6bbeb47f9c24c80f8c091c5acd822f35c1e74", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative2.tf", + "similarity_id": "c7a17f5acc8732f5d2692e3976d9bbec22c92166499b29fb4f1427b1c9c3fc6c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive3.tf", + "similarity_id": "60feebd225a2e753aedf60fa974036449c7c82a1ed00d670e5a6762b2a555358", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative2.tf", + "similarity_id": "ad20c8b8f6408498969d99b0901c9163cf047cf5c9fe8519a6dd87aa9401ed57", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative2.tf", + "similarity_id": "8310782747aa887c900fed4e72b880cd75596ff225156d2cacc2d237ec50f386", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative2.tf", + "similarity_id": "58eb8cc22bc7220f84cb1c98bc138f2f15a8756753b41591f37bda9c9e9b0b6b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/negative2.tf", + "similarity_id": "95e3596c6feb4929ca5c1e770bc352cb378a6b4ef8f8b970f1c9c7baa6da4960", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive6.tf", + "similarity_id": "ee4c600881beb53931b0bcc4dc9081b082c25db3c913c9d8f02f17c2d35403b1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative2.tf", + "similarity_id": "868ca309ac1af951565c615b30f5cac4ce0590914362962e9296c8456cd00197", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/positive3.tf", + "similarity_id": "55584d5e8a2c97650335e12d11ebf447fd1be8adc3131c376c0332f9f6dd0264", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative2.tf", + "similarity_id": "f2c4d02711c31d8064e8541b8d3c0cb497028ed9350d68ce9c5f4571ca9889ea", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/negative2.tf", + "similarity_id": "7e379ce70be7be1e2cbd2535423f228298d35d5bd4af08895ac1407ead5ee67f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative2.tf", + "similarity_id": "da28b27e0b7d31f2cb89e87424f70bf3ca3400a98eebe923ab5218f16d4f62ae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive2.tf", + "similarity_id": "969d115e069f3f3d8145b70c18b6aff6cc3106df6d0b54f1fbeee95fa9a73b26", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative2.tf", + "similarity_id": "5f0d481638563d43ec8e0c780389a129fff129f5e26da6cc5db65822ca32f4e2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive2.tf", + "similarity_id": "3219ae66520350c5f684706fcee073780c38002c544c741cd7fc2649f4623546", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "module[s3_bucket].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", + "similarity_id": "7915d61527e35dc8c02b27663bf0c4fabbbf951e906c955538a1b0c5145f21c3", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[positive3].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive2.tf", + "similarity_id": "5ff8e3d899ad48e8d9b12f045e457008c6a09c77d588d771483bf9a72a1fb3ae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", + "similarity_id": "a6a39dffa872be079622c039e04e4399055074f295f5115d6131860aabcf210d", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive7.tf", + "similarity_id": "67a9b1e5e52cd2bdd4ad70c8e4add2038d9b687e32b874fb2b71fe5e919ca4c8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", + "similarity_id": "b0be2bb527fa9103cf66ef9e13af23feb65108f02ca4c3e382f54e36278fe67e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive3.tf", + "similarity_id": "dca212d4ca54b5f4e97e4596c5f1757644c374a302427e599af8d8a4d4b0f62a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive4.tf", + "similarity_id": "24bed4e79074a0732a976b6867b5a40c6546724e2c8ab94d030e14f905610389", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/positive2.tf", + "similarity_id": "93c1e82d98d27ee2b2a3f31855d00d9a2e6a6e581306e8ef0780d8d4649bcbce", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive2.tf", + "similarity_id": "a986fdaeb3dcfa6846a75b3c23c7e67f33af01504ea398ffbd9a7ff0937f0228", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative3.tf", + "similarity_id": "af2a1e63a149db3a47500c6fc17e68bf8177fc49650e64ae55b9f01c7abf88da", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", + "similarity_id": "44e9de13fc33ead4f07ec60f220945bf3bcd413fd02bfd6888cec57abe58f37a", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[negative2].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/negative2.tf", + "similarity_id": "2d0e65ee6668f306d2b249ac87480b41e7053e68ef8c8030bb4ef629819ba5bd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative2.tf", + "similarity_id": "f471149c7d3ba246caf92f1d9195ebbedf8c6cba384331a458bc76b95c0fa3aa", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module[s3_bucket].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/negative2.tf", + "similarity_id": "cb92fd01a9cd35a3b9871353a86e970ce81c493ca870e685ec73ecd2faa21833", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", + "similarity_id": "e1aac6701373e656b46089f104a5419d540040231f98ab0d750b6c9f072c9325", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive3.tf", + "similarity_id": "4a3841fa0661203dfcb2d1cd254a9aea76f714695c44906f6907452f4f45c471", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive2.tf", + "similarity_id": "d458ca77a0c782aa5495c09c6dcffbe5a51522dc6e8ec1d9425077025d4fbc7d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive4.tf", + "similarity_id": "4491a578e416b4b72ce8d82ce8baa604d2633066aa2bcbe4067f72cb8115ca46", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative2.tf", + "similarity_id": "e5186d764509a91f4ccfb9b0913f0fc03345eae7bb18e8b9a45ebe36011c0da1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive5.tf", + "similarity_id": "954025b9ea01b3d8ad931ff920a1f73f15ad3991aa150eb8f226709e4d96e0ef", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive2.tf", + "similarity_id": "04d55ee345e43ceab854131a8805981009efa627ccb4192b0e0160a68b4c3d95", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", + "similarity_id": "deeff4aa803636a318fda9ade59e079b385cd016936fbb3a84a7238c7df82fdc", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[positive3].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive2.tf", + "similarity_id": "d86c04f2694d542fcced31feeb3dd8b71adf2af7af7bf9fd1187c7d4114f7909", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive5.tf", + "similarity_id": "fd19f0ed6d25e208608a32ec7b9f1d6cbe755a79dd68a69402b3139436833e6b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", + "similarity_id": "0d4d10d2c9b1631c2ca6ae5b7ab45b7bd93d55d640cc9d2fe881831e3f4ac704", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative2.tf", + "similarity_id": "00ca0ad0f80858a9ce1ab151d3017bbb96bde0b23398af857cab5ea4619314c1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative2.tf", + "similarity_id": "a143e24e718793a6d30b701ee30d0565e121b76ec6b809ce2b583b274747984b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative2.tf", + "similarity_id": "02257d32562ca2c3cd49816be4ea43e120b3e8c0e7cf49ed49830e622581efff", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/positive3.tf", + "similarity_id": "872ea1aecbf4506f275290b372bf0766832dfb09cfac56fa92ab7a62ad58253a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive3.tf", + "similarity_id": "606055c45c823870617251e820a02bff2fb6ba107fec0fc102a01d18cd8b782d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive3.tf", + "similarity_id": "d1cd614971c2b066cd8459ee0fcaf457ec703e1102301743a0e67045e9a35e84", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", + "similarity_id": "b033cb9f3871079f45dad2fa67a95c1b430a81c31954e934685a5c62ef616c82", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[block_public_bucket_32].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive8.tf", + "similarity_id": "2f92339539f4383b59efb26b0987b4d8a98d67e6876bacd5ea73f95a0a625bc8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/positive3.tf", + "similarity_id": "9b9f3ac357876ef050cd9fb45dd51de920f907417871ac7ddd0f811acfe7fdea", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative2.tf", + "similarity_id": "9603310a73bc8985fc6ed42b81aea4af36b5e5754731d2b8ea7d62d660df2104", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive3.tf", + "similarity_id": "8453bb65582e3eff5468433f889fae03e0e6f864321f5c31dc2a134975cb7aa8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative2.tf", + "similarity_id": "23022d71ac08b9b9136a5fc1934be199ca47267ea5cf57f7765568d83bd0c239", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative2.tf", + "similarity_id": "fbda4c542c849c120c0509bf0b1a2ded8b21314642c6ffc12e706a208c1ad7c9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive2.tf", + "similarity_id": "8538a926a7315f20bd3564b8f86bbb46c1dd3373ded43aeb6ab7c6dd62b06b74", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", + "similarity_id": "c53add7236bc0318b9e19672762b2b207608ff85a6c0b190a5759770ba4cb617", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is equal 'false'" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "aba30c7598affff9a1359c4f720505eab9a84724f9ca16126b72c5db08df3e9f", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive2.tf", + "similarity_id": "552013651b2f48918d034ead4caebb9360d5563a002861d8bc1390c19753c692", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive4.tf", + "similarity_id": "9cb27d9f6150cceb8b56eaeefaa9688cd2dfeb4adc9f6572b691b5ee726128c4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive5.tf", + "similarity_id": "7681d963b30a63959ab466ddae0ad90fc4b1340b5d1ae8f24a801fff9321eea8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/positive3.tf", + "similarity_id": "9a0b8e18b53794db1e2ce776a22ed89904f84b1daa080e83c9fb93059e6329b8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive2.tf", + "similarity_id": "75e30c83f46a2ac3a6830125984deb7ce8608dee361a6ebc8d078ba95d5c5608", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "'ignore_public_acls' is equal 'true'", + "actual_value": "'ignore_public_acls' is missing" + } + ] + }, + { + "query_name": "DynamoDB Table Point In Time Recovery Disabled", + "query_id": "741f1291-47ac-4a85-a07b-3d32a9d6bd3e", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/dynamodb_table#point_in_time_recovery", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "It's considered a best practice to have point in time recovery enabled for DynamoDB Table", + "description_id": "205ac3d1", + "files": [ + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", + "similarity_id": "f03c038717719d4e52fd0afe624a281d49dfa0075398a0587e3cb73c1006b47c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", + "similarity_id": "74c6bd6c5318eaef60b3105fe86a3d0d2d9aacc51dec5e05b090058ba4634947", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}].point_in_time_recovery.enabled", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is set to true", + "actual_value": "aws_dynamodb_table.point_in_time_recovery.enabled is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/negative1.tf", + "similarity_id": "4d97910308cd6eea33fff5ebacfb96f384f273fdfaff8b3e520515e8e9883dec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", + "similarity_id": "e3ab84533625c6e58bcb96022c917347f39b52c0f0fe9fa1fe99e2fdf060f6e1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "845e0a2e82bc081983abd1ba64f65189f082447269a33753e9124a4359bba0c2", + "line": 95, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "9d2737d2fb94bd186b96d28ebbe31e1eaadada3416977f7a4619401f44d4aeeb", + "line": 90, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", + "similarity_id": "2a606270f6c7bb7bf9298977e2f8c7f0f98d60cf7d258bff85b7512b5d49681e", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", + "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" + } + ] + }, + { + "query_name": "EC2 Instance Monitoring Disabled", + "query_id": "23b70e32-032e-4fa6-ba5c-82f56b9980e6", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#monitoring", + "severity": "INFO", + "platform": "Terraform", + "category": "Observability", + "description": "EC2 Instance should have detailed monitoring enabled. With detailed monitoring enabled data is available in 1-minute periods", + "description_id": "0d5413e6", + "files": [ + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", + "similarity_id": "fb5e9e5c2d43d59b4d37d1c7f3f3f4a803d3bda9788dfdf522779036b06b30fb", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", + "similarity_id": "01cb77186b543a354c34c5be8478f882788a57bb95516cebf48843815ac63920", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive6}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive6)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive6)" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "4e462c3427439c8cb969d1c0a4d05d37a8f77b22786044f14a3422dc5495c2eb", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{test-ec2-instance}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test-ec2-instance)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test-ec2-instance)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "616bc60d4322649c538dedd947befa0c9a64a29c15dc042d668c7ca738a258fd", + "line": 109, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst32}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst32)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst32)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", + "similarity_id": "9645f50b3de117e8a021b8709a8b8bb5f7a9cd2d8c41fc606e852fd79c0e5a4c", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive4}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive4)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive4)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", + "similarity_id": "85fcaacd9ef9041b5c6fb1f673033173a758ca10d4b9193897cf41cf75d4155b", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive5}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive5)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive5)" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "a2c506b7b224cce01b5d2281aaaffaedc631bd21a722c4727f46de453670002f", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{priv_ins2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=priv_ins2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=priv_ins2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "e4cbafb8a7d4d5062d2665acff7c953c35b9820b9e9bc08684f70b3751aae297", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive7}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive7)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive7)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "e9b1164c5be2c1bf401b14051485e55e49b181416e8ac0d493eb3e19ce56d420", + "line": 57, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{negative1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "8e00104660bd173409b4276a534d79ef5defa26b8b193ba68d97a7c078ddf365", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive9}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive9)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive9)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", + "similarity_id": "ff5d6b09922dfb8272d0ba8070a81a64a4775b6b1b8ff8515d58a29f0556508a", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive8}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive8)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive8)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "371b01927a7c7096c6fec4d1e4ca5580773680aec38310a45655f107088c22da", + "line": 96, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst22}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst22)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst22)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "bfb398b836f9c8600b4aba985efb752c9a8cfaa3f3a74f0e7f7cf6652ea6d433", + "line": 82, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", + "similarity_id": "363534b3aca3623853f868a73d58fab0a88d49cfcaad45ae34a4988799fa918a", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", + "similarity_id": "2cb5de106e6e7d8de2d0bbcf3b610c6ffb449ab807bfccf776089e4aa70f67cf", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{monitoring_positive1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=monitoring_positive1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=monitoring_positive1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "69aa775d5948502a6e89d2e7c9ecb1e08c0fd427cbebfb9bc34f2a83075ad179", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", + "similarity_id": "6efb19f6ecf1966b5372ba125a5dd2536888e227c78503e5a06392132e0e4b63", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "62c7ec970e2906db2b7e4848c712f7b2153b68aa6835490eaa43e2e8084efb24", + "line": 88, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{test2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", + "similarity_id": "65d2089f6e5028e4590a61cb2829b75bd4f007475504600dcf33f48fab2e6f24", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "75893af01a4db33ecd80f9136e8e5664b24f93abe3500d0575bf1935bb104283", + "line": 108, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst3}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst3)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst3)" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", + "similarity_id": "be5ffc7f628fbea762728309f0046f2603fe71649c76ca81adb0e0891fd0cfdd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{negative1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "de72601496ae4e0a186d3d900b993fe11bea39d55051c5de3106ca74d100edac", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{pub_ins}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=pub_ins)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=pub_ins)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", + "similarity_id": "f4efba1f428b8ff2789680233bc04f2b9238332c3ecff635db7b45039e9f29f0", + "line": 20, + "issue_type": "IncorrectValue", + "search_key": "aws_instance.{{monitoring_positive2}}.monitoring", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is set to true%!(EXTRA string=monitoring_positive2)", + "actual_value": "'monitoring' is set to false%!(EXTRA string=monitoring_positive2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "a4641650983d227d10d35a52e68db1e4d38aeda4f55420c3922c2474c6d81c88", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web3}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web3)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web3)" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "8689c4dfb4cd75e31855e08033351624d05028a3409207b746b852ff99c9a1d8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", + "similarity_id": "278d8af92a08362a9091a6dd4006e2b4c5776c879f2e0d79c7e0ee108a653a90", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "afc6976b05a7555c8f78892fa6264cd47b011e4790050a785180923e887180dd", + "line": 95, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst2)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", + "similarity_id": "e604a1bb76c27d5c6b344de7d63eb8efca137069f5b01cf0ee9b751ad6a6cf07", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive3}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive3)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive3)" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", + "similarity_id": "0c99cc2bfb0a7247589473e66b04eb2b339484b698f3b4fc52ea3bf6c6653c25", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{positive1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", + "similarity_id": "06ef5f50950fa554ab73735387a4725286824175219e4ff2c9246fcb9d0565ce", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "module[ec2_instance].monitoring", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is set to true%!(EXTRA string=ec2_instance)", + "actual_value": "'monitoring' is set to false%!(EXTRA string=ec2_instance)" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", + "similarity_id": "c6109be8837868af7f05ddeabae7803c95e36ee62c26f58c305358924b3717a0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{negative1}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "4e17df5fd2e1d30e13a180e8e6b81406c0a77337e80e6114e14ef941d9e4ae72", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{pub_ins2}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=pub_ins2)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=pub_ins2)" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "6073e20678715b407134307b01ffee4b23e76a7face8e0b438ec12f5863bc0cc", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{priv_ins}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=priv_ins)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=priv_ins)" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "52badb86aae36a8c0263149507e1c0d32e8aa6d9f02992368feadabaa4b38c60", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{inst12}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst12)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst12)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", + "similarity_id": "2514498a7e100d6f2aabacaa8cc4e1f0a7f2d59474e9cef8fb7d6affa5db3ccb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=ec2_instance)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=ec2_instance)" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "ede19bc1eb6ce8d021480f5880a66abb6bebceecf8503d927fd447d80b088c9c", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{test}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test)" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", + "similarity_id": "72f91854c0268009c83b8c6af178e60a53876d296d3934e218cbfd20d2cd9020", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance.{{web}}", + "search_line": 0, + "search_value": "", + "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", + "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" + } + ] + }, + { + "query_name": "EC2 Not EBS Optimized", + "query_id": "60224630-175a-472a-9e23-133827040766", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#ebs_optimized", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "It's considered a best practice for an EC2 instance to use an EBS optimized instance. This provides the best performance for your EBS volumes by minimizing contention between Amazon EBS I/O and other traffic from your instance", + "description_id": "ddce4bd9", + "files": [ + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "c4a06491dcea6102f5b74457b7bfb9b08a4d990808e9d3f8f85e35f51d959034", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_private_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "011dc8503dd732837ed7d4ee7617776ebbd3ed9cd7a4961a9b6837dcc91ed32d", + "line": 88, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "fbfb5c9607a895486d7c821ea64facc86d336e6f945f2bb0eb4082125b2cfe0f", + "line": 108, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", + "similarity_id": "bc2f8f6fd18b3a94d87dca6b5435da921868a70fcd114cf5714b9fc040f60ca0", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", + "similarity_id": "e52fc171c7e5ecb99bfa9c987476c634721c0c718ce5baa8fb0efc14a24c9ca1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", + "similarity_id": "66354a1ecf30be3623f54604f8262119588fc6c2d0e91cd305b25f5e12b9e0fe", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", + "similarity_id": "f8e171f90476547c9b64dfd758378f6ea6616d3dd39e015894d953388fab5ac8", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module[ec2_instance].ebs_optimized", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "16d171e432e242727969a74f50061fe611a3b00051e34a59685f73375ebc3f7f", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{pub_ins}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", + "similarity_id": "ff87c287f6db10b6bd2f71b217955419f52b8a20e0417219261a4437c409179a", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", + "similarity_id": "f7ccbb59bf0f8058b705b7c57d75ec788c42e9b9b30f63ecacfaa040490f67cc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "e9f59f9b1a23cbeb6c3a9b7238ff643c0ac4a328a92c2a842b6ea86a804f6ae2", + "line": 82, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", + "similarity_id": "c220efbf0e25f49130e1d9fce452ae28a1ad5ce3c057b49b1547cd744ef8e566", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", + "similarity_id": "a3ee63f10b14882d13199e67e085c72e201a3741499093466d299350e34b83c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "23aea01abc940cecc8ce168c79eed044822f080a60dcd3aac076a7803a9e4cf3", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", + "similarity_id": "af14fc5e97bd84336c325b1bbd3a5509d822f055e6a3566823f95b0af959fbae", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "f82a92f2fb8c79b56afe9e01c57ce2a7bea1d2572a8687d81f4040c53263d346", + "line": 109, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst32}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "3e5e65f8454f0431e7a877de325048184b8d6862c580f04bdf18163d797c2c18", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{priv_ins}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", + "similarity_id": "b3eaddee1331cd85e414f05354bf6e94a8df2b615af11495a180cae282158d1e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", + "similarity_id": "8344b4229d994394d98de0a6cc664f50ba2b524395f29216245e88f1cc2f2abe", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "789764d470c6b4357f6a5f2ec52a2019060e8c08112c198e47ba46ca6f3c8c20", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive7}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", + "similarity_id": "8a6b04dfd2de8f1cc74c02fd4c8503c8b901118f4703b78a11a6270aa29c86c7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", + "similarity_id": "98d959307541f8d003537375269d0e23a97520f7c2f3613dfb999aed3d26ddfa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "ffa0acbfe39ec7c5c7d37d2c21442e7ac8721cafcdd13687a919926978f8df9d", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "7445785a11415e487ac2e63d28ad27f04713d50bf9db8fb4fc0dc7d20978fd38", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst12}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "8acfb066efe90d2d3280c25ac5b00f8471f492930b54426362e5d290add9f32f", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive9}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "68aa819938a47ae9d655e54c504dbce54600ed5abfa51912d143fbe41348f238", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_public_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "4036bb57a8562699f2bc3e95855700f58ea64527e4d082e53e0ccef0b8f6092b", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_public_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "35a685e9c6c76e75f7617205e6f27563a882e47484c97f65d3e1731097802f84", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{pub_ins2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", + "similarity_id": "b4c6c88e31b4ce9ab062a79bebac8f35502ee7578c9ed8db5bf52e99b946a242", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "beb9d2f657e725c12fb24c822d85dd0e215a83050e104683ac4709a2318531ef", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "c161e1efdd486d50ba5b75cf87d60d91e112c5f17c7c7f956567b70cfe4119bb", + "line": 57, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", + "similarity_id": "985f79588fec3d23db5a958f5002f29d86bfc1d8983b5749504578e9197516ec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", + "similarity_id": "67e5ddad789bd369b3dc34e97a0372e9665d4392f17bd9ea7f9cd5dd0e35ca26", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", + "similarity_id": "a81e2e8fe09364e404326b15c57a8f9b5a11bd3ca5dd416fa39525ee1bc219b6", + "line": 20, + "issue_type": "IncorrectValue", + "search_key": "aws_instance[{{web}}].ebs_optimized", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is set to false" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", + "similarity_id": "d35cf5365ac696e1262568fb49a93ccae647e2b34abfc9f578b624abe9cfa7e7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", + "similarity_id": "b087cb883ee2e13b010a776ee3f3f5a06ad211d7f468ad010bd7882957fd8d3f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", + "similarity_id": "90b3da8eeaec7e202feea0b5f07ae04b35ee077f247d838fdd09e0ca7959092d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", + "similarity_id": "b6325c56b8eef5cfb7790051ff9325e986238222df9016138531c485941a811a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", + "similarity_id": "2b38d84be01cb50de9f772e44c02fac3946ff43a0e6ce3c4254f443af8c8e256", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", + "similarity_id": "bbed9a3bac228c8202504c9ffd9c33d80fec44bd5cbd3d63e643bc32263fd357", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "ed81e1904a44154caffa2c6e722db22f6b49de57b6f8405d58c814b55c8ad89f", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test-ec2-instance}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", + "similarity_id": "71ec4e8d73b9aae2218f697811c5f8a3769fb7d8e5b754932208924fd68cb10f", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", + "similarity_id": "65de401a1a6d072ca37f926153076b6abbf568088794547b7bb5478f08c642a0", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "6503dc96aee5641ef965f5c227ba579ba20c8b359ab9bfd7c9d17e34eae4981f", + "line": 95, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "f158f107b10e43fafafc2ee787fe00da46ab7a00ed3d1df3ee61d7c1e1f35ee5", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_private_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", + "similarity_id": "f5eaefa76d668c0d8d023406adcba65eab713450bfe0f79c38d02c5591d54991", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "125405ecf869511331479d90e20fab98229b5af88f2f6467b6a22b5e2d62d3c6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "489f8de872ec8586a445b73413d1acc5b2887f01ca8705bb09fe24719fe1441e", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{priv_ins2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "7d04cba353979c81931ec8dc8453c7f89eda7f3a73bf340e271770d28ec25969", + "line": 96, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst22}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", + "similarity_id": "54186cb138fd3b96778399f98a0d4ed49c5f66101ff1df1364da43b8e3e0e746", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive8}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", + "similarity_id": "b06d4225f22edd2f8f5d0a2b5a1aa1c150f9dbecd30180726ad59d7d4ab3d43a", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", + "similarity_id": "508e9eddb720ba7c083332676eaccc4971acbff151b929496d013e0abfcc277a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", + "similarity_id": "451cd05bbda645079f06ec60029c8010c63ba9364e0a4ebcb3b102c7be2686b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", + "similarity_id": "a55c7aeb90b6ef5522bf23ed2037a5faacfceaad20f9155d8b5f9a1df27042bf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[ec2_instance]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", + "similarity_id": "49fbefb0e0256a4d5d318dc6ea11da3b8d9767643546ee9f250e0d36f9e814a8", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'ebs_optimized' is set to true", + "actual_value": "'ebs_optimized' is undefined or null" + } + ] + }, + { + "query_name": "ELB Access Logging Disabled", + "query_id": "20018359-6fd7-4d05-ab26-d4dffccbdf79", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/elb#enabled", + "severity": "INFO", + "platform": "Terraform", + "category": "Observability", + "description": "ELB should have logging enabled to help on error investigation", + "description_id": "c745bca6", + "files": [ + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", + "similarity_id": "c01f299eb65b7e9b982121c67b2dbd5ad10537efb17267f6997749d971edd96c", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{positive1}}].access_logs' is defined and not null", + "actual_value": "'aws_elb[{{positive1}}].access_logs' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", + "similarity_id": "72f3042909fd9f50409024615bec4e3b911cddbc7029f5e7ed812cb79d05af51", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[elb_http]", + "search_line": 0, + "search_value": "", + "expected_value": "'access_logs' is defined and not null", + "actual_value": "'access_logs' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", + "similarity_id": "9f708aee741b03d2e3f52ad84e249c96d5fddbf697ca39d688fa594967812500", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{negative1}}].access_logs' is defined and not null", + "actual_value": "'aws_elb[{{negative1}}].access_logs' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", + "similarity_id": "812afc05a6aaddb845238634c5159e5a1f74c5d4508f53cfa4bb3f75ad36955e", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{positive1}}].access_logs' is defined and not null", + "actual_value": "'aws_elb[{{positive1}}].access_logs' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", + "similarity_id": "19ab34360976fe242bf917a105df0fd039d5098eec1f3a4a8e871a291ef2f33b", + "line": 39, + "issue_type": "IncorrectValue", + "search_key": "module[elb_http].access_logs.enabled", + "search_line": 0, + "search_value": "", + "expected_value": "'access_logs.enabled' is true", + "actual_value": "'access_logs.enabled' is false" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", + "similarity_id": "65510862ff2d16a1abb66d23df746369608870a38a654f51656ecd0a540d3e0b", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_elb[{{postive1}}].access_logs.enabled", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{postive1}}].access_logs.enabled' is true", + "actual_value": "'aws_elb[{{postive1}}].access_logs.enabled' is false" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", + "similarity_id": "5ad36bb73257067a7ec5b52d24a46923f9fe3adbd1b36830ba95bf1c1c5a233a", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{negative1}}].access_logs' is defined and not null", + "actual_value": "'aws_elb[{{negative1}}].access_logs' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", + "similarity_id": "8a57be56d39922588a43948806ad136fa13900329610adb4f3d048843a0275c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{postive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_elb[{{postive2}}].access_logs' is defined and not null", + "actual_value": "'aws_elb[{{postive2}}].access_logs' is undefined or null" + } + ] + }, + { + "query_name": "Name Is Not Snake Case", + "query_id": "1e434b25-8763-4b00-a5ca-ca03b7abbb66", + "query_url": "https://www.terraform.io/docs/extend/best-practices/naming.html#naming", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "All names should follow snake case pattern.", + "description_id": "ac707cad", + "files": [ + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "e285c46817744c1280bfb64d65fe9149837d658cf26c162e38eed311c7d83153", + "line": 58, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow-public-outbound-sg2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'allow-public-outbound-sg2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "bb089a95dd02b703cb65d6805c7079b1d1d19621385c8ae2fe173c1b9a0d22ec", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "25b808efb5305a4719c04521b0c05972677d37526c195361ea82d434d3fc8ece", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", + "similarity_id": "249367a7a16809302a505348cacca833bb8059d56f79fc38b9d3159deda6feb2", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "fb7f720e3e0c14747c960d76d42d7bc7932df44e3dd9a2694eb1c059bbe80b1a", + "line": 45, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.subnet22.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "fdc03ac8871e30598503b374f8f2f5f83f1a1f2b13bb70b5c30d70c58bb82bd4", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", + "similarity_id": "7b3b68a918dd88d73ff549d411352e52b6d3aac64779e266d55ecfb9fb50005e", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "23ea1887853b7f6e594a25ebe1036bd8f183ab430fd7db729616ae6ed1683f82", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", + "similarity_id": "1970a581a36226cb3e93ebb04ce33da66a9742209a17595912324918bc3ad332", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive2_1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "17f3644fa599067d8f76fecaa0717289aaab97ed1e6a45827911e007079d2ed9", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "82272bc3b87f1a706567aa6b639d890bef56e27e120db57f8941901d044e8bac", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_public_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", + "similarity_id": "f1b4d960f8ef04edf1b475c21de284bdfebf05c5d6555f481f2a698975426224", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", + "similarity_id": "1a617967c789366f442dc5955cfb0ff806fb07b31fdec254094ef9d812c1a9cb", + "line": 29, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_codebuild_project.project-cloudrail-test", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'project-cloudrail-test' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", + "similarity_id": "288f49cb7fdadf5884cdd0ed9d74ab1e309e072729ac652684e20fdd144b7f0c", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", + "similarity_id": "f21800af4a95b25a989a85b4f4c68211509c0459fc43f64565422de2d7d88af5", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "e7afb4d47d8e8fa79af27c06e63c87971572c0e595b47c41960c2902f19e1454", + "line": 29, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_codebuild_project.project-cloudrail-test2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'project-cloudrail-test2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "0ebb40d910829f1b4ef3d61d275c7d7db992c2f1973644867455d7ba49a163ce", + "line": 83, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", + "similarity_id": "5f74924975a4e69a7dae209cb8c429771cab9899afa60a24254ca1f25f50f21c", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", + "similarity_id": "d8fff975a526e3c952d7c6b2ecd755705c2addc22335dbaa28c14976e6fcc6a1", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_kinesis_stream.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", + "similarity_id": "d1e479d20e2cd542009cc3c6aada03eefae26300dc160c89347a0aebdac769e4", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", + "similarity_id": "978614fb65b98517014164e54540fcbe864913d6f4cc1f9d5aa68f582b306e2d", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", + "similarity_id": "9cac07f936c7f13e03ccf37276b76bc4742173102f001e87d7cf516a41cbe221", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/negative.tf", + "similarity_id": "5f3eaf2862b13851be3341103d5d8cd265ac3968aabfa0ea2ad1840a774e57a1", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.userExample.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "f5ce1190f8358062caaac0020e1aa210ec67c07ab9084e13a40cb47a590d3d6b", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", + "similarity_id": "15ff27f01b200ecedd0a83e4e1efd6d93cf033c5c61f143b5fd8de26b4c4083b", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_snapshot.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative1.tf", + "similarity_id": "8bafdf47d66f2c7a9423bbe8242a57dd35843e3e9932bf4b34c91ae6f9d7a570", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "0c771373aa6633cf96a57199d738f9f407b141f753503dca438e839cdd678e1f", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public-subnet", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-subnet' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "8a0343d2f0b970dbd4144cbe4eca4a3388db8db7b369083e22b46584ac99ed13", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_public_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/negative1.tf", + "similarity_id": "9a40e1c74b2fe8c575b889930c74e3345026bdf2f5ff04ded847ecf4ab3e9373", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elasticsearch_domain.negative1.tags.Domain", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Domain' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", + "similarity_id": "56eaf383e2b555fb35ab347b75a23dd4eab76f2b659d1511d67eb6b59d770113", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive6.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", + "similarity_id": "0f5f90d5bbcad7a2d297741bd8de2ffd89a47f75f93ab65d554ae79300cf9b9e", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", + "similarity_id": "483c2ee5e7c33df609593b73aa41ddf87a5b88233dcd4bd1505a1bd946fc4b70", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", + "similarity_id": "cf4cb2606670e5f17c971f13a61dddf77da416578b9569852c7db5bdee1950f3", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", + "similarity_id": "d2f1064ecb15fa4f93c25a072d0ada3c9753f2fc8ae2913bd4f877a4932e802f", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/negative.tf", + "similarity_id": "964fad8476d3a107a59f3992c753034699785ec5c1d116eea05329ac178814a7", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_api_gateway_method.negative1.request_parameters.method.request.path.proxy", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'method.request.path.proxy' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "7cd01288566af4bf2b73a6f7beebe13dd6db4d4c5b1fb83ba7c987c66e47471c", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private-rtb", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'private-rtb' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", + "similarity_id": "f20dcbf0b8553c5b80a8f07498b2366f84fc8cf227e5a58036af46a58741321f", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "21afbfad8aa9bd96ccab656a78fedb404b872402df16b2077d1ca92fc3faa808", + "line": 47, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", + "similarity_id": "dc5125fb387c566468c7b2de011e9319bdeeb7ea0c8b64f885f80c2c6daaded9", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", + "similarity_id": "86929a4af02c4693e76fb46f89142a06d29584ca7150d3016fdb71a578df7f50", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", + "similarity_id": "23dc445910499a3ae192cc9eae493d42c161fc88cd589e023b16da6092461b0b", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/positive.tf", + "similarity_id": "4764f67ca493c73cee064ad03fe492090f4521dd42b93c618a53e1509222acd3", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "f0bc49a64609c51dab8b4e2e947cb2e6cb5841677a65b2bc38cd6f6ef98cad68", + "line": 62, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_private_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "6b9aaf6736b1ced69f0742d42b60bae52efd4eb2445342855d9982a9b0013db4", + "line": 109, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "10c4c0f6483b14a555518066c38d3b0bc22c0eb86d97a78caf238f27cfdac012", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "59afaadfea06d7788c1ff8df5bc1528b6468c3346002a4f184f4973c13b8e1c8", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "af062b913319f77ce1e0b7d7d5b8a52f75b4a1e0cd6db0125ccb16ae5b0d3ab7", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "062ce6b24d4c2a30afed15c170708b1e18fb288da53fa75ee1781feca8c51a4a", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", + "similarity_id": "803c1d13da5e73e923414a54d4e9212322c9dde9064be6e78ff64d405f22a916", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", + "similarity_id": "5db62a45bb3a74774fededc0852114b05114a2c6cd92460f0f8504afe7a9c20e", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive2.tf", + "similarity_id": "3fe57aa9ca515ee74fa96a39512853ff4bd06de289e03d4dda430ab89ba22cdf", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/negative.tf", + "similarity_id": "1c45be234ffb38de00f40157d89e4e6bf5ab3652430faeb0fbe7cabf41d98bd0", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Application' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", + "similarity_id": "0ac4ee7ce2e003690d7ef27eb55aebfbb2ec45fa55cd552e935e69542ae89be3", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "d3dfa853b33aa00fa95ccd1e7c1847a763f28470638727e02b5ae8606853e7c7", + "line": 27, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public-rtb", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-rtb' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", + "similarity_id": "9c2962f6d20b3b5623611395337d08e841cac569cedc80200fc7a0ded350ea82", + "line": 30, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive1.tf", + "similarity_id": "ab3c4c6df7b2fb13dce1fd66660eda1837da6f9b49e48d7dcda94c0b06b34f1c", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "0342ffba90a7404e647fa73d5847228d5684b32b9a8288ed9c77e3cfe9b62c13", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_private_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive3.tf", + "similarity_id": "9e1758fac03504ee175af4231201b9bd84577b5005c0750d6f53394db7c8c4a8", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_workspaces_workspace.example_3.tags.Department", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Department' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive6.tf", + "similarity_id": "fac5a2ae883f9a5c7ee3dc3a9fa5fc69cf9ae4abb71ef3237bddec87302a8e16", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", + "similarity_id": "3fe0876526bf85bf5e2f00a0d9d522d8eb01745e486404f98a7fdbbb3f49a3c5", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "2e13b0e7032957cc6e1397681b8d03076a3b00b81168bf98909a3596ad795810", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive3.tf", + "similarity_id": "6271733d11dd17a39ef84a9095012d31f0b218e357306dcdc056bdd00655363e", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", + "similarity_id": "09d88e5fea5fa6afecbaf7b295db58fda792c1d7417f1c5d06bc55417f086026", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/positive.tf", + "similarity_id": "b6b2eb0e2dd361bbdbf853c36bffe16141ece247f8fbe9be9fa1643fc546beca", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive1.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", + "similarity_id": "f96178d77d96eb582284c126a1fde37e0c8223d6d63e3a580c9f0e81fba7eab2", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative5.tf", + "similarity_id": "bab6ba5d2e5821f229958633010fc8afea81ebd28e6507b101ca6b2fe0c68711", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "e03c7b9834666a08e592f7804026b01a9a09438a4e4433678bb7b64e982865e8", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private-rtb2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'private-rtb2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", + "similarity_id": "bfc35e787442999874e915c313166a6205b26f4c5ea1f3e0cc9e4b9cb8b392be", + "line": 26, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user_policy_attachment.test-attach", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'test-attach' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive1.tf", + "similarity_id": "0aad00304ed7f1ab3e6814d9ac57b271e065c77dfa52d0338ab616b8c8b4dd40", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/positive.tf", + "similarity_id": "f81753071fa2fa5a6e0eb4107b9b2a9d65cec53d2a0fdc23a1e8a029c2d0de77", + "line": 47, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_role.positive2.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", + "similarity_id": "44ad5328cbb17b4693f641c4fae447d3dcdcbc36ece7436d7238626704359f8a", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.public-bucket", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-bucket' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", + "similarity_id": "7464e24b389e0b20dff3e2e55c2c890c4189871e3eedf6c945570bfab96f4b59", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "d0e19663ca3507af85dc5854d92d44886b56a7ef9567774ac473d346c1986b51", + "line": 139, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_without_kms/test/negative.tf", + "similarity_id": "f9d404ccd44d8186d4ff1e40fdb7bfbb963d282b313befe49855724c12701eb9", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", + "similarity_id": "460de1e86a1e473da52f468c49d9852e1eab2f87ac75c4d432cb8a8a1d562604", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive1_1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "ff874131a1a85afc40f3d67dd2fb8c0013ccc9a260fec89b934accae44a8ffb8", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/positive.tf", + "similarity_id": "2739d53a9b5d288508d4108d8f436a71d02de5f8410fcd886717dee408915ad2", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_role.positive1.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative5.tf", + "similarity_id": "ececfd2c61ac7da7d39e533fc11b0d6bd58fca58fcfe52c1e728a49d575f08d0", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive3.tf", + "similarity_id": "5ae2f209d0ae608b893133bb7cc1bf544372ef6d3a06563a7193764858663f4a", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", + "similarity_id": "e05ba10606cfa215c5341021f319d454c7b5c602be6da75484e606a15d81a4d1", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lambda_function.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive3.tf", + "similarity_id": "a1fa6ded2e6186d02516f69cc904b5d18404474c08a41f8fbed4bbb7db1154f8", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", + "similarity_id": "b009ed5cec288813d215190dbb81b68fbed8aaf487cca891ac7c0f82018afcce", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/positive.tf", + "similarity_id": "adcbcf40ca30b9377c0d7ca9fa0cfec9bf12ba46ef26c96eb89cbd40abacf63c", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", + "similarity_id": "cad72a84374ca243aa1fc49f55ff07cf2fefe9e30942204191a4f8bbe6bbeca9", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", + "similarity_id": "534530bbaf08c1eb88cd0a31e19d768c5d5845af0606a6ab2cc6ed1a75f49940", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative2.tf", + "similarity_id": "7d1d0d72c4e437a486d8e53d198c42b07086f3a236d2069534b4f4b6e433e9d3", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "b97f935be5ab2b2049fe438a622f062c5d7e466ed269f20b24b7bb2d7725bfc1", + "line": 109, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "c1d527f6ba832ca4340eee6001d0d5e3843b2bfea626cc87b863f9c2a2db7115", + "line": 30, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table_association.private-rtb-assoc2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'private-rtb-assoc2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative4.tf", + "similarity_id": "b7b63adb265c9b4f6b3a9e08227630a85811f19fe9c4a50c524f3d0db0894bb9", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "8d24d238306dd69b2aa2af36356f85ade71fdafb7093a171ce58449719480b9f", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudfront_distribution.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", + "similarity_id": "e07ff69df6e2228fc5228e598ea4e148032ba3df7aa33109f7eb8f2a7c831efb", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_snapshot.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/negative.tf", + "similarity_id": "51a02386182e012254aa94155f280208bc1955291995ce8d05f1e6efeb82c98b", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_sagemaker_endpoint_configuration.negative.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "bb5573b8a5cd318882862f7a7546ec80bd9bd6eadb186c65dc0bdae50af42ff0", + "line": 30, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_endpoint.dynamodb-vpce-gw", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'dynamodb-vpce-gw' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative1.tf", + "similarity_id": "13a6e7ab250d5a93866caf906483a6a0cbcc86aa9e5306fab7a50c7e769d595e", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive4.tf", + "similarity_id": "90bd1241349c29013df87f86543d4c5338a9de2d2a089c202194529d9ac81b63", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", + "similarity_id": "a26113c4ca1c3180f2e8ffbe6ac65e358359c93856f02bec7388e48a2517fa3e", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "dd30a1007289f96867258b291021c33db43ad8bba51d196a35c8e344df8123a0", + "line": 26, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private-rtb.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", + "similarity_id": "f402c4feca474ab16da283c95b55d68f807647a97711424b00d48b367b1e2d5a", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", + "similarity_id": "59d8999c5b1c0b73d6287ac9db34a2c284426f63ba16487cc3ea66f48456a4fb", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", + "similarity_id": "9b4603fea9b0efded51619af883fadeb4ca8e2796c3cbc317fe015169899f64a", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'basic-dynamodb-table' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", + "similarity_id": "8bc01381c550271a155106eff2a3eeb4755544bd7dedcbaf8ca5bc3961676ed2", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "0b7d3bb60db93ad3ce03d3ce5faae191a9b8917e6062e6b556b94d9a5ac2aecb", + "line": 95, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'basic-dynamodb-table2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive2.tf", + "similarity_id": "02c2d91e73e579f962a03a512d2f698f7519c0016142135cf144dec1641e729f", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "6e59023006b47af8abb7e3a03e9e0bc42a3459c8094dc3016839b285a7a7ffbe", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", + "similarity_id": "90d5f9615458a7d30e2749da2b8aed865dd9b83cd172729788cc64fc92d134ac", + "line": 45, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive2.tf", + "similarity_id": "f1f08f7e1d3d2646727c0cd3a4db61e62a8df136d79ba27ec120b12f56ebdc78", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative4.tf", + "similarity_id": "39e843162e5ff9727d5d6514a55d842054f346ca1d4fe5fd057a3e7fd6e3b4ac", + "line": 55, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", + "similarity_id": "2fced3e4a432916241a8f576221a145f064e8f96afbe135e02e3c13db87f17b2", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "92fecf6fefb57bb1c1623b3f669404338bae42b864c0ff70abd51677d7340f38", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "f4d5662d26f3a08cf7ae53d520c7396f8e54b31e46789fc097737cb17897c987", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "115a6fa919db0caf4ba7e70576afc19be9bdf34d0616d9a5c8dbc03a17d807ac", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "3fbe4caa45c9ec45226431bd7079a423f495ae80914e00cd892e8a53f53398c4", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private-subnet2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'private-subnet2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "1a0a6cac6a33aa36edb8f6436c3ca1fdab04d59b15060e005906f55d46cc2711", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "output.kubeconfig-certificate-authority-data", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive4.tf", + "similarity_id": "16df3a8d925cc01b09f526b22a4966c2728398050fea4b15a7c056b679cfcaf0", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/positive2.tf", + "similarity_id": "e6f48355ee608a1a8fcdddd53787750b458f0d086ae34bfe2fcaea197476dfaa", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elasticsearch_domain.positive1.tags.Domain", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Domain' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", + "similarity_id": "63865bc2a7d9cca07948892098d7b8ff70d03aace87f2f54ffe90d2d36f09897", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative3.tf", + "similarity_id": "997d79f4d6d6478069252d14b449b1d5087f94ad574f471d04ac57217222708c", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive4.tf", + "similarity_id": "1c3bbabc1e9bb856f41a354cf9e04ca2b0d2bd3e4e5264f10caa6ae175cd45ca", + "line": 55, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", + "similarity_id": "c7ed64fbe5dc2463d7795b3170b98eceddf9e1724547e00346122d6581ea4d2f", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "2016ac07936cc7221690bcb2385bae2dee2d5a7b3b6f3c07c20d6baf248ee889", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "5b3f5a784fc0aa797a0c3260f6a8868e6406c3ee4fc72095c7c2bb9cfae4dc47", + "line": 120, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table9.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/negative.tf", + "similarity_id": "83ab6aee6cb6bb1dc6fcc0feb95e35a92e1de5723a7b9341e22d75597bda895e", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", + "similarity_id": "0fc372e916ff9c31d99aa7daa6bed16fea8cb781b93d135097bd8fd3b0c2ac45", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", + "similarity_id": "c723df32e44bc43710c9a900c165eb0fd6f6cd674f9841f3330724d87736b18d", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "578f053b1fe8d03db644bf8c4545334caa6e110372d800b7dd5f1046aa7eb9c5", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "9ef5b6e97b2fe73c97bd611b3670477e3fcc02087f95eef61e65c9bf9ce4c761", + "line": 43, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "1e264248f099dd9f2f1adc0d9fb46c9a6ff62217f3450f95788a52ce778d080c", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/glue_with_vulnerable_policy/test/negative.tf", + "similarity_id": "30b7a404e2378ef01afdec0521858bc08bece75f5f4b4947a1b56412f9262e38", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "data.aws_iam_policy_document.glue-example-policy2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'glue-example-policy2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive3.tf", + "similarity_id": "335517550c254c8f28ef87f90ff36d72acd5fc7584765cd49d19b91a27825df9", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lb.positive3.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/glue_with_vulnerable_policy/test/positive.tf", + "similarity_id": "6fb51acd7dae65fe0f10b45ff3c6a1598d3b1c6e12fbfd1567bdbe47191545c7", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "data.aws_iam_policy_document.glue-example-policy", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'glue-example-policy' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/negative.tf", + "similarity_id": "5435f54c7d2ab5431451961eeb20b9a840f0759e3a9eb993d6fe6e831c68357f", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Application' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", + "similarity_id": "6c5e12fc6e4b1ef1e35b5aa7d7743c375eb00458ccab3581c2179e877ca69006", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_snapshot.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", + "similarity_id": "4b40e2d979b4c375704860f0b6f2a242a16d68e79503b968eff4df35b035b77f", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "543566c34459dc9baed23a1e92c7a91601b3a52b4e1edc2ca2b7167cb4f0508c", + "line": 81, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "9f1561e249110a2eb98d6e0633e8014a3f466b581006039d366375a0edb2b00f", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative4.tf", + "similarity_id": "2a3b69cf0d0b38bf2e9fc9b91d3d73f7b560c2a2403b2a0a371a06b59a44fc5c", + "line": 47, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "0a4680c4155bf4f195e1de37443114af0af3035b8d1ee80e3359aa5c3782b413", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", + "similarity_id": "a8bbd3aa541be1122e042e27e8a41648c0217b81a6fdcad7e4d53ededce4d28a", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.negative1.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "df324863f861fdc996801fb27c2ac160ee953487f9dd1a3dd2c3185f9449fa47", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", + "similarity_id": "9b80b92756cb3929f9377c92e4a78c31ffda04f50fff6677a2a67960ad261fd8", + "line": 44, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "4db5a0d916116da3db0c2f8b7c3d4f888da53a7118cde204a09835ba874410d4", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", + "similarity_id": "bc08272e483de6133c3972d89d5f5cc697b73f0b174bf95d23ba83db06575d3d", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "6701c8c45247b00ccc38b21f4e7d58e030da5fb7a082edfac3aadbf639106830", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.b.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", + "similarity_id": "315d35b405e64d2f728346b454b8ad3513313f1d965d40572585c59684d99a74", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative2.tf", + "similarity_id": "7e6e469548ab15c9b630d93702c192cf750af1824286216858cac6864756f8cc", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "e5591f70cb580b0636318377db81aa893414926a4536d1c2e2b05c83bac37453", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.b2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "52387728fb1b426381d4b03ec2945cdf30f79fa0a25586c5296d025bfb0b66ed", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "ae99cbe52e6ae4dfe3a752ff5f97c6cb479becd538a14016c156150441161af3", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", + "similarity_id": "c7f18bd787ef199d572dc295afc618c81ded903e1547f15021ce435375ccb179", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "8692f7785f63f1b48e79c635a2bf5f18ec124633ebb8e6063b373ab9ef820edd", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.allow-public-outbound-nacl2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'allow-public-outbound-nacl2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/negative.tf", + "similarity_id": "dcc696a805aeffc368c853524bf2c3afe99c55bab284badd1d62710d2378de7b", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.userExample", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'userExample' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", + "similarity_id": "2305867ad6af7819e9178eac0212185894988341e60c0f274505347e0177cc93", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative2.tf", + "similarity_id": "3be9857b94358e25ec990e4471a1758d97a8ce78a36b3345fdcdd22998960c17", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", + "similarity_id": "17c64cf7029f4297d715def886fe9e7d6fc33407a97919a71837b0ffab378712", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", + "similarity_id": "8cd17122f46c7255a99d96b62bfcb258d0d6bc37a5104ec54ce074d37853d80e", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.postive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "4c3abb074b26e247e977d1b6e1f22e799ea6b0ecde5ebec8928f195120cb676b", + "line": 44, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lambda_alias.my-lambda-alias", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'my-lambda-alias' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive2.tf", + "similarity_id": "6940f3331000184314ecd23763aa2569eec18bff94aeda9f55c8b199997b249f", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", + "similarity_id": "d3569df7c7089bf700ace4ca9be7b1b47bdeecadc6fc087c91818bd5dc3f7853", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative2.tf", + "similarity_id": "8a8aa0027c7f559bf41b69886f952c4b6f545057a731a4d481e8d9aa3a5a6142", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "8727cb1342900da9828e9e40ee067baad48f80c95f12015f797cb5e7dfad9865", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "307133df1a9eaaf2a9a894192979d5c2cce95b469c9a2843208c67ed4a4a866b", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "1c11a4e31aa27b613bdd81512eb81677a12a1bc68a12e21b4bbf1efabcd7828f", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive7.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "3c9eee6c40066f4208558c6dd062ef75c0527be3da1bb5dc64a943491e111810", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lambda_function.my-lambda", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'my-lambda' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", + "similarity_id": "4965ca7963e398ce980f95421aa1691ed34de219ebbd5aef6133eef7ef18c681", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "7b37e20d023bc73ebae63d9d915549f6a81995002e1da35b71e3f7a0761365a2", + "line": 109, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "b378c350f5429c1d55e9a741c825bc33f6d72821b22673cbfbd35b9765b7d1fb", + "line": 72, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative2.tf", + "similarity_id": "e9bfdae6edeefe5124f657ec2595fe2231da1c22544702e2dd7bbf3066fbd991", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.negative2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "5f1e8a7f4cf4f400779ceb78c56d1a026046038cd9216eceef633dd78a6b9d20", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "50eb74bee9847068263b1fbaa5ec8a15be50e00083fa6c360b4c5e9a25a4f8d1", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", + "similarity_id": "6700c65754d43b1b7c5af030cad1eda541df170f09a1148217c23c4bcb498b88", + "line": 29, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "35bc24c27cbf6028087431b2d0547aa530801c1950c5826053dc803b6aa219c7", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", + "similarity_id": "7df1c0e324a23ee700498c6437bb4681c4269bf2549fc84f9439d760497e541d", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.positive1.tags.Application", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Application' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", + "similarity_id": "79e320d298f675caef40d6834b51859ff7d7e5c98da3d2e5c8a7d53065371a74", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", + "similarity_id": "5bcb4cee3c5dcd2276015396ce014c7f85cdff59e25ac4d965538a23b4ab254d", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", + "similarity_id": "90fc9819639a5011cc4680666a0181719b8e362abf1f8d5b795f871ced034d97", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "79af0142188320b4d4fa10a9c5066d0d39139c8a9cc66e21ceb5920bbcb9dec2", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", + "similarity_id": "6313a2e3c0b81012471fed174fc95dec308473439ef257af0d6fef9453f03417", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive4.tf", + "similarity_id": "f94f311183fc69f4c6f7d065c72954e45caa8ba74be0c7ecd68009a0aac56cd2", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "module.vote_service_sg.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "5ecda317c8ca9e9703591647b06101cab2a9f099b118df11348d8295232a111e", + "line": 128, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "44fd738ac7f4d209dfd9974e416cf57f056c17267944ccd901e8d0ee47224e58", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative3.tf", + "similarity_id": "26d9a4487f88cb6e51d4e86b1759678630375dcb110e734d4caa85a0febc0874", + "line": 56, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", + "similarity_id": "a7318b1050592de8fc3fb2cc16ab17ab036a1f67aa8ed94c4e7029a7c77c44a8", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "d7878d9eb2f59d9967676fa7f9c8a3dec90fabf418eb71a937ffccc733821448", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.b.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "b5beb5a66ad803dca65033e776c9ad4cb4ed31b71dea84a540cbefd7edd70100", + "line": 74, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", + "similarity_id": "59c0dff398763a7cb48d138a04cf530c5fa794272e51deb6fb7c314c157d7563", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", + "similarity_id": "c54d5238ea84469e82c1e2b2c31929dd0dd58f1e8a13ade04fe91b20e910afd9", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive6.tf", + "similarity_id": "0c34495723c23ef97668ade169f1ab09afc6672bd3dbbc8703a3d7f7a86c8b6f", + "line": 52, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", + "similarity_id": "f7d216c761e69bf844f8c6aa738ec9a97aadcc0e3ff00bbcdf9d2336614b2ccc", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "2a2a12e5942358a8e43406a8dd050a6cd12d81483179a5ff99e8d1cfa375043b", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "6c7ee2583e3eb7c4fce379906053297bc8079049b8d94b4c4c83155178eb4bc2", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "3a1bc2ab7f01307adba959d593a03ffbb4aed82e558b8fc3c70d859c3658a5b5", + "line": 81, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "7e39d4a96d279e81daabdc90185fe295db8c3bdfea22f920a6de323b8b1cbfc0", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", + "similarity_id": "9fd3ee735208610f9635877a32761b4896e3a1a2dd3d501e8c0cf604f0e6ddf2", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "d2f36bdad7284e64fbeab52855ccf892db7869fa1487e48fa875327db858b8ef", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "50d6ce1290c3bdab1141c9e5f09dc16ad731c4911e52c9ea8adb8e72e47d271d", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", + "similarity_id": "98e90a87c202ec9c754db27c109172c9cfdb9f7074d0613948a7668e65854076", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive1_1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", + "similarity_id": "665065c79aae79dd43577837c58312c593ff5850e98d1073c79c48a24bb8ab7c", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.public-bucket2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-bucket2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "e9e1672b6892444cd56bc6806c3388762a75bcf84edd0101249dcaf2a57a7f89", + "line": 87, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.test-ec2-instance", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'test-ec2-instance' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "f0aaadf8963c5f5d97718a01354553608ee32d1420a797222c59f7d974bb1fcd", + "line": 83, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", + "similarity_id": "2cf5c44aea2385f7cb78aece4a2df75499316cdf84446a72820f3ba2a7e6de93", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.negative2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "c71dcc8fa61cfc0acc63db2702b0a31b33bb2302c4aca82012f142677a0de253", + "line": 120, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", + "similarity_id": "b388eeab9faa9631be82b30b45841d72c751699cb6ebb8415e6f512c4378ba60", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/negative.tf", + "similarity_id": "475dbdc0756796195e226f50f66f73246fc28d0671e0a2958dd7ed5a1a8116aa", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_kinesis_stream.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive4.tf", + "similarity_id": "c23a7f01ef82b43a0217acbe265b42e2acf278fa30f99c4bdf8ea04e6701743a", + "line": 27, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "ccfc5daf780a3789815c06fceaadf346a147dd09bb489bfeb106edb9407b3d6c", + "line": 154, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative2.tf", + "similarity_id": "38ed35d4d3a02f36700f20092c885c16472af6bc036d8a2c83d6939f4bfc3e5c", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lb.negative2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive4.tf", + "similarity_id": "a3fcf3d04197008fb3e7f4f813613df56470885b3e251f4374834cff846fa617", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_lb.positive4.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", + "similarity_id": "1500659d619492c204a4a0f7b322096af37cb86bf969fede192390ffc99cd619", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "19d10d7985021871f6033297df82ca5d22b1582839b12f5f83024c731c5cbd00", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "0dbafb3a8863ff274ce05aeec673b3c1854f5616c493be6c97474f5d80d43762", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", + "similarity_id": "ae713279a1e484fbea5893a4654f8c5c8512f1309cf6c11b73c358391423fd43", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", + "similarity_id": "fdfa2c9bbdc0bcdd6295aecb3e26bbdc0d6e54cf3e1b7bad7336c3ed4034e671", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", + "similarity_id": "1751a09807576026912e4b78b26b8396e31e4e8734bae6b3e8b889cb5f272525", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", + "similarity_id": "4031d9e9744797bc74017041774553f93773c80cca47b6b044fa27085038dff9", + "line": 47, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "47f3e04d8a0ec915b1f2e3bb3e765afbec536f003daed8102eb3dba2472d0f33", + "line": 94, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_endpoint.sqs-vpc-endpoint", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'sqs-vpc-endpoint' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "0713351a31886f46d6e90b8d94acb01ca5989eebcc800b9bed88bb5137a6b88b", + "line": 74, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", + "similarity_id": "73edc2121b46fdc84b7d7604b925dd7cfb2256664251f054904d2d9cb707c000", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "086b60bb4f6c14c070bef48f0ccd9ee2b66850e8945a46e3e8ca597fce3cb7d2", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "2eeeaaccfbd6f5f73fbe310b3afd9a62e2608da129055470cef48297c4d3fb10", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive2.tf", + "similarity_id": "3356ec5b8eb065f1eec6765e2209ac7d1c49d6d7110ae1f4aa92ee653301de42", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_workspaces_workspace.example_2.tags.Department", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Department' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "24e97704b1962ed61091f0925cbcd5bc4a5b1125e1ae2bad3a2d6fd2599d240e", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", + "similarity_id": "ebcc61a27164a010d47be050245a8ff191b806f8fd44351885652cab1a89a9b5", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative3.tf", + "similarity_id": "32b5026c966424dbfc66fc2e49a99d954c5fc590b696474084111f9f72f19edf", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive4.tf", + "similarity_id": "61513477be63d8ba943737da51d33aa2938db14dc24c3d02a7eabfafa162fafa", + "line": 28, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "2a58b5863b6307644c7b340a03f9c9e14f231db63449673d459ad63b1da34894", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "6fee34612052885b14eebda817edf162609452fa61ed1e8be30eb36fbd6d77bb", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive7.provisioner.remote-exec", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'remote-exec' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "e78c7b2c62dc82ca09bd6e0016271759404f4724d991198aae0de5aad8c42e06", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive2.tf", + "similarity_id": "a9ba0ddf8330288eb9998fb5f5a4f5a97322dd69d16f7e17223f37ba9bbc4cd1", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", + "similarity_id": "26783256bab02b2d28c47d25e504869d83efce0f7204fb461df426456d5bc975", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "9ce5ca32d2be8cb4b5f4314a216e0e70861a8c6f1d9c2fc212d1bb78e79a6528", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "786e8be1c2459e36c29182055a1667bc7341067eec4f57087c31691dc40819fa", + "line": 138, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "6a4fa4e9f565d7a4d2dc935e6d126cddf951fe3784f66a5bf0b13e0763baabcb", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", + "similarity_id": "a0553459cd189a443d1cd7551efdf928db7fdc2a22bebfd9c0cd06973d2c64ff", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "ab78a10ac9b26928b3121277a3b56019d3dd5b47dee3631356c65cf3bd057d66", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", + "similarity_id": "9b1feb92247beb372cd45bff6bd53826f5e18a2072d08ec23a5d462d07f804e1", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", + "similarity_id": "17e519c8770e12effc16888f36d1cc90b28163a4be772cda3adbed539da421b4", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", + "similarity_id": "d865634b9d7fec4f1350d46129fa0a29400c4b8eb8a60870847b87d4573ab04d", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_acm_certificate.cert_2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive5.tf", + "similarity_id": "7ba8578d93dad4cd4aca7634b4d4f7369a9ef4ac9a3c7f7a6d8fec849c813fe2", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative2.tf", + "similarity_id": "865681b89ae6bdd0b67a48a3f86045dab83880633331946003888b1ba91bccdf", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative3.tf", + "similarity_id": "a46cc9f8fd0900ff2ee0d26369a66590ba7680006f1fbbc8d7745aff62d97575", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "0145f3e78f8ba61031ac13495d6b874847d3b943ad067f8198f6a2bddd0f5574", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive3.tf", + "similarity_id": "5d09e2551e958c561c91bd38bffd0db21e18af2266dc24a40b46ba5b2b7280c8", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "9dbba7097368f4a80174261a25961e02061607a7d703a1f977f367c6fec3caa5", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.allow-public-outbound-nacl2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "bb1ad36bea3ece3f9f013a8aa9d661f3c9407ffa0f7ea46affb166fdc818fd5b", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "60d6d83b0af93cefe084157529684dd4318170927e7fa8d72a2ef5fd0afd1932", + "line": 124, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "2af5a4fe03d492ddb6482cdb9ba9e466228470110b1c709a9df627577b9ae88f", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", + "similarity_id": "0bc12158e9d52c8b79fcdfbd4a9f69491133d3c89f4047a3be5c0f1e2e797bff", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/negative.tf", + "similarity_id": "ebe2775b4765d5fcb5c839e3b2f166403e2e86b9db7aaf036bfdec4e15c5e572", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudfront_distribution.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "10c0ba75af25933a1c4becb17dfeca02ebc42834bddee2853eb47b6221821480", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.subnet1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", + "similarity_id": "951db50c6b1762169a16b25d2c63e2903d9c2290b300d3d9a4d558b667f5e213", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", + "similarity_id": "a8b7997808a56c7980cf6dc7418f3b256eadfd181d7d3a6b0b42fd8533eac280", + "line": 21, + "issue_type": "IncorrectValue", + "search_key": "output.kubeconfig-certificate-authority-data", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/positive1.tf", + "similarity_id": "535f8bcbf9da96199cad5cc9e489e6fac5655bf595e2df3a34d99dc6d270d494", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_sagemaker_notebook_instance.ni.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "dd38ca482ff1c6c20841317f063d6d47fdc625a0853fc6413afb8e27588d1211", + "line": 140, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive5.tf", + "similarity_id": "e6e587afaae6f76ca2f61e611d1df4a9147e7305f4060e939c936569f2bc5420", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", + "similarity_id": "3d94bca96c25d76ea9f1a5ceda19ef7731508bb0146d367d7d6880216d7bafbc", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", + "similarity_id": "cde9a2ba0cd2d31f64b3a2e5eb3d523c9994c07d3ca85444fe485462963a71f8", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", + "similarity_id": "93fc580f957201d5f6ff91befbffa2f245cc8a50abb18e342ccf65abc72e3131", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", + "similarity_id": "3687bfc3f57e70c120f1f281830ea8ec2236d419e8e70ae424950647bc530872", + "line": 21, + "issue_type": "IncorrectValue", + "search_key": "output.kubeconfig-certificate-authority-data", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "8b191b4c530e73f78276ac957131c580821afeaf906b0f0a34b1264b7c37fb66", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_api_gateway_integration.api_gw_int.request_templates.application/xml", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'application/xml' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "8eafcfef5ce81e94bc058735983a7b3867152a8d62c93875545957ee980284fc", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "e0cb274fe578ccba2ef9e68c45c5c8d23ae1ec259da75fca5f6a882bf1e834c2", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "d2b6898c08fd6e18d56623025f8860f938a0ff4e1b468c80b49a15a69b5390bf", + "line": 141, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "796361a3c2e697f13d5850a58bc6fe8834dc8e8d8da8d3a7bf9cd0a8dbe0c7ad", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", + "similarity_id": "0539d229456ae9a9283e17c97a519794c9c175182fe32f47820f98da7179dc0e", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.negative2.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "8f6ca9855836897a2d8dd2742032303594a2382820111e672053ad25cb2cd4ad", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "1fa8f748088eb81af5ef4cfc38dac2cbfacefdd3c89f0c24378719088bb2ce84", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", + "similarity_id": "59df7a4bfb60c69399d31853f248c62c7e65c4af3ffd6ff5bd069ec7b7866b58", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "6e6970ba502f16fdb7c075665b14de7d352a766d2c46c263dd53c2935a722b7b", + "line": 109, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "a39ce5076b8c868b51c3a365f1b1200996f846b329171ea312fbd488db067a1b", + "line": 141, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "e4e52aac31400727fa2359dacc89a8f020640e8b89a5170c6fb0bf7af65c29a5", + "line": 83, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "5bccec8da5485b97289e45302101de755e8ba4e509bc839213a2dd395db0b331", + "line": 119, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table9.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive3.tf", + "similarity_id": "96048361e52f0229a1a0f007f7f87b13589536671b340eaeeadaba680b91ca7b", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "module.vote_service_sg.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive3.tf", + "similarity_id": "b01a895d3c2f78e13a0b076a3b1096b2a65cb25d98a83c6c83b1acf7f74eabf8", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "7a96583ac13c4c601573f52c5b8c4783fe96e8040e3b100963894a2678c5c3f3", + "line": 155, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "d34a1237e85bd0b8da1b0f159af81e6580e77bd1e4a96267fc73517404c96021", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", + "similarity_id": "290c24060b9368587858021c60820235b0ffb21194d5c9f9e27ffb7326b07ade", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive2_1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "534d52020b8b62d50f31264d52899df584867067cc5947ed2688ebe7a2d47cf9", + "line": 45, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.subnet2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "6d8e7f4e7e86c7fa5553db570235f9b572d7f8df708bd276058f8d0b66c3c136", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "1619c77ad66fc3283a13cd8215d4a0392d36fbc5f5121b22e466febfa1f11141", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative5.tf", + "similarity_id": "814bb0d304839447b58a2d7421c574c026e58c6750ec8a53d4d8bce60fdad133", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", + "similarity_id": "51e4701d93a00f6c769b722fb3f730f102f08e19ff8aaf572aef0479b37cae41", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative3.tf", + "similarity_id": "7ba565ca3aeb22afb29ccf57192052943c34243394659afe2a7bf93031eaea3b", + "line": 46, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "de74887682ba82a259d48ae5b4988dfbfbae18c6fadb4deb5d63bbd8c40cb7d8", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "05401ddc1a4c38edc2470027615a889a75c5e47b5e1b9eab15db14d8c2dfe701", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_public_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/negative.tf", + "similarity_id": "6059faf1f4de7fe0636491dee6dbbcd8083404accd85c0c04f49ea96743c47f1", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", + "similarity_id": "4c4f88f44420d277b2a6f58b9ee814c57989b1d300cf1663f89e6020cc1aad43", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.monitoring_negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", + "similarity_id": "b09ee313bb93c1cb09fa18a46aeb6878c3951fe7f72c96cb63ac497acb83a7c8", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "69910aa882a1c6bf4131a1f472a875059ca02027f1daafafd086c92691bb08ef", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", + "similarity_id": "d8fda90918cabf8cd22240df33aa517aa2288f4772b41f5bb1481546c1d43851", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", + "similarity_id": "7e41185d1103bf9b5c208e36afd3cd3df4db9d46b5af13dae2113bfbe3ca0647", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", + "similarity_id": "247a223eb12a95581c4abca3a3404706aa8ecd13b7d0dd9c5a2799ac77157834", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive4.tf", + "similarity_id": "f1255825ef16b08d3252268918ba10d3a9a74bb214d709cfd703fc4393bd3bd9", + "line": 28, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", + "similarity_id": "7768b79599ca82df2204d6d3e92a19b84b6938a99ed28d4ca223069edaf211f6", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "d5cc18c31b11f5629c2664d404e2dfd30081a2a7f3b085a34b74809fb394687e", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", + "similarity_id": "c18d34ca26d5a4ecb9e0c3196a7b0ddb5db68d8211d5a3d0aad033e2747559d2", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative2.tf", + "similarity_id": "661a5184a7bd067625cda25044441d4455b9871ae06b8fefb5fedef16d68652e", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", + "similarity_id": "ccf18e0c8d730fb13c9e865646e25a4d74b1a4df4363f83f23ccd3ce4ab1c9b6", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.monitoring_positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", + "similarity_id": "fe4d74cbe2c2b8069e87929266fec56bf8c0906b0c742064297203925b54a71d", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/negative.tf", + "similarity_id": "4a9240a1c9d160524ef27c114179c4e6e70b1c62d7e3eafd3003e0c0287ec51b", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "90fccc757a5a158b6e222b2d98ab2cb59523cfab8a273060faca15520cb63957", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "f4a1af720b89ebe65f1d39757dadb99840aaed7b158e2b8463c146f7ae216bd8", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive1.tf", + "similarity_id": "6d9456a2b03df937a09ffdcd98a93ebb6a32fef931911ae34a0fd19882cc6524", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_workspaces_workspace.example.tags.Department", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Department' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", + "similarity_id": "fda413158e2f207b723acdfc8d5d360ba77cbfe2f70a512f9e9aa78a3a366568", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'basic-dynamodb-table' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", + "similarity_id": "280a685aad832b1588fb92d139adc43ecbfc827714c5eeb7e050e51da0f6b6d4", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive6.tf", + "similarity_id": "2226b388b5ed87e1f649c05fa9efcb602c73e47ca32dfa9479b4a9d757333494", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "966e241f56dc379851821623812c4d65ff9dacafb489ce07d629a17c2b72c7f7", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", + "similarity_id": "c52f47808ac3afbce72efcf7fb9997732bd3a32888de579ea68234dcf2b5a88d", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", + "similarity_id": "1ebe83b7020d30e1160c5b96b4cab37d9ca97a8f2881472fe36d6c4ca5f7f892", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative4.tf", + "similarity_id": "cb7d75e0c0647a3abde82049494fd1f360c5513d80554e3b77112a6f9530faee", + "line": 48, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", + "similarity_id": "1e95d4994b101b5e32dc18dd60e6273947f7126b85690055781a008e9caec078", + "line": 48, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative2.tf", + "similarity_id": "897a1f5a3cddbcc644f9672c3015c60515a2177a95611ee43cc17a49aa68e383", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "0a3f149ebfa1742f94ddd4da62fd1a0252ae3b8a2ffe13823ac752bc2003d6fa", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "5e5c011c45bf992ca1c0e946ef4b4bad41051ed3f73c4209c80e0edae6ffc948", + "line": 140, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/positive.tf", + "similarity_id": "ac217e2028c7c5a0ed93bf521584f165f86644f83e4272e3146b449881048783", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elasticsearch_domain.es-not-secure-policy", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'es-not-secure-policy' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", + "similarity_id": "6845fda5f141490c132da03805391b295803f49ebe2044d974371bee395a3785", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "3c17c0b7663cf62b436e93cc64cb01465c1d907b7d2201e2e3d30b49c6d107bc", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive1.tf", + "similarity_id": "22c53730bd093a452802b3c2a60e284a719960a57af699c6ef5641a9e2e54e47", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_alb.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", + "similarity_id": "d3c5e661aaf939bab5ebb33c2cdaea62439f28215261f4e8d951764eb0898913", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative2.tf", + "similarity_id": "c9e42c3dcdb8d4229fbfc51add88d064126d202a1f3adb480ca981e49bf21abb", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", + "similarity_id": "3ab313038e15de5a7e6362ac4a2cd78a7e933c2fed23e85d31584572bdf9a4a6", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative4.tf", + "similarity_id": "ecc815f005003a2f9bddba2729d7baf07a5b6b9eb0d8725b76911c95c077815e", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", + "similarity_id": "8d137c6a9b7d4287a2d55213b065d8cd48058a0b2795c3d817a1518103ad197e", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "a5594e333c1abded154035adcaea38a80433cc5662ffc6cce3979f2a286418e6", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.subnet12.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "413bd74b0ff0fcf83a19cec882d1728b4f0a7869f22ca74946edbef5858f1c3c", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/negative1.tf", + "similarity_id": "28b1ed5a657f2dc08e11d3227e8e64abecb41c026e44d12da0c8434841c0c10e", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_acm_certificate.cert.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", + "similarity_id": "4ea82e2739203c6d392fadb0512dc76afce1468d9e8cd218673d32434c719485", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", + "similarity_id": "996de3745e0aef295c015a3e1f387e1501402eb88d82194c741d0222f1a7c0b0", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "7b5a2b08e20b0176ac4532dc17a6651e22a0a3da4841b8aa5238cb2ad8197702", + "line": 62, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_private_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", + "similarity_id": "5557f670f3bd973320cb018ab3ec77586d6407db810e337db7d5f669ca2adf3d", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "ce9b4e603f587319f6f15b26fb9e52934fd0710171487325649cbe66a8e5aaa7", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative2.tf", + "similarity_id": "54712e918be38f49acb889405d78e2fee1ea5634fe73bca90446b1b52dc9f881", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "a5ae0df3456797bb05983d9e53288ea82f2a989b5e5e828ea5c302459b50cc53", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_private_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", + "similarity_id": "1fa7108e9c0d97851e5894c16f036d6f16c0173bbc8f362c9565b03c4f78ec72", + "line": 30, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_kinesis_stream.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "7a1d8eb9a680a4691cf0ea4015b191113d937e42be8db6bb19f29d31a7844082", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", + "similarity_id": "0f007a9455e1729085dde42e8be9a029be2af3d3db7d8fd9888c1143b22a5fe6", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative3.tf", + "similarity_id": "8e906c3c4433cff6db1ab0df4ccea9290ff8cfc5648c1aabbb2105579b7be46f", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "d13e2f8f59828e5b06b6c001dd8c13b229d8c246e982737eb35e4322d3cce292", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", + "similarity_id": "78aa2b2c7a7ed650b37a9f3ae619936f8108c472e6979ddc79ef4dc53b812bc9", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", + "similarity_id": "59474ac310ff3e312c3c5e83755ea79b0491ef1cb94a7e62601cab6ccb2b2bee", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "7af1a7a8f16d9ef6fa0ccb24e87415319c739625476a7333728ba8b970a4391f", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "f1987bd2b09c6fec35cf39af0390e550b503b69cb9bb23d31285c65e40b8c6d6", + "line": 125, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/positive1.tf", + "similarity_id": "fc353689dbd5c0155f6ea75bf400d851a19605ffb291640d5256ac277626a71f", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elasticsearch_domain.positive1.tags.Domain", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Domain' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative2.tf", + "similarity_id": "1438039068adec548cb6f8d75064e329e1d47879952102b960f42318f90f1e26", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive4.tf", + "similarity_id": "14f33de475da81042f047062655adc3c7716ad3103129905df6dcd071072347d", + "line": 27, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", + "similarity_id": "9aacb8137eb39cc4d1814e42b95d3f420f04d5e3e24ebb43ddd9d737190e6f79", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "1d350da01814403119fe99a5b56fc712d8d0a5a24e4a2c284a00e25bdccfc55c", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative5.tf", + "similarity_id": "516a01ad96287f750e48673142d11ecea1506b3158644e602b06015946792121", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive4.tf", + "similarity_id": "5c93c1c5f8470842e195e36035d647281036d20e37d7064e06d7335567875011", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", + "similarity_id": "237c385deb9a955f374d9f5cbeb1d983b299ec72916c0aae254a2ac6df91791f", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive5.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "6c85770e140c37d85b6cd1026f56a222e92c974e8b4436967e8586e1a6b056d4", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive9.provisioner.remote-exec", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'remote-exec' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", + "similarity_id": "23488356cc9a8a8e583bcb9a38da6d475687fed5de19c230e88607d27d00e997", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", + "similarity_id": "9b9bc7ef9bf98c5f140fa355a82d07fa71e0e7f57ed25854cbeaf772f9d14a18", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", + "similarity_id": "5cd6e6ee41d5ca6b5375e464175cb57df467ba338a385134d28573bc16c58475", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "088680432b2b90e671b309f40ee800fe0f3f6c4f748dbf88daa1d8c6cacf61bc", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", + "similarity_id": "2257c7935ebeeeed7e3dca56da7ceb31b239af28dcd861f14fc904f822f8307c", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", + "similarity_id": "4f8b88a0b5b2f97119d4110f1c7720d8498d6d649301e8d4b77b3e3165844c92", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "01ab6682483e44c8da35b270ba78316099089e1fbc636f292117f28332e423fd", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", + "similarity_id": "f9074b75bdb9a8b2c59bc02c1d69ee52d8aea5b682b12ca8864f4dfd1d780641", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "a9e9c79f0352a77dce970ff96b136fe437cf4361e5478cfc688e8c3533cdf24d", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "b8ed73f39cf91709def8340811684935697a0c336a51d0a5e5129673cd811711", + "line": 50, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.public-internet-sg", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-internet-sg' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", + "similarity_id": "881383a3d302e15cfae862e935a261a814e35391573778a44ef9428b76614cd5", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", + "similarity_id": "abf47f74f66d46c4593f2bd59d7a28dd7a6613e857438c8e7e4f8b1565d18da9", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "0299bce254290d328037094c61ead9d91f750e65784cfa320b877eeaa9a9e3f6", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", + "similarity_id": "6091f7175c621413c58fc9aded221821ac189094270ab30b1695af6c93fff319", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "b4cbddbc3f08e0e04af779e43310c204b7ee87bc81cc2bfd16b2213afca79290", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", + "similarity_id": "f86ecbd26c6d6f8df31e4a23bc1624a91a261ca53039ba52ef921cd9bc1cb82c", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "cc1f0fb5febd0006201a1445cf2e80ceca05ccff9d628615d2a63eac807cf5f9", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "8d84148dd5aa82e6da577edde1253d026295ce33298d7a758727c8d90f032986", + "line": 128, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", + "similarity_id": "b97b93d0e270367bd986746f55c29d644c4d1a6de1b6b974f64c591290feeadb", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive4.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", + "similarity_id": "e25ef56461f4cfc4a35f0bfb833300a6b67317f44ed74b36b597a0a069155801", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "3a1b1207c276b30a6b7dd204dd92d69b1a6b6dc360a2bc516b0fc2f96ce6603b", + "line": 124, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", + "similarity_id": "0e5f5dd251a8c4c3c1eed56f38e05c74fc467fdc5f3f6951c808d24816742558", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "8dec0ddfec290c778497e7abc4bdede17380ae014503cd7dcc68229324b5b892", + "line": 49, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.allow-public-outbound-nacl.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", + "similarity_id": "a67ad7d78f629f07e1883705e58ae8599c0376aefd83a665523fff1b6bd93119", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", + "similarity_id": "3e3a29ad1782acf9bfd81cd185feb55c1c151144734532dc55c48cd7c25ba244", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.postive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/positive.tf", + "similarity_id": "5ac7bf30867e4d4a7abeb2e3c7ad1ff8d5f3f730455335907c3e6e80107f78b5", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", + "similarity_id": "0ea51b51a68437d9d04828db1aa144a786086a8fbe7dc7a0d274d4937d8c419b", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", + "similarity_id": "884fb8990831f55c09a918fdb3d80800b4920c806cc516368ee744f8ba111bc3", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "8aba5bc0efbd23ba8aea9c60850cdaeb3a835123c19afef0b92654d8ea5a7a75", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_role.lambda-role", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'lambda-role' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative2.tf", + "similarity_id": "35fa9c039f38a765fb4e599851cbe9a51b8a909e4c2181641354650b745196ce", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative4.tf", + "similarity_id": "7cd7b030b965ca46dfd68eed2aa656bf75941c7939c351d76727e4bf00d38b99", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "244c45d2cc5700749a37d9782668fbe9a1ea07ffcea1b8086f976ebe3a69c1db", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public-subnet.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "51e0b91b0ae5c7b2ba55f6e9126c084cd7c3324b703255d7f771e392ac97b868", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "b07ba524b51265ff7600fedc1edb1a62679b99a9dedcd14c024615068529ee0e", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", + "similarity_id": "971ba337f9f2288085c8606f33a7efa94188e3494d0228849fc1a539d16bbc09", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", + "similarity_id": "8385903249e281686df8366beb1be4071322a2fbfabcc8eceb8698d2ab49b5fa", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "fe5e3fffe0d67985688482b99a3a6a0b27920abfc40276a69a39bcd6244e7f5d", + "line": 125, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", + "similarity_id": "51fdfb929f1945c31ec986b2efe7899f71788fd143e1533186b2de6820fb090b", + "line": 45, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", + "similarity_id": "b0f97b8b5bea6a929c0ca131bf038f85754c671a3b7ce546c0b8de26a1670350", + "line": 44, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative1.tf", + "similarity_id": "1429f2b9c1ae90284653f0fc6fd8a5f5be7c4ec53a93c0306411d9fd74ead226", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative2.tf", + "similarity_id": "f8b2a8c00f824b0ddeae1b8fc9e6f4de23c7bce93b7939810691f29318d97fe3", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "module.vote_service_sg.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", + "similarity_id": "16f99359b3c70bffb8ff5da882861157798754723126d753896f61f1e5b2e62b", + "line": 24, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "346acd27d0cbb20747438450da05d5534958b1f1a2e09e2f16b60eeaa2fc41be", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/negative.tf", + "similarity_id": "3bd234eb3fac4a5dc78db03314aff25acae0343da7ad35056d4990dac296f420", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", + "similarity_id": "929f970c8183dd2f80758778ce519f3f1fb1ffc2f7d5e76c801fc8c91902df4e", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", + "similarity_id": "69bca9cd4301fad25737f3fd31ec40cd41e067663f8ef19345c5cff39fcc9b63", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.negative2.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "755bdf17246e6570114eab6bf577ca6f70906cbb734bcf94b58c65de0a40abdc", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", + "similarity_id": "348251ceddf3a5d54a2adcaba310895ff1bf9f065e6fbedc0197410524b59021", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", + "similarity_id": "f0ebd8c0a709baa5e15cdd44ac726a37c823c2d9b3c216590af17a92c8aa3bf9", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "a26bac5a4a656b1b93f8504926dca938589e6deaccf955c507fa328056f160db", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private-subnet", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'private-subnet' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "96f546c328b671362308c95eb60a5058f658aa783a826fa0886030f9cacd7853", + "line": 154, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", + "similarity_id": "85bd9583cd68b68ba4c4e1d02d691450fd67ff1205b28cf5fd0514599fcc3281", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", + "similarity_id": "17d941f780e9b573a11195a1486e4442632d4f6316f66bcfe4fa6cbeb6ee929a", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_ebs_volume.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "2aa7d3da65a556a6f83955b30c3dc39b8f4a19039f62ceace153891e326ca553", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative2.tf", + "similarity_id": "3e9790f01ef4a507bf67628892de9bbe569f54a13b61988d7698d684005ad4ac", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "dceab47076ce6cc729e99044b4f4058afbe381bd12903408f18b52d1e825708d", + "line": 40, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", + "similarity_id": "e8925e812be454f72e8414c984a7069d01708911ba789b1a397e2388f6513735", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "b839bf4dd2a0ba1972a53ac741044af0c29f0b2bb284e42140835f174c40672f", + "line": 103, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_sqs_queue.test-queue", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'test-queue' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", + "similarity_id": "c01cdfc16065f5afc95f76a609b5abb14234662b6c31f4bc4465f42d461c4ca8", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", + "similarity_id": "de4c6414194955b94a08151b094ba30deeeebb73f2baa4e43c0171ce0fce91c1", + "line": 34, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "4284323071233b6bc105046bd70d89a5366894f21eb165bccfa7ca671a2e3100", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "b342c95db84b35265b809be3ce99c8f2476be9cb1ba5e6a5feb378e06cc5cca5", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow_tls.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", + "similarity_id": "a9ae1578fdc440251309f785aa6d04323bde53c17eaf0aeb6e40c111abc2ed4c", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.monitoring_positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive6.tf", + "similarity_id": "6e85544bf3ca1733a04cd0193415955b56352017c4a6c546085ecfa324410395", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", + "similarity_id": "49b711336aaef0a47a4f83e67b8a9ac43dd97a6b679b3ad5b2711edab751f593", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", + "similarity_id": "36ec454eb71fbafe09b93c9182ac449fcbc4365146bacd601f5e3ab4660ccccd", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'basic-dynamodb-table' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", + "similarity_id": "73f8331c923c1a1cdbe7ed7c487277eef1535331a3a0dbad669bbaecfa396d3d", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "42f20fa8af421ac9a575c2291a3f76e5dea2b8bc9d14521986495b31812ba6ed", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_endpoint.dynamodb-vpce-gw2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'dynamodb-vpce-gw2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "7412bc25b1411dc579ff7c4a7f1e1076e2968b2ca2e0db59d0d8c53ce732ded1", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive4.tf", + "similarity_id": "08f04d68018af2808b97ebddc74e895cb7e1658fac24d700ead7c92deb09f847", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_workspaces_workspace.example_4.tags.Department", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Department' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", + "similarity_id": "4a083d8a09cbca91dc31b3e1a878c008783b6ac4b5407f4bc74127e3728a0153", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", + "similarity_id": "1e5d2a7cc5e055cbc2c99fbff96c21c4057b0ffa2eda8b30b7b3ff27d351fdbc", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_without_kms/test/positive.tf", + "similarity_id": "77200d3ae45d1f5673f4dfd85e3e364b5e70bc755fff5ac7b649e5ba663ecbdc", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", + "similarity_id": "96cc8f06f61f64abcb6d7b2c350570ee1d2cba2e13ead36e95cfa65ee3c30239", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "a308857f8fd065d1aaf0db41d4fbbd787610cbdb4b96f0212f4a49b5a72fa91b", + "line": 54, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.public.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/positive.tf", + "similarity_id": "a4713dc5892d94918e91444a433f9f1faf7b88d8f2817a5965f99c28a828f7bc", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_sagemaker_endpoint_configuration.positive.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/positive.tf", + "similarity_id": "42c375462901ff2a45815aa7fafc5b05ee32f5742a4fb680736d7ab2fa849126", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_api_gateway_method.positive1.request_parameters.method.request.path.proxy", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'method.request.path.proxy' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", + "similarity_id": "453c396ff120e84c690b7be23e2cb7453adbe7f4c0c1c79a042a68e9b3f84033", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", + "similarity_id": "6bd0ee3ebd17cf08cd00ee69b6dbd56dd4fe3ca4ac5b410bd69ef827513c58db", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", + "similarity_id": "2fe696dd55f03e7f8eef154ec5dde099f469d4cef4d83aa0ba7ffb102957b930", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.positive.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "eb5533df2f2a12148cfcf4ad3f10fa62e9d7de62883c8c2e31803f998bff426a", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive2.tf", + "similarity_id": "db6e59040382216283edb5e53eee761aa2b841070ffbad1debfd107fef0d6f8e", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_alb.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", + "similarity_id": "27fed3a9156d4654e316ecd8873a367b7bd9cc1294d0bc3113efcdb7d0ccdbd6", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative2.tf", + "similarity_id": "ad96a9969928025164d56f62846468d03f99b04c1eb41b1626a05fc418cf26b8", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "59cec616e1a18b2395a5e78e82ac4fb26750e4dd9853b5e0b856dcf3c6770fd3", + "line": 74, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", + "similarity_id": "f1111e12ee7ed489204e3d10866de884356279e3073b3c9e6199babd2ac241b9", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive1.tf", + "similarity_id": "e78609b6fd0e71425961507ed22ed0cc850652d346edaba272be5d8b7b1cf572", + "line": 3, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_default_vpc.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "939c7406aa1510363b522b666a0099468cb172bf316427f5043ce26ef81ee1dd", + "line": 26, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private-rtb2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "0c4f3a5317ce6167a485c731606c043ee492c70861f8848d44e641fc0f84d2c2", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private-subnet.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "3bf42280dae049b4ae42514be9f750073894d04fa8692ce47acfe8dac8078ff7", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", + "similarity_id": "bd52d6975ec405299356bf36a5a8bdece691750c1d88623230ba3e3303055d64", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive8.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "63b0ef5062829e4b428e2a2b7da8179ae776e04cf6c4bf29a9a775fb039aead8", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.b2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/positive2.tf", + "similarity_id": "c06ba30eb2aacd28485fb9992d9ecb4f8961be2f0e96921cd6a460535c696c62", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elasticsearch_domain.positive2.tags.Domain", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Domain' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", + "similarity_id": "98d6b534947abc0a21005acecda6c0cc7e92eb911eabd37c1dcb60d31ec942f8", + "line": 52, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_kinesis_stream.positive3.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "a38369fb3a5355b6d831c0729b74eeb92cbed9a8c4af110c072bf27da6bbc6d2", + "line": 43, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", + "similarity_id": "c39b340b17d328ab3523f92110d71395356a8b5a699bd72656748be0a5f988c5", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.positive2.tags.Application", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Application' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", + "similarity_id": "7d3196b48567e3cdf8b843b452ca3497ab68f4c79d7021d3b3f1691e1cd6bfef", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", + "similarity_id": "8ed2747a543bc26a6c11be518a9ae865f90f79105d163bcf811dee88ba878120", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_endpoint.sqs-vpc-endpoint2", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'sqs-vpc-endpoint2' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", + "similarity_id": "cedb60c696961f34adece5afa6d71abd2afa0efab87d411dcee08ed57f8191be", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/negative1.tf", + "similarity_id": "7471ac636235974240303c5f89cc2a22eda718f926e99987a631bcebd84b4361", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_workspaces_workspace.example.tags.Department", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Department' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", + "similarity_id": "ea50dd827806f9b9941dfe91709dac6daa64479f8590e3053d210762e1cbfb1d", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative5.tf", + "similarity_id": "2079cf232e99edca125015d3625bf4a553a4c6bfad58170aa11279a30e8710c0", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "3998381bbfece72857c646ffb615364f55ea6b5e628ffb41bea3ed4765f39693", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.positive9.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "3cbe90a5e5f9d7fca04c276c741668fab16371041e47ea0b6328b1600a92c7c8", + "line": 155, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "a552fa828e5b13220844efa1dc9af2bba6a16879202d7927040cb8b457132d12", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_security_group.allow-public-outbound-sg", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'allow-public-outbound-sg' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", + "similarity_id": "e24abf92d3904ea6f742530c02085c6ce6a0185c07848524da4bfbf02cb3566e", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", + "similarity_id": "77e497e76926f3c56e14c4d48ce0edb19a02c018899fb690f212dcb8e4b7a968", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative3.tf", + "similarity_id": "4e8832d61f3c8220a4678ad6a81cf6bb30d7c69aef032e3b5aca411659893858", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative4.tf", + "similarity_id": "c2b2a8ade073d489fc064d81d2a7f2b1a0a4e162514d402f06479ff95b7de8a4", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive4.tf", + "similarity_id": "59dd7e32da16aa09a18c6df71a4cf20b73699642f07f82c99aa263bde8bf7b68", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Service", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Service' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "031881bb4492874b6300913defab119f3370236355f55b243d89e154617d2efb", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "83432e2c53c8b9aeadd40dd82ed778d4f1daab01329bfae29d31d29a423f2e67", + "line": 90, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'basic-dynamodb-table' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "33dbe35137e6431cd5f9fa9a0d11e8404bf7aae935c280620d090a71a1263cd1", + "line": 62, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "4f2d8819a20263f5792b87febff1219b6cf2c97ede516d69a4ebc52ae7b4d68c", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_public_instance.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "e174a63f98947437c39f4708be33e855c67f03ebde8ee5c3c0c935d5d7eb3b71", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", + "similarity_id": "4ebf726cf97dbfbbb362264bce2629bd8e7c003bc2deda0c6fc721c723b37755", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "output.kubeconfig-certificate-authority-data", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "85bca752ac9b3b8ccad0f9f993e91172a5f7a2d7763979244db0dc2634280a75", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", + "similarity_id": "cfdd3a66d4359735adbe4e444fbe5c4f4aa76540f26571192fe46b4f057fe0c0", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_user.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "819242a879b899ffa0cee9555afed26f2a0f1a183bd676b0351c05ae0d393569", + "line": 43, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "110dfbd065a4ea1384a903320ec95e2ed11393caa041b1c1363dde526c809856", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "09fc4b59a9f4ec84ddcffa8ef6d1fdf932733645427629ef3f0555a3252b1b04", + "line": 45, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table_association.public-rtb-assoc", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'public-rtb-assoc' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "4424916e57155cc434cbb9af97eaab909cae02db12a80a0d118450e056bd8998", + "line": 139, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive5.tf", + "similarity_id": "f9ab8774cbbd640225ff179f967078c17cb2ce068f2cacb9bbffe85fd7dbf6af", + "line": 56, + "issue_type": "IncorrectValue", + "search_key": "module.alb.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", + "similarity_id": "17ac669dc753a0e818e40cf12fd235f6b5ada51ddb280cfe6d1c47ba6fd0b568", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "5f660ebe2a3f7af747379cb7eb4d15532dfddc9bf6b2a0046c379642e96f448f", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive5.tf", + "similarity_id": "e74af1af9a679cdab3fa52406dcc1eccd79ca59fd5237bcb3097bb1915ea8d45", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", + "similarity_id": "fb284e794fe6cff0fb65c8e5b25d8f724bc6ace9184fa1dc21219893f8ca2a99", + "line": 33, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", + "similarity_id": "83da13b1e64eeb5cfde9ee9183bd9bf573e3fc42ac4a4e716378dc54de63dffc", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.negative1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive2.tf", + "similarity_id": "c869335e626d8f4a83f67d88fad992441847984c9bffaaac14b15e5cb6bfda51", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "module.user_queue.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", + "similarity_id": "e5dfa07a43773831c06c73bd233327d02f2d8500d00f3cba3d10e124c8af1967", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "435517ebf7098a7a6591e655cdd0edaf087dce1b88ae05bc096135c53f918dc7", + "line": 43, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "c5e3ae193b2c7d65ef6f79dd8b7133c77552dedf207b57b2ac2bd3452378abe7", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "4b24f1a5117b3c47e61bfe514fcc00fdeb17f2a2031530a147562f2d9604e3aa", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", + "similarity_id": "c471f89017099d6958b0b2a006546532a831e5916271d4a3317303d089411d29", + "line": 34, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/negative1.tf", + "similarity_id": "82b9d5d6f8774514a9bc79232b257f0e1def4fe06ad5c4a28a876d8e4c260cf3", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_sagemaker_notebook_instance.ni.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "f9de5332b5607f47780cd9e30670a59f641cf80272781596dabb777799f8bf07", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "b5a7fd1c89f081acfe52b3c65c39e44cdfef3be4b49dde0b4f0140c057f12cd5", + "line": 64, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative1.tf", + "similarity_id": "f69206dc3763f31f1af04ea36ad378b0b825fff61897dabe0bbbcf7558009942", + "line": 10, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_alb.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "9c09b17284594759e4e1cbeadb205ea4d49c35d4a9a9b2dfa0291c7fc3e81778", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "943e0501da7e97693706e63f68cb49a37623da64e1997f9987f8b13be49635f3", + "line": 42, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc1.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "a887f56cab3b06540997b3f969cca6a3cf3653b17589e58eae01e37a9423b51f", + "line": 138, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.private_route_table.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "575699d258d9c5b53d96bdc04f862d87d90ecabb8be3b2a95a68ea9175c8f16d", + "line": 83, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "f21ca8b17304dd763898d05c3c3d8b841ccb4e03ea45cf667bf8dc8fe2c86917", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "b2aed6f29d22ec9c89b7d0987ebe324bf8a5c1663a315abb9f970197e871ff60", + "line": 72, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive3.tf", + "similarity_id": "09b99e9bd1aa7f95998ecdd1816d5594381f2e741258e1ca25b0d4621dabb40a", + "line": 36, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive3.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/positive.tf", + "similarity_id": "c48d35cce6fc791666e9872dbed0e75b16496f13b13c8e1fe1ef67594a08e548", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_efs_file_system.not_secure.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative3.tf", + "similarity_id": "7c06cce6aa5bf47817df325e8d30c5a41bb563743a46fe3f93a5ebcaad42ddca", + "line": 47, + "issue_type": "IncorrectValue", + "search_key": "module.elb_http.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive2.tf", + "similarity_id": "1d76d23dcd7f40f017b220838a13877514708e1cae2cd0aaa1a96495d45444dc", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.positive2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive2.tf", + "similarity_id": "f1e2d7018aa155626aee03ff60b590ddc43a0c8c01f0cdf50415fc46d3e844d2", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", + "similarity_id": "6308f1c09f4f1a2c49080694884616307445d0c83e8fb726e7ad68d3daac635f", + "line": 23, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_instance.web.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive2.tf", + "similarity_id": "b2e93d03d485c97fe0358d969b678a10d865edb9d0e9770d6d4c06aaee099251", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "e3a8d019d0604242fee6fddcc6f020a29d14a5c0e1b4b3e06af77b0283ffa291", + "line": 73, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative2.tf", + "similarity_id": "8c0d2e89ea9a32d6b2bd9779aa116fa16ba3fa41b128c9870ad2f1f437e5513b", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "dce0c3ce51368c2d8224c0e3015d11bf6475f10393805d6f8c5e609062b8364d", + "line": 65, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", + "similarity_id": "1c9145864f61e02bf7358770b06b5656caa7f32c7e60c300c5204116777c44e1", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_elb.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "7978545e23d34636cf7fd8cb04ac08190761afc582619c16eff2517c8ba78e73", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_nat_gateway.nat.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "c4906d9d9e48b34bdcb435bb4998a0e5bf4d701a76299abb96ed1861ee3d0eee", + "line": 13, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Root_Account_Use_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_Root_Account_Use_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "f1da668d4d068beec42ab936262ed8c20a7f05969713cba47459e79a1dc26579", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative4.tf", + "similarity_id": "8f1347c3e9ee906de14af43028242063eff022d83ec30116354cf5053b855287", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "9ed4a0099ae03998c9c9f68a17f062556c958831102604f9bc571d0cd77e5e33", + "line": 111, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "b0fce6713d19a762fc0dbb3c8d60b93061877a82004e9ef673abc190b4296e8f", + "line": 82, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_internet_gateway.igw.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", + "similarity_id": "fdfbe5f1dc4c40874ed0afb62780c9c24aba28c4ab26e963d8fdae62c3d0b5e7", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", + "similarity_id": "9614f8f17fcffbd9f4fe2c135b70ed432f0989336d222fe098d9a38d9c07954b", + "line": 19, + "issue_type": "IncorrectValue", + "search_key": "module.ec2_instance.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "caa26eadde0c2a8a18c028b530c37f8ba29d24236f55fcb5189e1f4fd161502a", + "line": 110, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/positive.tf", + "similarity_id": "69a8129bf9c3027161520db6e269babe57bcacc1b326c22f11519cbf7b679536", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", + "similarity_id": "63f9dd457a62cccc5575b12755a0bb040dea11999f0e2e591218bde4c5331a74", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_s3_bucket.positive1.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "ba94335c337eadb74fd88c73d332b0697d4f468cdfa5782c0adb4079ddd18545", + "line": 5, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", + "similarity_id": "a08c0d8514692799d1ca77e755dc9cc5d9b3a9ce3cbcc47a5ce7c5b00ff3464f", + "line": 104, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudfront_distribution.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", + "similarity_id": "d78ead0ef2f3187e592e934a20987acbfd502d94c3870fef6048c950cc5358cf", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative3.tf", + "similarity_id": "57539d55fd7928bc7812965c11a25666dc1ecf67ab045e79593eadc684dca803", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "d6be5cf2a7b8e7af547d08fe450f13d708341d129a49541f4162793402152fb7", + "line": 74, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_vpc.vpc2.tags.Project", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Project' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/negative.tf", + "similarity_id": "ef717a745662f6b7af47dada20523a417c9bdc77e39001cfa4e4432d27bad4e7", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'VPCCidr' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/negative.tf", + "similarity_id": "17c379f004bf49cdc2b697667e079fdcd71502410b5406fef85530c5ca66ec99", + "line": 22, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_role.negative1.tags.tag-key", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'tag-key' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", + "similarity_id": "e21402fe5c2421b651e2e42826eb7e5e3e2c5277a6bd3d3580eda1e73f8f9773", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "9d5ccf4a45e6116f4848841015e4685aa7c099132d5917874f6a4d7650a69274", + "line": 119, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public_route_table2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive2.tf", + "similarity_id": "d1e86ab3ab02b04d771934fabb03d968c9a0b2288858a4df7b2c026dd6a81d91", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "411772c66dbcf4b8153d6328b2933bcd5bc69a06576c5d14a805ad94bce7265b", + "line": 35, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_network_acl.allow-public-outbound-nacl", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'allow-public-outbound-nacl' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "4aaf805eec7747d7105dc9f24d56696159d71046f8e42aa093995eb99ba37458", + "line": 41, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_route_table.public-rtb.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "2daa3b1ad23ebbd0374fe99a1dc7b9e0253f02af5669ba87db6645da74122030", + "line": 12, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", + "similarity_id": "58ac15137abcfd8fd8c93877632f209ee2f1083c18cd921d40b1f47086674a51", + "line": 49, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_iam_policy_attachment.test-attach", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'test-attach' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "5c245006fec121466fa24e2c8f0af2eed5c6f741a9f7539f9706c861506d7f4d", + "line": 18, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_subnet.private-subnet2.tags.Name", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Name' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative4.tf", + "similarity_id": "48f8684c9a856db56f1e2bc7be347dee89fdde3bb0db344c633f296632d5fe29", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "module.vpc.tags.Terraform", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Terraform' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/positive.tf", + "similarity_id": "063674bbee29646ef1b3796731800f024b3ded6e818a327f51392845cd048a21", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Application' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", + "similarity_id": "7278ea934f5b3a38ecef69a14e586ac1fc23033f8172ccf1c4de807c42dae6a1", + "line": 32, + "issue_type": "IncorrectValue", + "search_key": "module.db.tags.Owner", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Owner' is not in snake case" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", + "similarity_id": "dd216d3f43ee7645670a1a2a52d26ab2d820575712efbbf08e43917b8f8dc4b3", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "resource.aws_cloudwatch_log_group.positive2.tags.Environment", + "search_line": 0, + "search_value": "", + "expected_value": "All names should be on snake case pattern", + "actual_value": "'Environment' is not in snake case" + } + ] + }, + { + "query_name": "Neptune Logging Is Disabled", + "query_id": "45cff7b6-3b80-40c1-ba7b-2cf480678bb8", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/neptune_cluster#enable_cloudwatch_logs_exports", + "severity": "INFO", + "platform": "Terraform", + "category": "Observability", + "description": "Neptune logging should be enabled", + "description_id": "eb6f1a3b", + "files": [ + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive2.tf", + "similarity_id": "1c0405bb165c729dbcf6a049168924129e957282b780ae14cec0a77c49e669e9", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_neptune_cluster[{{postive2}}].enable_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports should have all following values: audit", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is empty" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "74b61a0248f5b1c22247d01095ef54452124c2d50ad0fc31c2509e2ed56006d8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "f2e76817dd9d5dd5f97d09929c81be2730475ce362b5a3414ec2121f7d9193bb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive3.tf", + "similarity_id": "b0a23be2719bf75e259cec51212498cc32119c416b87a38465fdf426432db289", + "line": 9, + "issue_type": "IncorrectValue", + "search_key": "aws_neptune_cluster[{{postive3}}].enable_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports should have all following values: audit", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports has the following missing values: audit" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", + "similarity_id": "2ffbb813e704578d0874665cd6275152316b23245a361dc53f27963f8d612472", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive1.tf", + "similarity_id": "3e21e261fb043b2d6fff900f0d25312e83e37cace0f03ff7a2eb19dfc496e771", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{postive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", + "similarity_id": "a82929c622f9b84eed8cad39c223778026781554a4db8262faae485aebf9a049", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/negative.tf", + "similarity_id": "3baf10ca64b00814879bfd985fd3f54c7bd7b55d8e0d3a631281caf2ba9d3065", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "7ef86c307b58cb6cd56444c65571ce0c96cbe0d814bc0c1566a734cf37e20c76", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", + "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" + } + ] + }, + { + "query_name": "Output Without Description", + "query_id": "59312e8a-a64e-41e7-a252-618533dd1ea8", + "query_url": "https://www.terraform.io/docs/language/values/outputs.html#description-output-value-documentation", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "All outputs should contain a valid description.", + "description_id": "81535d16", + "files": [ + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", + "similarity_id": "4fc7c041f58201f74de9e2bea1d2b12a94fa574fdf1c7f8979dea8fd9ec2fd5d", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "output.{{kubeconfig-certificate-authority-data}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", + "similarity_id": "af33bc55f0f3d18bbb1363e1e83c3c8c34f4ef4ed4523c388a7951c8db38ba03", + "line": 32, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", + "similarity_id": "db8ed9060a44bd2205a3542a0804a07248115b98f18cbf7467679b91fb78ec82", + "line": 43, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", + "similarity_id": "06956b3babe23ecc1f80146332881287afee675a20d22a3b382f5c6fd70986e7", + "line": 43, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", + "similarity_id": "cb2f8c556cbd43cd976b190bd8ae3e09d4142a923ef7cc73d4ac94cd19d6f2d4", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "output.{{endpoint}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", + "similarity_id": "80a8e4f10d12f6b39d600bcd8c9adc0ccbd8285c063c57729c0ab20608801e7f", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "output.{{username}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", + "similarity_id": "30428d93436ac9002bddddd66aebd9318bd538b5b7f4b233db0259ffba51d3f9", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "output.{{username}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", + "similarity_id": "92a9771d91987231734d620433931239d578250ccac0b96ebf0e838e08be04ef", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "output.{{kubeconfig-certificate-authority-data}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", + "similarity_id": "95be5a87221ee7f9b4a91b2f615e53de707298ea43d5e6a4504c4f8a40cca308", + "line": 32, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", + "similarity_id": "e2aff156d721fd96ccea417a09049f1682e09dfe17034402412ddc62b5e33edc", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "output.{{endpoint}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", + "similarity_id": "8b9276533071393939dd994292c0c5946e4d0223df6a424b2fd4b44aeeeefd8b", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "output.{{username}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", + "similarity_id": "d8b9aae21ce6e4a1861e29548946e0d9772b2d374b643867ba1b7b9f6c4eaf81", + "line": 38, + "issue_type": "MissingAttribute", + "search_key": "output.{{username}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", + "similarity_id": "7b8df4fc3d84b48b856c6fa43b6b73d0e784f325e598cfc925da2fa72c731a62", + "line": 43, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "f7a65411846649dd32cbe30226bf159b8d741db535ac4860f1fae09e79a42f55", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "output.{{endpoint}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", + "similarity_id": "e178d35cc297562df7f46110548b666df08d7dcfc246246cf8497c0355be3432", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "output.{{endpoint}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", + "similarity_id": "a653c6311fd684bd2461ef1338637585d123094578fb3547c906d991348f367a", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "output.{{username}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", + "similarity_id": "9ad5ea584de1abb57833710cdd574a16b7c71e326c60bee3c068ade6c68cf2cc", + "line": 42, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", + "similarity_id": "d3954dc0a3f748ade565c4dd77e0bd4b68d2b5784dcad49202c866a8fbad528f", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "output.{{kubeconfig-certificate-authority-data}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", + "similarity_id": "3216bfe89f9bf5ab2a4351a59e1addeee0bdc97d7a5d87ca6f239e23644c4b71", + "line": 32, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", + "similarity_id": "ce94234d145740edc20e7e0889b5cdd28fa626f979d909b416f8a76fd8323377", + "line": 43, + "issue_type": "MissingAttribute", + "search_key": "output.{{secret}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "85b64fffeb3d57265b2304fa679c516310979eca96aaa8a60978af8a7c388040", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "output.{{kubeconfig-certificate-authority-data}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + } + ] + }, + { + "query_name": "RDS Without Logging", + "query_id": "8d7f7b8c-6c7c-40f8-baa6-62006c6c7b56", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/db_instance#enabled_cloudwatch_logs_exports", + "severity": "INFO", + "platform": "Terraform", + "category": "Observability", + "description": "RDS does not have any kind of logger", + "description_id": "c499a58c", + "files": [ + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", + "similarity_id": "fae9533d0141a1f5f27c25c3d989d3cc13e9247278f763de1847ed01a13b4eaf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", + "similarity_id": "9b2222c63cbd7b17ca8bf7a2b6f258a250066e38065e9ea6c5b905cc705088f8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", + "similarity_id": "d27a4c30e24efdc30d70bc68deff163ec44739d827e984586b7e88d3f6d3fdda", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive2.tf", + "similarity_id": "6008d8166b4e4cd74c3985797ce6373bc8d1471693d45c32a65d64bdb9a9595e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", + "similarity_id": "b0bb0c256dad02137198610fc00c38c264ec1fbd9cc9fb815818d7a72fe88a3a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative1.tf", + "similarity_id": "c345799c7b93cdd832f5c493ba89d1b6d318753a382d479d36cf6f373637723e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", + "similarity_id": "c7f051a2a11d5293c0458b5bc4b93b7cca93f05fe75ed270dd3ae9e88190b74b", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative1.tf", + "similarity_id": "0560239b87e7432a7473e4a7a6434692e6438112029299dfcce2477dc1300db3", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", + "similarity_id": "450de690194a193ff6ec9bd92a5cd9d638c16d9a2ee73d4ddb5172cce2be38cc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative1.tf", + "similarity_id": "ae161e836a9425e161ed99953924cef014718b78c5fcca63106c89e8610075bf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", + "similarity_id": "ea9ab37a6e126a1cc7c1e64c3e7d1dcdadb31910f0fadace6521e763d11d1fe5", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive1.tf", + "similarity_id": "2099960e139454a018ec5237b0837cf7de6431757cd0bdfce4f841d99f6a90b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive1.tf", + "similarity_id": "44a5d3a6e9aa75c08d153dd96bde323c36e157fdc833ea6cc29a028edafe1f13", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", + "similarity_id": "b17f557d3a41f534d9d9693c5678a67c049d0a75cd9dc4f3f14996a123792d8a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", + "similarity_id": "32e011d1ce59c6be9a1ff8cbef5aa13189167cf640c8df575c8f07a90bf3dea3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive1.tf", + "similarity_id": "0d27962ca3ad069e9a43cc4a8d226f224af24b06fe21b731a71cd0cd61a88461", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", + "similarity_id": "76f3ae2fbb71026388ae30f9c3ff5b059e91ae1eb7895bc0ee2973345043343f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", + "similarity_id": "6b236bb26377e8d80d11b922261bdcdc88b145f556179ade9581a091bf9bb298", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", + "similarity_id": "4b341d00fef50044bc30e53de85bdb9f8f224d6600486b02b2801cc1c9c88d79", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive1.tf", + "similarity_id": "ab4ea2b0f47883fcc21ca20ce3eae27404ee77d8bf651d6638179fb647cbe139", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", + "similarity_id": "d7edee056023452965f5799cebf6b8f1b354a2040c1c0689acda84728ade7a14", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive1.tf", + "similarity_id": "ecdcdf6a885aca6c1a6955efad12c83ee0d5eb4b3474ceb4480f1b344086cc07", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative1.tf", + "similarity_id": "da2f5c78ef84808e50853093225d89b765ed3b2c37321ed8bd063393ec2bb9eb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", + "similarity_id": "389fff0ebe63dcb2fc3d4cef5dfd627cb8b3dc521adbe40488b3a4b1d8985661", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", + "similarity_id": "7841895e49f3865411fe6cb8d454f699e8abf396abc62301ba78c340a7de9752", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", + "similarity_id": "5751bb7505921720f1e5b0603c610469123896384d83ebead2158ddc6cbc822b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", + "similarity_id": "3883937a795b21efeb982e2777e42c758a93e962f5ce6f1317a6c4e2fc5a37f0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", + "similarity_id": "08d252bfb9ef37dc1b10148b413edef594a396479ea5384e38cb6d7b6d2a76ad", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive2.tf", + "similarity_id": "f3db60a0220d043c2456a96839f74e3937429194b44d3cbee25a8117f133c9bd", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_db_instance[positive2].enabled_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' has one or more values", + "actual_value": "'enabled_cloudwatch_logs_exports' is empty" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative1.tf", + "similarity_id": "03b5c7234d8c9806924fd3f2e6d3258543178da27008ab0258246f78a335b56b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", + "similarity_id": "b12ed983003cbe29dd0ab54b1726cc1ee8db5c05244a78206d8ce47232fc7e7e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", + "similarity_id": "0131772231b2e7354f3328fd1a1b466964e8182f548dc68b6ce6ec311f868258", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", + "similarity_id": "d641947cb6edd7684192a90891b098ff9d283f0213909a6bea1c040f540c8233", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", + "similarity_id": "2f600b61cc9f99c4fcbb6eaaf4262a918103754a4858836398f18184eb4e150d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "module[db]", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' is defined", + "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", + "similarity_id": "70f32821ed3dc3b831fe2dab5b4c818df3392c3f08d1d36c13e21f85e3d9ab28", + "line": 11, + "issue_type": "IncorrectValue", + "search_key": "module[db].enabled_cloudwatch_logs_exports", + "search_line": 0, + "search_value": "", + "expected_value": "'enabled_cloudwatch_logs_exports' has one or more values", + "actual_value": "'enabled_cloudwatch_logs_exports' is empty" + } + ] + }, + { + "query_name": "Resource Not Using Tags", + "query_id": "e38a8e0a-b88b-4902-b3fe-b0fcb17d5c10", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/guides/resource-tagging", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "AWS services resource tags are an essential part of managing components", + "description_id": "09db2d52", + "files": [ + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", + "similarity_id": "7e02e8b9c0dad3c4fcbab64886412a41ec2069f79f82b3174a452d175f999008", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", + "similarity_id": "83b2ee7077c3c1c5eedecf44c2289d7872710dc6b780112f7c1eb7a5e692d21b", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_cluster_with_backup_disabled/test/negative1.tf", + "similarity_id": "8ca9b71db695394745d2d2b7d8a79ceb249996d8756bd7449e3c41d7896d0fe6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{postgresql}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{postgresql}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{postgresql}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/negative2.tf", + "similarity_id": "ca9ef761f3ec26ccb07d14bd4237e954ad0a4009667ebf0c94ab2f18931057a1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{negative2}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/positive2.tf", + "similarity_id": "2ead60d89418bd040d676dd9b82c091ebf187d0e3b57abcf94d97e1dce441e69", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/negative.tf", + "similarity_id": "e07d18b15798e084cae85eb808b161b015d33d364a3c2267eb2a4cc92a5e862c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/negative.tf", + "similarity_id": "e2530a639493c42cd482b59c112fafdc91e90c62f1dbe0784db6afb4c56f19c8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "ba0f53d25ae87f5895a00fa8254dd9778783a90c0bd1f68e47b62b4bd7097eae", + "line": 93, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive4}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", + "similarity_id": "e26bae590f859e175790269f07fc770a22df0007302d44e14bee7e00883b8819", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/positive.tf", + "similarity_id": "2a3ab4cecdcbd321696eaf03a9057c2625a1f6df278105667157ae7b31ff8721", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_without_kms/test/positive.tf", + "similarity_id": "4c900b48aab13fd27a83389d1c28863c1db6541fcd3eea23b085545e762ec7b7", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive2.tf", + "similarity_id": "a8a666752449204c1d7a68b54ad35ddee8c557877f99db7f692c57f469a71455", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/positive2.tf", + "similarity_id": "506fab471e61b74698da6047c53258782ecc95522b8814d115abb4de9c092735", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{test}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "ea20b106920a54c26d8511e0d6c14280d34dea902914b3ca9ab661c25c9276c1", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_route_table[{{private-rtb2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route_table[{{private-rtb2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_route_table[{{private-rtb2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "846840191ca1916ab5a63b75f11a0dc52ebe4722aab0b2a11ff4697240bfcc1a", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{test_role}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{test_role}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{test_role}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/negative1.tf", + "similarity_id": "1b3324f7c94b6dede2dcbbac6b3e1c9b082bb215f099825d697b3a460c189d47", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive2.tf", + "similarity_id": "b3862e7d41f123f8eaedb4e8043366cf026b859163fdf23752a2b9ee65337849", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", + "similarity_id": "1b69624c85d46670f4e61905714b5965759435d27ffe23b82287950fa86e5dcb", + "line": 34, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{postive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{postive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{postive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "5a1da4e5ebd82f085d5063a928de0bc78c30cf758b48ccc633187fb8615eaa87", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{vpc1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{vpc1}}].tags is defined and not null", + "actual_value": "aws_vpc[{{vpc1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/negative1.tf", + "similarity_id": "45c14ed492322458ff3e44a37a19979c70049fc035e8023faaa4c613f4e07525", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dax_cluster[{{bar}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dax_cluster[{{bar}}].tags is defined and not null", + "actual_value": "aws_dax_cluster[{{bar}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/negative.tf", + "similarity_id": "7165497ae13105fd68db3206c5be60e34c0818b7dc65ce7e34827c7a1b9c89bd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example3}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", + "similarity_id": "00c83f43543c3c7a77d330dc5c9f986a2b9dfdd513ea21785539da20a02411a6", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/positive.tf", + "similarity_id": "a68e17569ce907a9f53029de09e80e04d7576907afab4e1012b6c749605e4131", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "1a053758462b24cffe82cf6b2d79df4806f7bfe255a1a445edcf635dd28b291e", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_usage_plan[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is defined and not null", + "actual_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/negative1.tf", + "similarity_id": "4f79e64c87465132270cea917f66a41d224491c3c0569f455312dde04c85e0d9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "288628148c1dd8a1ba828981f1ec7e85e8d4a1351d55515a5f860d2f58499274", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", + "similarity_id": "e18137ffdb26d7ead65d13b9248fb09e2b0b6c7e25b4b8647d9ffdc18f5507c9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/positive.tf", + "similarity_id": "47ab5a5a4c2c84ca1706eea63347914963e30d926b97dc98c4c7d77d3f19d605", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/positive.tf", + "similarity_id": "2c9d8ab0af1a1109813eabceefc41829b6044967357f654709650c51995c47fb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive1.tf", + "similarity_id": "52ec09e42c16a3fb9cf0e75889765c16df350632a2f0383fa1ad09b94e762a52", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "412c119c5698f2fb69bb4dc1628d124c788d0d56bbcec2bc94ea0ff1688dd0ba", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", + "similarity_id": "47923349ae643b9f667e24b018908eaa66751e657c646db0d98bb7b72b0999cb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", + "similarity_id": "fb0a937ddde6135ea46b356b1e9a1104eda37601027dbbb488fa80b174c5745d", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive3}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", + "similarity_id": "0c27c87a464242ba6ae0ada50437f591c69d99bfedfa8e54883ad8a867f7d540", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", + "similarity_id": "c7aa5bbd271945c843a80f889225b0c52a537143d7d8f61b8a4061b231a670fc", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", + "similarity_id": "0e6741250342a3e4853e5bb37010d5dcd3549e26acbde99a3c758b83637be06e", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/negative.tf", + "similarity_id": "69088c805e052e8828b9f8a7c5da05cdefba03279e82e831bc6dcab5d70f89b4", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{negative1}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", + "similarity_id": "707ab051388c646536fcfae6489c6d71ac44d197f4dd52245c1df977d66979cf", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{positive3}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "27e45e9167f5af6eae42515c25a31c4dc8656fff744ccdb0ff081b8240b84726", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test}}].tags is defined and not null", + "actual_value": "aws_lb[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", + "similarity_id": "f1d23607f865826e68c1891350de06f695e09df1dc6723d7b4161fb7a64b08b1", + "line": 33, + "issue_type": "MissingAttribute", + "search_key": "aws_organizations_policy[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_organizations_policy[{{positive3}}].tags is defined and not null", + "actual_value": "aws_organizations_policy[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive2.tf", + "similarity_id": "b201960db9397f12bafc7d0e0cfa575ef954cee092768f2675de7cb1b8d4b42a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive2}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "ef4bfdeaf2c14b75184e4f5f0fd9d6606770016aed273b1e58d343750ebd3025", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", + "similarity_id": "261b3a6793d3a0d3357750aecf6f6db454a0e6c2e288d1a01568127a580bc3b1", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/negative1.tf", + "similarity_id": "c71b9036b628c802f4a033cbb3966fea4ae019a4ebc1af45513cc9f6c3f1f92b", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_sagemaker_notebook_instance[{{ni}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has tags defined other than 'Name'", + "actual_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", + "similarity_id": "62212ce9e813a833d31ab11a2af38ce7f2967bed290134bd303d0033f3225d5e", + "line": 23, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "393ba58777cd068ff77d916d1e4ae16a325a482688d20c0ac922ab7e71b07a50", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_usage_plan[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is defined and not null", + "actual_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", + "similarity_id": "fe79e338d31195c85c51109d8fdc53894bb1b123d08323c4b9dded4692a4de2f", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "e531765773e296c5618ee9e4b10761c9ee2c7bcf6ddc7247fd6169089cd6bc00", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "2e26557e78f3f7955a5a031b7453454c52c59b0051c3f58b0fb80ca9dfd0fc4e", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "4af43f1b8061d91a858ed8034d17cd8a4d6a9d64ce50ac0eaeb2636b62529c55", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/negative.tf", + "similarity_id": "5afed49fc6a2915a402cc1fdb1b8379cb9f7cbec121e1469fa90c9be54981d5a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", + "similarity_id": "fc5ed0e912505526f8a98a4a4e68c43c2b240982efbc64321f52bec10677cf7a", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", + "similarity_id": "7655a9b5b1a4bbdd4cec9c8ae584d8da55eeda37bf8af9d088051f87f575dbf3", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_ami[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ami[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ami[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/negative1.tf", + "similarity_id": "5e40ab8211a035efe849559bfaae1ee931356659f8325c61b22d53b9899dad16", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example4}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/negative.tf", + "similarity_id": "a421b7589e0da6b62b605a35efef550989462f21c6a304f198ef7c672b7a084a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", + "similarity_id": "f1cdbe8ea87c5bb5c00fbcd517b60c0d1509e0cff29131b8c5d6476de491cdf2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "eebda7e6c5c73313f77a57d81f80784ba28cdc5357c4e935444c1fdf52a861e3", + "line": 94, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}].tags is defined and not null", + "actual_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "8ef2d5c588f29eec85b7d577c725a35871e2a0fbcfc0db33ba8941a748140e92", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{foobar2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{foobar2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{foobar2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_service_admin_role_is_present/test/positive.tf", + "similarity_id": "955e41d5d1d04786e98be69491b267366a92c7b8faa2c94e654f6f9c6e2623fd", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_service[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_service[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecs_service[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/negative1.tf", + "similarity_id": "d8a576c8572a4c4064a620647e262bd1ecfa49a1c5f76e4df785b2538013a662", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{negative1}}].tags is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "43c204b5408fd3fd9c95009d665de20a7acabcacaed371c1b3b10e1c379b8470", + "line": 58, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow-public-outbound-sg2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow-public-outbound-sg2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{allow-public-outbound-sg2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_is_publicly_accessible/test/positive.tf", + "similarity_id": "f75f94d286cb29ce4f0d1683c20de3a202303b44d10a087c1915c7c18780cccc", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", + "similarity_id": "db1121dfe91d7df84a97592162b8a1b346a1c99233038f07dd188e94ff94720f", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", + "similarity_id": "cfca747d5adea55d9b316fa3e9005f25c6b6615183aa964378ee99fc39080d6f", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "d9cc822320dc4d9cd025a48c3823e953f0bf29a2a784c54140bd2805104204af", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{private-subnet2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{private-subnet2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{private-subnet2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "a44b1e99b912fa54138525e2863cb045b554de9bb5fbf4308756215d8fc1e9eb", + "line": 40, + "issue_type": "MissingAttribute", + "search_key": "aws_route_table[{{public-rtb}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route_table[{{public-rtb}}].tags has tags defined other than 'Name'", + "actual_value": "aws_route_table[{{public-rtb}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", + "similarity_id": "0e474fccfb992b7ae8f733abeb47ba2fccb83efe04464b77f33aff2ed270d53d", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_athena_workgroup[{{example_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_athena_workgroup[{{example_2}}].tags is defined and not null", + "actual_value": "aws_athena_workgroup[{{example_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", + "similarity_id": "2f055d8c48923799a78012718c1fb4b21d7a0198e2f748e2b9369dca7c21ea4c", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/positive1.tf", + "similarity_id": "fcd76071826d157edb744c53ef16f40ff397cea5b9e283bbb2f86ad2de56b13d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive3.tf", + "similarity_id": "491572e75aec5c4e850d6616b246a029bff75d543dd8a81702c4535d02b94570", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{positive3}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/negative1.tf", + "similarity_id": "5beb0a48d845e3d7c6aa0246ea1d1db1bb2183556200c445ef71fc80f66ac600", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{negative2}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative1.tf", + "similarity_id": "2ae7c0015e1872e779e77bfc6edb482cebdde59b619b226f7e4868c90c559ca1", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive1.tf", + "similarity_id": "90b653eca86352c80beb63c96a9b2c2815b17de563861e7b4dbdb292fcd30103", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_autoscaling_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_autoscaling_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "2018e63aa198b6b898b9703f6045024f897e119dc76773e679a86c05671a9220", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive1.tf", + "similarity_id": "507ac4927b22bab5cdbba3395b8d8b107704c83bcab157f8c4ff308f9903e666", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/negative1.tf", + "similarity_id": "cc755e3a6cb0faf3fc6959c7d075ee518ea28ec200bbd7dc78109380336e83df", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example3}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/guardduty_detector_disabled/test/positive.tf", + "similarity_id": "f3954aa3293229e6fcf1407295f8a41a2d56fed3893f7363b27c974a11c95cdf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_guardduty_detector[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_guardduty_detector[{{positive1}}].tags is defined and not null", + "actual_value": "aws_guardduty_detector[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", + "similarity_id": "07fc33d5175008f9223e68b689af7a106718429a840f17a62bf4640057a13fa4", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{positive2}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", + "similarity_id": "b4e386561ea6c671889c98f64a8af5fd76420e78d7c80f4d6eee70e437b45907", + "line": 28, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive4}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "73ecb72ab2643b1a920380ff3d9323fe577f9fdf2974681b79dd3a92696d44f7", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "1c75034b7ec8992d154727cfcedadf30efc13ad205721cb03e07928272f5c788", + "line": 95, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table[{{basic-dynamodb-table2}}].tags is defined and not null", + "actual_value": "aws_dynamodb_table[{{basic-dynamodb-table2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", + "similarity_id": "ee0fd33604f16f32ac1a4f7b6facc70bffa69fb0efd010590c501334b14182bf", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "27a1ee8de2c849bda4a90fa7c02856b078131b29b083c04516a95c7e3dc66b29", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{pub_ins}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{pub_ins}}].tags is defined and not null", + "actual_value": "aws_instance[{{pub_ins}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", + "similarity_id": "17ad9b83d7b4a3d06b5bb92405ece1ddbc134f5c7e1c1dd7e664391015d09e1e", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "a02625f1cedab8735b617b4585e26dc48465ee5de5ef1a69247de4a67f51206f", + "line": 44, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{subnet22}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{subnet22}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{subnet22}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "d26cf45284e13beba9999c830d57149c916133c65d0aa4ce69af33f933a66828", + "line": 48, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{allow-public-outbound-nacl}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{allow-public-outbound-nacl}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{allow-public-outbound-nacl}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/negative.tf", + "similarity_id": "dca446c913eeb019748add566e8ddd8b512e99f4cdd83bcf9dd35f7705db22e2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", + "similarity_id": "d14870efa711607f8ac398d279fd5fdc0f489c66711d94e86ae1e246d2a8af7d", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{positive2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/negative.tf", + "similarity_id": "637cf29e514551b89e42850770fdd6bcd4c8aaeb631c04b9623007335030d4a8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", + "similarity_id": "c52dfb2db823b18e0ddd8aa79bffbdd4c0fa693ea9d318a3696fd2f47f0f482b", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/negative.tf", + "similarity_id": "06c17deb1f5198a68483522d37394e87a461143609fb912e160ba1cc8752d3ee", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_usage_plan[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "d0e0872e1a1f2e2e0cd971571a48297fdeff432a05d917236f5c53aa8bf105c5", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "5475def60eec77d37dcdb225e91c03a15467fe43c1de8f432b51fd2c0edda71c", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative2.tf", + "similarity_id": "5a54c4d0a1878c45af83a386c2da665d19976bf6d26c2b930b90851c6b483669", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "f518a7a3f94000a826ca0682ebe7ac227f0acdd2fafc5d935324d9fa2513d327", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", + "similarity_id": "76bbd2060aedeb8a192d188b52d0bb29feac2b2f335ecb56c1d8d14a3493913d", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{positive2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative3.tf", + "similarity_id": "c7ce2c14447de28f6411bede0bb33bcb570d23ac01ef3469b0b7219eeb221791", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", + "similarity_id": "94e9567976835acc7a19a63bb0a59609ffd3378cc77a3e813ffc55954f8ec4d5", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{monitoring_positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{monitoring_positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "5077a9e4fe0c1d954d1a0de6ed48fb4a69b72dd55ed24248f69f085db72fbdc1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "99d8946712aaba18a750aa58b88e1c290fa5b96892a9345fab6756a177db4575", + "line": 40, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", + "similarity_id": "309e42594c2490c0f2e677e4186913877ec0cb62ab083e1bcbda253f15d791fc", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{codebuild}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{codebuild}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{codebuild}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive5.tf", + "similarity_id": "b74abeb63a77ea3dbbb4b49c05d8d406107ae158830d2b3c0d033737f6bb5d7c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "4e2993ad7cc3e86d8b694bb06b77a6e8d365652665ba4534dfdaad2665f83dd4", + "line": 108, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive5}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/positive.tf", + "similarity_id": "dcca84e6f93c0b993b368dbfb5c6d89563079d538453bb10fd961fd82a342065", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/negative.tf", + "similarity_id": "23a79dd593bc28c07e6b13e8ee9d14d60066009a448ac0d2fdd66a51247c25b8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", + "similarity_id": "59ddb8e8b17db58e3a4c0392cd11393683079052c07f47fc84f01afbf76006c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{examplebucket}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{examplebucket}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{examplebucket}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "d383b5d816b06598541ba870ba46c25fd1b915bc81733a276080f3a2b21e5f2a", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "538330f0d7f2664e1c474b8be8f371e56a7a0abe66ad7e4a8b91f052990f7082", + "line": 29, + "issue_type": "MissingAttribute", + "search_key": "aws_codebuild_project[{{project-cloudrail-test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_codebuild_project[{{project-cloudrail-test2}}].tags is defined and not null", + "actual_value": "aws_codebuild_project[{{project-cloudrail-test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/negative.tf", + "similarity_id": "7866e25259f9f2d87c3c82d898d68de16c9f7e5aee5a2439fa61308c9ea424a4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{example2}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative2.tf", + "similarity_id": "e86228dd472c4210069763481a493272dd4f326567b2f7e0310dd02e3212040b", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", + "similarity_id": "9438b526285b5e564be319fca4c8dfafd2bc13d2a2cf6833fb5be9b036603fe2", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive8}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive8}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive8}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", + "similarity_id": "372baf8662a547260c4b851dfe37f8f5916748a9fa6940912f9e1eb789821406", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cognito_user_pool[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cognito_user_pool[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cognito_user_pool[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/positive.tf", + "similarity_id": "2b678d04a71c26b117b451a681b05327b9602bc49d84d2c2d82af4512ca73711", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "69114e3ba4c6b49283e1c3d252c56ae7761392eec19671ccf3b6577bb83b7064", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", + "similarity_id": "b7abc5ccfc2a43db34510753654b9df1304500ddf1a11cb9e9202eb0099177f0", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_snapshot[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_snapshot[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_snapshot[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", + "similarity_id": "6134d78f266152ea1eb86efb67dc94da71621e290aff38f58712df8204dd7da6", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_lambda_function[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "c9c2a06bb033614c985547e6879e943fce89fa51eb9c0523621b1125da797668", + "line": 72, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{api_gw_stage}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{api_gw_stage}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{api_gw_stage}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "68bb4bb573fc3de211bb14131b734538d1e125eba670872f966d371381867f2b", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "0612a31a2e360dfb191d936f809d4eb04f86e85f50b26a995b9858f210074c76", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", + "similarity_id": "3c5dee2890876ac461868702fcb14d5f5b0d6213b068e3936c74b4954e17762d", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/negative1.tf", + "similarity_id": "9b01035e70fcc57a6133dae0e9499e96e9a9b1ec33b240a5477bdd3f24f3da04", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[{{bar3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_autoscaling_group[{{bar3}}].tags is defined and not null", + "actual_value": "aws_autoscaling_group[{{bar3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "0892eccf773c3acc5a32709b9db5d98d9c93c4360d32d9dd61c1bdcd05a3b746", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/positive.tf", + "similarity_id": "a60f6d0c12cee891cbae8682f124f21f1b5a1de700ca63b26b254ceddfe9c9a3", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", + "similarity_id": "c7c7520fe0078890e9e5e11c5288a889850e75e567d60854cb18bea64aacfb42", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{iam_for_lambda}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{iam_for_lambda}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{iam_for_lambda}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/negative.tf", + "similarity_id": "442b2ab40fb3d888f16940b05684a88397eca0354b7f7d38dccf2cbff1534740", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{default2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{default2}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{default2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", + "similarity_id": "5b8e8815977316ce2976ef335bb0a9025c1f88a0f28384727aee92dcd090fbf6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "e441857edcb5152531498652a102190fc5f772a5fadcf4dc5ab75108814c7ac5", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/negative.tf", + "similarity_id": "89957dd65a545357d6db77fabbde367580e4faa18ebcd71d7194f1dbbc2686b9", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "64264ccc566144634569809fca8a21adef929e85fbf3586e6ee601d5727ed298", + "line": 95, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst2}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "843c4fedd84f384401a5a7ea3cd9cdf9b3b70b30c6d2ce702884519ed722648a", + "line": 52, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_with_plaintext_password/test/negative.tf", + "similarity_id": "39e23c50089bd41f8ffa563cc85f9c56a1f76e5e01d87d7772181bace60c2f03", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "516773d5d8b5859d991eac0080c80d9b28cdcf5adb681f271586b16c81263ee1", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", + "similarity_id": "3d1da7cd15a6d7b02324af4b7e5bacd00a121a147d5f92e83d6547b8cb29709f", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "17cf49b17a1709e5c93a8aec46cd423a7ed21d61d43544514951c46e553fc797", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{priv_ins}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{priv_ins}}].tags is defined and not null", + "actual_value": "aws_instance[{{priv_ins}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", + "similarity_id": "f8237960acefac3f8be0b1d4b940cc3af4efbcf75bc7d9dd9b437446c481b9fa", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/negative.tf", + "similarity_id": "c66ea2898679be6a8f49c46dbc29b7e758b9dcfbfc3237fb2f0cbf47e64ef2b3", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{test_lambda}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{test_lambda}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{test_lambda}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", + "similarity_id": "710b07691e7bde9b1b26e01bbef2664a7e9b4fe7aed2d53bfd39348a17cd33fc", + "line": 38, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/positive1.tf", + "similarity_id": "2bf2b16d318d6e771c4a3b91800534d22a9d43f1fd59afcd17a01c9550003c8c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{user_updates}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{user_updates}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{user_updates}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/negative.tf", + "similarity_id": "84ecb2f55ee0ea1f0cc8a53c34da669032d3bb8a297efd6484d64420d080b854", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/positive.tf", + "similarity_id": "7225318b3652ec2522c66ba50759ca7e57a654f7deba0a46e5bef83c8ee10745", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{example}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "d13f310a8f971dcaa803346fc79f9c4ee3d27eaa11a545b9c578f9ebe3db5fef", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{test22}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{test22}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{test22}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", + "similarity_id": "9abd138bb7055e8c908da4c5d1ff1d4a21327b94d04f703bb31e8e4eacb1dcd9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/negative.tf", + "similarity_id": "f93bcf6774c81663b96a5e6a1dc6caa36ccb51599e3349793ade316d6aecdc32", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_ami[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ami[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ami[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_is_publicly_accessible_for_subscription/test/positive.tf", + "similarity_id": "76da5875b2bdb16178726827eff6205fb2d05cdf4f40db8912c2997652388393", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/negative.tf", + "similarity_id": "a17307324bf9ac6aa530e4121b4c7bb44d4fccf10d74e360686e9f4d70f3f73d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/positive.tf", + "similarity_id": "3557b9ae2cc97dbf7ad7e542f6b8c901e001dad42923045b520b05ed6b186925", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "95c0025b8f189cd6480b4a252329e796b2af7d4f8237a63245d805c425f965a5", + "line": 19, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive3}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", + "similarity_id": "1d4ba686e2deab685c57ec959739832cf756fc472732de29f0be924f140ffd21", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example2}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "f954d004ed4b77e24cc14306499e91c48f7258cf7afced3448ed6242f11f1869", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive1.tf", + "similarity_id": "a46e1d381344a768ea08e407395ca3d15c2d4ba8d90332925693a9fda6579bc8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", + "similarity_id": "0e32c21f3db3c8f6a9c32c3b2cf50587d2f1b4f01af841967d7bcec08e27e81a", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", + "similarity_id": "a0a359e3db745d85069cdd5127bbd40db1a312f1989180a1ddb5321bf90b999e", + "line": 20, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user_two2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user_two2}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user_two2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", + "similarity_id": "43462b733c1e294edfa2b23677ed0c17762a35471b4b5e226f8123a668999e4f", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_object[{{examplebucket_object}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is defined and not null", + "actual_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/positive.tf", + "similarity_id": "b5bb99fb037fbbbf3371564928e76aad57c8d2626a2eea94f484e96a1c30bf51", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{positive2}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive1.tf", + "similarity_id": "19bb6d932ff30ced592cb6f06697c37682a279b58e2409b59072a8cebd4cb079", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test3}}].tags is defined and not null", + "actual_value": "aws_lb[{{test3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/negative.tf", + "similarity_id": "b94ee7878149d2266eec9affb8a88c4251bc5e26450df4465f576d8062edd957", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{negative1}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/memcached_disabled/test/positive.tf", + "similarity_id": "e256e337c953cfac68de9599eb93d8de58945c0a0f7faaf1fc5285c47a689535", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive1.tf", + "similarity_id": "e4386e5b567c7a3fa89c7ed629d9658b5f0a4ae68a907c46ab3a8f147244378d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[{{bar}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_autoscaling_group[{{bar}}].tags is defined and not null", + "actual_value": "aws_autoscaling_group[{{bar}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "e4428bf562f1cce5dc4e01e1e282564c7b07b36e78cba70eea41dab5698e9b13", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "d673d91073a57aac2beb5318bf56f380631c10ff3c930f679417911aef459c43", + "line": 53, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow-public-outbound-sg}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow-public-outbound-sg}}].tags is defined and not null", + "actual_value": "aws_security_group[{{allow-public-outbound-sg}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", + "similarity_id": "26241351b2fe0221db62a3ebfae01860d644375def6892313a17c1b03fb374b2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/negative.tf", + "similarity_id": "520685b25a49d58b2fb6405ba121ea90c9194ccfb3c9cabdba5d23cfc9805a98", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_cluster[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_cluster[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecs_cluster[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "6defdd3e776af665deba3b46a33a2bc36385c691733b07991712de30b93503f0", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{docdb_2}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{docdb_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "6727e76468a4c0dbf981ccd97a118f6139cdb31a806880d82106b52316a5495c", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test-ec2-instance}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{test-ec2-instance}}].tags is defined and not null", + "actual_value": "aws_instance[{{test-ec2-instance}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative1.tf", + "similarity_id": "3e50a4fe72a239298854ddad5333e4ff841dced5e8e623b57076ca6a5d82ca19", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive2.tf", + "similarity_id": "6b66b89fa0a866d81ac52c6ccdd86215dd497e316812e039a415e553ba7993c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{postive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{postive2}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{postive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/negative1.tf", + "similarity_id": "c0ee11714d4663de2877de6f3550c45ff097be53bcc54c636653276b5e3a374e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "1a7ac61dbf2e3f3b73e67b797789a23ba1b3104288c2ccaab217f4f99e03e4af", + "line": 99, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{pub_ins2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{pub_ins2}}].tags is defined and not null", + "actual_value": "aws_instance[{{pub_ins2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", + "similarity_id": "30b0cd90d8314294ece920e151fc44baea81d0e4360ef3c7ac1dfa63a9394694", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{positive2}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", + "similarity_id": "1b5f4c5e90ba877785dd878c3271237bc10260a2cadb5e0fcc8920caf186a6bd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", + "similarity_id": "4ab3beea6772677122a2dc6c098dd4da96a7f3e0a10c5a42d2c6201c1949e7ea", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{positive2}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_service_without_running_tasks/test/positive.tf", + "similarity_id": "3a23587ce8b3355c1b75300712e31ef250ff8ef9fa5c62a77a5bc6aa4d429db7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_service[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_service[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecs_service[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_node_group_remote_access_disabled/test/positive.tf", + "similarity_id": "a2495c663f8d2f895484a0d09e450972cf56e636ca4e77683913c0df8d8c4261", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_node_group[{{positive}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_node_group[{{positive}}].tags is defined and not null", + "actual_value": "aws_eks_node_group[{{positive}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive1.tf", + "similarity_id": "bb260f0b6c15e5d4776cf607e75105e0fd7b43bfe410cc6eb644d23d360316cb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/negative.tf", + "similarity_id": "51e2c7ba8238d45ab5f2b4c3516efd33be100d08dadcf4d55dc1b54f48998248", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "28c4400dc5de01434bce2c767b7ca41e50ecf3dee35407c887185daa5794a9ca", + "line": 60, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", + "similarity_id": "11a865b89014aac57427a30218b60da173f9e366819e0e861da91eebae74ef02", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "aa49041cf372a5c4664e67afc090a3146b802941d3ef6d49a641ef42350a5fb8", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "41f16462e622323f76759f988bc2eabacf171e244c0ab683cd1ff2e69ea90700", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", + "similarity_id": "d025d3a978ed9b644c36a889d84315d34d55a641bc17d8b186c6b6a12a64b269", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "41b2a94b87fa2d87b0818351cf71ffdce6b90c043bc2bfd556fe6d6cd49fb25d", + "line": 27, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{positive3}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", + "similarity_id": "ebbb5a684f35de823edb9a0924b75a7bcde81f46c5c026ae88d87a4c7fe25938", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", + "similarity_id": "af2ae2af5eba88d65904d4dd84875de900e6fff29ff549810479c9faf91bebaf", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive4}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/negative.tf", + "similarity_id": "81f6379f028e75e24409530fcb8f85dcfbc61eb3a83cbd5ca85292ec75ff0087", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_config_config_rule[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_config_rule[{{negative2}}].tags is defined and not null", + "actual_value": "aws_config_config_rule[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/negative.tf", + "similarity_id": "e9191821fa3672508186a9b2724c4f2479e3db388e50b880f8567c5f2fb2f648", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{iam_for_lambda}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{iam_for_lambda}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{iam_for_lambda}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", + "similarity_id": "0fed6d6b7242e47145d9d4e63d3d6705eab40ff144e458a276e7b566bb0a3edf", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive1.tf", + "similarity_id": "dc0cf59eb88b8d06885b3911334937bea36e37ae3cf5bd18b26e69fe1ed20a41", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "15bbf4504be572a31d0531d3de384c5a6a4f4e352347323838d18ad7552cfe9e", + "line": 44, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{subnet2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{subnet2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{subnet2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "a8f6b5184f718342a60cbb89593f2cb633f4ca178e84a33ecf3105cd4185386a", + "line": 49, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test2}}].tags is defined and not null", + "actual_value": "aws_lb[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/positive.tf", + "similarity_id": "b9ffab0e6250113b3c983e2d48110f5e8868d1e1340c9d1e343b915ff6668dfe", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/negative.tf", + "similarity_id": "6ac7704ec9dc2e567ea8eb24c92fb328e58b7cba5f85d703792f709c77662911", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_route53_zone[{{example_com}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route53_zone[{{example_com}}].tags is defined and not null", + "actual_value": "aws_route53_zone[{{example_com}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "191c8c5756444c07dac4872af0c55ea10045ed3ef5afda326a5b8a0827ab1463", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{test}}].tags is defined and not null", + "actual_value": "aws_instance[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", + "similarity_id": "7b07904eafe81902e46a81274b15a93fde5e06d4539a7aaa9754838e8aacabc8", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{example}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/negative.tf", + "similarity_id": "9eb97b557154f9117f1a9458fc0808ce877be637f3794dc3f32a537bc73ea0a7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative6.tf", + "similarity_id": "1608cc1980b8f6746dde207b10d79389d26200eea50c2b0151792314f0e92bac", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "b448f7be1851859652f26e7c494ccd5495e7f0e75ec0d306e91d3b0c3bf3f419", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", + "similarity_id": "c5fca03dd66b80605ca1913831f98800d229b5680e34168bf072de14cd9443f2", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", + "similarity_id": "23b677233201e3be436893d2e3788d703bb622cccf9e2c4a752b544927e35079", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{positive2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "1fe5af4d7384bbb99f39916bdc159b5e765dd94bf59054c2258c815ac5145a13", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive2.tf", + "similarity_id": "1ecfa92af60fdd0a6f4bbe4c3b6e85254df9b79406100422745fc375ad2730c7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_cluster_snapshot[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_cluster_snapshot[{{positive2}}].tags is defined and not null", + "actual_value": "aws_db_cluster_snapshot[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", + "similarity_id": "f1fcb93e53cae99aec8e2de3f715f280a71a3c7bff8de38124eb59199f69a6c7", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{monitoring_negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{monitoring_negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "cd7415f25e912e728eeda59d54e9a6bffbedae63188e111d80819f36ccab5ba1", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", + "similarity_id": "7be94ba0431f0f6aab830e7785d9a8b6a5e4200f5b9aa24501a769d7748330b6", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user_one2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user_one2}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user_one2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/positive.tf", + "similarity_id": "18b470e6db26f7cf8a0dbf73cea3eb19d1111914ac6190341cd3546296aec031", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_config_config_rule[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_config_rule[{{positive1}}].tags is defined and not null", + "actual_value": "aws_config_config_rule[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", + "similarity_id": "9401ecc37787bb6dfae15c111e059cdfe165f5fc58d3e7d6e8d08c521b2745fa", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative2}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "9d3f19e95afa6ab7e3f58c71e5e88cb53c1c08bc499482d6d435638b7450fd63", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", + "similarity_id": "2549281003f8119ca6b95cc225206b1a798640a044ac51a59161f29716eb22c0", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{negative2}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "e146ebefb44f84dbf3d3e4d8bb06397f0f7a05c8c964206e64a7ad3c6e81954e", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", + "similarity_id": "35115a0fb703be0bfc5ec70b5a9b10c18e9a88a33e78067b3fb8b2ace61a6070", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_snapshot[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_snapshot[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_snapshot[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", + "similarity_id": "bd69fe7069541454d1721579dc422f53dfa161224caba76a2adf721d9b4e059f", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "ce159dc07ff57b6a33db159c5a8daa0513cb9f3db390fc7774e63b78ecfd4b20", + "line": 20, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{foo3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{foo3}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{foo3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", + "similarity_id": "1ca32488ad5b7f94154241dc6cfc3d12119f62b73452427aa30f679edf9062d3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main3}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "f6087a04b217a7028237b8ba68b4c8434e1fa2bbe4a96c7ab4356026e3d8ba5e", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{foo2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{foo2}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{foo2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/positive1.tf", + "similarity_id": "929a5b0931f65c6bcc9947dc5c56b3ae6ed78be2136b941b563bb423a08f15e5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{user_updates}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{user_updates}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{user_updates}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/negative.tf", + "similarity_id": "6fb58f137ac1812edfa1233a8be4b168b1606f4a6f6f0516ac8ffa9729c38c8f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/negative.tf", + "similarity_id": "ad1c51ea993097ab6ccd28884eb7aaf71d62b6e7281d17a7bae2af117092bd2e", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{negative2}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "f7370db98303a3141ff18f9c6d511e3064089e89208584f0b98f4ec1c688464f", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative1.tf", + "similarity_id": "6782bb830f9e9a243f7213948c57b8f560ad75badc3ee82d64ee75f0af2392b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "256a52f1799995882084d24f4339d3e925572e6ea5b25a47e74221eff9a258e7", + "line": 62, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{positive5}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative1.tf", + "similarity_id": "a801217030d3b0e8e1d56a68e537ab4d3624801e109b07b7481202613e4e339a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "f01dd34ee0ebdb8e46ad77bf6f934da1381e2264ead0b5e0979e48e2a6a757fd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dax_cluster[{{bar_1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dax_cluster[{{bar_1}}].tags is defined and not null", + "actual_value": "aws_dax_cluster[{{bar_1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "4f57ffef3e1c7732aa69af74d1886098764365d22c270e651652c13de4f8ff18", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{negative2}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/negative.tf", + "similarity_id": "f5a9b32284ce1a13571f82a88ee53934cd1ee53ea4703973725cdcdfc67340f9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", + "similarity_id": "dfdb0c92947bbf5dbad1c647de329556bad685ab30452df4fc6e220bed6077c5", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", + "similarity_id": "3f443c494f9e99835030d4dcb9a7c0f7c33be8251b8bf7a8a2fa6ac891b0313c", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", + "similarity_id": "52ae3f8e3c3451225e115fcd134e9f83385a3670e2a15b43332737193e90584c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/positive.tf", + "similarity_id": "d5b2b99ce705bd8dcfa7dc7a6d12d75f460a552e1a2249de14597ec8f0ad8951", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/negative.tf", + "similarity_id": "f3fceac98bb569fa5857a123dbaf945d7f03bb0ee9587f5e8bec5ea9137e43b3", + "line": 41, + "issue_type": "MissingAttribute", + "search_key": "aws_batch_job_definition[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_batch_job_definition[{{negative2}}].tags is defined and not null", + "actual_value": "aws_batch_job_definition[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative1.tf", + "similarity_id": "d8a0693cfd4cf7e844b6ba3ad94122c93ee5a7bb122facb4b67210ef47f99ef3", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "074491364f9ad692e9ffb7a0bbb3cd753236fb964ef7a848a120fd8529f31ea5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{test222}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{test222}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{test222}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "7e3a40cb27977449a7ef70d4fc5586a8829c3e57af1f2da1ad44a82805098c7c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive1.tf", + "similarity_id": "089fedfc5231f261a14c640a619a2dc70faadba71fc7e862feedac01f4837409", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "db141d0358b8679375cddf94f05ccb8bc0144a995bcc4b7e09ff8e51ac58be82", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/positive2.tf", + "similarity_id": "8e556c15562a49823de6a25f3eec6d22fb8b68338b52e15b3218c0624791c732", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{test}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative2.tf", + "similarity_id": "f5c9e50ebb49a1ffd397ce6c22a6e150390a73204c52399ed624b57e7aa34ec2", + "line": 41, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{negative2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{negative2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/positive.tf", + "similarity_id": "bfffdb27fa9f3e45e177bf16c82a3e88e244f15087f216b61499d8f0e3149fec", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{secure_policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{secure_policy}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{secure_policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive2.tf", + "similarity_id": "ab8eab0cb98609ef178f433a70dc3b485c0cab66c7aff3b5593136712797cc5a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", + "similarity_id": "a896de7a4488ecf4ed2bf7e17c50dbc5cbe80d6cf0ec7e7cceb8baf4e82d225c", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cmk_is_unusable/test/negative.tf", + "similarity_id": "fe8bbf056f8e1eaeb140ee0a975f35d08de2c5f5d6ea7e8d4065fd6a8a0d0e9f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{a3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{a3}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{a3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/positive.tf", + "similarity_id": "94dc443d27fbc47d48d7d0f50817d22dd65d178d0b8946fb1a97a274e971ce0e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "9be047f91eece591d1cd2d86edde0f580f939f598cd60078bfcfc0822aedae83", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "53d8c436c5b634d5cb3630cdc4048c9794fa7100230f8e44d70f3ff017774d27", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "2ff28c577eff196a80ab496316ed36febbc4702c0c92c217d914660582f9f12e", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "a0ef527b8f5a4c9da41f6df6680b8a157b2091de30f9a420eafff52c43249ea4", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", + "similarity_id": "1fd37b8860d1f339cb5d0d820ec3260b8c4639fa05b1770300b0ae516a648cf6", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", + "similarity_id": "550dcab908a48e620a069757ad535ddfa85cae49e434b6701b71701618daba62", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cmk_is_unusable/test/positive.tf", + "similarity_id": "7a54f0b140c53b9242768caeacc140e9b9bd756da99bb1bd236fb73c2cf18837", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{a}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{a}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{a}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", + "similarity_id": "f12c48458e5bc5cb2eecd9ec943e9d8d53dfd65e348e7791677e7566749821c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive1.tf", + "similarity_id": "14c46b7016c799a7a79d6b9fd0c32401ee2a4e8f56e52c3ea8fe10e6a5dec483", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{postive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{postive1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{postive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "78dec2f0e074b6cec468b0ff31be7171fcf42fa167f12b6c8fa1a113f8218105", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{negative4}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", + "similarity_id": "64f9436143b49a3cf72a64a21beca85fb87ee7ac556b100632cccaa9eb50c3d4", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{foobar}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "cc27a71dba8d3b20087863d9f76e10b9581a6f053045764787c56ea8bcb88918", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "70be704f4d515b1af9b96aa53f4b8fe78bd517f408650bc4696e5354843af829", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", + "similarity_id": "a74a6b1dea11536b8957c3d826d47ec0d7893e6abfed5b40199993fb901d025f", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive3.tf", + "similarity_id": "f3dfdcfe5c459cbc66bc44e4c52ed68ca4c1d8e010aa1b6c05c441db362d0a1f", + "line": 35, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "edf1c643f1e8f2a3e75e53c218e04edd1058309964c1b37046571705c61cd3ea", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", + "similarity_id": "b84eadb69e074ef9f6552414382df8510eccd16a7ca46d078cc86a10894b071c", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", + "similarity_id": "851997d62c5d82575badd2bab62ee9cb016e425de931885c861b1c6a38d6cef7", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive3.tf", + "similarity_id": "1a646a74d98d1c6836ff2378ae3835e681cb56f8e396b56ff36cb93a5f0c0779", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative1.tf", + "similarity_id": "f3d4e6294e9c2c7a0ad0fdf7038a7762db61afb3b3024e79b872941da5d83976", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test33}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test33}}].tags is defined and not null", + "actual_value": "aws_lb[{{test33}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", + "similarity_id": "ce74423a5ebdb6b7fada8003325efb68fa78a83a3d8ef519ad493e4c95fd579e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{examplebucket}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{examplebucket}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{examplebucket}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", + "similarity_id": "51066425f3c3795ca8f7efdb30faf8626bcf26a0265fbf4565df041d85ba94ec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{postive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{postive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{postive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", + "similarity_id": "3c55eb5b2a80ba26ca8af0a47c1b6f9d4e15ea53a58a245bb1b519f3dbf97bda", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", + "similarity_id": "f32295d4e6444ca1ee2172e3411c8e4e5921b2bdc74204e8b04f92d41b5e24b0", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", + "similarity_id": "327e15f99b01b0ae66997060af16201647261f4a32185c6ac602f9edacd86f15", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive1.tf", + "similarity_id": "e823d8a156d0f07f9b6dcd1e7a73cd2a074a80f86f249e8eaf8af68b2d43485e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "13e7a8f2e43cea0687127698852b3b21d39fa1fcb53e20f59a1e0f9934d56c6f", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "4aed886ca8ba5f772742ec213f79274b108c258cea7b8bd769e2fc8c82fb805c", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{test2}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/negative.tf", + "similarity_id": "37ea5262ecc508ffbe423bfcf90f00f3aadf676432f1370f499c0fba936ed05b", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_sagemaker_endpoint_configuration[{{negative}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sagemaker_endpoint_configuration[{{negative}}].tags has tags defined other than 'Name'", + "actual_value": "aws_sagemaker_endpoint_configuration[{{negative}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive1.tf", + "similarity_id": "76b5c89a698a4c22bd328d64028cdc5ed46602ae94ac6f0e7ab2e6e3600264f1", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/eks_node_group_remote_access_disabled/test/negative.tf", + "similarity_id": "7e30d1c222fc45220644d624bcd0567c473f44512ef1c4074b946b80304cc291", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_node_group[{{negative}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_node_group[{{negative}}].tags is defined and not null", + "actual_value": "aws_eks_node_group[{{negative}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/positive2.tf", + "similarity_id": "fd5d638af2b36f88ab03e0f50160b7d6e7186cc2238ede0eead63c9d9b0f3e13", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ssm_document[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ssm_document[{{positive2}}].tags is defined and not null", + "actual_value": "aws_ssm_document[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", + "similarity_id": "02aa15a78e3a1fce9d1bbe9514ff43f4629962a53e8bdb4caf1a719de3339781", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", + "similarity_id": "2d2272715a1892aa4140c5c56a4e67189e557c5d4a4f18904e9e67e70c01bd7e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_has_public_ip/test/negative.tf", + "similarity_id": "450ad3925bf7c7c081215d0b88df9d5f962abebf0206d854197fd7ccc953344e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secrets_manager_with_vulnerable_policy/test/negative.tf", + "similarity_id": "947a65993ec3259f766561b26e41910d543a4adf8de4beeb07e974fdac4643d0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{example2}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", + "similarity_id": "190c94b0b2b24113def0cf693efef28e6860874ea48660fee11e5f47c3bb316c", + "line": 86, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "e8f71c54fa498ad3a80065100e1ee29c295967824429b5e38b6d3817d2718234", + "line": 34, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{subnet1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{subnet1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{subnet1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative3.tf", + "similarity_id": "6fb74ea6de2af993798d4f278ca4adfde850464f08e95a13833e4b5b7c2f9773", + "line": 35, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "d9d6421ac4b66f63d0eb549514f4d5f02e2b704cbaa39ad5ae8e11b96a55a11b", + "line": 88, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{test2}}].tags is defined and not null", + "actual_value": "aws_instance[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", + "similarity_id": "940f7acd0bd8010cd1c9fa38593d16ff539c7cfd2b30c61b4e29afd7a49220eb", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/positive1.tf", + "similarity_id": "a2ff8df06c57aa62a69b0448eb1570586231ff4b1980f4b85f4c0b4307eb2f37", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/positive1.tf", + "similarity_id": "1e645af2229e581d6ccbfc984e69ec8f13ed33dc79daf3c64493c0a2395d4feb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ssm_document[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ssm_document[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ssm_document[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", + "similarity_id": "44cf75869f027a88fc9cd12be7cb3ec7a053ed68145258479930d13fbc572c53", + "line": 29, + "issue_type": "MissingAttribute", + "search_key": "aws_codebuild_project[{{project-cloudrail-test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_codebuild_project[{{project-cloudrail-test}}].tags is defined and not null", + "actual_value": "aws_codebuild_project[{{project-cloudrail-test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive2.tf", + "similarity_id": "48ad1912be1a7c206f989c2f90f8c4ad7b04223a6e0f487a15251cf8766e76fa", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{example2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "319c999a711e159ac5e65b7dfa8afa97b7171d0efd4c99b236da88b619dea086", + "line": 106, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive8}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "09ee867262e7e6a5e89c8e705d943586b75f790070f527998e0bf83a38c95b7b", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "369c6be4d1c1c8b9029abbb49f2359ecc35f2f6e88010f835c1b8df39c479f64", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/negative.tf", + "similarity_id": "66b36a3a331b1b1cfea85d6a49b153ead150a9edf8953b149e185bf230d4d1ba", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{negative1}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", + "similarity_id": "75e60bb9574ef6ffd13b5eac22690ce7ba9b0cbf089313475b222389b3ccb701", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/negative1.tf", + "similarity_id": "e7fcfb974dfdeca3762cf255c92bfe7f4216089777c75d4d6b303b72282f0abb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{a3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{a3}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{a3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/positive2.tf", + "similarity_id": "218c99b72697b5d8dc69c6307d7ab67eaf598f132e22e7ae8e7be97d64836f58", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{a2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{a2}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{a2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", + "similarity_id": "14fb818504232a1707691f2ccf1cafecf6bf1cebaa3ba6bdd68323c0130dd368", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example00}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example00}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example00}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive3.tf", + "similarity_id": "ba82a8835b3b1c6ad004f427b8aacc71734a973cfca0d88565cec63c07a45a45", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{postive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{postive3}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{postive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", + "similarity_id": "5e3276a3079883cd1967ac89c3c3fabcf55cf944e266ad28221be632d235aa2b", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{public-bucket}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{public-bucket}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{public-bucket}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/negative.tf", + "similarity_id": "40882ba50ebe6cef99ee6c065d29d681dee772dc45d8ac93be459702a05d4eb5", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "68cef50e605408b2f4b5ac9bb96a66ffd1db36034b30474b0f3e150d9cd0cc6e", + "line": 83, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst12}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst12}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst12}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive2.tf", + "similarity_id": "767cce0dd632a163730026194e22ac1640b7f94285a6e393dd4815d6c321af00", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{positive1}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative1.tf", + "similarity_id": "85160dc0f396d7491a76ab02c6bced4417775566c67433ec09193dede51b3822", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative2}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", + "similarity_id": "2e3eeab7274491a175c816650f5252e268d39b2cd2ae04b8bc4e2933c5764ec7", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive4.tf", + "similarity_id": "32312921137a69ceb0994208f54402fd6b6ebdb7774e15c69bfe0720cb0ffd1f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", + "similarity_id": "bb8ea811a4ab7206c36dbeb4b06203af39515761bdd977cf62a9c112d4a4ba37", + "line": 64, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{positive4}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", + "similarity_id": "9a9768e64ec9c88afee2f1ec2a9c8c180387d9ea9ae62a77fe334dfe93440e7e", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{monitoring_positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{monitoring_positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{monitoring_positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", + "similarity_id": "1eefda542a82f205c5c82860f872d0546b31eea1839edec0ed8b56c8b3769c94", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}].tags is defined and not null", + "actual_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "0bbfc88181ca484edfd2fd2261fa85b4bb1993de0175f265013c85b09732cdad", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", + "similarity_id": "073933d364e8ad6d7bacef5928a61cbe821b5fc435493f294ec3ac91456dbca2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", + "similarity_id": "c89503ebe0fe9c3d97ba1f81eb8610cbc91eb22a66054e45f842780bfbd57cef", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_has_public_ip/test/positive.tf", + "similarity_id": "60b6c30bad6a7da721e12e6e14d84d17677d21f41106a15356129723e1643d42", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/negative.tf", + "similarity_id": "288e1a9fdbac6555856810a39d0bf1fb46e546bfb848b4e4811feb5c38f97fd4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/positive.tf", + "similarity_id": "b77f53563a6a880962bfd89299dbc95349eac972f050899cb917e0951668f192", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_sagemaker_endpoint_configuration[{{positive}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sagemaker_endpoint_configuration[{{positive}}].tags has tags defined other than 'Name'", + "actual_value": "aws_sagemaker_endpoint_configuration[{{positive}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "941026080b380417420912d77b129f561181d9b2e3ee91d569e431cac0d67a66", + "line": 30, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", + "similarity_id": "e47696e665355800fe8b40f351cd52389c910778a15cdcba3c473e090975fe49", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{q}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{q}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{q}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", + "similarity_id": "484bd967d7f62f8d2066b302f7aab555b2cd361a9a518439ac4e2defff74641a", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/negative1.tf", + "similarity_id": "500b7547ffb7778f44855cb5cf190e7e38866113ed35943a4123b4da6c269a42", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", + "similarity_id": "829e673f5c8332d89c31c1978e66b2d942636a906f1e5cac455803807577adcf", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{test_lambda2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{test_lambda2}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{test_lambda2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/positive.tf", + "similarity_id": "687905ea8280a48775153b37d3be9033740f7b3e3c5cc7152c56a6b05b33b40f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/negative.tf", + "similarity_id": "df97fdb5bc3354afea3801215dad5085d9eb4cb30814860d9a8e17dfd3516bf2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{test}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", + "similarity_id": "64d5c93496ff0fc2b53d638f479cc0a6c7928e8d21afdeda76ad3e520e0b79ef", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table[{{example}}].tags is defined and not null", + "actual_value": "aws_dynamodb_table[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_network_mode_not_recommended/test/negative.tf", + "similarity_id": "b9940003156e61ad5af63d9f063bb4ebcba6b3d2db8ae8946a84b8cd1807f092", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/positive.tf", + "similarity_id": "0954f8c38e1399b5164268b9378ead9df9efb931a38966685b3ceb453ceb8cb0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "58006aa5953a62be80285d965954cc1ddc588d9db124fe35d0255929101dbab2", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_service_without_running_tasks/test/negative.tf", + "similarity_id": "eb93bbb35d65945543c9ddf7517140502fa2273da99719e4e3c99e42deb9b7bd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_service[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_service[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecs_service[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_endpoint_config_is_not_private/test/positive.tf", + "similarity_id": "1552e46b1c05e6c811a3b182b1e7e3c57940af23bd9e4aae7829c1b467ed5c70", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_without_slow_logs/test/positive1.tf", + "similarity_id": "eac23ef05dc1b31c79e841fd89771455c6e9ca54d78f76ad4e5cdf7701ca25b4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive8.tf", + "similarity_id": "76abc79cf8a5c8b582da62599653ceb331395c7c901a503698db1801ae4c3344", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive8}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", + "similarity_id": "3b19eeb18c5870604f4a1c5877bed3d2875fa8d36c291da1edd6d66c3dffafef", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{foo}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/negative.tf", + "similarity_id": "e7d25e8eeb6d8ec494e7b4ac1c04c0f0669db04237eaefbd800eb957df74b539", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "6da67a3b662c358b5e57f30b725257ef9d3d4138c8bb2cb39bd90c67b7dba7d1", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", + "similarity_id": "24ff225d1c5b993e14cbb4596d8fd51f91d0b8f6032a9ce5be778cb884990ff6", + "line": 42, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{positive3}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/positive1.tf", + "similarity_id": "426e3a813d3ffcd446db3239b2d3038a4f2c6f461d4bb26bddb8223da7b48b48", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", + "similarity_id": "df39e50db13cba60d95fe31f5eab483202659abd08461215f8c74bedbab1c13f", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{negative2}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", + "similarity_id": "20b95cb272833a8a109c5bb61bb9615185b925cecea16b8af4088353029925be", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative1.tf", + "similarity_id": "2fe8152d51efcca906e01bfaae31e6ec135c595ed8e683a493d9c984b526bbc6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "2da471f3f0000cf5f7e0f835c30d186ccced1c2abc67f0172005011b911c202c", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{cloud_watch_logs_role}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{cloud_watch_logs_role}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{cloud_watch_logs_role}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", + "similarity_id": "794209cbf85465e34efcfbccca6713bd3186deb2e920ae6eb7978a7eb63e5e3b", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo3}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", + "similarity_id": "6beb1129fcf99437ee86c63bc30cc6e165bd4caa5519a5b84d2c3506591b4231", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/negative1.tf", + "similarity_id": "1ffb0212fafe640ee6fe652f72ba6a0db50d92b743b6fc3a41db0bf907f1c218", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_athena_workgroup[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_athena_workgroup[{{example}}].tags is defined and not null", + "actual_value": "aws_athena_workgroup[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", + "similarity_id": "024b277b161a021d1ab8f88a3a357598489e37b1a6f2d41310ee737894d0bd7d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive1}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative3.tf", + "similarity_id": "360b22fab444d5ce9f344a0c2307a7ee7b1e64e5eb98137fb12e661ea4037684", + "line": 35, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_has_expired/test/positive.tf", + "similarity_id": "dfb387d971fc64e3777466c11ecbd69f79ab5bfafd360e31184d35a99a13a823", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "0de03be8af24c0dcfede23eb7e42765a8063bc04acdfc29aadd8c2ea070fd0d1", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_dax_cluster[{{bar_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dax_cluster[{{bar_2}}].tags is defined and not null", + "actual_value": "aws_dax_cluster[{{bar_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/negative.tf", + "similarity_id": "f5aaad4dd6c2ca25d65175f8a3efc6b4ed225fdb1d8d507ad27c01b5ef2ae708", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_organizations_policy[{{all_features_allowed}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_organizations_policy[{{all_features_allowed}}].tags is defined and not null", + "actual_value": "aws_organizations_policy[{{all_features_allowed}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/positive.tf", + "similarity_id": "b1cac7f2deae0e332762d6bfa090ff8439dfb132113cd5ccb48e67eaa0674f2d", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{es-not-secure-policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{es-not-secure-policy}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{es-not-secure-policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", + "similarity_id": "edaf2a8443111522214d44e2aab150717a989f64c0f3af02bd3e0b2d5d89c274", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", + "similarity_id": "8da9369ce85355a8b706969db784e00e8518b6b0279c80e4dcfd5cf89a5abd97", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/negative.tf", + "similarity_id": "ff2e59a4f5847a96e125ccb9dd7e695cf0aa1ed9668e7922edf320efb9c18b53", + "line": 29, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{negative2}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "1d07c4736e5ffe5e83f6cc8c8d9b96b3cadf2b88524d6fcef720e6736b4f1ae0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive7.tf", + "similarity_id": "8b598fca21f90eab1c38ea28e78402bd29c1d77d60ce990152fb163fc5dfca5b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive7}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/negative.tf", + "similarity_id": "34b5b7eea0d1690bd684b0140bd95f02a6bed19b62d55d81c164724579734239", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_batch_job_definition[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_batch_job_definition[{{negative1}}].tags is defined and not null", + "actual_value": "aws_batch_job_definition[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", + "similarity_id": "4ad915e306da616399af5c92a17a38d7ad7009704f672e619000aa24abb00cce", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive9}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive9}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive9}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "d961bd5b5e4844adf4488400a9dfa78200d42a324d5d415a30e3f6cacf696521", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "1c81e014d1dba3dbe8f95cc647a6abddd3205d7892fea3e05258283f2354ae57", + "line": 72, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile2}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_with_plaintext_password/test/positive.tf", + "similarity_id": "0af559c0122892553f90855f00c2dc2669f195fd97f9b573f4f703f5afe65452", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_is_publicly_accessible/test/negative.tf", + "similarity_id": "38e3965e93bc0ebb8ab6db47d0c59b857458c46eb00a8989411bdd95512ca7a8", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/negative.tf", + "similarity_id": "bc197c47743fa87497d3de82891388000a4fb5968946bd9f553aab9abcd4ddce", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{q}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{q}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{q}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive6.tf", + "similarity_id": "d497fe33ae44fb7021c9c883a0aaf0613e3411afa4fa3433e10a1ff2a4081147", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", + "similarity_id": "8e7be03f53c62ffaae7813f12a0c06ccb29755838f44d36f8585269d40a6f369", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative2.tf", + "similarity_id": "f711138300784437dc5f7c823ceba28c141779c8c58fe3a201099e6b11b895ab", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{negative2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{negative2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{negative2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/negative.tf", + "similarity_id": "5167dc07bf8f7fb6e49408cc60a1b16119c4125be4afc310802e4dc72b635730", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secretsmanager_secret_without_kms/test/positive1.tf", + "similarity_id": "830435bb3a6cec187deb229545c04668edc00b7b52a4501d979bed68411f9fcb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{example}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/positive2.tf", + "similarity_id": "08ecd82604c837198214db3d23dd03776424433f730b26c8531abe08e083d36d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_server_certificate[{{test_cert2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_server_certificate[{{test_cert2}}].tags is defined and not null", + "actual_value": "aws_iam_server_certificate[{{test_cert2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "29a669983f734fac7e9fb8630bd673060936c2421a1925ba61d202c1848f762c", + "line": 76, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", + "similarity_id": "d2e5c09aa3f99b431a4394cc403c12465d9d6a8f1e4a28a226977ed84a3b48f3", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "e9b3bb858a83b6d24edc03184e003f9e44d0890f86e14bbc2c80d11129382560", + "line": 69, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative2}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", + "similarity_id": "e9ce565c69fbda08c58433b8f7c1e2f9b7aae9ade07bd0ab3df1caeb2ac2d590", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/positive.tf", + "similarity_id": "5d44077d925c17af7698395a5cffd4beb5e710963ac785dba18f0c29eba1ed9b", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{lb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{lb}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{lb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive1.tf", + "similarity_id": "65d0652aeba60add05c49c1836f10460412d48fb0fbbd8f48669015935dde10a", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{default}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{default}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{default}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", + "similarity_id": "04312fe7b2d21d6262efea71e6fecf482e5e95d1af61f5adb6cb92e87bcfc48f", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", + "similarity_id": "f54d8a536aa7ccf58605e825a61eb744b74e53b1fb90689570299f803a85b4e4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/negative.tf", + "similarity_id": "911d257c2a1854408c40ab0a879d522b5ba258faffe9a92caa95f5e02794b307", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive3.tf", + "similarity_id": "6f75dad11972a091197752a1614c603d3b9a25a0447ecafcf3ffe32e2ecc45d6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive3}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", + "similarity_id": "131afae0005f9daec5d98c96ab5b741ef6cad8da9fdc8ac80c6b46b07536b778", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", + "similarity_id": "efd58a6c5ba604f8a387bf22bb7efffc84ff34ef00393e62d8156048fdada7b6", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "badf30c5be23c8df8bb35d193a1b8ff8ededa67916b2f5ff808be09eae34a459", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "737bf3609d45ae5511492b7ce02f35b9036696032a452266d0f111967613ad95", + "line": 24, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/negative.tf", + "similarity_id": "c7978d6fedf8fa7d86f5162e4d2ea81b653fe62542b97ba75160afd5a1a4d49e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_organizations_policy[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_organizations_policy[{{negative1}}].tags is defined and not null", + "actual_value": "aws_organizations_policy[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", + "similarity_id": "d311972bbcc9a536b29f16ef805c908cc3e391652f3ef1a68cde012db2e2475c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_cluster_with_backup_disabled/test/positive1.tf", + "similarity_id": "3eaec0622f056cce42179f558af3e321578d403acf3a413db1f8e7102daf412d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{postgresql}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{postgresql}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{postgresql}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/positive.tf", + "similarity_id": "e1d94934cc89878e082e1ecfecbbad0151f98890374adc2efba1ccdbc49ca4a6", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "4f591321f29717ab20238b97e1f78e4e469f9cd0eead4e86e0a75c61dacad232", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", + "similarity_id": "fe0f89f652c7cbd6ddef463af3a44fa497771f7d997334eae281e0fffe5498d6", + "line": 38, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/positive.tf", + "similarity_id": "1dc960204a220423bb6e50a55d56d308c6ef87099f4742719851509ff87704c4", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/negative.tf", + "similarity_id": "1f986e6289426c21229cef00384479093e6af8c3e70497f1692d6eed4d4cf9d3", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user_one}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user_one}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user_one}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "938febd5c740791bec6131780a344b1963a0202f8896f43edf896cc6084892ee", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "da3ea37f2c4b6ad1490d9391fb9bb72660f55fc54fdd19ea994769f868fe6aad", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{test_policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{test_policy}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{test_policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "6b87bd5cc26e20ba7e65658041ab8520d47c6e28e7b027c9ac75831a252ca41d", + "line": 76, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "7cc7e5f4ee9f8797a0fa83c818a3bd9561b54ceaf9abba2aef810e21cdfae483", + "line": 56, + "issue_type": "MissingAttribute", + "search_key": "aws_lb_target_group[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb_target_group[{{test}}].tags is defined and not null", + "actual_value": "aws_lb_target_group[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "10b45e9e1c8e13ea719d055373f17142b5647e5dbc133a53f1d6342a4ee665e8", + "line": 30, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}].tags is defined and not null", + "actual_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "49e946826e6f62abd4671001251649aea7582e47fd5e8e89fea93b51f0214344", + "line": 34, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{subnet12}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{subnet12}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{subnet12}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive1.tf", + "similarity_id": "30ebc9cfe821c29299307b1681442b594380f300b92499b61d1efb5e7cc57c22", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/negative1.tf", + "similarity_id": "55232098e347cf4d09ff1265ad24d2ec357926285bdf8108950604309233afcb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/positive1.tf", + "similarity_id": "37eda2d6d82cd29db279b251e529171cef14adfe8cfc0a157feb970983524a62", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", + "similarity_id": "315a543709fcd468a6166d109fc8bde2aba48a1fa0624b7c69e3654bebe3c649", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/positive1.tf", + "similarity_id": "b73954a6100888886150b6cc3c2590d2f1f002528c6215212046131683bd4196", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", + "similarity_id": "946fea4bd27d1d8f3cc8bd68a34c71edbb9eb1525730e64c67bde19b9171ce53", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive1.tf", + "similarity_id": "7363b637ffd75998a8dcec86cbda05f30e0d78f9d19603c42d3de1d194249e36", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "d328425ea162f5ba17d8409d650a3e3f4e120963272b8f28af36b1b8d031b6b9", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive3.tf", + "similarity_id": "f200d7876928cae8f5e4eab919d77a928cf3b076dd855ebdd59bc6d327927d98", + "line": 35, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{positive3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{positive3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{positive3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "d30db3e7e5157e5e1ec674073be6de016b8cf56f835c471aa1b54692060f66d5", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_internet_gateway[{{igw}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_internet_gateway[{{igw}}].tags is defined and not null", + "actual_value": "aws_internet_gateway[{{igw}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", + "similarity_id": "af477de158b795b7f2fb383111d041022c195420495399385dd5232dcf838f1d", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table[{{example_2}}].tags is defined and not null", + "actual_value": "aws_dynamodb_table[{{example_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative1.tf", + "similarity_id": "b42965f41e8276ea50c3f9e8cb3113ec705c0160cc9e611f5851df98806fddcb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "8514bc27efb710c8f777d267aeeac35a2b850b65dfd4f27fd54cc295dc547eac", + "line": 56, + "issue_type": "MissingAttribute", + "search_key": "aws_lb_target_group[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb_target_group[{{test2}}].tags is defined and not null", + "actual_value": "aws_lb_target_group[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", + "similarity_id": "44cafc7a4ce5812940902c3bb801c30b4bfb86bb6c83648f8580e4ac1d5a9d06", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive4.tf", + "similarity_id": "861259c88ab87d1e97be8d6609e6de302001940618e4f2c266a939b648099141", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{positive4}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", + "similarity_id": "4c5f220b8db7539f7fca93f337eeb51b9b1b1f8157952bb5b130a87a6de1be42", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive3.tf", + "similarity_id": "fed199249c11dfa3c87814b8ea3731d122ca9a93eef49e8a3615f7d8f6c21303", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive3}}].tags is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", + "similarity_id": "575a877c3c41a2b890775d30bc509c1d00278ab3509ba7b210ec5b0e77286cb7", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive3.tf", + "similarity_id": "7075baa6293ecaa00e4d8e9ee94c0120058c6fe8b83859929be25f8396634528", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive3}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", + "similarity_id": "b01484f07af857ead34f6373d174104e0082153644164e858b2f58784af8a9b7", + "line": 24, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{positive3}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", + "similarity_id": "d3805150a049b0d187cf192a75f80aa7b6a1ccb154c616194c9365a53bb52feb", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive2}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/positive.tf", + "similarity_id": "62ee282556d5792c87b241ded26ef2ce69f553bd45b9753464f33e46df623f5b", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{positive2}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", + "similarity_id": "4949e7cfcad54198417fd3981a16044b7d399ed25884d49569ed9a1c4394cb29", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", + "similarity_id": "23167c354cf704c54617b66a313bc67f36962177e03e24ac31fe7fd05482e071", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", + "similarity_id": "e4e767b2000c6183ccb9a036048e783fd71f48ea094c18c5886808cbce865db4", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive6}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive6}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive6}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "b57e9977e1745174e6249dde1c5311f1adb4912a469ba63aa25828ea343cf74a", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/positive.tf", + "similarity_id": "911aa7f5bcac0ed1c8c5e258939f04c784054cc5b0a70bb68494ce46dd794e43", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_route53_zone[{{log_group_mismatch}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route53_zone[{{log_group_mismatch}}].tags is defined and not null", + "actual_value": "aws_route53_zone[{{log_group_mismatch}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/negative1.tf", + "similarity_id": "64f804060c4cddfcf454cb25522fd8fb7ac19723211ceea061711ae2df4f99a7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", + "similarity_id": "c42891cee565577e3c5bb338c11d652914894a039b9b4f7308a2b159a3d1595b", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{negative2}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", + "similarity_id": "f402c940fcb657fe183e95aff4936e6798329dfab1133fda5d3a36ec449dc32b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "d35f2ba315f1450faf1f860e38d516d87753f8e0b76e99562275ebe54a598cb1", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/negative.tf", + "similarity_id": "e8542ce93bd9d316e2f1f375d89b4b898c180a87abc2e61934a64271cccb51b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_with_public_scope/test/negative.tf", + "similarity_id": "c745a2628de1bd44e2d2d2fc5dc41369683b81c64dc172878cb421b63c14205f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", + "similarity_id": "31d155f2c7aa1f689187f8440758f2bb216d72da71f70b923e790a14bc8dd5f6", + "line": 41, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{postive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{postive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{postive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "a0b383612bdc292ed1d31680c997a3529f07a63adb4985178ddc02fe5a01e732", + "line": 76, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/negative.tf", + "similarity_id": "d9df150b24779b16c197ce62e3007c939b807130482708c83dc6d2e49ded5db6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "f4beb44c2ac02e1800e292c8be6a03a42576cc66ac6085230afc63353ec5a1fa", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", + "similarity_id": "9a29a7695a6996ae6869c34f556bce5896f74ef65d4471ba1c53471b8765786a", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secrets_manager_with_vulnerable_policy/test/positive.tf", + "similarity_id": "44f6bccaaea1d6642e9e34e7d2c599fbac824e768d6acfa1e3f9ce1f2e14ca13", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{not_secure_policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{not_secure_policy}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{not_secure_policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "ef721ba48c4988277b4b6ed7d2fffb7b06ec5994f5722d027322611b9616774a", + "line": 91, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive7}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", + "similarity_id": "aece977fc4e0c4f038b764fcab94b8dc5c16bca7e961062c2d33b64ea9ba1ca5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive2.tf", + "similarity_id": "04cf4e8ce615ab352bb9ea9eeafca8eb1691184cb91fb2bf478f2a76e0379d38", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", + "similarity_id": "12d8964e2f6c3e65150439272cacfebd9ff18f1181da7a52a1ac25a05aa33bbb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/negative1.tf", + "similarity_id": "355289dbb5db97f13bc02e2d4627c4eacbb66d53ba3d6c5cba8bbffdfcb194b0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative1.tf", + "similarity_id": "db3812848ec337cf9f78b3b60ead7016b2110cd982168b98a3ddec8faa14ea55", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "b0546040c33ab273676aacd6500cd5253a60495deaddf9aff15af3b3d6c56b10", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "e9646fa15d593eed7a0d0a393b74ba6921c33ee1b7c86eef61b3912d15c1a53a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "27ca396eaeabee9269bdeb7e2c05b67c981457d615374899d56fe5ff6e23b61c", + "line": 51, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{test_role}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{test_role}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{test_role}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive2.tf", + "similarity_id": "54674de9e98cafbba34b292128a2d78f070c2d1e96e1ba945f16d3d441599732", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{example3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{example3}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{example3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", + "similarity_id": "11e938d695ed577f9229ef5a765698fb14ec5b0d76584b31f9d0b6f51627d916", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", + "similarity_id": "ee11fab17604538603125981a3fcd874e325047fd6f0f0b1fdb6353f6992efe5", + "line": 28, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{q_aws_array}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{q_aws_array}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{q_aws_array}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "68dd1ffa0d5c13b75e0a4a715b10c78e3c41bc5433d854bdcb88e93a94002425", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "f6a012672b69527fd3b269c7e06a32e5ca47655f9de04a4ab673ad51226769d5", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{lambda-role}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{lambda-role}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{lambda-role}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", + "similarity_id": "bf54447c7468376cfa4514ac82e9d83285981508caa3efc07700c2d75ccfda7c", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "00b1abf495c2f3751082be775eb791baa7ca79eda7477f82fd829d10b106da9f", + "line": 106, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive8}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", + "similarity_id": "de8063d843362cb4cb736ef0ea226e5ffc232369629c20127fa50dbe04e5e73e", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", + "similarity_id": "49a6a35d70985a8fe28c25517a29523eb8142480dc9ee6fcd660f8f63bc71375", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{role}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{role}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{role}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_instance_is_publicly_accessible/test/positive.tf", + "similarity_id": "87f7326890fef77ad4fc5dc79c0843de9dbc2866986c4c3ded61d7a8a6e98a97", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster_instance[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster_instance[{{example}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster_instance[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "a481971bf91659a20d2dc88a962b66e19c9588274096253db0bb9f61ada5d937", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_encryption_with_kms_is_disabled/test/negative.tf", + "similarity_id": "362d22d6bcf8d2eda166d145891819ecd8226dd01aff79db2a95fb1ca7b62031", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", + "similarity_id": "a72dbd082eb5ff41a6e267233afaabe531dc75157251c049919cb2fbdf8d0cf9", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive2.tf", + "similarity_id": "1a51b789e457a906da665bd95de7ac24e48da9dc440ee393e2431a5feb797dd3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive2}}].tags is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/positive.tf", + "similarity_id": "f0c9a0ebd2a39e2db1eefa68ca65b2a147d95a29970e0df7c902fa4be2aeea22", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/positive.tf", + "similarity_id": "60993c1b4eadb9f38ebcb44ae858212de2ed4141c972f5406dbc5319ae954941", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/negative.tf", + "similarity_id": "8436377b3c283b1ff432dd0c4b9304a040ffca7df54123d7eb7672cc3c69d563", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{example}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", + "similarity_id": "9df8edee04574e02cad57184eca2bc66c168cee6c636db4af33607f406f297c2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_organizations_policy[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_organizations_policy[{{positive1}}].tags is defined and not null", + "actual_value": "aws_organizations_policy[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/negative.tf", + "similarity_id": "add4bcc38064f706367376cad320dcc1d2e045aac18b8cbbefa2217fe254e00a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", + "similarity_id": "0ee636437b6c7a52bb125dc9a212535084efd14c21858d807a7b6bb552175b4b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/negative.tf", + "similarity_id": "1480987850b106de2e3229287bab921c86cc9807c7e4337d6b4095af70195edd", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{negative1}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "d842c78be33ffec57a9d1d44740c2213e27fa4ea1db4af9d93432d67884fc06b", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", + "similarity_id": "c0954749a3431925300c4fb106d2529af49c9551e66aba172fd53c4027827b2c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", + "similarity_id": "0d40f0a1db07d4055d196c96760cc845945c884404dd86172ac69398b3dccf46", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/positive.tf", + "similarity_id": "058ee0fc9ebc6f3ca04f5b76328f4dca47a2cf69f74b08089b27623bb56e29eb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_cluster[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_cluster[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecs_cluster[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/negative1.tf", + "similarity_id": "23e6292ef9b1a36f93e2098ca9914c07bb43a7f7abe913163a0e0d35e40e8efd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{service}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{service}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{service}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", + "similarity_id": "c5b0d4f93b74205883e45966ec9af2e820711ab2510ee5ff7d15a9d547262c5b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", + "similarity_id": "bf6dd48cf6d1203cb7c72d21eccdc499882264dab222b8d73bf210f935f645e2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_acm_certificate[{{cert}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_acm_certificate[{{cert}}].tags is defined and not null", + "actual_value": "aws_acm_certificate[{{cert}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", + "similarity_id": "38cb6982d7461cd71fafc837785e37cbbbaa74698a67bcfc28cb6a2729a809ca", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "9d0414dcc59e22da3ead9aded256183b52397a20ac2ac572de66a334d3884940", + "line": 108, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst3}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", + "similarity_id": "dd0bebc9a146da82a4bb62e589ad4c6c43dd3da8362a2456ddcde3867f928b91", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "2f82b0cd9f8770c98ce312929455de6f2265c3edf8c7674741f1794f13cfc68f", + "line": 71, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile5}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative1.tf", + "similarity_id": "9de1651fa54629a08b3048245e5c99a2f01c87d15b203e09f28e61e60efcfcfd", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", + "similarity_id": "1d28706ea412ac062081e2eb4f9237e6febd748f8ac0a5305ca4bc23520ad075", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", + "similarity_id": "2d88d97c2ba586f2c7f9bac47cefbcc4eac8e7f8c861d5c2721c925ee4d73b3a", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive2.tf", + "similarity_id": "6a98d6eb981ad760fc362d285322b751d3795e56f3431d5bb7d07b88690ca782", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative1.tf", + "similarity_id": "2f8f4e55043aeaf8060cde74f24b07e07ab27b147d56f943e87f228bfcf3f6a2", + "line": 40, + "issue_type": "MissingAttribute", + "search_key": "aws_elb[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "f4ff64572cf8624c6a73e062d084aaf7063ff966a47acf2f2b6d04c70a879520", + "line": 90, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table[{{basic-dynamodb-table}}].tags is defined and not null", + "actual_value": "aws_dynamodb_table[{{basic-dynamodb-table}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/positive1.tf", + "similarity_id": "380f8a5a1bd203426cfd58e775b01fa99714e9641bb19406c683cd1f2651f499", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{test2}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "b61f222dd03a344da25ac882c4f8d6275425b042a0e8b25a4270c89b3c059291", + "line": 63, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{dsg}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{dsg}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{dsg}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_network_mode_not_recommended/test/positive.tf", + "similarity_id": "6492e3bb40272db9ca02a049c91aa7c38784d0c9715890780d433eb4891ae742", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", + "similarity_id": "d194cf00dc68d1ad5b3ab4a338276adbff98456c011d8ec51e1b5c8818888994", + "line": 66, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile1}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/negative1.tf", + "similarity_id": "7a5d0d4a8aa566b266147380f833bb6538e6e758807642419c9fb0b588d0677e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "da98fa80bfdbbbd1439b4f1890d90eaa34f0b83426380542afa2450bea4d04be", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "aws_dax_cluster[{{bar_3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dax_cluster[{{bar_3}}].tags is defined and not null", + "actual_value": "aws_dax_cluster[{{bar_3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", + "similarity_id": "59800085fef26e10d75221d6441c4b5dc695c15981aadc63a69c3bf558ec9764", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{iam_for_lambda2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{iam_for_lambda2}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{iam_for_lambda2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", + "similarity_id": "64f3ae5cb1ae3833c96ea65e885e8275d09759239b25929cef39e04851bb1e31", + "line": 45, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{test_lambda3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{test_lambda3}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{test_lambda3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative1.tf", + "similarity_id": "77ddb67294ee6322fd636ef53f280e7b499721455a3376bd47ac7d337d03a1db", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_vpc[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", + "similarity_id": "3cc0b7ea613935c4f4d7bdc54430e220928a285a7e077282f73322135a710761", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{codebuild2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{codebuild2}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{codebuild2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/positive2.tf", + "similarity_id": "23f06ba7f2632a0e968726458bec36539432a3def4ad540f876613001d339117", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{positive3}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "67af587d429a510c8bbb24eea60c161a77fe115288afd2d57e759bf676736e68", + "line": 35, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}].tags is defined and not null", + "actual_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", + "similarity_id": "42ecc118e2a125e40ff4e8e994daabaff1fba3d096dfb85dd1ad74fec3bfe567", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example1}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "e6cb93ea861b3f03f0ce6dcde8739a86a5174cebdc713e3b0a658b66bbad9a3a", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", + "similarity_id": "7894314f1bb6c353c55e9df5b1a482fc4cd1d033a9b09227aff2f3536a08afab", + "line": 29, + "issue_type": "MissingAttribute", + "search_key": "aws_ami[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ami[{{positive3}}].tags is defined and not null", + "actual_value": "aws_ami[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive1.tf", + "similarity_id": "33e2a1632801f87e790fdc9bfa89ccca2900eac657449781e906de237ab6f3b9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_globalaccelerator_accelerator[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_globalaccelerator_accelerator[{{positive1}}].tags is defined and not null", + "actual_value": "aws_globalaccelerator_accelerator[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/negative1.tf", + "similarity_id": "c0f28dfdee8b6f17b11c0f1c23f56965ec53701851c9d9332dc6513d959826a9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_dynamodb_table[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_dynamodb_table[{{example}}].tags is defined and not null", + "actual_value": "aws_dynamodb_table[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", + "similarity_id": "f658bc37686769dab71201ca47ae2e4e8ae221c6bcf7b9abfe5a6e0fb9b15dd5", + "line": 64, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{negative4}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", + "similarity_id": "5585cab123f52514fa535f5ff99a46b0dc91d09244ba0e4c18e00fbcb8e154af", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_without_slow_logs/test/negative1.tf", + "similarity_id": "fa9118747c5aad19e45ef1bd8a9304d6a27bf6657f6bf64a7fa9ef7068aec348", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", + "similarity_id": "00f9de83cedf8974239af44f1cb7d314ac6fc2a828fb08766db0cd2f8868091a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{b}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{b}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{b}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/negative.tf", + "similarity_id": "ef59ce8cc6ee3d93e05acfef697f5e9b58bd268956fd9b896c18d9929219469a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ssm_document[{{negative}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ssm_document[{{negative}}].tags is defined and not null", + "actual_value": "aws_ssm_document[{{negative}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", + "similarity_id": "ac4f9cbe5003cebb1c4d0f8dfc1ac309628bd3a4ae8ba3dd6df32aff24101e68", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_athena_workgroup[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_athena_workgroup[{{example}}].tags is defined and not null", + "actual_value": "aws_athena_workgroup[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/negative.tf", + "similarity_id": "9cbb69e3c91b531151b51aafa32f4e6d1a38281fd118942b15e5de232f8721b5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_config_config_rule[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_config_rule[{{negative1}}].tags is defined and not null", + "actual_value": "aws_config_config_rule[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", + "similarity_id": "33e698690ec58b289134ba3553d2ac94fb844ee0b6afe9bf71432c7decdf8387", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_instance_is_publicly_accessible/test/negative.tf", + "similarity_id": "43d347b5382dcf0d85e858455aa63fe4424e7f4841836f902d4046c7cab98c26", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster_instance[{{negative}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster_instance[{{negative}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster_instance[{{negative}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "b67fa0956e0a1b91b3556b92447b6827b0416845ecbc0986dc4aa8db61a994f4", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", + "similarity_id": "255e174a91bb6ca25dd86895b44ed007d99beb1dd54e6bc05ba27a551d79c518", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{test_lambda}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{test_lambda}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{test_lambda}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", + "similarity_id": "691377719393a88c71a5b95170e86d3506e97e1c55df278b27ec7c86009a970d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", + "similarity_id": "17d4cd0e8489ef9b016415046fb0ec40cfc95bf0475ad8f375471d708876eb26", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", + "similarity_id": "3c3ad490b88fae3262e297e43719cbd06120af70d8f10b9cee814460ad19ca31", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_ami[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ami[{{positive2}}].tags is defined and not null", + "actual_value": "aws_ami[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", + "similarity_id": "371b69531b7eb0c269275c8e8b3d328819f4b29c500218b5e364c5d666a371f7", + "line": 32, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{q_aws}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{q_aws}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{q_aws}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "4d38df0194d335ff891c61f9d82c4f162bc3d082b4a6fd8d186dced344319d3a", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive1.tf", + "similarity_id": "4ba7fe12c1407e79b10aa5914db2179c929a550ad20a53318619087248f65b0d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", + "similarity_id": "cad43037f560ca1924a9c90fa5d19f096c7b2240f384f2f300c1e331bea48856", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", + "similarity_id": "4fe751a15cd90a307f4f6b54c54356c079c470ef834d00624aa785c077e10207", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket_object[{{examplebucket_object}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is defined and not null", + "actual_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", + "similarity_id": "1460d114b75bd15da8a53d2d505b3f03457384f0e9c708e245cfd901b6c924fc", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", + "similarity_id": "369d9fcf12363afcc763cb869aef150ea81305afacba1bf0d57ebe6d579266d0", + "line": 72, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "762152dbf211afdd3def573e8bba9100d4e3fc85da1c215b4d82b3b5d1c52da7", + "line": 47, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive3}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/positive.tf", + "similarity_id": "1694af784b2890619c1a2eba5372620db623c4cbe48009e387a2213ac917b079", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", + "similarity_id": "03df93e9bf127e7171c34ea92c3c888b9d94556338dacda1c70d7f972c3119e0", + "line": 23, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", + "similarity_id": "1ee0cd3359c1b7fa224c745b9b5c1b6d8fd25d59063856454507d1811e5e8c3c", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", + "similarity_id": "6062554f7080cbfcb7e82cef9c8642ef5104d47741b4408fb95e956b8eacd469", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", + "similarity_id": "38b0b47595475cf25ca2db234daad913a20519ca1c635b0f745ab2fa5fd40aec", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "499e429ee05b925d74808ddd398ca9bc7e6a06c24a5a90647d070109b6a5afd4", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/positive.tf", + "similarity_id": "075d2bb6cc4d08eef2a2f4b7097ff4a10cafd07668d7f13148db28d5091e9ae4", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "163971bbbf493fb1a8331582d92b6ff7df7ca1ca5327beadca306896f13456c5", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", + "similarity_id": "717cf4963f674d5c5918c44a95ef3c795185fdb51be4b3451896771466139b7d", + "line": 38, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "99b8718f26ec19b0ce1fc68ffd16ce990012a310d605be88c8c1051955c44b99", + "line": 53, + "issue_type": "MissingAttribute", + "search_key": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_with_access_to_console/test/positive1.tf", + "similarity_id": "08bd08456d7924d025233ee6186fb710c1b76e7388a50cfe956c6e3bca439209", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{example}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", + "similarity_id": "2ededcdd11b3dd8ec11aebdc31663326426fc56c18c38553f05501bb17ad3b06", + "line": 19, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{foo}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", + "similarity_id": "dc709bf7a1d3eedc7802ff6b49d5b31f4848bbd9f2ed58dd35a9754558d39d0b", + "line": 67, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{positive2}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive2.tf", + "similarity_id": "186ddbbfae216891ef19ec19b9ecefc39476131d70773ed307d2bae0d0b2d24e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_autoscaling_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_autoscaling_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", + "similarity_id": "3ab2487e28261dab79c7df0c5c958fda5a5ee28b2c2b3b14a5689b84aa3fec0b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "e8ec4e91b1a690bb82c7954c5db336f9ca782d5975333aef74aa1aea32ad01e1", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "df7be6940efbd99be9e931c7e6f362224ad4224e7b92a2f30fbc02fbfb1f96e3", + "line": 80, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive4}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", + "similarity_id": "a10c0c7ad96cbff1a8bee0d121de0f3f1af4652fc4a89713bd25e43809c22e1e", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", + "similarity_id": "1dee35cdb166279d17470fe403e40b307d91b327bbab9115310519e2ccdd70d4", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{disabled_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{disabled_2}}].tags is defined and not null", + "actual_value": "aws_lb[{{disabled_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_with_public_scope/test/positive.tf", + "similarity_id": "9c41bc969168420830ea834f42edd8fb090cdb6051a1a5422afdaa6b1d8ad31b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", + "similarity_id": "ddc6e3c020474937782826aa002f6abb1c6c9a66d53f2da52984fe7de23e7fff", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", + "similarity_id": "7bfe3fdde1154909c1f033c9fddbfb9c9d0a05c757bd4cd96e71d2597427a3cf", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{positive3}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/aws_passord_policy_with_unchangeable_passwords/test/negative.tf", + "similarity_id": "f9acbe3d5ff37a69e3591d00b1b982e0bad2d0de4879b5446b9c814f45056c9d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative1.tf", + "similarity_id": "eb7a8280f79beefa08c97eb27424284ab2f0c061fcdd80c0aaa46f043b767afa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_user_with_access_to_console/test/negative1.tf", + "similarity_id": "18f5fc4617f9f02db4aafc68209bcc43ca273c2bfc420c06390d2466da153a93", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{example}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "c5796037a6c6dd9ec62bcdd14fba70fc86d894e93e629744946ec98670b794fc", + "line": 51, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{test_role2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{test_role2}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{test_role2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive1.tf", + "similarity_id": "b76bb63d0fe87769f0f5760dbc963d9973c0eff03cb994d0bac2a1c85acf24cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/positive.tf", + "similarity_id": "d861b8319f64b5b27a0b5ef8e6b6425fb817e2fa24de1966a9b6e98d84fbb346", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive1.tf", + "similarity_id": "4d4f54f186e3f133bbfc776833587aa21ad50621e7eae5c21306706590f42c7f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "702f509ae841055208e001af8fa7ca8b3016725173987c0a0d9ef07d1967f655", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", + "similarity_id": "a244d588c8457e9d17aff7ab0881e78cd7e7ee24b86303fefc3b275289c7ca73", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web3}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web3}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web3}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", + "similarity_id": "5039c269aed724abfad32d1c29291cfef836fcd835dca2a8f2f21253d428d26d", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", + "similarity_id": "0f320bbb08a464ad3bb201576c6ab8fe0ab7515b5538f0365d3d47d19b4a4f5a", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", + "similarity_id": "53ba19713edd180b6038950f1ff1fc1afbaab73ea4189808d3d9ae3388fad567", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", + "similarity_id": "f049e2f4b1410080c08b7fdd77e814e5032943642bfaa92e8d9293126a3dd0a6", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{policy}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/negative.tf", + "similarity_id": "4e5f465f56142a344ce9f324875fc4684f341c8f90ff397b5ecedf5a4c8a8d22", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{negative2}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", + "similarity_id": "d85c3901d6445c824c3205812d9e0b4ce0285ee1055db4434284d399fc1521a5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_open_to_large_scope/test/negative.tf", + "similarity_id": "fbec022839c6cac31f117cceb5a9883392700eaa7c34d6c9899534dee636e5b6", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "e5d0ff714dc834507f94824c26905ee1102f6d95c36d0970ecba2b12552a1619", + "line": 52, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive3}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", + "similarity_id": "2fe5ca60f925f1faa050b6a00f1e4ab559ece56062407fb40789cd0c6bf6f14b", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", + "similarity_id": "4efefabf083ba0758f994f07e6c0c6e2d03c049a9f9a811123260110236cf0ca", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{negative2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{negative2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{negative2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/negative.tf", + "similarity_id": "acf8cb689ff30f9cb83a11625b86ebf6c3cc257db0561240c03607c1ba695af9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{mainvpc2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{mainvpc2}}].tags is defined and not null", + "actual_value": "aws_vpc[{{mainvpc2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/positive.tf", + "similarity_id": "e2d8037886c3bdf488e71230a00947af99426033c301655a49e5cd1e82b2682c", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{not_secure}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{not_secure}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{not_secure}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", + "similarity_id": "0e1caf5ee91f0953bd914f1e3b0cf3a467c663135c80cdcbf83213f12cd61a29", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "92035e70ffe2241953d3e583cc1aee9d83c867f810614838cd3b96f6f81f8f32", + "line": 63, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{dsg2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{dsg2}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{dsg2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_endpoint_config_is_not_private/test/negative.tf", + "similarity_id": "24bb2934969beeb06f1b9bf414e98f9559e37d338267ed4dc409cc62756c3ff5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", + "similarity_id": "9e06c6e1603dd8174b1244ffe631c81c2a6c0615b012755155b90da9be3d0cde", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive2.tf", + "similarity_id": "1a38a4f86212d5c9cff8034f5cac14b43dedcc8e75cb3de8ed1501548d8490bc", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_default_security_group[{{default3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_default_security_group[{{default3}}].tags is defined and not null", + "actual_value": "aws_default_security_group[{{default3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", + "similarity_id": "ae01458619d3cb08379e2a0f5c2a124ee3a1b661b6cf51b45d3aed0182a2c74c", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/negative.tf", + "similarity_id": "fb60c9676378238bf5f34f5aa7f841dd619dc872a212cf9d3f4c2a21eef4e4ab", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/positive1.tf", + "similarity_id": "9ff674fd4c1d89108215f2de81501dde202d0bbd812b61ca2d3f6c249a308171", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{a}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{a}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{a}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", + "similarity_id": "a2c0962dfe1ddb30bc455409d74cdec0bb5f6270dc34db13e1c35eef91ae90a0", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", + "similarity_id": "aa45110b8bbecfe4f26b3922eef575cf7b6cbe6cab7af1384c21615be13e1333", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "b5d8b948ae86e6c19f4d2cf517109c7544309b145da1060bea87ab910c8ac59e", + "line": 76, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative6}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "b9fcf85b215a6791f0022f2556eb62519ce78880e64f65531fed2c0b328617cd", + "line": 82, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst1}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "e55687ee31d44735838f27f843bf4fd3227a35648000cb4bfef50155133a56db", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{vpc1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{vpc1}}].tags is defined and not null", + "actual_value": "aws_vpc[{{vpc1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", + "similarity_id": "2cf8aaadc1efca770f97b345001c6f0190fa95e7ce02cc1588a2106866c5d18e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", + "similarity_id": "b7b19e20c75b99ab49ba05a22f01bf622c53d8e34d9ea9d6994f8bb470d6cb63", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", + "similarity_id": "c9fd34d9d27088cbbb41db3200be1cde9add3b06fcfb2a9a3fe3ffbcac9bb3cd", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive4}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive4}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive4}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/positive.tf", + "similarity_id": "984377e8134080395f285efdba53d519e77ff043282a27d57bf82b4acc881425", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", + "similarity_id": "982e1352848af2d100c1cf88786ce9227a40224239fb39791db67a6402cc4291", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/negative.tf", + "similarity_id": "b44214e547049ef913befd33828546a087f82e1da2f82d404e27a6ee486868cb", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cognito_user_pool[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cognito_user_pool[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cognito_user_pool[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", + "similarity_id": "afa43d50a177f29a4a706003eca3c7aab0d1f20685f5ba6e899343e73396fe50", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", + "similarity_id": "4a537f92c39af2b24f69c5d2d2c49ddd7f11d372bf0e254953a3b5ba4919cb34", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{enabled}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{enabled}}].tags is defined and not null", + "actual_value": "aws_lb[{{enabled}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "75f9777570c99ab5547d4497da40f432fafb4bd0c0da16ae3c970cd905682369", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "7c6dda3a73888b08142eece5daef8aed2e391630964731f9ede3c7432a41884e", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{private-subnet}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{private-subnet}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{private-subnet}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/positive.tf", + "similarity_id": "9dcb841c390a8929c7cb81d0032414355ff366409eb63d444493b2974a3c5d37", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_config_configuration_aggregator[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_configuration_aggregator[{{positive1}}].tags is defined and not null", + "actual_value": "aws_config_configuration_aggregator[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", + "similarity_id": "234f8e60da0d499c4c98e4362d24170bea533db1983a7f655643d14ec800bc98", + "line": 29, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_policy[{{policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_policy[{{policy}}].tags is defined and not null", + "actual_value": "aws_iam_policy[{{policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", + "similarity_id": "30941eb9e12e564ea70620a40fc2fffdfdbf412c2b1f67cbc12205a472650840", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_snapshot[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_snapshot[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_snapshot[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/aws_passord_policy_with_unchangeable_passwords/test/positive.tf", + "similarity_id": "6da9cf1307246f14181930af7528366c659d7045350cc83a5bd5f65fc9726f10", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/negative2.tf", + "similarity_id": "1f8423f3889aad9b2069339841db249da47be9cb7de5f39e048a28becd8cf9b7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_server_certificate[{{test_cert22}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_server_certificate[{{test_cert22}}].tags is defined and not null", + "actual_value": "aws_iam_server_certificate[{{test_cert22}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", + "similarity_id": "aae8be024ae2dc00ffeac6cb9018f52f300eb454c897055b7cf7f732fa2c01e5", + "line": 32, + "issue_type": "MissingAttribute", + "search_key": "aws_cognito_user_pool[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cognito_user_pool[{{positive3}}].tags is defined and not null", + "actual_value": "aws_cognito_user_pool[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", + "similarity_id": "20c8f6c27ec76ef7aba62b59bfb7478e00320f3687506b8b1b9c2960b2aee752", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example2}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/positive1.tf", + "similarity_id": "bae526766626119cb4241a4ab7dafcd9ea56d606c8a0077a8a4be8190f1ff7bf", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/positive2.tf", + "similarity_id": "018c21605d11540dd3a13a83992d6301d871c23f33dc9afbc8f697730c7dade3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/positive.tf", + "similarity_id": "0016630a8c34f4eff3a0aaca9e7749a87395959b46f803c0feebcc13093edb6e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", + "similarity_id": "06dafba0889f7a0dfbe15d7eeaa7b8399136eafd147c9dac89065126211ea45b", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "513e22c2f03628d40876f6fe55a78e2d6076e249adf1364ef3434ea1a22aee52", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", + "similarity_id": "1b3654352954d3259c45f249b3a6a32751caa5850cf4cbffb6cfc59d9ff0afb1", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{web}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{web}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/negative.tf", + "similarity_id": "488b6284ac054f8288f53f91a33b5b9b66d46152a341cb85c6d946cb28f27a29", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cognito_user_pool[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cognito_user_pool[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cognito_user_pool[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", + "similarity_id": "7fa574ff6e00a8c3e7b9d1d8fe7fb6405cb5994dcaf4c2d7fcc7efcf9afdf0bb", + "line": 21, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{negative2}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", + "similarity_id": "1ae11b5c34bc8dfb1b6d7d138c7277a4324168128e335b627272496bdcf725aa", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/negative2.tf", + "similarity_id": "b8729e07b6b29248dde8401df8f2da902196ecba2e6b26ceab0471ff4fb5aefb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_autoscaling_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_autoscaling_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_autoscaling_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/negative.tf", + "similarity_id": "48e394d2b464d1f2da97d1361bdeeb22bc1c5ef4ce4e429a8e490374c90da544", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticsearch_encryption_with_kms_is_disabled/test/positive.tf", + "similarity_id": "cf87a7640cd0e4bff87abe256c4a4238fe3c366ad643537058794d29a3938248", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticsearch_domain[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", + "similarity_id": "a5b97d1e1c1f33de962232b376287796fd3d5e0bbbce702e8aeac1a39f1e80cb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{disabled_1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{disabled_1}}].tags is defined and not null", + "actual_value": "aws_lb[{{disabled_1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "9be721d034a88551b79b7a398d01c81f3306365b98f2ff1ff5c4d9fd48098df5", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative_rdp_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative_rdp_2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative_rdp_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", + "similarity_id": "7fff89cfcd942ab435923c62da6cefde6ddd4fdaa81d1780e299cfd1a20646f5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{b2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{b2}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{b2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", + "similarity_id": "72ec12b487c7e9d3dd1e68580dfc5c974a98665278f3b1164880ccf14f86c421", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", + "similarity_id": "e6dd823caf7a585dd7b65f62855a57a20ff57c92aa0beb81a8bd8c648b47404e", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "281d707fc8f4759d51c817fc8ab0a0be8ff772c3ec5839abc94a063a5097d074", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "5ae8b018575d04dd20b6e8e9440e73da7cc148ff384e5eac3e9e8498e7827d55", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{public-subnet}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{public-subnet}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{public-subnet}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/positive.tf", + "similarity_id": "a0eee800f0535ef372677f08318e4864315e62f73d1436dbdcecf33d73c441e7", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_config_configuration_aggregator[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_configuration_aggregator[{{positive2}}].tags is defined and not null", + "actual_value": "aws_config_configuration_aggregator[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", + "similarity_id": "833afd15f489ca94f8359c3ab68974879c9f6432206fa58e45403f38bf62cdb6", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", + "similarity_id": "384563f2000b97b49c76c0b744d6f87657c29650bc3aaacd7d698613b494940a", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", + "similarity_id": "3c7f7e1bcd73f128dd48e5b415f62bd2ffc62aa6a173d36305e31ef0659a1ad3", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", + "similarity_id": "8df4ab9d742dfbd7d76985f1cbc05ff9304bd86987d259c892761b433889c44e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{hoge}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{hoge}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{hoge}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "22c49b122aef8aa6218731b03f2fd0d2c6bf84e0cf5b7404d13b3b97b1c2c935", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_neptune_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", + "similarity_id": "a367c223bed4b262eb59cca637b5ac9ea9efa3179ff7aaaca4aef6889d717bf2", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{lb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{lb}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{lb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", + "similarity_id": "2ee4037e0bfaaebca4de967bd0036ae1e23a1f4bf0fa8c1d70447102045ade7e", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{positive4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{positive4}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{positive4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative2.tf", + "similarity_id": "59fb9a79d5902a0a2f72436900db7bdd09cdb7b9d3631fcc7a1fccd62d7c1ae5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", + "similarity_id": "3834c9adf8937618934f261798ed8c0fc29537a0d215d89901e8e677d46d17ce", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/guardduty_detector_disabled/test/negative.tf", + "similarity_id": "0cf1391ca55a0848e6dcd111bf16c344c999b5c98f1b27866b6206d67bd5756b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_guardduty_detector[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_guardduty_detector[{{negative1}}].tags is defined and not null", + "actual_value": "aws_guardduty_detector[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", + "similarity_id": "833c6c3f7c9ed303a2e1612a4e6e7cc9ed2f10abeddf41b6b10c2ef375645f88", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/positive1.tf", + "similarity_id": "30572ab291cdf06c53feef4a67c31936710a3d67070170d90e109ea362a34204", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", + "similarity_id": "2dd4f8f95eca6d6c33c448f433f98deeebf493bbb936113e3e3f35cf51d0498a", + "line": 86, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "3b52be7ccd4384373ae53b5a5c8ec90d022e3dea5d32aa74da9fda48131d0d84", + "line": 96, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst22}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst22}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst22}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "c114ffd1fe9e71076ebb5603a4029e258720b56be6654d604182b38455ec95aa", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "f8c357fd2709f9cac5ce2242168c25cda405d166748fdd439ff2874beebaf447", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/positive.tf", + "similarity_id": "693c6b1b83cb84dcfc101c911b27826411c5715bf85cbc09ce92708485b839cb", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", + "similarity_id": "1eef4bcea4ae9f3a6acb090ab4a90f351e0e6ad94369b99eadf218205f82b508", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "cda229e77ffdbcbed15a49f4a9f3658b751bae35e0c6922c00a12679fc7ee9c4", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive1.tf", + "similarity_id": "6affd9e757245633559f25f56d3fc5bdc492c91380dd1face201c5fd701a2f11", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{positive1}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative1.tf", + "similarity_id": "13c886cd1452109a92b483cbb46860b8f77d2240f01348a8fdd10291b93b2af3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/positive2.tf", + "similarity_id": "3d08ddfd925693ab1c9c32485d35808588ac6d9abc1ea02ccdd49bac13fe10ab", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{service_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{service_2}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{service_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/negative.tf", + "similarity_id": "fcd4fa42ff7d45e41e3f1b91adc6626b4eacc885aade0306a59e86c19834a7ca", + "line": 20, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_user[{{user_two}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_user[{{user_two}}].tags is defined and not null", + "actual_value": "aws_iam_user[{{user_two}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", + "similarity_id": "f22789d04b8b1403818e4a411620937640f2b021874e9a62798db357ba773dd6", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{public-bucket2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{public-bucket2}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{public-bucket2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "4332ace44f5e064a340c8373ae6d0243898f1e4770e5f060a6d4de9c9ebff5b4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", + "similarity_id": "14927b7e021766d6a67464303fee04e8ab8360e7114086f20899791b2da23c32", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", + "similarity_id": "a7d173569d7a016917bd5939a7bf51fef6a84ae3c328f47dfcbd38fb5d8e0fc1", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", + "similarity_id": "a6f97695d5a67f026b54b6737b70b7f02010bbd87714c915119fa0fa44aae6de", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{negative4}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/positive1.tf", + "similarity_id": "9f1e1a96a296750c993eb4423f1963e5ba213e06d7f8a30adf9a8af7809773b5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", + "similarity_id": "ce2fc142c4e77729ebfeeea61696cba28fd40b476415f9dbd02e9686ae8d71da", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", + "similarity_id": "4f44335b78daf819489d6f3631705ee15f67ae857c23ef9e59643fd4bfb16977", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_subnet[{{positive}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_subnet[{{positive}}].tags has tags defined other than 'Name'", + "actual_value": "aws_subnet[{{positive}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", + "similarity_id": "d804240d04d6e1dc57142654b2d1e8345d1d9addf7be6d8d47fba607c0d20879", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", + "similarity_id": "7b30d19f6b76b71271db841a6c68752d006de9f41d3800af8bc570a7cbd38039", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/positive.tf", + "similarity_id": "c662a1c3aff2e5d8a1a08ecf9c8ed67f9f62b0455136fdd9846ea635d653f11d", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{test2}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", + "similarity_id": "587d003f018d259d59ec27cb0871858678c6118fcf41b4b36e6dcfd1aae1f40f", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/positive1.tf", + "similarity_id": "d7b8a6817257fe11d9e53c30fdbeca3deea30081a7e5d8006fe1b6a257244c7d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_task_definition[{{service}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_task_definition[{{service}}].tags is defined and not null", + "actual_value": "aws_ecs_task_definition[{{service}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", + "similarity_id": "cc04f65894ecccf45706ad5f1bca8f368a9b7c97c13299574cc96166565e5d32", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/negative.tf", + "similarity_id": "d97372acc69a3fc7cb235309877d6da7eaec1b19d082109142aa662089cca0ca", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_usage_plan[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is defined and not null", + "actual_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", + "similarity_id": "b5053dcb7b2ad6839a5b2f498153f3ab11a56394110970dcf6b3fed99100cc46", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_athena_workgroup[{{example_3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_athena_workgroup[{{example_3}}].tags is defined and not null", + "actual_value": "aws_athena_workgroup[{{example_3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", + "similarity_id": "b07f5d0e0400b24fd67fd6b7f400b254ffc99cb9cb52cb16ff7d0b70a979a1a4", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "bec8b88dcdd7274c0913ae55ffbb97e39181735b7beb02cede22aac4a6afe55b", + "line": 50, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{public-internet-sg}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{public-internet-sg}}].tags is defined and not null", + "actual_value": "aws_security_group[{{public-internet-sg}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/negative.tf", + "similarity_id": "88d3c42ad9afaf18587c30b64e87e361b6e663520c45d5dc53f6e31d0196aa44", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", + "similarity_id": "e4570226e23eff95f0e8092718eff2b6b165ccb72af1615709e124d653ee273b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", + "similarity_id": "1ba0e13f7133e120992d54567c8a436cf1c709b653a3c8a04a2c34b03f52704d", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_apigatewayv2_stage[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_apigatewayv2_stage[{{negative2}}].tags is defined and not null", + "actual_value": "aws_apigatewayv2_stage[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "54431b4ba109f780027bb657a4b01e3bf5fac5618443d38e7f226c1e9549955c", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{foobar}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "79edd38fe37cad070083c72c6c661c1bf760dcdae8c41cedc880daa41a7a1abd", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudfront_distribution[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "620489c70fa3399b9a537d08cfa8225cfb43d3aaa5629d47b3bf29088c98e56c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/negative.tf", + "similarity_id": "80ee37016638db5b66f2bbd4535df12b9fb7b014bba793b2407c86a45d16497e", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/positive.tf", + "similarity_id": "2664f51812f69054da3e0d27289877929dce48dc24ebc3ff1facbac211825607", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "601f093f973a6a58c312a2ca5d41f76b6fcb08f132d9a1de86abb7625e5c03a8", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", + "similarity_id": "6e69cf0147859cdf85c98abe63c36358c5dd505b88b657041bf6495aab32a05f", + "line": 107, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{priv_ins2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{priv_ins2}}].tags is defined and not null", + "actual_value": "aws_instance[{{priv_ins2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "c5876b169aed55a45a3d6baaa838ae7089f6e3b7732ade59f743367130d863ef", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/negative1.tf", + "similarity_id": "de004ddfe8d1692f19f09107d29c4dbdbccb706646afec6a76f16698e59b1ebd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example3}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", + "similarity_id": "32209efdc9044e088525b422321326c3a6d649450837968a06984eb958841ef2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", + "similarity_id": "77fa4e7bf0c2ecf023209be8b937aeef6d09c078ec2804c53fc9806a904d7426", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", + "similarity_id": "74ff7ba80ed7de629006cf6ae6088231c0c5bea9d025730d558eea523af280cf", + "line": 109, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{inst32}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{inst32}}].tags is defined and not null", + "actual_value": "aws_instance[{{inst32}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", + "similarity_id": "e1e98cefb5daa25c81cb08c90b4a4255937ebe2f08666808886d2d727ef3dfc7", + "line": 38, + "issue_type": "MissingAttribute", + "search_key": "aws_kinesis_firehose_delivery_stream[{{positive5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive5}}].tags is defined and not null", + "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "5a925546150e29169991bebbb29441a61d21bf295d40b4c9634c0666c9a8c694", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive1.tf", + "similarity_id": "37c91425efaf2005266249ec1202652e66a5f58a1fcaf6a3af63353b938fabc5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{mainvpc}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{mainvpc}}].tags is defined and not null", + "actual_value": "aws_vpc[{{mainvpc}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", + "similarity_id": "b688aba31df36fda9b0c1d60e06992e6dfba6669e3660b7e766cfc13e29dc07f", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/positive.tf", + "similarity_id": "cb38517d1e890b302216b8969a79d6ea9d572fa992fdfe20672e03c9c4730c8a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_route53_zone[{{no_query_log}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route53_zone[{{no_query_log}}].tags is defined and not null", + "actual_value": "aws_route53_zone[{{no_query_log}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive1.tf", + "similarity_id": "532e0628749b35e62484dc3c545e44837379ced4f5bf21b6981cec7544c1c255", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{foo}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", + "similarity_id": "83a3b5f34b9eb8e11879eaf2a664596d1d42178e34b09295dace03de04d7f347", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive7}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive7}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive7}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", + "similarity_id": "d33885b4752c1cd6deba1a99a227057e340558dcd42e82e1bf886d1e8cb7562c", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", + "similarity_id": "6c7395a794baba6c9988754065c2b636ae9956b4145496903e4ed1bfe4aa4bee", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", + "similarity_id": "41f4819cf71faa08ab8c1e7224157b0b08896bf5b42a8cbb3dfb4f8ca4315655", + "line": 49, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test}}].tags is defined and not null", + "actual_value": "aws_lb[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", + "similarity_id": "09552c9d72f4901a6c27d4166d11507eaf9c7e09f17e0c57a9af37c28b5d2b22", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", + "similarity_id": "ce678c19eac6251be9ac636c6c7e7f31f80268976461050404fa6beb49e28ba0", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", + "similarity_id": "aa1d0d9fd6d2fa93fa7ac9435af5359b3fa52539a4d4ce0751205d5399bc04ca", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative4.tf", + "similarity_id": "7942fe4ffb05fe2182a7065baba61b75c5fef5ffdb8af42eaf47dfe0e6161ffb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", + "similarity_id": "7e2cd7fa837fd18506c14769af66dfe98805792005b0b4e118ddcb7b468f64af", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive2.tf", + "similarity_id": "2de1f3d740a1dcbbbe19277e30c68fb82317786adc25dfd67dd872c3a969d180", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", + "similarity_id": "1fc945ab6ee52928421a34739f7a32babc4350d8243f5f44ab4b31aa4b3561c1", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_role[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", + "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "d326a8dbb9f5951b20c168526f136dbf556f66c563152e3597797b44b66c111f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_cluster_snapshot[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_cluster_snapshot[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_cluster_snapshot[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "521c81505724383bfb5396504d5ebd1d46fd841fccfb65efbede5b7d4406b780", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", + "similarity_id": "a8e36842361b20aa35e38ce880f19d44fdf6bce0b8e25777ed5007cddbfa9e31", + "line": 87, + "issue_type": "MissingAttribute", + "search_key": "aws_eip[{{nat}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eip[{{nat}}].tags is defined and not null", + "actual_value": "aws_eip[{{nat}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", + "similarity_id": "b9874e27be7e0647d7af01881182ce65386a74f7271f4e1a9a2762197b761c75", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/negative.tf", + "similarity_id": "081766e2a442d300fc35d57461730db9b2e845d070016bfcc7a1e9a50154f590", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_cluster_snapshot[{{negative}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_cluster_snapshot[{{negative}}].tags is defined and not null", + "actual_value": "aws_db_cluster_snapshot[{{negative}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/positive.tf", + "similarity_id": "d785261b8dce77ade8a40b5986bf94213399251f92b9052f778a2ff484ff75d2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{positive1}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "0dd80711add1ce6378403c30483e7369758f34744d776c49f353283172c8c356", + "line": 91, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive7}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive1.tf", + "similarity_id": "cb9462d2498c9b18719f6b211dad05fb729f09d97cec3c112e371e97b622f414", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", + "similarity_id": "bc329eca221daf5e6014092ca2157b910aaca4e2b0b3882e8e610899ea8af0e7", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", + "similarity_id": "3195f78cd8a542e0cc2b69e0c612503af894d467018cae708dcdd45190156146", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative2.tf", + "similarity_id": "bf6d88f277325c7349fd318c6e8c81adc9eff5752f89325c79dc030d45f227c7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{enabled}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{enabled}}].tags is defined and not null", + "actual_value": "aws_lb[{{enabled}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", + "similarity_id": "a16d5ea1a614053a724e936eeeb384ec38d66281c71fd63bfbd170dada7a3ed3", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/negative.tf", + "similarity_id": "a175058a62776680ba122746d3246d3a6eec4e31f308a6b6a0f96c0d6638340d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{fs}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{fs}}].tags is defined and not null", + "actual_value": "aws_efs_file_system[{{fs}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/efs_without_kms/test/negative.tf", + "similarity_id": "53ed9ee035d0162c10c3e8c08c3b725ce8a5762f69b9b37d099eac76e6246a5e", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_efs_file_system[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_efs_file_system[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_efs_file_system[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", + "similarity_id": "2f1f1c31fcfec200e1fc9859daa6f8af2b03b7a0ad0acb538165c7b95965594e", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative1.tf", + "similarity_id": "5e09ee363daca360c6150982522064e3604df8aa293909a7a8ecd3592bfd96be", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "d1bc013d22bd9b431fd0591e9dff453dc4d7a9d2c4d72327a991f24b3c155fed", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", + "similarity_id": "160cb5262627941db1594fb9e6950b0d97f90fdbf924898b6f63720cad1401ce", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/positive.tf", + "similarity_id": "3b40f0da0d97d24220cb0b37bbf35c02a473475326118f652f3cbbe22c88419f", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_ecr_repository[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecr_repository[{{positive1}}].tags is defined and not null", + "actual_value": "aws_ecr_repository[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redis_not_compliant/test/negative.tf", + "similarity_id": "35533628d428fcf760e95a652fa5ab00a44b8083567f688fa278b6e34614a825", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative5.tf", + "similarity_id": "1101d8de10e40f8bd4dbeca5395b916a9c7ce5bbd2cdc01acb40c9738416d215", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative5}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/certificate_has_expired/test/negative.tf", + "similarity_id": "0ed3a66686058d15e17422b4fbb0548bdc5b799b9ed5e9b87d6e3600c88b3244", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_domain_name[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", + "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", + "similarity_id": "56bf6fcaa667c64d1719827f23d2c395b6878a2d868cd84156ddfa817a1f2797", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{disabled_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{disabled_2}}].tags is defined and not null", + "actual_value": "aws_lb[{{disabled_2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", + "similarity_id": "d4ec6345adeac1d529ac8db293520337be2d1318aa7e50352d3bd172e403f445", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{hoge}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{hoge}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{hoge}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redis_not_compliant/test/positive.tf", + "similarity_id": "20b4570b5e4a26efcf5f9bed289236093b7b46ae1c9f5d98b72ff93a0b2664e2", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", + "similarity_id": "e3b56bc8117c209f761a5bcee62f3c87318383c21502a59b597214ec673bff87", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{b2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{b2}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{b2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive2.tf", + "similarity_id": "949a306a3308f3a06467af8857db125a7306d4c40184feffdf0d3d4009e9d8fe", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{mainvpc3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{mainvpc3}}].tags is defined and not null", + "actual_value": "aws_vpc[{{mainvpc3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", + "similarity_id": "33b3deef328bef37410c6c04a01b0fad8daeb0a0bf531a592e4ee1259a295e18", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_msk_cluster[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_msk_cluster[{{negative3}}].tags is defined and not null", + "actual_value": "aws_msk_cluster[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", + "similarity_id": "e10ad2160d6ac745089e335b6cda69dd13c9a826d031035bb4aafdd5e8aae0cd", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secretsmanager_secret_without_kms/test/negative1.tf", + "similarity_id": "3c47dba1e9846e327a128b578dda73d118f61110f2d4df03bb7d450d10e349e5", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{example}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", + "similarity_id": "a9c98a90172b03a72986a5a934fc73672f08fa82d9e1fcf2da300b463bd98773", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", + "similarity_id": "8d89f8b1b51323d94d21e4fc36308492021da41cc8d95749bc80fc133bc1a8a3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_instance[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/positive2.tf", + "similarity_id": "5000c8b54e1f5c18de4cc7dc43cb5144d8000445b21f51260a0155a171b5fdd2", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example2}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "0485215ddd3b48d8026419cedc469648bd50e6c07a621a08c0b4e31f83f806a9", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{foobar2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{foobar2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{foobar2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", + "similarity_id": "313358e70211b2aa3542a89e1dd0146dcd7d4db5a614befd496f95909166ddf3", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", + "similarity_id": "e2389542084f3ba7348468fe067f1023a16a93289872cc859925bd75aae5f8d4", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_cognito_user_pool[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cognito_user_pool[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cognito_user_pool[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/negative.tf", + "similarity_id": "b5344e5f0dc48937a3c8af22cb5f15583372a82741e0efbc868c288725105f5a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", + "similarity_id": "f7962d8c5aa507889fcd0615c483817c5724e8cef9287b202f0a4f4d86b7640c", + "line": 39, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/negative.tf", + "similarity_id": "880d9fc9b2f770a9be7c1038723c1956b4a6d38878bd1e6583d889dd4e4a9734", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_config_configuration_aggregator[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_configuration_aggregator[{{negative1}}].tags is defined and not null", + "actual_value": "aws_config_configuration_aggregator[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", + "similarity_id": "50de1f16ce95091bc912f7ba8841317ee874a7c2e9e262054c31757297dd6685", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_lambda_function[{{my-lambda}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lambda_function[{{my-lambda}}].tags is defined and not null", + "actual_value": "aws_lambda_function[{{my-lambda}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "7c871a31272c4ae39136cc911630e06f635882cec88835b888bcbee00635f257", + "line": 103, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{test-queue}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{test-queue}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{test-queue}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "87883982047b5e857bc246bd8e71e8e11616b62c965b75047f9b8e4f8cce0394", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "57b4362f2c9b2c41b471e0e188c115a892736b484e94586a6ed9de446f41112f", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive2.tf", + "similarity_id": "87552b3ce68c7e991e907c7249c54ac17a4f495458af641b3aec9702d98cc05c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", + "similarity_id": "140a94d77dc6e84835f595a6fb50fc2c9d79bd3b1f90824063ce58295923e812", + "line": 28, + "issue_type": "MissingAttribute", + "search_key": "aws_lb[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_lb[{{test}}].tags is defined and not null", + "actual_value": "aws_lb[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/positive.tf", + "similarity_id": "50b0d6121f1baedf2144e03de9d1b6c9ed9076cc397ad685f0d4441af04d105a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_batch_job_definition[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_batch_job_definition[{{positive1}}].tags is defined and not null", + "actual_value": "aws_batch_job_definition[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", + "similarity_id": "3a7740697e63500d62666816c41095685563f0030ade329bd195c161946c5f3f", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", + "similarity_id": "6974389fb3d7caabbc30c6aa1659b4645da99d463151f04b894bcdfac89a0339", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "aws_organizations_policy[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_organizations_policy[{{positive2}}].tags is defined and not null", + "actual_value": "aws_organizations_policy[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "c0ddebf53afe007e0bfe45c1531d1a3f2e837471aa5b9aa28efe0900521837b0", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", + "similarity_id": "87671640449d67dc448eb5bef9fd3cbeadcbabf94706084cb37b1020a7d5f9c3", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", + "similarity_id": "3cb28a46a92d9ec5e58b4c81cc1b7ddfc2f153703d6e387dc91b2f26b6ffa60c", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/stack_without_template/test/positive.tf", + "similarity_id": "94bd70f63e5b28d52ebe2a594a5a6c8e91f45a88603bd3bc7acb92f2de8908bb", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", + "similarity_id": "6641f2907e698ff4339895c7a12ff6449aa58873d52b42cfd8d58ea58ecc10a9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_vpc[{{main}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_vpc[{{main}}].tags is defined and not null", + "actual_value": "aws_vpc[{{main}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", + "similarity_id": "e64bbb0a3a0becc5cafd664fd8e62609e2d9546a8ec128b9c8cc28a3000fc2a4", + "line": 40, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative1.tf", + "similarity_id": "0bdc8f4e6320805d81e6e8e22e49b375132a2cf2ffd25570e78f08e8611ca657", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{secure_policy}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{secure_policy}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{secure_policy}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_cluster_without_vpc/test/positive.tf", + "similarity_id": "df900952faef7848302a280a53960a09dee624ac89d009415f5cd16faf0ba3a9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", + "similarity_id": "b57a9cadd8183f300a98687aba9372f8c58d400be75d5a297c46776148490535", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative1.tf", + "similarity_id": "550a00588b31e605da782c1aa8b6bf2bb9e2d902d523ec40f90189008403366d", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sqs_queue[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", + "similarity_id": "8a622b3a313decf89e16ae1d5cdd5ccf83e7cc1bad2b672e82447520294cf99b", + "line": 61, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", + "similarity_id": "a37f57eb3663501b2807b523a87af9bceefaeac497d97ac445563e88d485c902", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", + "similarity_id": "f7a4bdb1d71f1d9fdd75a26b69ba5374136cfb14ea8b908d338e65540145582a", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{positive3}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{positive3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", + "similarity_id": "dd87fa508d2dc1164be7b6d4d6c0cfc328a931d8a13f472064d33d9cde4b4bfa", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", + "similarity_id": "fcafc04f0436f043a3e96f82e5781d5e6fd8503b19f3fe7ec8fb2cd281ab8990", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{foobar}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", + "similarity_id": "21decdd58927b41d4a493e3983846b6452ade1efeb092a674a1cece45ed0148b", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "b30672d78bbb6838e056bd11b4314ba3e07bf02d1d973fb3841b5f2022697aa7", + "line": 16, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", + "similarity_id": "4851daee2c0d1a898e82f67d87c9ddcd3727506838b9d21d49ac092fec7dd1af", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example0000}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example0000}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example0000}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", + "similarity_id": "f2e8d2e11b10be3f7b6b6837fdf37435c09a90d2150ffbceff1359319fcdda20", + "line": 66, + "issue_type": "MissingAttribute", + "search_key": "aws_iam_instance_profile[{{test_profile4}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_iam_instance_profile[{{test_profile4}}].tags is defined and not null", + "actual_value": "aws_iam_instance_profile[{{test_profile4}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "87be0de6ab2fd60ca0d74fecbc385e00289636f864877ebe9c0ce63ecd82ef07", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_is_publicly_accessible_for_subscription/test/negative.tf", + "similarity_id": "0e4d096b9e40efa9af714d4561fcb748406d688259bb5b87beddf38374acd29a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{negative1}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "f03baaa27f8c837d97fdbd9d3e194b604a286b5bd4f8c643ea50ace15cbf622d", + "line": 46, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_security_group[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/positive2.tf", + "similarity_id": "87243a3303da420997d3d18fc2a6e27a0071b5931209e7c27cc5b095c99e8cbd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_replication_group[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", + "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", + "similarity_id": "52d6ee7fb5aad8b7620ff3aa604aa51e073e1e2c2aa0f8521ade710451affe4b", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_flow_log[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", + "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", + "similarity_id": "7bdb3b505e086a8a9ff635fac05bc14c989e8cc78caf5fb32f6da520598efe8b", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", + "similarity_id": "80c078fed0ecee71812797bf777b736c7939b9c09aabf8e612bfe7dfdee0aa52", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_log_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_log_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_log_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", + "similarity_id": "e54023286799116b5615729250c77cd94324b2838265d1170002b8f1b928006f", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ecs_service_admin_role_is_present/test/negative.tf", + "similarity_id": "b96228815033408893ce8fd1db2cab1aa22a98d6e7a15695a9ae1c6ac2dcc8f6", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_ecs_service[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ecs_service[{{negative1}}].tags is defined and not null", + "actual_value": "aws_ecs_service[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/positive1.tf", + "similarity_id": "7b71d1bbf0dfd7d94acc74db6a744ba4b63a5da80f047a0e0da35169e356068e", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_sagemaker_notebook_instance[{{ni}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has tags defined other than 'Name'", + "actual_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/positive.tf", + "similarity_id": "8781b118e92c6cb375673038a3b0c6fc45fe8ab85fc45eda36927bc77aaac83e", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_config_config_rule[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_config_rule[{{positive2}}].tags is defined and not null", + "actual_value": "aws_config_config_rule[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/negative.tf", + "similarity_id": "7009c367e82c41f46df83dc6debe9d3773acd115793e6be228caa5b25f9d0bac", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{negative1}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{negative1}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{negative1}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/negative.tf", + "similarity_id": "5bfe6770e71dc946ae0b8ee4820c83a84a1eb5f6fac48784fa1a7ec9f915c53e", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_config_configuration_aggregator[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_config_configuration_aggregator[{{negative2}}].tags is defined and not null", + "actual_value": "aws_config_configuration_aggregator[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", + "similarity_id": "677c8278ad8600fc8674ba7c9f975f5579bca11214be0970253b6d544371a808", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_apigatewayv2_stage[{{postive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_apigatewayv2_stage[{{postive2}}].tags is defined and not null", + "actual_value": "aws_apigatewayv2_stage[{{postive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "302075dff2a31fc6bc75e9fde67f1a221088d5da68ac01b51013ebd96815eacc", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "ae93eaa8e8f54e1bfbf1a4c0ad5de0151e93aef56e732de444da3d9ef9172ca6", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/positive2.tf", + "similarity_id": "5a9008d0d0138a984503ca53e2f51e478fe6cfde4178142bbe30051dcab2d506", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_secretsmanager_secret[{{test}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_secretsmanager_secret[{{test}}].tags is defined and not null", + "actual_value": "aws_secretsmanager_secret[{{test}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", + "similarity_id": "08a2d4c9429eec1283d35f14ed8e628c487a92fc2ad70fb90bb50a318e5f796c", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_acm_certificate[{{cert_2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_acm_certificate[{{cert_2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_acm_certificate[{{cert_2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/negative.tf", + "similarity_id": "7a132fee2deb850f513fec0e5a8c05b6ad272a836551874715c2206d142e846e", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{example}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{example}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{example}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive2.tf", + "similarity_id": "e99ae1aa232256214d6ac75f69c61d7ca59e958b16a587363f151cc8834862cf", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_ebs_volume[{{positive2}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_ebs_volume[{{positive2}}].tags has tags defined other than 'Name'", + "actual_value": "aws_ebs_volume[{{positive2}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", + "similarity_id": "b89a5d79bd15d921bcf23099a523c1cdcd64077eb6bd136b2808adad61fbe66a", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_instance[{{positive5}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_instance[{{positive5}}].tags has tags defined other than 'Name'", + "actual_value": "aws_instance[{{positive5}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/positive.tf", + "similarity_id": "75d2b7920b52c18409959bacb4fc583cdce0017ea304566c0dbe5841ee4df2ef", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", + "similarity_id": "6703a70ede7cd94c9d9b74bfbf4f6d63ead29d11a3ffe4489a08044cdd4a830a", + "line": 9, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example000}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example000}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example000}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "5169079fcfb849c9e81452116aff756bddde8694e23ee2c1c0402e8fe5849d98", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_docdb_cluster[{{docdb}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", + "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", + "similarity_id": "692d8ca81cf118529c0c61d2cee69fd0b470b73ff90a4cd7c99c58374af3bed0", + "line": 11, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{example0}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{example0}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{example0}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/positive.tf", + "similarity_id": "d286ccfe47ef661cf5cd889c56839865a27f821ecc85d02b1ac5bdd55f095a9c", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_kms_key[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", + "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/negative.tf", + "similarity_id": "2e8928c15569c8f1ee1579fc9e6db4c07a800a0d85d16c3a194b1750ff68615b", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", + "similarity_id": "dd381de9d3f2bc4b9643ddec720880ab11f591e257e3ff28e7686820ed54614a", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/redshift_cluster_without_vpc/test/negative.tf", + "similarity_id": "8a0f0afa6d548aa118b6a82ab18acf19588e25ed746aebe0759b260947d28235", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_redshift_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", + "similarity_id": "1aa77ed9f6defc4e886074d8b19fb827a1f667b9397a84bd9a4110ead7dda527", + "line": 26, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive2}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/negative.tf", + "similarity_id": "c7dd38d64d677270b9d504e080b48d7b439df8baf778d722250919b2886bda46", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_sns_topic[{{test2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_sns_topic[{{test2}}].tags is defined and not null", + "actual_value": "aws_sns_topic[{{test2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive1.tf", + "similarity_id": "a79f146a43d4456332e8f82ec105c95ec0a6ce49a09c108290c01c94be1f03e1", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_rds_cluster[{{example2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_rds_cluster[{{example2}}].tags is defined and not null", + "actual_value": "aws_rds_cluster[{{example2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/negative.tf", + "similarity_id": "72e78cbcd82758fb522c583f9f26d59435066cab71316569f7c421ea9647f438", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_stage[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", + "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", + "similarity_id": "27496f8453c01af6020c31c0f8bb66adf340d2d9831d5292e1c2974d17d95dc7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{b}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{b}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{b}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", + "similarity_id": "32c367d0c6d39633be995a1b5fd139e2837c1a0e6e8056ed97e3b1619067256d", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_api_gateway_rest_api[{{api_gw}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_api_gateway_rest_api[{{api_gw}}].tags is defined and not null", + "actual_value": "aws_api_gateway_rest_api[{{api_gw}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "19aabad4f15ebeef176560b97edaf0d8ab5f14a0c3857189c9df8857c2d2bf63", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", + "similarity_id": "3e306bf41f303bc2fb3a70159ebf6ffae3037a5590853e4aacb7e92d40f6ea85", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", + "similarity_id": "414459e9120d1c2db94e518f0f39d10e05573c63fc3c543dc47823402d7f6527", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "aws_mq_broker[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_mq_broker[{{positive2}}].tags is defined and not null", + "actual_value": "aws_mq_broker[{{positive2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", + "similarity_id": "7ebc38adfd68ba928e8b5f1a4559b703313c81ae00733ad8fc526b63633ec478", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", + "similarity_id": "3574319f06ac50530ea75de41741e64a27356835774538b286dae3568a0925e9", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", + "similarity_id": "06f473420868c8e813244902937352a115c34e523bc9aabcf2c7ef88d59c6ba4", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudformation_stack[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudformation_stack[{{negative2}}].tags is defined and not null", + "actual_value": "aws_cloudformation_stack[{{negative2}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "44fedd3d0e9852f493cd03729c9b667c94955bba75eb872f309f8b9e527fbe3c", + "line": 10, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{log_bucket}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{log_bucket}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{log_bucket}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/db_security_group_open_to_large_scope/test/positive.tf", + "similarity_id": "04c54fa534401d08b72cc021c163b00d3f7200f7f03b3daed1e830447ba22291", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_db_security_group[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", + "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", + "similarity_id": "224ef00b57315cbee0d10def11356aff91941d6bbbf433be7ee821649d472659", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", + "similarity_id": "88dd6632bec2e94a42a6ecc01280c615ef11760dce5e111be53f09f00eb4385b", + "line": 12, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "9f5724024ac91244a6b54b8d3725fa967f989df14d26c1cf055d8b3768623a1c", + "line": 25, + "issue_type": "MissingAttribute", + "search_key": "aws_route_table[{{private-rtb}}].tags", + "search_line": 0, + "search_value": "", + "expected_value": "aws_route_table[{{private-rtb}}].tags has tags defined other than 'Name'", + "actual_value": "aws_route_table[{{private-rtb}}].tags has no tags defined" + }, + { + "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", + "similarity_id": "0062acffb52169c9082bcd1a98ff5f7a87cae846e534a050c1c6458931330c47", + "line": 13, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", + "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", + "similarity_id": "9d05f0f68a5dad58d0e792151ea1214aeba6e193f2030f558479f0b73c06a5be", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_eks_cluster[{{positive1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", + "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", + "similarity_id": "f14eb8ec31b04320c7e7b05ba8c4988cbaa28665dff7fb317d8c855b6eb02f05", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_s3_bucket[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", + "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "76047c4a4e7cba58c78b4c22801cd82cc7135c2cbe7e0a55a346b24091400479", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "aws_cloudtrail[{{example3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_cloudtrail[{{example3}}].tags is defined and not null", + "actual_value": "aws_cloudtrail[{{example3}}].tags is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/memcached_disabled/test/negative.tf", + "similarity_id": "49100f90b87e61710dc47a0165e8d552e911bb53a394c9a9021dfee6d579b201", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_elasticache_cluster[{{negative1}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", + "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" + } + ] + }, + { + "query_name": "Security Group Not Used", + "query_id": "4849211b-ac39-479e-ae78-5694d506cb24", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group", + "severity": "INFO", + "platform": "Terraform", + "category": "Access Control", + "description": "Security group must be used or not declared", + "description_id": "eff2383a", + "files": [ + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "b34de59e36b34a4c19518a6e1ec353aacc1f0e996ad2f68c77b4c94aee19ef66", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "dc28977b6fe46ebd23c1da788a21849794afec7ff88a83ae7e4b568f0cab2b44", + "line": 8, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow_tls]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow_tls]' is used", + "actual_value": "'aws_security_group[allow_tls]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "47c5bc4571b7341d7d35f2f25d310a7770c8247d2c18651b2ef273702d73da69", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "cc14c34ecf0b1d52eb75640a2c6575a5270c8111a859a95b4f1c90219a98e1aa", + "line": 17, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative_rdp_2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative_rdp_2]' is used", + "actual_value": "'aws_security_group[negative_rdp_2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", + "similarity_id": "e849a2f5e998cba335bcfcc448d76a78a6d9374280b64e281181b389edb05877", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow_tls]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow_tls]' is used", + "actual_value": "'aws_security_group[allow_tls]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "1079df6156741ed31a5989b95d98656352ab73401116dc8c24e58e470479fec0", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative3]' is used", + "actual_value": "'aws_security_group[negative3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", + "similarity_id": "0f0900a6fc4525d5f829110cd31568675297cd052d7d5614190d743124d025be", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "216dd7f494b888a497c227775ce036f483511eb7dad48e8cc2965dec635fe372", + "line": 58, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow-public-outbound-sg2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow-public-outbound-sg2]' is used", + "actual_value": "'aws_security_group[allow-public-outbound-sg2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive2.tf", + "similarity_id": "e55e34b27f1663115f9727fd9882dfbf8aaad2ff02b8acf0253027acb9acf16f", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", + "similarity_id": "fe7d2e8a70f2026b00b3fad43a6422b112ab7784f7e176de463dc85a211e2887", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "a91e0c532a2e0506b42ebad34088f61e924948d45f684f5af3f3af1a44d98191", + "line": 76, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive6]' is used", + "actual_value": "'aws_security_group[positive6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "9549b66a01e7d1b081807d3e10352c06582891c740a675e25ed1beffb58193d5", + "line": 53, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow-public-outbound-sg]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow-public-outbound-sg]' is used", + "actual_value": "'aws_security_group[allow-public-outbound-sg]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", + "similarity_id": "0c4b0988118981b6dafb6daad599122a0d8326bf0c7b44f8bc97c8260b97acf5", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow_tls]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow_tls]' is used", + "actual_value": "'aws_security_group[allow_tls]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "8b4e32fbf123be0405ac7075ed7c1edb6764a03a6c0f600e0bbd043fe7fd5f30", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "e9246e7ecd3569fae5a0663289fa276575bb8d768221093447162ab7ec4cc18a", + "line": 46, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive4]' is used", + "actual_value": "'aws_security_group[positive4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "651ab242e3ed0e3232e9ecc1338bb81c13a04cb6d5395c6dcfaae561e6ec3747", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "9119d6bf141f7ae79f599c17792116ce832a1e31c79903f3470a4121148e65e8", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "b09959d54b5ac1e3d7dbb0cbe0f86f688ca480ade3bc4f57222b8710cdaab200", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive8.tf", + "similarity_id": "b0fb6463e23378a02e2e53c337e1b1c2d991cf371bdeb9f3e6480f437c6fa250", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive8]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive8]' is used", + "actual_value": "'aws_security_group[positive8]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "a0a3139505f7bbcd611f4565b35010aed1622a591f24f4f840f290702f2f7c3b", + "line": 50, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[public-internet-sg]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[public-internet-sg]' is used", + "actual_value": "'aws_security_group[public-internet-sg]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "0b14bf9f8abfe6aa8342f5061208b923a5fbaac7f4690a4f648e02bddfe75d25", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", + "similarity_id": "a09497235def90f1eab9bde9aaa2515b8445b2e6f1400dd4b7cdcd19e93b8762", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "c635380bac05c17e10f99691ed4255aec4ca1abfa4be40e2f68c08faaf40e0f8", + "line": 7, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", + "similarity_id": "cd1febaf834c4d8ec3af6c2564a91cccc9efa56a0758769565d01189a25116f3", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive3]' is used", + "actual_value": "'aws_security_group[positive3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive5.tf", + "similarity_id": "92b08ca77f922f792758fd694e9fc60488e6f22ee54ac6271e9a4a666a588095", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive5]' is used", + "actual_value": "'aws_security_group[positive5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", + "similarity_id": "ecda9b69ab0e79a39243a5e0501cf01d3f5ccf44d92d4b78c743f5e4df5e05f0", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow_tls]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow_tls]' is used", + "actual_value": "'aws_security_group[allow_tls]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "910c495a10ef47ae63670f61e44a2e7b241014d2c94ee66aca6b0bcc4091fbc9", + "line": 76, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive6]' is used", + "actual_value": "'aws_security_group[positive6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/negative.tf", + "similarity_id": "8822ed74f1b9d332752c9ef43df283f1d70a4f7e813b566daf7e7724ace7fe8a", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "a2bd20a1fcc7064cdc9668ce502200a7232c2e493cddc69a428d69886c4afa2c", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive5]' is used", + "actual_value": "'aws_security_group[positive5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "29b69e4c381ab151863df423323d370f2dde43322ec602c61a0cda9bfb6e4acc", + "line": 26, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", + "similarity_id": "e84114fdc3e07676e30a9a18529cf260ab319e3f09c638e28e108ae7460de17a", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "0844f97e566c95a7a7a29e760a31e011fa8ea2393d2463649543b83e12dcdf7e", + "line": 2, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive4.tf", + "similarity_id": "33dc6947723d8c375d323a85c0fb359e8bdef2064fb8c55bf58473b2457f6c21", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive4]' is used", + "actual_value": "'aws_security_group[positive4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative5.tf", + "similarity_id": "ffa16e12728f9e0505e07000dd4fe2222ca948da262ba455b40a96eacecfe67c", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative5]' is used", + "actual_value": "'aws_security_group[negative5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "b5d2974424ee695207aea177f2cb0564e43e9557aff46635ee90b1b20631d2c4", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "d322571bdc80e01ba976aae4f31d4f0cb4077aa7037caacb0f3e6a9e9d2360cd", + "line": 106, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive8]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive8]' is used", + "actual_value": "'aws_security_group[positive8]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "ba7b211e54bbd61536a9e92c90493294de1b3e795db86cd6eadb70496eb37172", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative3]' is used", + "actual_value": "'aws_security_group[negative3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative4.tf", + "similarity_id": "85550e4d81596ef63fac7f8b73c8be29469e750bb4f79eb25d46cba32ef8075f", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative4]' is used", + "actual_value": "'aws_security_group[negative4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "4b474e5eab73dd28051e418f6d88d3ba6603074cb502dd30553a2e497cd4a875", + "line": 76, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative6]' is used", + "actual_value": "'aws_security_group[negative6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "970b6ae9b54bc9656952dbd86602f6872f9ca2fda1e337238b0ab239c696cd09", + "line": 91, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive7]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive7]' is used", + "actual_value": "'aws_security_group[positive7]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive6.tf", + "similarity_id": "9e503201ba640d6a6a0036ccf71576206d33dc737878f95dfb9dfa5669172a2b", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive6]' is used", + "actual_value": "'aws_security_group[positive6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", + "similarity_id": "44144dc84cc32ce00ef6081cac87492c058b862dfa05b5e0947a3866640200db", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", + "similarity_id": "6fb86ee07fa3ab4a26faf6ed504b5e31f5312329e7712be3a5aaba49baa5473b", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative1.tf", + "similarity_id": "1c6871ace99b13429234ecd360e86d39ce4b5560b94cca1bd33be9ef50c4acb1", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "8802e064969bc916d4ef02f06c9c47892d2f3bb4eea6c11aba564085d31d424b", + "line": 46, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative4]' is used", + "actual_value": "'aws_security_group[negative4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive7.tf", + "similarity_id": "bd267f1f2745ba7ad91ebff57611c6c9e54fd1321b8dea14d5acca714207b4b6", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive7]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive7]' is used", + "actual_value": "'aws_security_group[positive7]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "abd08f520c5633eed72885d441db5a5936387c4ae3d7db9c60e9872bd777f4d6", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive5]' is used", + "actual_value": "'aws_security_group[positive5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "c95c36535d0a7df2c176b0810f6e5d48a51f4f579f2a67e68cd3d2018699a00a", + "line": 46, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive4]' is used", + "actual_value": "'aws_security_group[positive4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", + "similarity_id": "ee144dbb3085387c863df92f0e41c0edd378c451341a233093f83b4be1ee2539", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", + "similarity_id": "9d9754ff06cafa80f5475027c863e8913007c0d76626b1180a5cf2d638996b67", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[allow_tls]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[allow_tls]' is used", + "actual_value": "'aws_security_group[allow_tls]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", + "similarity_id": "ae737bb212b1cfb8a2c806120abb34711cbc63025a8c15487961dd5801395414", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative5]' is used", + "actual_value": "'aws_security_group[negative5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", + "similarity_id": "8ee3d3a402aa43b6e3f2cf54c44bd8fccc285e9a0d0bf7749fdf16cd6af15057", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive3]' is used", + "actual_value": "'aws_security_group[positive3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative6.tf", + "similarity_id": "1b16280ab89e00b2f2c57b95936f5a209c7d76840fc62ee9e39618c4b13adf1f", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative6]' is used", + "actual_value": "'aws_security_group[negative6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "474863073ae8b9ecc66d74c96204b36a3c0a32a18265bb861fc9691c62cb5ca4", + "line": 16, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative2.tf", + "similarity_id": "3d7d71e2acd96134a31a44c4888dd582061f87e9a4296654a353724b54e4149a", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "bc83bbaaef7e527400c6f92f17637ed599e8ac54e48d4fd51534190b381902e3", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "f4c4b1830fcf0beb1dc337de174fd08fa644a25dfa5f85412ebe61502dd8573a", + "line": 76, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative6]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative6]' is used", + "actual_value": "'aws_security_group[negative6]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "e93ee550ce0ee01418b4a1c02a5e048a807c14670570c7512f7ab5d50fd4a274", + "line": 15, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative3]' is used", + "actual_value": "'aws_security_group[negative3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "7e073fef54b77d57fa937bc30efb9239c7ca635f391827f864da47aca36ac61b", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "8f046721e55cb8c7c1d792300e6509f2765fb444819c40fae9c3cee98b3ea794", + "line": 6, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative2]' is used", + "actual_value": "'aws_security_group[negative2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "4d4a207a6527f23a4692690dbb93ce8956dd3262df1bf934e6924e0bc12cd1f9", + "line": 91, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive7]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive7]' is used", + "actual_value": "'aws_security_group[positive7]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "73f99f67ba58819a427b3ebc2195436342b23865ad1b69a96276d71f43801826", + "line": 106, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive8]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive8]' is used", + "actual_value": "'aws_security_group[positive8]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "36165878b6d660e01bb0e87cf7c9d160084eede23de3db5a5305ec2882bf6389", + "line": 61, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative5]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative5]' is used", + "actual_value": "'aws_security_group[negative5]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive1.tf", + "similarity_id": "59f6892722fb687fc6e9146824f4083677d37b4ce4ae2d1bf3001b1566659e08", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive1]' is used", + "actual_value": "'aws_security_group[positive1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", + "similarity_id": "b07dd9f1938ae90bc88bb632d5005d911ea42b641ade6af94d3bd966a9f9a678", + "line": 14, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", + "similarity_id": "3b39fe2fbe598d59b160f091d9372563ffc7643f2f0031ae85669b3c83c7f651", + "line": 46, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative4]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative4]' is used", + "actual_value": "'aws_security_group[negative4]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "76b7c3aaf1da33fac752d44d1160f90bb008fec161489243005ee2beb7278e5a", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", + "similarity_id": "11fa9ac15d69d8123ce1fb038f3086a7621d7c7fcc4fc40470372a5bef90a172", + "line": 31, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive3]' is used", + "actual_value": "'aws_security_group[positive3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "d9265eeefbc0892b393fd33b7d3188f7595eee896631bff626666ae606131752", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive2]' is used", + "actual_value": "'aws_security_group[positive2]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative3.tf", + "similarity_id": "79736e14b588a95ce6d2b547b4433187e32f6b99348adbe8b12f98af96dd9547", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative3]' is used", + "actual_value": "'aws_security_group[negative3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive3.tf", + "similarity_id": "a9edad357d7df714428d702fd554dcb88855d77ed56f94add9b002e863b3c896", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[positive3]' is used", + "actual_value": "'aws_security_group[positive3]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", + "similarity_id": "d4e7db0358e3d6347e46e46bbdd7e88f2a0820270b40061629d50a192091bded", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative1]' is used", + "actual_value": "'aws_security_group[negative1]' is not used" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", + "similarity_id": "36440f30c6b51ef6561c700d8c4a8502d89631075c7477858c39dc84bb228f10", + "line": 1, + "issue_type": "IncorrectValue", + "search_key": "aws_security_group[negative3]", + "search_line": 0, + "search_value": "", + "expected_value": "'aws_security_group[negative3]' is used", + "actual_value": "'aws_security_group[negative3]' is not used" + } + ] + }, + { + "query_name": "Security Group Rules Without Description", + "query_id": "68eb4bf3-f9bf-463d-b5cf-e029bb446d2e", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#description", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "It's considered a best practice for all rules in AWS Security Group to have a description", + "description_id": "cee242dd", + "files": [ + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", + "similarity_id": "2dc0890b59a106e2cc426d77c23e9c522a9a7d035f1e09574ef6e25d8bc0424d", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", + "similarity_id": "3daaac79ee6edcaf76dcc89b9d01d077cce8b198635e77101b7af5e926ed8641", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative1}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative1}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{negative1}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", + "similarity_id": "4862ce071bb1d363b000bb53ee240dd6ce35c559be4b0e6d83e1fdc9b7e7314a", + "line": 58, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow-public-outbound-sg}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow-public-outbound-sg}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow-public-outbound-sg}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", + "similarity_id": "100519cbdcf3df4d0211a20cb28c13adcd5d3a41b135d2503ebfcc726c54b90f", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "45afdd7085631fae75df9b1cc77c348dc1e8205c8d9ed4247dbf6451bd4dbad2", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "8b5418ea08b72998227db1ccdd96661374704e9dd758d77b927ebb078a84251c", + "line": 62, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{public-internet-sg}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{public-internet-sg}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{public-internet-sg}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", + "similarity_id": "f363c10a06cbd3031d28c22bb804d8fe9ac6ea983fd34c5cecf6c09f9e3470ff", + "line": 31, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "411575ac5d72e413a809b85a05e761ba96e7633770e49f89b40c9e1df4e45bd5", + "line": 8, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", + "similarity_id": "8db84596a4f3c9ed090cb85b1ba47ec6bff3e2bd46a4fa67eb6e30f1128c002a", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", + "similarity_id": "e6462b6dc7888e2303da32d39a6ca6492a7f970dd6ffbfb0661983a49eb49f15", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", + "similarity_id": "cd5b8301be50491b2efdb0fc76328180ba90a0dfcc92d4f0cfa27574d1bc9035", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", + "similarity_id": "78e5e7cadcb973bb9b1edd29dc451d181fbc58bce43d62058e4271a87ce9a688", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", + "similarity_id": "e364258f261f1f792e394a9fa474cc907c412e6b7b152056fa142293c8e3d81d", + "line": 19, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", + "similarity_id": "66303822c8f1bb7301836bc3106b13500cb007ebda808c4055f6c6de042eaf03", + "line": 63, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow-public-outbound-sg2}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow-public-outbound-sg2}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow-public-outbound-sg2}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", + "similarity_id": "630f14396cdf3166c5ac459ba9b4e3011129ee94ea36e24575884f1b8641aae5", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{negative2}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", + "similarity_id": "22cb57ab0377190165707a44fecf388ba1c081fc3bad1e7f064c3b5be49902e0", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive3}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", + "similarity_id": "fccd7ce54c2f81017555931784cea70f2e01361f00e4ac8a03695c0040ad0964", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", + "similarity_id": "22b988c42c73026fb8616bb9756b84ec39d8874a19554c42878fe3bb8c747ac5", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive1}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive1}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{positive1}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", + "similarity_id": "3c150a59c35c8bd3e463e4f250c4ebbd6f99d2c9323f6a8bf33b682f92be0de2", + "line": 55, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{public-internet-sg}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{public-internet-sg}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{public-internet-sg}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", + "similarity_id": "f0287963b35b539518c81d5e5705038c7a093b37ccd86e04984a5cc2ccfcf7c8", + "line": 22, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", + "similarity_id": "18976e48fb2ec3241f93fb5eabce67d71feb122559e9703096eec271454f8caf", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "646e5183aad86fcdb33b2dbc958c0021df017a383467ea1a8e727247723f3412", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{negative3}}].ingress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", + "similarity_id": "a823d1d90808d0393349ec071a2d231c19f39d83371b1dbe39c1061428f233ba", + "line": 14, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}].egress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", + "similarity_id": "2bc8be5c1319dd1601fab22812dd209065f13deb48748dfd74c18d95f82d89f1", + "line": 18, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}].ingress", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" + } + ] + }, + { + "query_name": "Security Group Without Description", + "query_id": "cb3f5ed6-0d18-40de-a93d-b3538db31e8c", + "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#description", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "It's considered a best practice for AWS Security Group to have a description", + "description_id": "bc535d27", + "files": [ + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "97295dc3bd259c7e904b577e51bd58c118a70713285e524a540cb130ef33029a", + "line": 17, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative_rdp_2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative_rdp_2}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative_rdp_2}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", + "similarity_id": "cc27ed549e2644065d4800aa7d84131465c07608116018b6ef0b57e894e04434", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive2}}] description is defined and not null", + "actual_value": "aws_security_group[{{positive2}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", + "similarity_id": "6b9ceea4e2161112b8bceecf47b8345cec460bd8c845ce32de6676d69371e044", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative3}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", + "similarity_id": "f25c2a2ae6ea0b4f2cb887b2f33f69ce1569f7b00a0522c8c8d667a4ded0cca8", + "line": 7, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "478294c875a639c111f30cc1a334adb94d041dd954eb079c60032546b49e6a82", + "line": 6, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", + "similarity_id": "908a0c7610f98be7cbcb4b91fe44df06b11c2a83b199a56ba1399d8fbead49cd", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative2}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", + "similarity_id": "2c0c6e0149f1762c8cf78222421d2f2b8326c3426b28db7f88d03032570e5735", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{allow_tls}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{allow_tls}}] description is defined and not null", + "actual_value": "aws_security_group[{{allow_tls}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", + "similarity_id": "220fd79273145fe5498f8f7f17e043b9442d52572d2c254f4a210fb1bc6bd824", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{positive3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{positive3}}] description is defined and not null", + "actual_value": "aws_security_group[{{positive3}}] description is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", + "similarity_id": "ba762cc45131836f9b5f790de302e30c86fae6eaecc9519ca2ee8eb58041bc68", + "line": 15, + "issue_type": "MissingAttribute", + "search_key": "aws_security_group[{{negative3}}]", + "search_line": 0, + "search_value": "", + "expected_value": "aws_security_group[{{negative3}}] description is defined and not null", + "actual_value": "aws_security_group[{{negative3}}] description is undefined or null" + } + ] + }, + { + "query_name": "Variable Without Description", + "query_id": "2a153952-2544-4687-bcc9-cc8fea814a9b", + "query_url": "https://www.terraform.io/docs/language/values/variables.html#input-variable-documentation", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "All variables should contain a valid description.", + "description_id": "b44986be", + "files": [ + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", + "similarity_id": "62078456419f5622852ab8cf84462b2c74b43b06744b5a34c25e80b23ad3d702", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "41f26963a12df7c1151d97bf1b5d0709e431c561c906b7167901c764ae171689", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "variable.{{private_key_path}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "e381b53ef16b9c328c196929a5a26d4cdbd82d2977ea71dc4d596d2f74f98993", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "variable.{{region}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "0a7073b99329a57cb649f1c21da1367d170f02d41ac2e6e5f807d0109d2f6d6c", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "variable.{{aws_secret_key}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", + "similarity_id": "fa3f91cba9cd74a984e00c25bc2ac49ea65a279447c29c89176fdc4a3a035b78", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", + "similarity_id": "48d16e18162d19cf802b6e0c2aef11f2d50246dd9fdd7787b771ed385a8da0a9", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "c76818170cf4777255865bde01f29c4e33cd086469dbbd4d02b45e68afc24c09", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{aws_access_key}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "f6232ed43785f9d741f5a0671caef48ec4a173afe1c72e0ac5b581b8ed97343e", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "variable.{{key_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/negative1.tf", + "similarity_id": "1308d0e221e62b1e083f26fdfe97a407ee9dd096edc25877020b7cf9cdae2248", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", + "similarity_id": "df50786a61ae71ad217393ae9d4606050a29c48a30c9eaf8e958a0ca8021c4c7", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", + "similarity_id": "3ef461b9af906c94d782dfb45daf8edb1d5007e815eb6b42ab5a9190a5ec4b42", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", + "similarity_id": "022f0f34de59966151af271df69219e424a7f374245ee40c7c75aa2f6e8a4384", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{cluster_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'description' is defined and not null", + "actual_value": "'description' is undefined or null" + } + ] + }, + { + "query_name": "Variable Without Type", + "query_id": "fc5109bf-01fd-49fb-8bde-4492b543c34a", + "query_url": "https://www.terraform.io/docs/language/values/variables.html#input-variable-documentation", + "severity": "INFO", + "platform": "Terraform", + "category": "Best Practices", + "description": "All variables should contain a valid type.", + "description_id": "bba696eb", + "files": [ + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "19c801966dd2da16397ad711be930605bd6b1a1be3b41f0993e8d883934ad502", + "line": 2, + "issue_type": "MissingAttribute", + "search_key": "variable.{{aws_secret_key}}", + "search_line": 0, + "search_value": "", + "expected_value": "'type' is defined and not null", + "actual_value": "'type' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "6684e95bc8f93fd55f4d3a5c4890655b3bb5591bc18227c940930beb7637d06e", + "line": 5, + "issue_type": "MissingAttribute", + "search_key": "variable.{{region}}", + "search_line": 0, + "search_value": "", + "expected_value": "'type' is defined and not null", + "actual_value": "'type' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "f08f903d32e8d577c959094b07d53f57730ad1af1a848156b65ac30025508d7f", + "line": 4, + "issue_type": "MissingAttribute", + "search_key": "variable.{{key_name}}", + "search_line": 0, + "search_value": "", + "expected_value": "'type' is defined and not null", + "actual_value": "'type' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "2a6e2d88043d99605c846cb8c13e1c90470d7b25e81fa49db30c7316cf3a47ed", + "line": 1, + "issue_type": "MissingAttribute", + "search_key": "variable.{{aws_access_key}}", + "search_line": 0, + "search_value": "", + "expected_value": "'type' is defined and not null", + "actual_value": "'type' is undefined or null" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", + "similarity_id": "e340e3072f2ef20a185b495b9e412f688cd60f72a7b78867f42c2e525f335e23", + "line": 3, + "issue_type": "MissingAttribute", + "search_key": "variable.{{private_key_path}}", + "search_line": 0, + "search_value": "", + "expected_value": "'type' is defined and not null", + "actual_value": "'type' is undefined or null" + } + ] + } + ], + "bill_of_materials": [ + { + "query_name": "BOM - S3 Buckets", + "query_id": "2d16c3fb-35ba-4ec0-b4e4-06ee3cbd4045", + "query_url": "https://kics.io", + "severity": "TRACE", + "platform": "Terraform", + "category": "Bill Of Materials", + "description": "A list of S3 resources specified", + "description_id": "0bdf2341", + "files": [ + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", + "similarity_id": "3cfe47bb5e3c6349b98542d91ee5274ed5996f4a13a9e471b073f5ce1582d99d", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my_tf_test_bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", + "similarity_id": "20b34fd0c662cb32feced3769c55bd76e0525536aee17c586a2ff36859817714", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true,\"mfa_delete\":false}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", + "similarity_id": "e84fdc991f347648effc622245b9ca4ef7a8db1d439f913cd3c2311ceadfa007", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", + "similarity_id": "aaac2e1ac7eae46819429dfac5e755cf0ad4dac75d51e3b412df9cd3ecdd801f", + "line": 10, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", + "similarity_id": "225b5a3547c7224092d4e7dccb8b044bb8349dd52359285a8b3743dc7d33957f", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my-tf-test-bucket\",\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": [\\n \\\"aws_s3_bucket.b.arn\\\"\\n ],\\n \\\"Condition\\\": {\\n \\\"Bool\\\": {\\n \\\"aws:SecureTransport\\\": \\\"false\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", + "similarity_id": "ace6a40b375fbd216848326213cb26a261effae0af44a71a13a951710ff4abd5", + "line": 5, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[public-bucket2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read-write\",\"bucket\":\"bucket-with-public-acl-32\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", + "similarity_id": "fa667690d97015898c61ace4b7f7384e1014c124b7a9f58898ec55244e0b2f6e", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read-write\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", + "similarity_id": "e3fabada99372aa90bdbaa4ec222083b804ddfd18ac6bce27ce80dc566ca84c8", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my-tf-test-bucket\",\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": [\\n \\\"aws_s3_bucket.b.arn\\\"\\n ],\\n \\\"Condition\\\": {\\n \\\"IpAddress\\\": {\\n \\\"aws:SourceIp\\\": \\\"8.8.8.8/32\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", + "similarity_id": "b208adf02709122124fcaf5c0a9531965c66fa008cdc2d83ba09af2b4dcec1d5", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", + "similarity_id": "5613eecc821464ca8934d3c2c8fe0c84ef382bbbdc83ef78d96e853511b641dc", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", + "similarity_id": "06d00bcf29f3f63e83fee5d9971e5d244306c97fbdbcf82b9cd43c13223e08a4", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my-tf-test-bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", + "similarity_id": "bb28259b6d8d780647c6fe0d93b3682ab79c869e1ec23275c0564bf222e80f4d", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[hoge]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"hoge\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", + "similarity_id": "a0269cda7a646c8aaba0dbb4b7f88e5347027d8a4c4deb514d83fa9b85e71774", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", + "similarity_id": "e5a588d03ed11119b0afcb00362423fb68d1623a82723ee51747d426bbca6988", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", + "similarity_id": "f466e21861d0d5f6bce99223e7d54d0e7a2ff556c78ce30b38abf5e598fc4419", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", + "similarity_id": "5d021c75ef09a3e9e8103c6c6f98a9ac83ebf924e843ac79342e221540cce2fa", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my_tf_test_bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", + "similarity_id": "91d6fe9be8dca86488c76245854106ce1f9124849e3ae8dc59b391bfadc3a582", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"S3B_181355\",\"policy\":\"\\t{\\n\\t \\\"Id\\\": \\\"id113\\\",\\n\\t \\\"Version\\\": \\\"2012-10-17\\\",\\n\\t \\\"Statement\\\": [\\n\\t\\t{\\n\\t\\t \\\"Action\\\": [\\n\\t\\t\\t\\\"s3:*\\\"\\n\\t\\t ],\\n\\t\\t \\\"Effect\\\": \\\"Allow\\\",\\n\\t\\t \\\"Resource\\\": \\\"arn:aws:s3:::S3B_181355/*\\\",\\n\\t\\t \\\"Principal\\\": \\\"*\\\"\\n\\t\\t}\\n\\t ]\\n\\t}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", + "similarity_id": "705d28ba4cf90b667145415031ab834a69916db85ede5128933e11d6f7c599cf", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", + "similarity_id": "ecbd8d8be3c3aa0925bb400f55a414ee85e50d8206125a585fb859b6b7399403", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", + "similarity_id": "36a6df64dff9bdbe2b749f8ab445bc51774b63e36e47af8fc66fdf7e00c2f5d1", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", + "similarity_id": "fd23b519d9de3c9e937d36c6c15ed6b2d30857d14504942ff8594acd02238a74", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\"}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", + "similarity_id": "8aa92d328b0c2510f739b1ea6307d0f1e4cf7ac9260d8b5c2311b74fb824153f", + "line": 69, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", + "similarity_id": "184e8a008eeceb0d552201392fec564a5f78683cc4baae6ad1b2c3a3b9b63cd9", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my_tf_test_bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", + "similarity_id": "f4441d44c8dce3d033bc61abad849e84e0a20fff1a0200445cadc9a70d6ee1a2", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", + "similarity_id": "671b661eec245970e807af4391c3ebbb8541d19388b8fb499ce71ff70c3df226", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive3]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", + "similarity_id": "930988ac27e4f1682a2299c1e8675787b24e3572ce516a4e41ae65f647a8ea14", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", + "similarity_id": "96b65d7ec60d5487931d8a786e663b5ebdfdf1b909a60dd9be4984892fae3a79", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[hoge]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"hoge\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", + "similarity_id": "1a0ab5ee1405fb6fbf510f27412091d4abc0e7ef3f045c03e883a80ba69abe0a", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\",\"cors_rule\":{\"allowed_methods\":[\"PUT\",\"POST\"],\"allowed_origins\":[\"https://s3-website-test.hashicorp.com\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000}}" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", + "similarity_id": "1bfbe33817f5456a6025a9d3b83fff5ad8001dece3b05b58f59d0d9f3209f064", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", + "similarity_id": "d724252e60d639385ecaa09935add198de4965fd23e3ba8dc842bcde1bcf3af7", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "9ef1ca02e068fd6e648c12ff0ef580b3ffcfc6dd8029f4f3f90be64da3a8e855", + "line": 16, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[foo2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"logging\":{\"target_bucket\":\"${aws_s3_bucket.log_bucket.id}\",\"target_prefix\":\"log/\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", + "similarity_id": "439cdfaeaedcf60ccb07cfc151f55de34864a6fd9017faac60039058b67210b5", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[examplebucket]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"examplebuckettftest\",\"object_lock_configuration\":{\"object_lock_enabled\":\"Enabled\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", + "similarity_id": "c3ad79e29a0d7155321fc3d0f9047b7f34ad844eb26b14e62f07e75230d1ebd2", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"kms_master_key_id\":\"some-key\",\"sse_algorithm\":\"AES256\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", + "similarity_id": "d9ded88fa570d9a95bb6addc41877ba64def60b05b7ed2782f03b96b5531b695", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", + "similarity_id": "dccd9ebfcd719742700a961317fde677cebcc3a50c0b2f7bfbe5dbe24f05ed7f", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", + "similarity_id": "1f6f4c688f980a8b94aa9ee3fcc1611c87d25a564fe9fbec7396f2fe9378d027", + "line": 5, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[public-bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read-write\",\"bucket\":\"bucket-with-public-acl-3\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", + "similarity_id": "f4cb214e402e7f6a4f7ddfef2574ab338a3e9325928d82eb65b922101520fea3", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", + "similarity_id": "8ca0b7b2a315fa9c1b6b28f38213fd72ec27c8c29e14ae2390f7be30bce0888c", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", + "similarity_id": "feb3a1e708d932c7e9e508e91410f12018c53eba1a3d0a73bc7ff64f98a16603", + "line": 19, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", + "similarity_id": "6da57ecf0ef32da4afbbe03be3c29560a7ab8d3201aaad13258ee1dcf3dc6fab", + "line": 10, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive4]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", + "similarity_id": "70a2a1a20a3ef61e2c52d44a9f51f6852f0f97636e5b977342dac5af1af9c5c1", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my_tf_test_bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", + "similarity_id": "7d38380efc922c9e2a2138848f3227358107e15b153acc4ae67f45b926ed1082", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", + "similarity_id": "03ef4eeb44cc99c658039cd3a974e8ca5ef27302e7e9ab8f58f4a73ce8998a0d", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"cors_rule\":{\"allowed_headers\":[\"*\"],\"allowed_methods\":[\"GET\",\"PUT\",\"POST\",\"DELETE\",\"HEAD\"],\"allowed_origins\":[\"*\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", + "similarity_id": "81ae4518a54b75efd3cb1199be55b7afa3201173f3ab119a53b8976e3af7c79a", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\",\"website\":{\"error_document\":\"error.html\",\"index_document\":\"index.html\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", + "similarity_id": "67a97d3821c1fb10e749d6538a7eeb690825a3d79350caeddbe531e56416c0b9", + "line": 10, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[log_bucket]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"log-delivery-write\",\"bucket\":\"my-tf-log-bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", + "similarity_id": "6604099d7d3c93c84624b67926d65094d828398b9d5e4327cfb842a50a411e49", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my-tf-test-bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", + "similarity_id": "e511aa399e157dd721d42b9d3249def9a50cd140337857f25fbe0df00d64522b", + "line": 20, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[foo3]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current3.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", + "similarity_id": "198cbc0ccc999475689626fcb64a6544d288966f5bcdfc7983ed4d41a1081138", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"authenticated-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", + "similarity_id": "95bfc44a4337badf496c97f0bf8648e21203e4020878a018648ee2ee71ff9424", + "line": 10, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[b]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", + "similarity_id": "ad415d657ef54484a27a9f197fed0dfe922f5d57dfa3347107c896ba28354b0b", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[examplebucket]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"examplebuckettftest\",\"object_lock_configuration\":{\"object_lock_enabled\":\"Enabled\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", + "similarity_id": "4284ee3c815ea34a164c9d1d1bd41c23f86401c80c0dd3671a0dc5aece1ce4eb", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", + "similarity_id": "ea34f358f6e9d96683cfd53c5785ca7c6b5c3cf85c75d3574788bafe0bed6abb", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"cors_rule\":{\"allowed_headers\":[\"*\"],\"allowed_methods\":[\"PUT\",\"POST\"],\"allowed_origins\":[\"https://s3-website-test.hashicorp.com\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", + "similarity_id": "b49586a525c02b6b1e996a8dba4269c7eeadfb794ac7df7dd8e0bd10ae7456b8", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive2]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" + }, + { + "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", + "similarity_id": "52a4ead57d40049da3b0f60cf9f8c992a47f0cadd75bf761005121133a01979a", + "line": 10, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[foo]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", + "similarity_id": "c7953fb7aa44cc79fd055c52cc70ae98ed42c2a4f4bab036a614061ad00bbfc6", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"my_tf_test_bucket\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", + "similarity_id": "dee2e88009ac8e34ef3d5f02bb802ecc43558d74ffdd71f83f41ab656a906301", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true,\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", + "similarity_id": "f5aef5e494ab7efdbecb94e4c7e2dbe6ad95f06addd2ffffcc01a47e2e24c1c2", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", + "similarity_id": "ae3ded1985cb283bf170c1553793a5815577ad55acd8be6768c9f1e406f3ac7d", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"sse_algorithm\":\"aws:kms\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", + "similarity_id": "caff2c6eef0e43d2e2a2f609284d4a965372bfd162398996b3dfe3f1677229dc", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"S3B_181355\",\"policy\":\"\\t{\\n\\t \\\"Id\\\": \\\"id113\\\",\\n\\t \\\"Version\\\": \\\"2012-10-17\\\",\\n\\t \\\"Statement\\\": [\\n\\t\\t{\\n\\t\\t \\\"Action\\\": [\\n\\t\\t\\t\\\"s3:putObject\\\"\\n\\t\\t ],\\n\\t\\t \\\"Effect\\\": \\\"Allow\\\",\\n\\t\\t \\\"Resource\\\": \\\"arn:aws:s3:::S3B_181355/*\\\",\\n\\t\\t \\\"Principal\\\": \\\"*\\\"\\n\\t\\t}\\n\\t ]\\n\\t}\\n\"}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", + "similarity_id": "9430b62718b0a7f9273c57285497bf4c6230b960dbcee3ee1735d54d5ff25140", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"kms_master_key_id\":\"${aws_kms_key.mykey.arn}\",\"sse_algorithm\":\"aws:kms\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", + "similarity_id": "7c0a7ad742cf3016ba7ac1deace3421835f5a1d6230cbc5d4aae22702026985f", + "line": 2, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[negative1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"logging\":{\"target_bucket\":\"logs\"},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" + }, + { + "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", + "similarity_id": "76144ef296c0cc5b8505090d561fff1e126e10d71f2c7a6b21932eddd70f5bb5", + "line": 1, + "issue_type": "BillOfMaterials", + "search_key": "aws_s3_bucket[positive1]", + "search_line": 0, + "search_value": "", + "expected_value": "", + "actual_value": "", + "value": "{\"bucket\":\"example\"}" + } + ] + } + ] +} \ No newline at end of file diff --git a/src/commenter.js b/src/commenter.js new file mode 100644 index 0000000..bb1a433 --- /dev/null +++ b/src/commenter.js @@ -0,0 +1,88 @@ +const fs = require("fs"); +const moment = require('moment') + +const kicsLogo = "https://user-images.githubusercontent.com/75368139/136991766-a4e5bc8b-63db-48f7-9384-740e9f15c9f6.png" +const severityOrder = ["HIGH", "MEDIUM", "LOW", "INFO", "TRACE"]; +const severityIcons = { + "HIGH": "https://user-images.githubusercontent.com/23239410/92157087-97285600-ee32-11ea-988f-0aca12c4c126.png", + "MEDIUM": "https://user-images.githubusercontent.com/23239410/92157093-98598300-ee32-11ea-83d7-af52251a011b.png", + "LOW": "https://user-images.githubusercontent.com/23239410/92157091-98598300-ee32-11ea-8498-19bd7d62019b.png", + "INFO": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png", + "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png" +} + + +function readJSON(filename) { + const rawdata = fs.readFileSync(filename); + const parsedJSON = JSON.parse(rawdata.toString()); + return parsedJSON; +} + +function createComment(results) { + let message = "![kics-logo](" + kicsLogo + ")\n"; + + message += "---"; + message += `\n**KICS version: ${results['kics_version']}**\n` + message += "\n**Total Results: " + results['total_counter'] + "**\n\n"; + message += "| | Category | Results |\n"; + message += "| --- |--- | --- |\n"; + let severityCounters = results['severity_counters'] + for (let severity of severityOrder) { + if (severity in severityCounters) { + message += "| ![" + severity + "](" + severityIcons[severity] + ") |" + severity.toUpperCase() + " | " + severityCounters[severity.toUpperCase()] + " |\n"; + } + } + + message += "\n**Scan Metrics**\n\n"; + message += "| Metric | Values |\n"; + message += "| --- | --- |\n"; + message += "| Files scanned | " + results['files_scanned'] + "\n"; + message += "| Files parsed | " + results['files_parsed'] + "\n"; + message += "| Files failed to scan | " + results['files_failed_to_scan'] + "\n"; + message += "| Total queries | " + results['queries_total'] + "\n"; + message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; + + let executionTime = moment(results['end']).diff(moment(results['start']), 'seconds'); + + message += "| Execution time | " + executionTime + "s\n"; + + return message; +} + +async function postPRComment(repo, prNumber) { + const githubToken = core.getInput("token"); + const octokit = github.getOctokit(githubToken); + const results = readJSON("results.json"); + const message = createComment(results); + console.log(message); + + const { data: comments } = await octokit.rest.issues.listComments({ + ...repo, + issue_number: prNumber, + }); + + const comment = comments.find((comment) => { + return ( + comment.user.login === "github-actions[bot]" && + comment.body.startsWith("![kics-logo](" + kicsLogo + ")\n") + ); + }); + + if (comment) { + await octokit.rest.issues.updateComment({ + ...repo, + comment_id: comment.id, + body: message + }); + } else { + await octokit.rest.issues.createComment({ + ...repo, + issue_number: prNumber, + body: message + }); + } +} + +module.exports = { + postPRComment +}; \ No newline at end of file diff --git a/src/install.js b/src/install.js new file mode 100644 index 0000000..de08661 --- /dev/null +++ b/src/install.js @@ -0,0 +1,128 @@ +const https = require('https') +const filepath = require('path'); +const tc = require('@actions/tool-cache'); +//const releaseDownloader = require('@fohlen/github-release-downloader'); +const os = require('os'); +//const decompress = require('decompress'); +//const decompressTargz = require('decompress-targz'); + +function getVersion(version) { + let path = '' + if (version == "latest") { + path = '/repos/checkmarx/kics/releases/latest' + } else { + path = '/repos/checkmarx/kics/releases/tags/' + version + } + const options = { + hostname: 'api.github.com', + port: 443, + path: path, + headers: { + 'User-Agent': 'node.js' + }, + method: 'GET' + } + return new Promise((resolve, reject) => { + const req = https.get(options, (resp) => { + console.log(`${options.method} https://${options.hostname}${options.path} ${resp.statusCode}`) + let rawData = ''; + resp.on('data', (d) => { + rawData += d; + }); + resp.on('end', () => { + try { + const parsedData = JSON.parse(rawData); + resolve(parsedData); + } catch (e) { + reject(e); + } + }); + }) + + req.on('error', (error) => { + reject(error); + }) + }) +} + +function getReleaseInfo(release) { + const assets = release.assets || []; + const os = process.platform; + const arch = process.arch; + let targetAsset; + switch (os) { + case 'darwin': + targetAsset = assets.filter((asset) => asset.name.indexOf('darwin') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + case 'linux': + targetAsset = assets.filter((asset) => asset.name.indexOf('linux') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + case 'win32': + targetAsset = assets.filter((asset) => asset.name.indexOf('windows') !== -1 && asset.name.indexOf(arch) !== -1)[0]; + break; + default: + targetAsset = { size: 0, browser_download_url: '' }; + } + return { size: targetAsset.size, browser_download_url: targetAsset.browser_download_url, version: targetAsset.name }; +} + +// async function downloadReleaseFile(releaseAsset) { +// const dest = os.homedir(); +// const releaseURL = releaseAsset.browser_download_url; + +// console.log("Downloading", releaseURL); +// const baseName = releaseURL.substr(releaseURL.lastIndexOf("/") + 1); +// return releaseDownloader.downloadAsset(releaseURL, baseName, dest, () => { +// process.stdout.write("."); +// }); +// } + +// function decompressRelease(path) { +// const dest = os.homedir(); +// return decompress(path, filepath.join(dest, 'kics'), { +// plugins: [ +// decompressTargz() +// ] +// }); +// } + +// function getExecutableName() { +// const os = process.platform; +// switch (os) { +// case 'darwin': +// case 'linux': +// return 'kics'; +// case 'win32': +// return 'kics.exe'; +// default: +// return 'kics'; +// } +// } + +async function installKICS(kicsVersion) { + let release = {}; + if (!kicsVersion || kicsVersion == "latest") { + release = await getVersion("latest"); + } else { + release = await getVersion(kicsVersion); + } + const releaseInfo = getReleaseInfo(release) + + const kicsDownloadPath = await tc.downloadTool(releaseInfo.browser_download_url); + const kicsExtractedFolder = await tc.extractTar(kicsDownloadPath, filepath.join(os.homedir(), 'kics', releaseInfo.version)); + const cachedPath = await tc.cacheDir(kicsExtractedFolder, 'kics', releaseInfo.version); + core.addPath(cachedPath); + + // const releasePath = await downloadReleaseFile(releaseAsset, "./") + // console.log('\nDownloaded KICS release', releasePath); + // const files = await decompressRelease(releasePath); + // console.log('\nDecompressed KICS release', files.map(f => f.path)); + + // const kicsPath = filepath.join(os.homedir(), 'kics', getExecutableName()); + // console.log('\nInstalling KICS to', kicsPath); + return kicsPath; +} + +module.exports = { + installKICS +} \ No newline at end of file diff --git a/src/main.js b/src/main.js new file mode 100644 index 0000000..4c7f419 --- /dev/null +++ b/src/main.js @@ -0,0 +1,29 @@ +const install = require("./install"); +const commenter = require("./commenter"); +const scanner = require("./scanner"); +const core = require("@actions/core"); + +const actionInputs = { + kics_version: { value: core.getInput('kics_version') }, + enable_pr_comments: { value: core.getInput('enable_pr_comments') }, +} + +async function main() { + console.log("Running KICS action..."); + try { + // const context = github.context; + // const repository = context.repo; + // const pullRequestNumber = context.payload.pull_request.number; + const kicsPath = await install.installKICS(actionInputs.kics_version.value); + console.log("KICS installed at: " + kicsPath); + //await scanner.scanWithKICS(kicsPath); + // if (actionInputs.enable_pr_comments.value === "true") { + // await commenter.commentOnPullRequest(repository, pullRequestNumber); + // } + } catch (e) { + console.error(e); + core.setFailed(e.message); + } +} + +main(); \ No newline at end of file diff --git a/src/scanner.js b/src/scanner.js new file mode 100644 index 0000000..3eac527 --- /dev/null +++ b/src/scanner.js @@ -0,0 +1,38 @@ +const exec = require('@actions/exec'); + +const core = require("@actions/core"); + +const kicsInputs = { + path: { flag: '--path', value: core.getInput('path') }, + ignore_on_exit: { flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, + fail_on: { flag: '--fail-on', value: core.getInput('fail_on') }, + timeout: { flag: '--timeout', value: core.getInput('timeout') }, + profiling: { flag: '--profiling', value: core.getInput('profiling') }, + config_path: { flag: '--config', value: core.getInput('config_path') }, + payload_path: { flag: '--payload-path', value: core.getInput('payload_path') }, + exclude_paths: { flag: '--exclude-paths', value: core.getInput('exclude_paths') }, + exclude_queries: { flag: '--exclude-queries', value: core.getInput('exclude_queries') }, + exclude_categories: { flag: '--exclude-categories', value: core.getInput('exclude_categories') }, + exclude_results: { flag: '--exclude-results', value: core.getInput('exclude_results') }, + output_formats: { flag: '--report-formats', value: core.getInput('output_formats') }, + output_path: { flag: '--output-path', value: core.getInput('output_path') }, + queries: { flag: '--queries-path', value: core.getInput('queries') }, + verbose: { flag: '--verbose', value: core.getInput('verbose') }, + secrets_regexes_path: { flag: '--secrets-regexes-path', value: core.getInput('secrets_regexes_path') }, + libraries_path: { flag: '--libraries-path', value: core.getInput('libraries-path') }, + disable_secrets: { flag: '--disable-secrets', value: core.getInput('disable_secrets') }, + disable_full_descriptions: { flag: '--disable-full-descriptions', value: core.getInput('disable_full_descriptions') }, + types: { flag: '--types', value: core.getInput('types') }, + bom: { flag: '--bom', value: core.getInput('bom') }, +}; + +async function scanWithKICS(kicsPath) { + let statusCode = 0; + if (kicsInputs.config_path.value) { + statusCode = await exec.exec(`${kicsPath} scan ${kicsInputs.config_path.flag} ${kicsInputs.config_path.value}`); + } +} + +module.exports = { + scanWithKICS +}; \ No newline at end of file From 85361e63facc8a5170fb5bf02ee97baa863393de Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Fri, 15 Oct 2021 18:36:36 +0100 Subject: [PATCH 02/18] feat: progress on javascript action --- .../{test-action.yaml => test_action.yaml} | 5 +- action.yml | 4 +- dist/index.js | 7149 ++++++++++++++++- src/install.js | 67 +- src/main.js | 22 +- src/scanner.js | 80 +- 6 files changed, 7038 insertions(+), 289 deletions(-) rename .github/workflows/{test-action.yaml => test_action.yaml} (70%) diff --git a/.github/workflows/test-action.yaml b/.github/workflows/test_action.yaml similarity index 70% rename from .github/workflows/test-action.yaml rename to .github/workflows/test_action.yaml index c4fb64d..b037c5b 100644 --- a/.github/workflows/test-action.yaml +++ b/.github/workflows/test_action.yaml @@ -1,4 +1,4 @@ -name: Test +name: Test KICS action on: pull_request: @@ -9,6 +9,7 @@ jobs: runs-on: ubuntu-latest steps: - uses: actions/checkout@v2 - - uses: ./ + - name: Test KICS action + uses: ./ with: path: positive.tf diff --git a/action.yml b/action.yml index e952ee6..7552adc 100644 --- a/action.yml +++ b/action.yml @@ -6,10 +6,10 @@ inputs: required: false default: "latest" description: "KICS version to use (defaults to latest)" - enable_pr_comments: + enable_comments: required: false default: false - description: "Enable PR comments" + description: "Enable pull request reprot comments" path: description: "paths to a file or directories to scan, accepts a comma separated list" required: true diff --git a/dist/index.js b/dist/index.js index 437bb63..31e1a24 100644 --- a/dist/index.js +++ b/dist/index.js @@ -1,7 +1,7 @@ /******/ (() => { // webpackBootstrap /******/ var __webpack_modules__ = ({ -/***/ 351: +/***/ 7351: /***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { "use strict"; @@ -27,8 +27,8 @@ var __importStar = (this && this.__importStar) || function (mod) { }; Object.defineProperty(exports, "__esModule", ({ value: true })); exports.issue = exports.issueCommand = void 0; -const os = __importStar(__nccwpck_require__(87)); -const utils_1 = __nccwpck_require__(278); +const os = __importStar(__nccwpck_require__(2087)); +const utils_1 = __nccwpck_require__(5278); /** * Commands * @@ -100,7 +100,7 @@ function escapeProperty(s) { /***/ }), -/***/ 186: +/***/ 2186: /***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { "use strict"; @@ -135,12 +135,12 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge }; Object.defineProperty(exports, "__esModule", ({ value: true })); exports.getIDToken = exports.getState = exports.saveState = exports.group = exports.endGroup = exports.startGroup = exports.info = exports.notice = exports.warning = exports.error = exports.debug = exports.isDebug = exports.setFailed = exports.setCommandEcho = exports.setOutput = exports.getBooleanInput = exports.getMultilineInput = exports.getInput = exports.addPath = exports.setSecret = exports.exportVariable = exports.ExitCode = void 0; -const command_1 = __nccwpck_require__(351); +const command_1 = __nccwpck_require__(7351); const file_command_1 = __nccwpck_require__(717); -const utils_1 = __nccwpck_require__(278); -const os = __importStar(__nccwpck_require__(87)); -const path = __importStar(__nccwpck_require__(622)); -const oidc_utils_1 = __nccwpck_require__(41); +const utils_1 = __nccwpck_require__(5278); +const os = __importStar(__nccwpck_require__(2087)); +const path = __importStar(__nccwpck_require__(5622)); +const oidc_utils_1 = __nccwpck_require__(8041); /** * The code to exit an action */ @@ -448,9 +448,9 @@ Object.defineProperty(exports, "__esModule", ({ value: true })); exports.issueCommand = void 0; // We use any as a valid input type /* eslint-disable @typescript-eslint/no-explicit-any */ -const fs = __importStar(__nccwpck_require__(747)); -const os = __importStar(__nccwpck_require__(87)); -const utils_1 = __nccwpck_require__(278); +const fs = __importStar(__nccwpck_require__(5747)); +const os = __importStar(__nccwpck_require__(2087)); +const utils_1 = __nccwpck_require__(5278); function issueCommand(command, message) { const filePath = process.env[`GITHUB_${command}`]; if (!filePath) { @@ -468,7 +468,7 @@ exports.issueCommand = issueCommand; /***/ }), -/***/ 41: +/***/ 8041: /***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { "use strict"; @@ -484,9 +484,9 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge }; Object.defineProperty(exports, "__esModule", ({ value: true })); exports.OidcClient = void 0; -const http_client_1 = __nccwpck_require__(925); -const auth_1 = __nccwpck_require__(702); -const core_1 = __nccwpck_require__(186); +const http_client_1 = __nccwpck_require__(9925); +const auth_1 = __nccwpck_require__(3702); +const core_1 = __nccwpck_require__(2186); class OidcClient { static createHttpClient(allowRetry = true, maxRetry = 10) { const requestOptions = { @@ -552,7 +552,7 @@ exports.OidcClient = OidcClient; /***/ }), -/***/ 278: +/***/ 5278: /***/ ((__unused_webpack_module, exports) => { "use strict"; @@ -599,7 +599,7 @@ exports.toCommandProperties = toCommandProperties; /***/ }), -/***/ 514: +/***/ 1514: /***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { "use strict"; @@ -634,8 +634,8 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge }; Object.defineProperty(exports, "__esModule", ({ value: true })); exports.getExecOutput = exports.exec = void 0; -const string_decoder_1 = __nccwpck_require__(304); -const tr = __importStar(__nccwpck_require__(159)); +const string_decoder_1 = __nccwpck_require__(4304); +const tr = __importStar(__nccwpck_require__(8159)); /** * Exec a command. * Output will be streamed to the live console. @@ -709,7 +709,7 @@ exports.getExecOutput = getExecOutput; /***/ }), -/***/ 159: +/***/ 8159: /***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { "use strict"; @@ -744,13 +744,13 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge }; Object.defineProperty(exports, "__esModule", ({ value: true })); exports.argStringToArray = exports.ToolRunner = void 0; -const os = __importStar(__nccwpck_require__(87)); -const events = __importStar(__nccwpck_require__(614)); -const child = __importStar(__nccwpck_require__(129)); -const path = __importStar(__nccwpck_require__(622)); -const io = __importStar(__nccwpck_require__(436)); -const ioUtil = __importStar(__nccwpck_require__(962)); -const timers_1 = __nccwpck_require__(213); +const os = __importStar(__nccwpck_require__(2087)); +const events = __importStar(__nccwpck_require__(8614)); +const child = __importStar(__nccwpck_require__(3129)); +const path = __importStar(__nccwpck_require__(5622)); +const io = __importStar(__nccwpck_require__(7436)); +const ioUtil = __importStar(__nccwpck_require__(1962)); +const timers_1 = __nccwpck_require__(8213); /* eslint-disable @typescript-eslint/unbound-method */ const IS_WINDOWS = process.platform === 'win32'; /* @@ -1334,7 +1334,222 @@ class ExecState extends events.EventEmitter { /***/ }), -/***/ 702: +/***/ 4087: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.Context = void 0; +const fs_1 = __nccwpck_require__(5747); +const os_1 = __nccwpck_require__(2087); +class Context { + /** + * Hydrate the context from the environment + */ + constructor() { + var _a, _b, _c; + this.payload = {}; + if (process.env.GITHUB_EVENT_PATH) { + if (fs_1.existsSync(process.env.GITHUB_EVENT_PATH)) { + this.payload = JSON.parse(fs_1.readFileSync(process.env.GITHUB_EVENT_PATH, { encoding: 'utf8' })); + } + else { + const path = process.env.GITHUB_EVENT_PATH; + process.stdout.write(`GITHUB_EVENT_PATH ${path} does not exist${os_1.EOL}`); + } + } + this.eventName = process.env.GITHUB_EVENT_NAME; + this.sha = process.env.GITHUB_SHA; + this.ref = process.env.GITHUB_REF; + this.workflow = process.env.GITHUB_WORKFLOW; + this.action = process.env.GITHUB_ACTION; + this.actor = process.env.GITHUB_ACTOR; + this.job = process.env.GITHUB_JOB; + this.runNumber = parseInt(process.env.GITHUB_RUN_NUMBER, 10); + this.runId = parseInt(process.env.GITHUB_RUN_ID, 10); + this.apiUrl = (_a = process.env.GITHUB_API_URL) !== null && _a !== void 0 ? _a : `https://api.github.com`; + this.serverUrl = (_b = process.env.GITHUB_SERVER_URL) !== null && _b !== void 0 ? _b : `https://github.com`; + this.graphqlUrl = (_c = process.env.GITHUB_GRAPHQL_URL) !== null && _c !== void 0 ? _c : `https://api.github.com/graphql`; + } + get issue() { + const payload = this.payload; + return Object.assign(Object.assign({}, this.repo), { number: (payload.issue || payload.pull_request || payload).number }); + } + get repo() { + if (process.env.GITHUB_REPOSITORY) { + const [owner, repo] = process.env.GITHUB_REPOSITORY.split('/'); + return { owner, repo }; + } + if (this.payload.repository) { + return { + owner: this.payload.repository.owner.login, + repo: this.payload.repository.name + }; + } + throw new Error("context.repo requires a GITHUB_REPOSITORY environment variable like 'owner/repo'"); + } +} +exports.Context = Context; +//# sourceMappingURL=context.js.map + +/***/ }), + +/***/ 5438: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.getOctokit = exports.context = void 0; +const Context = __importStar(__nccwpck_require__(4087)); +const utils_1 = __nccwpck_require__(3030); +exports.context = new Context.Context(); +/** + * Returns a hydrated octokit ready to use for GitHub Actions + * + * @param token the repo PAT or GITHUB_TOKEN + * @param options other options to set + */ +function getOctokit(token, options) { + return new utils_1.GitHub(utils_1.getOctokitOptions(token, options)); +} +exports.getOctokit = getOctokit; +//# sourceMappingURL=github.js.map + +/***/ }), + +/***/ 7914: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.getApiBaseUrl = exports.getProxyAgent = exports.getAuthString = void 0; +const httpClient = __importStar(__nccwpck_require__(9925)); +function getAuthString(token, options) { + if (!token && !options.auth) { + throw new Error('Parameter token or opts.auth is required'); + } + else if (token && options.auth) { + throw new Error('Parameters token and opts.auth may not both be specified'); + } + return typeof options.auth === 'string' ? options.auth : `token ${token}`; +} +exports.getAuthString = getAuthString; +function getProxyAgent(destinationUrl) { + const hc = new httpClient.HttpClient(); + return hc.getAgent(destinationUrl); +} +exports.getProxyAgent = getProxyAgent; +function getApiBaseUrl() { + return process.env['GITHUB_API_URL'] || 'https://api.github.com'; +} +exports.getApiBaseUrl = getApiBaseUrl; +//# sourceMappingURL=utils.js.map + +/***/ }), + +/***/ 3030: +/***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { + +"use strict"; + +var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } }); +}) : (function(o, m, k, k2) { + if (k2 === undefined) k2 = k; + o[k2] = m[k]; +})); +var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { + Object.defineProperty(o, "default", { enumerable: true, value: v }); +}) : function(o, v) { + o["default"] = v; +}); +var __importStar = (this && this.__importStar) || function (mod) { + if (mod && mod.__esModule) return mod; + var result = {}; + if (mod != null) for (var k in mod) if (k !== "default" && Object.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); + __setModuleDefault(result, mod); + return result; +}; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.getOctokitOptions = exports.GitHub = exports.context = void 0; +const Context = __importStar(__nccwpck_require__(4087)); +const Utils = __importStar(__nccwpck_require__(7914)); +// octokit + plugins +const core_1 = __nccwpck_require__(6762); +const plugin_rest_endpoint_methods_1 = __nccwpck_require__(3044); +const plugin_paginate_rest_1 = __nccwpck_require__(4193); +exports.context = new Context.Context(); +const baseUrl = Utils.getApiBaseUrl(); +const defaults = { + baseUrl, + request: { + agent: Utils.getProxyAgent(baseUrl) + } +}; +exports.GitHub = core_1.Octokit.plugin(plugin_rest_endpoint_methods_1.restEndpointMethods, plugin_paginate_rest_1.paginateRest).defaults(defaults); +/** + * Convience function to correctly format Octokit Options to pass into the constructor. + * + * @param token the repo PAT or GITHUB_TOKEN + * @param options other options to set + */ +function getOctokitOptions(token, options) { + const opts = Object.assign({}, options || {}); // Shallow clone - don't mutate the object provided by the caller + // Auth + const auth = Utils.getAuthString(token, opts); + if (auth) { + opts.auth = auth; + } + return opts; +} +exports.getOctokitOptions = getOctokitOptions; +//# sourceMappingURL=utils.js.map + +/***/ }), + +/***/ 3702: /***/ ((__unused_webpack_module, exports) => { "use strict"; @@ -1400,15 +1615,15 @@ exports.PersonalAccessTokenCredentialHandler = PersonalAccessTokenCredentialHand /***/ }), -/***/ 925: +/***/ 9925: /***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { "use strict"; Object.defineProperty(exports, "__esModule", ({ value: true })); -const http = __nccwpck_require__(605); -const https = __nccwpck_require__(211); -const pm = __nccwpck_require__(443); +const http = __nccwpck_require__(8605); +const https = __nccwpck_require__(7211); +const pm = __nccwpck_require__(6443); let tunnel; var HttpCodes; (function (HttpCodes) { @@ -1827,7 +2042,7 @@ class HttpClient { if (useProxy) { // If using proxy, need tunnel if (!tunnel) { - tunnel = __nccwpck_require__(294); + tunnel = __nccwpck_require__(4294); } const agentOptions = { maxSockets: maxSockets, @@ -1945,7 +2160,7 @@ exports.HttpClient = HttpClient; /***/ }), -/***/ 443: +/***/ 6443: /***/ ((__unused_webpack_module, exports) => { "use strict"; @@ -2010,7 +2225,7 @@ exports.checkBypass = checkBypass; /***/ }), -/***/ 962: +/***/ 1962: /***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { "use strict"; @@ -2046,8 +2261,8 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge var _a; Object.defineProperty(exports, "__esModule", ({ value: true })); exports.getCmdPath = exports.tryGetExecutablePath = exports.isRooted = exports.isDirectory = exports.exists = exports.IS_WINDOWS = exports.unlink = exports.symlink = exports.stat = exports.rmdir = exports.rename = exports.readlink = exports.readdir = exports.mkdir = exports.lstat = exports.copyFile = exports.chmod = void 0; -const fs = __importStar(__nccwpck_require__(747)); -const path = __importStar(__nccwpck_require__(622)); +const fs = __importStar(__nccwpck_require__(5747)); +const path = __importStar(__nccwpck_require__(5622)); _a = fs.promises, exports.chmod = _a.chmod, exports.copyFile = _a.copyFile, exports.lstat = _a.lstat, exports.mkdir = _a.mkdir, exports.readdir = _a.readdir, exports.readlink = _a.readlink, exports.rename = _a.rename, exports.rmdir = _a.rmdir, exports.stat = _a.stat, exports.symlink = _a.symlink, exports.unlink = _a.unlink; exports.IS_WINDOWS = process.platform === 'win32'; function exists(fsPath) { @@ -2194,7 +2409,7 @@ exports.getCmdPath = getCmdPath; /***/ }), -/***/ 436: +/***/ 7436: /***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { "use strict"; @@ -2229,11 +2444,11 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge }; Object.defineProperty(exports, "__esModule", ({ value: true })); exports.findInPath = exports.which = exports.mkdirP = exports.rmRF = exports.mv = exports.cp = void 0; -const assert_1 = __nccwpck_require__(357); -const childProcess = __importStar(__nccwpck_require__(129)); -const path = __importStar(__nccwpck_require__(622)); -const util_1 = __nccwpck_require__(669); -const ioUtil = __importStar(__nccwpck_require__(962)); +const assert_1 = __nccwpck_require__(2357); +const childProcess = __importStar(__nccwpck_require__(3129)); +const path = __importStar(__nccwpck_require__(5622)); +const util_1 = __nccwpck_require__(1669); +const ioUtil = __importStar(__nccwpck_require__(1962)); const exec = util_1.promisify(childProcess.exec); const execFile = util_1.promisify(childProcess.execFile); /** @@ -2542,7 +2757,7 @@ function copyFile(srcFile, destFile, force) { /***/ }), -/***/ 473: +/***/ 2473: /***/ (function(module, exports, __nccwpck_require__) { "use strict"; @@ -2578,12 +2793,12 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge Object.defineProperty(exports, "__esModule", ({ value: true })); exports._readLinuxVersionFile = exports._getOsVersion = exports._findMatch = void 0; const semver = __importStar(__nccwpck_require__(562)); -const core_1 = __nccwpck_require__(186); +const core_1 = __nccwpck_require__(2186); // needs to be require for core node modules to be mocked /* eslint @typescript-eslint/no-require-imports: 0 */ -const os = __nccwpck_require__(87); -const cp = __nccwpck_require__(129); -const fs = __nccwpck_require__(747); +const os = __nccwpck_require__(2087); +const cp = __nccwpck_require__(3129); +const fs = __nccwpck_require__(5747); function _findMatch(versionSpec, stable, candidates, archFilter) { return __awaiter(this, void 0, void 0, function* () { const platFilter = os.platform(); @@ -2677,7 +2892,7 @@ exports._readLinuxVersionFile = _readLinuxVersionFile; /***/ }), -/***/ 279: +/***/ 8279: /***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { "use strict"; @@ -2712,7 +2927,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge }; Object.defineProperty(exports, "__esModule", ({ value: true })); exports.RetryHelper = void 0; -const core = __importStar(__nccwpck_require__(186)); +const core = __importStar(__nccwpck_require__(2186)); /** * Internal class for retries */ @@ -2767,7 +2982,7 @@ exports.RetryHelper = RetryHelper; /***/ }), -/***/ 784: +/***/ 7784: /***/ (function(__unused_webpack_module, exports, __nccwpck_require__) { "use strict"; @@ -2805,20 +3020,20 @@ var __importDefault = (this && this.__importDefault) || function (mod) { }; Object.defineProperty(exports, "__esModule", ({ value: true })); exports.evaluateVersions = exports.isExplicitVersion = exports.findFromManifest = exports.getManifestFromRepo = exports.findAllVersions = exports.find = exports.cacheFile = exports.cacheDir = exports.extractZip = exports.extractXar = exports.extractTar = exports.extract7z = exports.downloadTool = exports.HTTPError = void 0; -const core = __importStar(__nccwpck_require__(186)); -const io = __importStar(__nccwpck_require__(436)); -const fs = __importStar(__nccwpck_require__(747)); -const mm = __importStar(__nccwpck_require__(473)); -const os = __importStar(__nccwpck_require__(87)); -const path = __importStar(__nccwpck_require__(622)); -const httpm = __importStar(__nccwpck_require__(925)); +const core = __importStar(__nccwpck_require__(2186)); +const io = __importStar(__nccwpck_require__(7436)); +const fs = __importStar(__nccwpck_require__(5747)); +const mm = __importStar(__nccwpck_require__(2473)); +const os = __importStar(__nccwpck_require__(2087)); +const path = __importStar(__nccwpck_require__(5622)); +const httpm = __importStar(__nccwpck_require__(9925)); const semver = __importStar(__nccwpck_require__(562)); -const stream = __importStar(__nccwpck_require__(413)); -const util = __importStar(__nccwpck_require__(669)); +const stream = __importStar(__nccwpck_require__(2413)); +const util = __importStar(__nccwpck_require__(1669)); const v4_1 = __importDefault(__nccwpck_require__(824)); -const exec_1 = __nccwpck_require__(514); -const assert_1 = __nccwpck_require__(357); -const retry_helper_1 = __nccwpck_require__(279); +const exec_1 = __nccwpck_require__(1514); +const assert_1 = __nccwpck_require__(2357); +const retry_helper_1 = __nccwpck_require__(8279); class HTTPError extends Error { constructor(httpStatusCode) { super(`Unexpected HTTP response: ${httpStatusCode}`); @@ -5042,7 +5257,2554 @@ function coerce (version, options) { /***/ }), -/***/ 623: +/***/ 334: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +const REGEX_IS_INSTALLATION_LEGACY = /^v1\./; +const REGEX_IS_INSTALLATION = /^ghs_/; +const REGEX_IS_USER_TO_SERVER = /^ghu_/; +async function auth(token) { + const isApp = token.split(/\./).length === 3; + const isInstallation = REGEX_IS_INSTALLATION_LEGACY.test(token) || REGEX_IS_INSTALLATION.test(token); + const isUserToServer = REGEX_IS_USER_TO_SERVER.test(token); + const tokenType = isApp ? "app" : isInstallation ? "installation" : isUserToServer ? "user-to-server" : "oauth"; + return { + type: "token", + token: token, + tokenType + }; +} + +/** + * Prefix token for usage in the Authorization header + * + * @param token OAuth token or JSON Web Token + */ +function withAuthorizationPrefix(token) { + if (token.split(/\./).length === 3) { + return `bearer ${token}`; + } + + return `token ${token}`; +} + +async function hook(token, request, route, parameters) { + const endpoint = request.endpoint.merge(route, parameters); + endpoint.headers.authorization = withAuthorizationPrefix(token); + return request(endpoint); +} + +const createTokenAuth = function createTokenAuth(token) { + if (!token) { + throw new Error("[@octokit/auth-token] No token passed to createTokenAuth"); + } + + if (typeof token !== "string") { + throw new Error("[@octokit/auth-token] Token passed to createTokenAuth is not a string"); + } + + token = token.replace(/^(token|bearer) +/i, ""); + return Object.assign(auth.bind(null, token), { + hook: hook.bind(null, token) + }); +}; + +exports.createTokenAuth = createTokenAuth; +//# sourceMappingURL=index.js.map + + +/***/ }), + +/***/ 6762: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +var universalUserAgent = __nccwpck_require__(5030); +var beforeAfterHook = __nccwpck_require__(3682); +var request = __nccwpck_require__(6234); +var graphql = __nccwpck_require__(8467); +var authToken = __nccwpck_require__(334); + +function _objectWithoutPropertiesLoose(source, excluded) { + if (source == null) return {}; + var target = {}; + var sourceKeys = Object.keys(source); + var key, i; + + for (i = 0; i < sourceKeys.length; i++) { + key = sourceKeys[i]; + if (excluded.indexOf(key) >= 0) continue; + target[key] = source[key]; + } + + return target; +} + +function _objectWithoutProperties(source, excluded) { + if (source == null) return {}; + + var target = _objectWithoutPropertiesLoose(source, excluded); + + var key, i; + + if (Object.getOwnPropertySymbols) { + var sourceSymbolKeys = Object.getOwnPropertySymbols(source); + + for (i = 0; i < sourceSymbolKeys.length; i++) { + key = sourceSymbolKeys[i]; + if (excluded.indexOf(key) >= 0) continue; + if (!Object.prototype.propertyIsEnumerable.call(source, key)) continue; + target[key] = source[key]; + } + } + + return target; +} + +const VERSION = "3.5.1"; + +const _excluded = ["authStrategy"]; +class Octokit { + constructor(options = {}) { + const hook = new beforeAfterHook.Collection(); + const requestDefaults = { + baseUrl: request.request.endpoint.DEFAULTS.baseUrl, + headers: {}, + request: Object.assign({}, options.request, { + // @ts-ignore internal usage only, no need to type + hook: hook.bind(null, "request") + }), + mediaType: { + previews: [], + format: "" + } + }; // prepend default user agent with `options.userAgent` if set + + requestDefaults.headers["user-agent"] = [options.userAgent, `octokit-core.js/${VERSION} ${universalUserAgent.getUserAgent()}`].filter(Boolean).join(" "); + + if (options.baseUrl) { + requestDefaults.baseUrl = options.baseUrl; + } + + if (options.previews) { + requestDefaults.mediaType.previews = options.previews; + } + + if (options.timeZone) { + requestDefaults.headers["time-zone"] = options.timeZone; + } + + this.request = request.request.defaults(requestDefaults); + this.graphql = graphql.withCustomRequest(this.request).defaults(requestDefaults); + this.log = Object.assign({ + debug: () => {}, + info: () => {}, + warn: console.warn.bind(console), + error: console.error.bind(console) + }, options.log); + this.hook = hook; // (1) If neither `options.authStrategy` nor `options.auth` are set, the `octokit` instance + // is unauthenticated. The `this.auth()` method is a no-op and no request hook is registered. + // (2) If only `options.auth` is set, use the default token authentication strategy. + // (3) If `options.authStrategy` is set then use it and pass in `options.auth`. Always pass own request as many strategies accept a custom request instance. + // TODO: type `options.auth` based on `options.authStrategy`. + + if (!options.authStrategy) { + if (!options.auth) { + // (1) + this.auth = async () => ({ + type: "unauthenticated" + }); + } else { + // (2) + const auth = authToken.createTokenAuth(options.auth); // @ts-ignore ¯\_(ツ)_/¯ + + hook.wrap("request", auth.hook); + this.auth = auth; + } + } else { + const { + authStrategy + } = options, + otherOptions = _objectWithoutProperties(options, _excluded); + + const auth = authStrategy(Object.assign({ + request: this.request, + log: this.log, + // we pass the current octokit instance as well as its constructor options + // to allow for authentication strategies that return a new octokit instance + // that shares the same internal state as the current one. The original + // requirement for this was the "event-octokit" authentication strategy + // of https://github.com/probot/octokit-auth-probot. + octokit: this, + octokitOptions: otherOptions + }, options.auth)); // @ts-ignore ¯\_(ツ)_/¯ + + hook.wrap("request", auth.hook); + this.auth = auth; + } // apply plugins + // https://stackoverflow.com/a/16345172 + + + const classConstructor = this.constructor; + classConstructor.plugins.forEach(plugin => { + Object.assign(this, plugin(this, options)); + }); + } + + static defaults(defaults) { + const OctokitWithDefaults = class extends this { + constructor(...args) { + const options = args[0] || {}; + + if (typeof defaults === "function") { + super(defaults(options)); + return; + } + + super(Object.assign({}, defaults, options, options.userAgent && defaults.userAgent ? { + userAgent: `${options.userAgent} ${defaults.userAgent}` + } : null)); + } + + }; + return OctokitWithDefaults; + } + /** + * Attach a plugin (or many) to your Octokit instance. + * + * @example + * const API = Octokit.plugin(plugin1, plugin2, plugin3, ...) + */ + + + static plugin(...newPlugins) { + var _a; + + const currentPlugins = this.plugins; + const NewOctokit = (_a = class extends this {}, _a.plugins = currentPlugins.concat(newPlugins.filter(plugin => !currentPlugins.includes(plugin))), _a); + return NewOctokit; + } + +} +Octokit.VERSION = VERSION; +Octokit.plugins = []; + +exports.Octokit = Octokit; +//# sourceMappingURL=index.js.map + + +/***/ }), + +/***/ 9440: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +var isPlainObject = __nccwpck_require__(3287); +var universalUserAgent = __nccwpck_require__(5030); + +function lowercaseKeys(object) { + if (!object) { + return {}; + } + + return Object.keys(object).reduce((newObj, key) => { + newObj[key.toLowerCase()] = object[key]; + return newObj; + }, {}); +} + +function mergeDeep(defaults, options) { + const result = Object.assign({}, defaults); + Object.keys(options).forEach(key => { + if (isPlainObject.isPlainObject(options[key])) { + if (!(key in defaults)) Object.assign(result, { + [key]: options[key] + });else result[key] = mergeDeep(defaults[key], options[key]); + } else { + Object.assign(result, { + [key]: options[key] + }); + } + }); + return result; +} + +function removeUndefinedProperties(obj) { + for (const key in obj) { + if (obj[key] === undefined) { + delete obj[key]; + } + } + + return obj; +} + +function merge(defaults, route, options) { + if (typeof route === "string") { + let [method, url] = route.split(" "); + options = Object.assign(url ? { + method, + url + } : { + url: method + }, options); + } else { + options = Object.assign({}, route); + } // lowercase header names before merging with defaults to avoid duplicates + + + options.headers = lowercaseKeys(options.headers); // remove properties with undefined values before merging + + removeUndefinedProperties(options); + removeUndefinedProperties(options.headers); + const mergedOptions = mergeDeep(defaults || {}, options); // mediaType.previews arrays are merged, instead of overwritten + + if (defaults && defaults.mediaType.previews.length) { + mergedOptions.mediaType.previews = defaults.mediaType.previews.filter(preview => !mergedOptions.mediaType.previews.includes(preview)).concat(mergedOptions.mediaType.previews); + } + + mergedOptions.mediaType.previews = mergedOptions.mediaType.previews.map(preview => preview.replace(/-preview/, "")); + return mergedOptions; +} + +function addQueryParameters(url, parameters) { + const separator = /\?/.test(url) ? "&" : "?"; + const names = Object.keys(parameters); + + if (names.length === 0) { + return url; + } + + return url + separator + names.map(name => { + if (name === "q") { + return "q=" + parameters.q.split("+").map(encodeURIComponent).join("+"); + } + + return `${name}=${encodeURIComponent(parameters[name])}`; + }).join("&"); +} + +const urlVariableRegex = /\{[^}]+\}/g; + +function removeNonChars(variableName) { + return variableName.replace(/^\W+|\W+$/g, "").split(/,/); +} + +function extractUrlVariableNames(url) { + const matches = url.match(urlVariableRegex); + + if (!matches) { + return []; + } + + return matches.map(removeNonChars).reduce((a, b) => a.concat(b), []); +} + +function omit(object, keysToOmit) { + return Object.keys(object).filter(option => !keysToOmit.includes(option)).reduce((obj, key) => { + obj[key] = object[key]; + return obj; + }, {}); +} + +// Based on https://github.com/bramstein/url-template, licensed under BSD +// TODO: create separate package. +// +// Copyright (c) 2012-2014, Bram Stein +// All rights reserved. +// Redistribution and use in source and binary forms, with or without +// modification, are permitted provided that the following conditions +// are met: +// 1. Redistributions of source code must retain the above copyright +// notice, this list of conditions and the following disclaimer. +// 2. Redistributions in binary form must reproduce the above copyright +// notice, this list of conditions and the following disclaimer in the +// documentation and/or other materials provided with the distribution. +// 3. The name of the author may not be used to endorse or promote products +// derived from this software without specific prior written permission. +// THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED +// WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO +// EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, +// INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, +// BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY +// OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +// NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, +// EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +/* istanbul ignore file */ +function encodeReserved(str) { + return str.split(/(%[0-9A-Fa-f]{2})/g).map(function (part) { + if (!/%[0-9A-Fa-f]/.test(part)) { + part = encodeURI(part).replace(/%5B/g, "[").replace(/%5D/g, "]"); + } + + return part; + }).join(""); +} + +function encodeUnreserved(str) { + return encodeURIComponent(str).replace(/[!'()*]/g, function (c) { + return "%" + c.charCodeAt(0).toString(16).toUpperCase(); + }); +} + +function encodeValue(operator, value, key) { + value = operator === "+" || operator === "#" ? encodeReserved(value) : encodeUnreserved(value); + + if (key) { + return encodeUnreserved(key) + "=" + value; + } else { + return value; + } +} + +function isDefined(value) { + return value !== undefined && value !== null; +} + +function isKeyOperator(operator) { + return operator === ";" || operator === "&" || operator === "?"; +} + +function getValues(context, operator, key, modifier) { + var value = context[key], + result = []; + + if (isDefined(value) && value !== "") { + if (typeof value === "string" || typeof value === "number" || typeof value === "boolean") { + value = value.toString(); + + if (modifier && modifier !== "*") { + value = value.substring(0, parseInt(modifier, 10)); + } + + result.push(encodeValue(operator, value, isKeyOperator(operator) ? key : "")); + } else { + if (modifier === "*") { + if (Array.isArray(value)) { + value.filter(isDefined).forEach(function (value) { + result.push(encodeValue(operator, value, isKeyOperator(operator) ? key : "")); + }); + } else { + Object.keys(value).forEach(function (k) { + if (isDefined(value[k])) { + result.push(encodeValue(operator, value[k], k)); + } + }); + } + } else { + const tmp = []; + + if (Array.isArray(value)) { + value.filter(isDefined).forEach(function (value) { + tmp.push(encodeValue(operator, value)); + }); + } else { + Object.keys(value).forEach(function (k) { + if (isDefined(value[k])) { + tmp.push(encodeUnreserved(k)); + tmp.push(encodeValue(operator, value[k].toString())); + } + }); + } + + if (isKeyOperator(operator)) { + result.push(encodeUnreserved(key) + "=" + tmp.join(",")); + } else if (tmp.length !== 0) { + result.push(tmp.join(",")); + } + } + } + } else { + if (operator === ";") { + if (isDefined(value)) { + result.push(encodeUnreserved(key)); + } + } else if (value === "" && (operator === "&" || operator === "?")) { + result.push(encodeUnreserved(key) + "="); + } else if (value === "") { + result.push(""); + } + } + + return result; +} + +function parseUrl(template) { + return { + expand: expand.bind(null, template) + }; +} + +function expand(template, context) { + var operators = ["+", "#", ".", "/", ";", "?", "&"]; + return template.replace(/\{([^\{\}]+)\}|([^\{\}]+)/g, function (_, expression, literal) { + if (expression) { + let operator = ""; + const values = []; + + if (operators.indexOf(expression.charAt(0)) !== -1) { + operator = expression.charAt(0); + expression = expression.substr(1); + } + + expression.split(/,/g).forEach(function (variable) { + var tmp = /([^:\*]*)(?::(\d+)|(\*))?/.exec(variable); + values.push(getValues(context, operator, tmp[1], tmp[2] || tmp[3])); + }); + + if (operator && operator !== "+") { + var separator = ","; + + if (operator === "?") { + separator = "&"; + } else if (operator !== "#") { + separator = operator; + } + + return (values.length !== 0 ? operator : "") + values.join(separator); + } else { + return values.join(","); + } + } else { + return encodeReserved(literal); + } + }); +} + +function parse(options) { + // https://fetch.spec.whatwg.org/#methods + let method = options.method.toUpperCase(); // replace :varname with {varname} to make it RFC 6570 compatible + + let url = (options.url || "/").replace(/:([a-z]\w+)/g, "{$1}"); + let headers = Object.assign({}, options.headers); + let body; + let parameters = omit(options, ["method", "baseUrl", "url", "headers", "request", "mediaType"]); // extract variable names from URL to calculate remaining variables later + + const urlVariableNames = extractUrlVariableNames(url); + url = parseUrl(url).expand(parameters); + + if (!/^http/.test(url)) { + url = options.baseUrl + url; + } + + const omittedParameters = Object.keys(options).filter(option => urlVariableNames.includes(option)).concat("baseUrl"); + const remainingParameters = omit(parameters, omittedParameters); + const isBinaryRequest = /application\/octet-stream/i.test(headers.accept); + + if (!isBinaryRequest) { + if (options.mediaType.format) { + // e.g. application/vnd.github.v3+json => application/vnd.github.v3.raw + headers.accept = headers.accept.split(/,/).map(preview => preview.replace(/application\/vnd(\.\w+)(\.v3)?(\.\w+)?(\+json)?$/, `application/vnd$1$2.${options.mediaType.format}`)).join(","); + } + + if (options.mediaType.previews.length) { + const previewsFromAcceptHeader = headers.accept.match(/[\w-]+(?=-preview)/g) || []; + headers.accept = previewsFromAcceptHeader.concat(options.mediaType.previews).map(preview => { + const format = options.mediaType.format ? `.${options.mediaType.format}` : "+json"; + return `application/vnd.github.${preview}-preview${format}`; + }).join(","); + } + } // for GET/HEAD requests, set URL query parameters from remaining parameters + // for PATCH/POST/PUT/DELETE requests, set request body from remaining parameters + + + if (["GET", "HEAD"].includes(method)) { + url = addQueryParameters(url, remainingParameters); + } else { + if ("data" in remainingParameters) { + body = remainingParameters.data; + } else { + if (Object.keys(remainingParameters).length) { + body = remainingParameters; + } else { + headers["content-length"] = 0; + } + } + } // default content-type for JSON if body is set + + + if (!headers["content-type"] && typeof body !== "undefined") { + headers["content-type"] = "application/json; charset=utf-8"; + } // GitHub expects 'content-length: 0' header for PUT/PATCH requests without body. + // fetch does not allow to set `content-length` header, but we can set body to an empty string + + + if (["PATCH", "PUT"].includes(method) && typeof body === "undefined") { + body = ""; + } // Only return body/request keys if present + + + return Object.assign({ + method, + url, + headers + }, typeof body !== "undefined" ? { + body + } : null, options.request ? { + request: options.request + } : null); +} + +function endpointWithDefaults(defaults, route, options) { + return parse(merge(defaults, route, options)); +} + +function withDefaults(oldDefaults, newDefaults) { + const DEFAULTS = merge(oldDefaults, newDefaults); + const endpoint = endpointWithDefaults.bind(null, DEFAULTS); + return Object.assign(endpoint, { + DEFAULTS, + defaults: withDefaults.bind(null, DEFAULTS), + merge: merge.bind(null, DEFAULTS), + parse + }); +} + +const VERSION = "6.0.12"; + +const userAgent = `octokit-endpoint.js/${VERSION} ${universalUserAgent.getUserAgent()}`; // DEFAULTS has all properties set that EndpointOptions has, except url. +// So we use RequestParameters and add method as additional required property. + +const DEFAULTS = { + method: "GET", + baseUrl: "https://api.github.com", + headers: { + accept: "application/vnd.github.v3+json", + "user-agent": userAgent + }, + mediaType: { + format: "", + previews: [] + } +}; + +const endpoint = withDefaults(null, DEFAULTS); + +exports.endpoint = endpoint; +//# sourceMappingURL=index.js.map + + +/***/ }), + +/***/ 8467: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +var request = __nccwpck_require__(6234); +var universalUserAgent = __nccwpck_require__(5030); + +const VERSION = "4.8.0"; + +function _buildMessageForResponseErrors(data) { + return `Request failed due to following response errors:\n` + data.errors.map(e => ` - ${e.message}`).join("\n"); +} + +class GraphqlResponseError extends Error { + constructor(request, headers, response) { + super(_buildMessageForResponseErrors(response)); + this.request = request; + this.headers = headers; + this.response = response; + this.name = "GraphqlResponseError"; // Expose the errors and response data in their shorthand properties. + + this.errors = response.errors; + this.data = response.data; // Maintains proper stack trace (only available on V8) + + /* istanbul ignore next */ + + if (Error.captureStackTrace) { + Error.captureStackTrace(this, this.constructor); + } + } + +} + +const NON_VARIABLE_OPTIONS = ["method", "baseUrl", "url", "headers", "request", "query", "mediaType"]; +const FORBIDDEN_VARIABLE_OPTIONS = ["query", "method", "url"]; +const GHES_V3_SUFFIX_REGEX = /\/api\/v3\/?$/; +function graphql(request, query, options) { + if (options) { + if (typeof query === "string" && "query" in options) { + return Promise.reject(new Error(`[@octokit/graphql] "query" cannot be used as variable name`)); + } + + for (const key in options) { + if (!FORBIDDEN_VARIABLE_OPTIONS.includes(key)) continue; + return Promise.reject(new Error(`[@octokit/graphql] "${key}" cannot be used as variable name`)); + } + } + + const parsedOptions = typeof query === "string" ? Object.assign({ + query + }, options) : query; + const requestOptions = Object.keys(parsedOptions).reduce((result, key) => { + if (NON_VARIABLE_OPTIONS.includes(key)) { + result[key] = parsedOptions[key]; + return result; + } + + if (!result.variables) { + result.variables = {}; + } + + result.variables[key] = parsedOptions[key]; + return result; + }, {}); // workaround for GitHub Enterprise baseUrl set with /api/v3 suffix + // https://github.com/octokit/auth-app.js/issues/111#issuecomment-657610451 + + const baseUrl = parsedOptions.baseUrl || request.endpoint.DEFAULTS.baseUrl; + + if (GHES_V3_SUFFIX_REGEX.test(baseUrl)) { + requestOptions.url = baseUrl.replace(GHES_V3_SUFFIX_REGEX, "/api/graphql"); + } + + return request(requestOptions).then(response => { + if (response.data.errors) { + const headers = {}; + + for (const key of Object.keys(response.headers)) { + headers[key] = response.headers[key]; + } + + throw new GraphqlResponseError(requestOptions, headers, response.data); + } + + return response.data.data; + }); +} + +function withDefaults(request$1, newDefaults) { + const newRequest = request$1.defaults(newDefaults); + + const newApi = (query, options) => { + return graphql(newRequest, query, options); + }; + + return Object.assign(newApi, { + defaults: withDefaults.bind(null, newRequest), + endpoint: request.request.endpoint + }); +} + +const graphql$1 = withDefaults(request.request, { + headers: { + "user-agent": `octokit-graphql.js/${VERSION} ${universalUserAgent.getUserAgent()}` + }, + method: "POST", + url: "/graphql" +}); +function withCustomRequest(customRequest) { + return withDefaults(customRequest, { + method: "POST", + url: "/graphql" + }); +} + +exports.GraphqlResponseError = GraphqlResponseError; +exports.graphql = graphql$1; +exports.withCustomRequest = withCustomRequest; +//# sourceMappingURL=index.js.map + + +/***/ }), + +/***/ 4193: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +const VERSION = "2.17.0"; + +function ownKeys(object, enumerableOnly) { + var keys = Object.keys(object); + + if (Object.getOwnPropertySymbols) { + var symbols = Object.getOwnPropertySymbols(object); + + if (enumerableOnly) { + symbols = symbols.filter(function (sym) { + return Object.getOwnPropertyDescriptor(object, sym).enumerable; + }); + } + + keys.push.apply(keys, symbols); + } + + return keys; +} + +function _objectSpread2(target) { + for (var i = 1; i < arguments.length; i++) { + var source = arguments[i] != null ? arguments[i] : {}; + + if (i % 2) { + ownKeys(Object(source), true).forEach(function (key) { + _defineProperty(target, key, source[key]); + }); + } else if (Object.getOwnPropertyDescriptors) { + Object.defineProperties(target, Object.getOwnPropertyDescriptors(source)); + } else { + ownKeys(Object(source)).forEach(function (key) { + Object.defineProperty(target, key, Object.getOwnPropertyDescriptor(source, key)); + }); + } + } + + return target; +} + +function _defineProperty(obj, key, value) { + if (key in obj) { + Object.defineProperty(obj, key, { + value: value, + enumerable: true, + configurable: true, + writable: true + }); + } else { + obj[key] = value; + } + + return obj; +} + +/** + * Some “list” response that can be paginated have a different response structure + * + * They have a `total_count` key in the response (search also has `incomplete_results`, + * /installation/repositories also has `repository_selection`), as well as a key with + * the list of the items which name varies from endpoint to endpoint. + * + * Octokit normalizes these responses so that paginated results are always returned following + * the same structure. One challenge is that if the list response has only one page, no Link + * header is provided, so this header alone is not sufficient to check wether a response is + * paginated or not. + * + * We check if a "total_count" key is present in the response data, but also make sure that + * a "url" property is not, as the "Get the combined status for a specific ref" endpoint would + * otherwise match: https://developer.github.com/v3/repos/statuses/#get-the-combined-status-for-a-specific-ref + */ +function normalizePaginatedListResponse(response) { + // endpoints can respond with 204 if repository is empty + if (!response.data) { + return _objectSpread2(_objectSpread2({}, response), {}, { + data: [] + }); + } + + const responseNeedsNormalization = "total_count" in response.data && !("url" in response.data); + if (!responseNeedsNormalization) return response; // keep the additional properties intact as there is currently no other way + // to retrieve the same information. + + const incompleteResults = response.data.incomplete_results; + const repositorySelection = response.data.repository_selection; + const totalCount = response.data.total_count; + delete response.data.incomplete_results; + delete response.data.repository_selection; + delete response.data.total_count; + const namespaceKey = Object.keys(response.data)[0]; + const data = response.data[namespaceKey]; + response.data = data; + + if (typeof incompleteResults !== "undefined") { + response.data.incomplete_results = incompleteResults; + } + + if (typeof repositorySelection !== "undefined") { + response.data.repository_selection = repositorySelection; + } + + response.data.total_count = totalCount; + return response; +} + +function iterator(octokit, route, parameters) { + const options = typeof route === "function" ? route.endpoint(parameters) : octokit.request.endpoint(route, parameters); + const requestMethod = typeof route === "function" ? route : octokit.request; + const method = options.method; + const headers = options.headers; + let url = options.url; + return { + [Symbol.asyncIterator]: () => ({ + async next() { + if (!url) return { + done: true + }; + + try { + const response = await requestMethod({ + method, + url, + headers + }); + const normalizedResponse = normalizePaginatedListResponse(response); // `response.headers.link` format: + // '; rel="next", ; rel="last"' + // sets `url` to undefined if "next" URL is not present or `link` header is not set + + url = ((normalizedResponse.headers.link || "").match(/<([^>]+)>;\s*rel="next"/) || [])[1]; + return { + value: normalizedResponse + }; + } catch (error) { + if (error.status !== 409) throw error; + url = ""; + return { + value: { + status: 200, + headers: {}, + data: [] + } + }; + } + } + + }) + }; +} + +function paginate(octokit, route, parameters, mapFn) { + if (typeof parameters === "function") { + mapFn = parameters; + parameters = undefined; + } + + return gather(octokit, [], iterator(octokit, route, parameters)[Symbol.asyncIterator](), mapFn); +} + +function gather(octokit, results, iterator, mapFn) { + return iterator.next().then(result => { + if (result.done) { + return results; + } + + let earlyExit = false; + + function done() { + earlyExit = true; + } + + results = results.concat(mapFn ? mapFn(result.value, done) : result.value.data); + + if (earlyExit) { + return results; + } + + return gather(octokit, results, iterator, mapFn); + }); +} + +const composePaginateRest = Object.assign(paginate, { + iterator +}); + +const paginatingEndpoints = ["GET /app/hook/deliveries", "GET /app/installations", "GET /applications/grants", "GET /authorizations", "GET /enterprises/{enterprise}/actions/permissions/organizations", "GET /enterprises/{enterprise}/actions/runner-groups", "GET /enterprises/{enterprise}/actions/runner-groups/{runner_group_id}/organizations", "GET /enterprises/{enterprise}/actions/runner-groups/{runner_group_id}/runners", "GET /enterprises/{enterprise}/actions/runners", "GET /enterprises/{enterprise}/actions/runners/downloads", "GET /events", "GET /gists", "GET /gists/public", "GET /gists/starred", "GET /gists/{gist_id}/comments", "GET /gists/{gist_id}/commits", "GET /gists/{gist_id}/forks", "GET /installation/repositories", "GET /issues", "GET /marketplace_listing/plans", "GET /marketplace_listing/plans/{plan_id}/accounts", "GET /marketplace_listing/stubbed/plans", "GET /marketplace_listing/stubbed/plans/{plan_id}/accounts", "GET /networks/{owner}/{repo}/events", "GET /notifications", "GET /organizations", "GET /orgs/{org}/actions/permissions/repositories", "GET /orgs/{org}/actions/runner-groups", "GET /orgs/{org}/actions/runner-groups/{runner_group_id}/repositories", "GET /orgs/{org}/actions/runner-groups/{runner_group_id}/runners", "GET /orgs/{org}/actions/runners", "GET /orgs/{org}/actions/runners/downloads", "GET /orgs/{org}/actions/secrets", "GET /orgs/{org}/actions/secrets/{secret_name}/repositories", "GET /orgs/{org}/blocks", "GET /orgs/{org}/credential-authorizations", "GET /orgs/{org}/events", "GET /orgs/{org}/failed_invitations", "GET /orgs/{org}/hooks", "GET /orgs/{org}/hooks/{hook_id}/deliveries", "GET /orgs/{org}/installations", "GET /orgs/{org}/invitations", "GET /orgs/{org}/invitations/{invitation_id}/teams", "GET /orgs/{org}/issues", "GET /orgs/{org}/members", "GET /orgs/{org}/migrations", "GET /orgs/{org}/migrations/{migration_id}/repositories", "GET /orgs/{org}/outside_collaborators", "GET /orgs/{org}/packages", "GET /orgs/{org}/projects", "GET /orgs/{org}/public_members", "GET /orgs/{org}/repos", "GET /orgs/{org}/secret-scanning/alerts", "GET /orgs/{org}/team-sync/groups", "GET /orgs/{org}/teams", "GET /orgs/{org}/teams/{team_slug}/discussions", "GET /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/comments", "GET /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/comments/{comment_number}/reactions", "GET /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/reactions", "GET /orgs/{org}/teams/{team_slug}/invitations", "GET /orgs/{org}/teams/{team_slug}/members", "GET /orgs/{org}/teams/{team_slug}/projects", "GET /orgs/{org}/teams/{team_slug}/repos", "GET /orgs/{org}/teams/{team_slug}/team-sync/group-mappings", "GET /orgs/{org}/teams/{team_slug}/teams", "GET /projects/columns/{column_id}/cards", "GET /projects/{project_id}/collaborators", "GET /projects/{project_id}/columns", "GET /repos/{owner}/{repo}/actions/artifacts", "GET /repos/{owner}/{repo}/actions/runners", "GET /repos/{owner}/{repo}/actions/runners/downloads", "GET /repos/{owner}/{repo}/actions/runs", "GET /repos/{owner}/{repo}/actions/runs/{run_id}/artifacts", "GET /repos/{owner}/{repo}/actions/runs/{run_id}/attempts/{attempt_number}/jobs", "GET /repos/{owner}/{repo}/actions/runs/{run_id}/jobs", "GET /repos/{owner}/{repo}/actions/secrets", "GET /repos/{owner}/{repo}/actions/workflows", "GET /repos/{owner}/{repo}/actions/workflows/{workflow_id}/runs", "GET /repos/{owner}/{repo}/assignees", "GET /repos/{owner}/{repo}/autolinks", "GET /repos/{owner}/{repo}/branches", "GET /repos/{owner}/{repo}/check-runs/{check_run_id}/annotations", "GET /repos/{owner}/{repo}/check-suites/{check_suite_id}/check-runs", "GET /repos/{owner}/{repo}/code-scanning/alerts", "GET /repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/instances", "GET /repos/{owner}/{repo}/code-scanning/analyses", "GET /repos/{owner}/{repo}/collaborators", "GET /repos/{owner}/{repo}/comments", "GET /repos/{owner}/{repo}/comments/{comment_id}/reactions", "GET /repos/{owner}/{repo}/commits", "GET /repos/{owner}/{repo}/commits/{commit_sha}/branches-where-head", "GET /repos/{owner}/{repo}/commits/{commit_sha}/comments", "GET /repos/{owner}/{repo}/commits/{commit_sha}/pulls", "GET /repos/{owner}/{repo}/commits/{ref}/check-runs", "GET /repos/{owner}/{repo}/commits/{ref}/check-suites", "GET /repos/{owner}/{repo}/commits/{ref}/statuses", "GET /repos/{owner}/{repo}/contributors", "GET /repos/{owner}/{repo}/deployments", "GET /repos/{owner}/{repo}/deployments/{deployment_id}/statuses", "GET /repos/{owner}/{repo}/events", "GET /repos/{owner}/{repo}/forks", "GET /repos/{owner}/{repo}/git/matching-refs/{ref}", "GET /repos/{owner}/{repo}/hooks", "GET /repos/{owner}/{repo}/hooks/{hook_id}/deliveries", "GET /repos/{owner}/{repo}/invitations", "GET /repos/{owner}/{repo}/issues", "GET /repos/{owner}/{repo}/issues/comments", "GET /repos/{owner}/{repo}/issues/comments/{comment_id}/reactions", "GET /repos/{owner}/{repo}/issues/events", "GET /repos/{owner}/{repo}/issues/{issue_number}/comments", "GET /repos/{owner}/{repo}/issues/{issue_number}/events", "GET /repos/{owner}/{repo}/issues/{issue_number}/labels", "GET /repos/{owner}/{repo}/issues/{issue_number}/reactions", "GET /repos/{owner}/{repo}/issues/{issue_number}/timeline", "GET /repos/{owner}/{repo}/keys", "GET /repos/{owner}/{repo}/labels", "GET /repos/{owner}/{repo}/milestones", "GET /repos/{owner}/{repo}/milestones/{milestone_number}/labels", "GET /repos/{owner}/{repo}/notifications", "GET /repos/{owner}/{repo}/pages/builds", "GET /repos/{owner}/{repo}/projects", "GET /repos/{owner}/{repo}/pulls", "GET /repos/{owner}/{repo}/pulls/comments", "GET /repos/{owner}/{repo}/pulls/comments/{comment_id}/reactions", "GET /repos/{owner}/{repo}/pulls/{pull_number}/comments", "GET /repos/{owner}/{repo}/pulls/{pull_number}/commits", "GET /repos/{owner}/{repo}/pulls/{pull_number}/files", "GET /repos/{owner}/{repo}/pulls/{pull_number}/requested_reviewers", "GET /repos/{owner}/{repo}/pulls/{pull_number}/reviews", "GET /repos/{owner}/{repo}/pulls/{pull_number}/reviews/{review_id}/comments", "GET /repos/{owner}/{repo}/releases", "GET /repos/{owner}/{repo}/releases/{release_id}/assets", "GET /repos/{owner}/{repo}/secret-scanning/alerts", "GET /repos/{owner}/{repo}/stargazers", "GET /repos/{owner}/{repo}/subscribers", "GET /repos/{owner}/{repo}/tags", "GET /repos/{owner}/{repo}/teams", "GET /repositories", "GET /repositories/{repository_id}/environments/{environment_name}/secrets", "GET /scim/v2/enterprises/{enterprise}/Groups", "GET /scim/v2/enterprises/{enterprise}/Users", "GET /scim/v2/organizations/{org}/Users", "GET /search/code", "GET /search/commits", "GET /search/issues", "GET /search/labels", "GET /search/repositories", "GET /search/topics", "GET /search/users", "GET /teams/{team_id}/discussions", "GET /teams/{team_id}/discussions/{discussion_number}/comments", "GET /teams/{team_id}/discussions/{discussion_number}/comments/{comment_number}/reactions", "GET /teams/{team_id}/discussions/{discussion_number}/reactions", "GET /teams/{team_id}/invitations", "GET /teams/{team_id}/members", "GET /teams/{team_id}/projects", "GET /teams/{team_id}/repos", "GET /teams/{team_id}/team-sync/group-mappings", "GET /teams/{team_id}/teams", "GET /user/blocks", "GET /user/emails", "GET /user/followers", "GET /user/following", "GET /user/gpg_keys", "GET /user/installations", "GET /user/installations/{installation_id}/repositories", "GET /user/issues", "GET /user/keys", "GET /user/marketplace_purchases", "GET /user/marketplace_purchases/stubbed", "GET /user/memberships/orgs", "GET /user/migrations", "GET /user/migrations/{migration_id}/repositories", "GET /user/orgs", "GET /user/packages", "GET /user/public_emails", "GET /user/repos", "GET /user/repository_invitations", "GET /user/starred", "GET /user/subscriptions", "GET /user/teams", "GET /users", "GET /users/{username}/events", "GET /users/{username}/events/orgs/{org}", "GET /users/{username}/events/public", "GET /users/{username}/followers", "GET /users/{username}/following", "GET /users/{username}/gists", "GET /users/{username}/gpg_keys", "GET /users/{username}/keys", "GET /users/{username}/orgs", "GET /users/{username}/packages", "GET /users/{username}/projects", "GET /users/{username}/received_events", "GET /users/{username}/received_events/public", "GET /users/{username}/repos", "GET /users/{username}/starred", "GET /users/{username}/subscriptions"]; + +function isPaginatingEndpoint(arg) { + if (typeof arg === "string") { + return paginatingEndpoints.includes(arg); + } else { + return false; + } +} + +/** + * @param octokit Octokit instance + * @param options Options passed to Octokit constructor + */ + +function paginateRest(octokit) { + return { + paginate: Object.assign(paginate.bind(null, octokit), { + iterator: iterator.bind(null, octokit) + }) + }; +} +paginateRest.VERSION = VERSION; + +exports.composePaginateRest = composePaginateRest; +exports.isPaginatingEndpoint = isPaginatingEndpoint; +exports.paginateRest = paginateRest; +exports.paginatingEndpoints = paginatingEndpoints; +//# sourceMappingURL=index.js.map + + +/***/ }), + +/***/ 3044: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +function ownKeys(object, enumerableOnly) { + var keys = Object.keys(object); + + if (Object.getOwnPropertySymbols) { + var symbols = Object.getOwnPropertySymbols(object); + + if (enumerableOnly) { + symbols = symbols.filter(function (sym) { + return Object.getOwnPropertyDescriptor(object, sym).enumerable; + }); + } + + keys.push.apply(keys, symbols); + } + + return keys; +} + +function _objectSpread2(target) { + for (var i = 1; i < arguments.length; i++) { + var source = arguments[i] != null ? arguments[i] : {}; + + if (i % 2) { + ownKeys(Object(source), true).forEach(function (key) { + _defineProperty(target, key, source[key]); + }); + } else if (Object.getOwnPropertyDescriptors) { + Object.defineProperties(target, Object.getOwnPropertyDescriptors(source)); + } else { + ownKeys(Object(source)).forEach(function (key) { + Object.defineProperty(target, key, Object.getOwnPropertyDescriptor(source, key)); + }); + } + } + + return target; +} + +function _defineProperty(obj, key, value) { + if (key in obj) { + Object.defineProperty(obj, key, { + value: value, + enumerable: true, + configurable: true, + writable: true + }); + } else { + obj[key] = value; + } + + return obj; +} + +const Endpoints = { + actions: { + addSelectedRepoToOrgSecret: ["PUT /orgs/{org}/actions/secrets/{secret_name}/repositories/{repository_id}"], + approveWorkflowRun: ["POST /repos/{owner}/{repo}/actions/runs/{run_id}/approve"], + cancelWorkflowRun: ["POST /repos/{owner}/{repo}/actions/runs/{run_id}/cancel"], + createOrUpdateEnvironmentSecret: ["PUT /repositories/{repository_id}/environments/{environment_name}/secrets/{secret_name}"], + createOrUpdateOrgSecret: ["PUT /orgs/{org}/actions/secrets/{secret_name}"], + createOrUpdateRepoSecret: ["PUT /repos/{owner}/{repo}/actions/secrets/{secret_name}"], + createRegistrationTokenForOrg: ["POST /orgs/{org}/actions/runners/registration-token"], + createRegistrationTokenForRepo: ["POST /repos/{owner}/{repo}/actions/runners/registration-token"], + createRemoveTokenForOrg: ["POST /orgs/{org}/actions/runners/remove-token"], + createRemoveTokenForRepo: ["POST /repos/{owner}/{repo}/actions/runners/remove-token"], + createWorkflowDispatch: ["POST /repos/{owner}/{repo}/actions/workflows/{workflow_id}/dispatches"], + deleteArtifact: ["DELETE /repos/{owner}/{repo}/actions/artifacts/{artifact_id}"], + deleteEnvironmentSecret: ["DELETE /repositories/{repository_id}/environments/{environment_name}/secrets/{secret_name}"], + deleteOrgSecret: ["DELETE /orgs/{org}/actions/secrets/{secret_name}"], + deleteRepoSecret: ["DELETE /repos/{owner}/{repo}/actions/secrets/{secret_name}"], + deleteSelfHostedRunnerFromOrg: ["DELETE /orgs/{org}/actions/runners/{runner_id}"], + deleteSelfHostedRunnerFromRepo: ["DELETE /repos/{owner}/{repo}/actions/runners/{runner_id}"], + deleteWorkflowRun: ["DELETE /repos/{owner}/{repo}/actions/runs/{run_id}"], + deleteWorkflowRunLogs: ["DELETE /repos/{owner}/{repo}/actions/runs/{run_id}/logs"], + disableSelectedRepositoryGithubActionsOrganization: ["DELETE /orgs/{org}/actions/permissions/repositories/{repository_id}"], + disableWorkflow: ["PUT /repos/{owner}/{repo}/actions/workflows/{workflow_id}/disable"], + downloadArtifact: ["GET /repos/{owner}/{repo}/actions/artifacts/{artifact_id}/{archive_format}"], + downloadJobLogsForWorkflowRun: ["GET /repos/{owner}/{repo}/actions/jobs/{job_id}/logs"], + downloadWorkflowRunAttemptLogs: ["GET /repos/{owner}/{repo}/actions/runs/{run_id}/attempts/{attempt_number}/logs"], + downloadWorkflowRunLogs: ["GET /repos/{owner}/{repo}/actions/runs/{run_id}/logs"], + enableSelectedRepositoryGithubActionsOrganization: ["PUT /orgs/{org}/actions/permissions/repositories/{repository_id}"], + enableWorkflow: ["PUT /repos/{owner}/{repo}/actions/workflows/{workflow_id}/enable"], + getAllowedActionsOrganization: ["GET /orgs/{org}/actions/permissions/selected-actions"], + getAllowedActionsRepository: ["GET /repos/{owner}/{repo}/actions/permissions/selected-actions"], + getArtifact: ["GET /repos/{owner}/{repo}/actions/artifacts/{artifact_id}"], + getEnvironmentPublicKey: ["GET /repositories/{repository_id}/environments/{environment_name}/secrets/public-key"], + getEnvironmentSecret: ["GET /repositories/{repository_id}/environments/{environment_name}/secrets/{secret_name}"], + getGithubActionsPermissionsOrganization: ["GET /orgs/{org}/actions/permissions"], + getGithubActionsPermissionsRepository: ["GET /repos/{owner}/{repo}/actions/permissions"], + getJobForWorkflowRun: ["GET /repos/{owner}/{repo}/actions/jobs/{job_id}"], + getOrgPublicKey: ["GET /orgs/{org}/actions/secrets/public-key"], + getOrgSecret: ["GET /orgs/{org}/actions/secrets/{secret_name}"], + getPendingDeploymentsForRun: ["GET /repos/{owner}/{repo}/actions/runs/{run_id}/pending_deployments"], + getRepoPermissions: ["GET /repos/{owner}/{repo}/actions/permissions", {}, { + renamed: ["actions", "getGithubActionsPermissionsRepository"] + }], + getRepoPublicKey: ["GET /repos/{owner}/{repo}/actions/secrets/public-key"], + getRepoSecret: ["GET /repos/{owner}/{repo}/actions/secrets/{secret_name}"], + getReviewsForRun: ["GET /repos/{owner}/{repo}/actions/runs/{run_id}/approvals"], + getSelfHostedRunnerForOrg: ["GET /orgs/{org}/actions/runners/{runner_id}"], + getSelfHostedRunnerForRepo: ["GET /repos/{owner}/{repo}/actions/runners/{runner_id}"], + getWorkflow: ["GET /repos/{owner}/{repo}/actions/workflows/{workflow_id}"], + getWorkflowRun: ["GET /repos/{owner}/{repo}/actions/runs/{run_id}"], + getWorkflowRunAttempt: ["GET /repos/{owner}/{repo}/actions/runs/{run_id}/attempts/{attempt_number}"], + getWorkflowRunUsage: ["GET /repos/{owner}/{repo}/actions/runs/{run_id}/timing"], + getWorkflowUsage: ["GET /repos/{owner}/{repo}/actions/workflows/{workflow_id}/timing"], + listArtifactsForRepo: ["GET /repos/{owner}/{repo}/actions/artifacts"], + listEnvironmentSecrets: ["GET /repositories/{repository_id}/environments/{environment_name}/secrets"], + listJobsForWorkflowRun: ["GET /repos/{owner}/{repo}/actions/runs/{run_id}/jobs"], + listJobsForWorkflowRunAttempt: ["GET /repos/{owner}/{repo}/actions/runs/{run_id}/attempts/{attempt_number}/jobs"], + listOrgSecrets: ["GET /orgs/{org}/actions/secrets"], + listRepoSecrets: ["GET /repos/{owner}/{repo}/actions/secrets"], + listRepoWorkflows: ["GET /repos/{owner}/{repo}/actions/workflows"], + listRunnerApplicationsForOrg: ["GET /orgs/{org}/actions/runners/downloads"], + listRunnerApplicationsForRepo: ["GET /repos/{owner}/{repo}/actions/runners/downloads"], + listSelectedReposForOrgSecret: ["GET /orgs/{org}/actions/secrets/{secret_name}/repositories"], + listSelectedRepositoriesEnabledGithubActionsOrganization: ["GET /orgs/{org}/actions/permissions/repositories"], + listSelfHostedRunnersForOrg: ["GET /orgs/{org}/actions/runners"], + listSelfHostedRunnersForRepo: ["GET /repos/{owner}/{repo}/actions/runners"], + listWorkflowRunArtifacts: ["GET /repos/{owner}/{repo}/actions/runs/{run_id}/artifacts"], + listWorkflowRuns: ["GET /repos/{owner}/{repo}/actions/workflows/{workflow_id}/runs"], + listWorkflowRunsForRepo: ["GET /repos/{owner}/{repo}/actions/runs"], + removeSelectedRepoFromOrgSecret: ["DELETE /orgs/{org}/actions/secrets/{secret_name}/repositories/{repository_id}"], + reviewPendingDeploymentsForRun: ["POST /repos/{owner}/{repo}/actions/runs/{run_id}/pending_deployments"], + setAllowedActionsOrganization: ["PUT /orgs/{org}/actions/permissions/selected-actions"], + setAllowedActionsRepository: ["PUT /repos/{owner}/{repo}/actions/permissions/selected-actions"], + setGithubActionsPermissionsOrganization: ["PUT /orgs/{org}/actions/permissions"], + setGithubActionsPermissionsRepository: ["PUT /repos/{owner}/{repo}/actions/permissions"], + setSelectedReposForOrgSecret: ["PUT /orgs/{org}/actions/secrets/{secret_name}/repositories"], + setSelectedRepositoriesEnabledGithubActionsOrganization: ["PUT /orgs/{org}/actions/permissions/repositories"] + }, + activity: { + checkRepoIsStarredByAuthenticatedUser: ["GET /user/starred/{owner}/{repo}"], + deleteRepoSubscription: ["DELETE /repos/{owner}/{repo}/subscription"], + deleteThreadSubscription: ["DELETE /notifications/threads/{thread_id}/subscription"], + getFeeds: ["GET /feeds"], + getRepoSubscription: ["GET /repos/{owner}/{repo}/subscription"], + getThread: ["GET /notifications/threads/{thread_id}"], + getThreadSubscriptionForAuthenticatedUser: ["GET /notifications/threads/{thread_id}/subscription"], + listEventsForAuthenticatedUser: ["GET /users/{username}/events"], + listNotificationsForAuthenticatedUser: ["GET /notifications"], + listOrgEventsForAuthenticatedUser: ["GET /users/{username}/events/orgs/{org}"], + listPublicEvents: ["GET /events"], + listPublicEventsForRepoNetwork: ["GET /networks/{owner}/{repo}/events"], + listPublicEventsForUser: ["GET /users/{username}/events/public"], + listPublicOrgEvents: ["GET /orgs/{org}/events"], + listReceivedEventsForUser: ["GET /users/{username}/received_events"], + listReceivedPublicEventsForUser: ["GET /users/{username}/received_events/public"], + listRepoEvents: ["GET /repos/{owner}/{repo}/events"], + listRepoNotificationsForAuthenticatedUser: ["GET /repos/{owner}/{repo}/notifications"], + listReposStarredByAuthenticatedUser: ["GET /user/starred"], + listReposStarredByUser: ["GET /users/{username}/starred"], + listReposWatchedByUser: ["GET /users/{username}/subscriptions"], + listStargazersForRepo: ["GET /repos/{owner}/{repo}/stargazers"], + listWatchedReposForAuthenticatedUser: ["GET /user/subscriptions"], + listWatchersForRepo: ["GET /repos/{owner}/{repo}/subscribers"], + markNotificationsAsRead: ["PUT /notifications"], + markRepoNotificationsAsRead: ["PUT /repos/{owner}/{repo}/notifications"], + markThreadAsRead: ["PATCH /notifications/threads/{thread_id}"], + setRepoSubscription: ["PUT /repos/{owner}/{repo}/subscription"], + setThreadSubscription: ["PUT /notifications/threads/{thread_id}/subscription"], + starRepoForAuthenticatedUser: ["PUT /user/starred/{owner}/{repo}"], + unstarRepoForAuthenticatedUser: ["DELETE /user/starred/{owner}/{repo}"] + }, + apps: { + addRepoToInstallation: ["PUT /user/installations/{installation_id}/repositories/{repository_id}", {}, { + renamed: ["apps", "addRepoToInstallationForAuthenticatedUser"] + }], + addRepoToInstallationForAuthenticatedUser: ["PUT /user/installations/{installation_id}/repositories/{repository_id}"], + checkToken: ["POST /applications/{client_id}/token"], + createContentAttachment: ["POST /content_references/{content_reference_id}/attachments", { + mediaType: { + previews: ["corsair"] + } + }], + createContentAttachmentForRepo: ["POST /repos/{owner}/{repo}/content_references/{content_reference_id}/attachments", { + mediaType: { + previews: ["corsair"] + } + }], + createFromManifest: ["POST /app-manifests/{code}/conversions"], + createInstallationAccessToken: ["POST /app/installations/{installation_id}/access_tokens"], + deleteAuthorization: ["DELETE /applications/{client_id}/grant"], + deleteInstallation: ["DELETE /app/installations/{installation_id}"], + deleteToken: ["DELETE /applications/{client_id}/token"], + getAuthenticated: ["GET /app"], + getBySlug: ["GET /apps/{app_slug}"], + getInstallation: ["GET /app/installations/{installation_id}"], + getOrgInstallation: ["GET /orgs/{org}/installation"], + getRepoInstallation: ["GET /repos/{owner}/{repo}/installation"], + getSubscriptionPlanForAccount: ["GET /marketplace_listing/accounts/{account_id}"], + getSubscriptionPlanForAccountStubbed: ["GET /marketplace_listing/stubbed/accounts/{account_id}"], + getUserInstallation: ["GET /users/{username}/installation"], + getWebhookConfigForApp: ["GET /app/hook/config"], + getWebhookDelivery: ["GET /app/hook/deliveries/{delivery_id}"], + listAccountsForPlan: ["GET /marketplace_listing/plans/{plan_id}/accounts"], + listAccountsForPlanStubbed: ["GET /marketplace_listing/stubbed/plans/{plan_id}/accounts"], + listInstallationReposForAuthenticatedUser: ["GET /user/installations/{installation_id}/repositories"], + listInstallations: ["GET /app/installations"], + listInstallationsForAuthenticatedUser: ["GET /user/installations"], + listPlans: ["GET /marketplace_listing/plans"], + listPlansStubbed: ["GET /marketplace_listing/stubbed/plans"], + listReposAccessibleToInstallation: ["GET /installation/repositories"], + listSubscriptionsForAuthenticatedUser: ["GET /user/marketplace_purchases"], + listSubscriptionsForAuthenticatedUserStubbed: ["GET /user/marketplace_purchases/stubbed"], + listWebhookDeliveries: ["GET /app/hook/deliveries"], + redeliverWebhookDelivery: ["POST /app/hook/deliveries/{delivery_id}/attempts"], + removeRepoFromInstallation: ["DELETE /user/installations/{installation_id}/repositories/{repository_id}", {}, { + renamed: ["apps", "removeRepoFromInstallationForAuthenticatedUser"] + }], + removeRepoFromInstallationForAuthenticatedUser: ["DELETE /user/installations/{installation_id}/repositories/{repository_id}"], + resetToken: ["PATCH /applications/{client_id}/token"], + revokeInstallationAccessToken: ["DELETE /installation/token"], + scopeToken: ["POST /applications/{client_id}/token/scoped"], + suspendInstallation: ["PUT /app/installations/{installation_id}/suspended"], + unsuspendInstallation: ["DELETE /app/installations/{installation_id}/suspended"], + updateWebhookConfigForApp: ["PATCH /app/hook/config"] + }, + billing: { + getGithubActionsBillingOrg: ["GET /orgs/{org}/settings/billing/actions"], + getGithubActionsBillingUser: ["GET /users/{username}/settings/billing/actions"], + getGithubPackagesBillingOrg: ["GET /orgs/{org}/settings/billing/packages"], + getGithubPackagesBillingUser: ["GET /users/{username}/settings/billing/packages"], + getSharedStorageBillingOrg: ["GET /orgs/{org}/settings/billing/shared-storage"], + getSharedStorageBillingUser: ["GET /users/{username}/settings/billing/shared-storage"] + }, + checks: { + create: ["POST /repos/{owner}/{repo}/check-runs"], + createSuite: ["POST /repos/{owner}/{repo}/check-suites"], + get: ["GET /repos/{owner}/{repo}/check-runs/{check_run_id}"], + getSuite: ["GET /repos/{owner}/{repo}/check-suites/{check_suite_id}"], + listAnnotations: ["GET /repos/{owner}/{repo}/check-runs/{check_run_id}/annotations"], + listForRef: ["GET /repos/{owner}/{repo}/commits/{ref}/check-runs"], + listForSuite: ["GET /repos/{owner}/{repo}/check-suites/{check_suite_id}/check-runs"], + listSuitesForRef: ["GET /repos/{owner}/{repo}/commits/{ref}/check-suites"], + rerequestRun: ["POST /repos/{owner}/{repo}/check-runs/{check_run_id}/rerequest"], + rerequestSuite: ["POST /repos/{owner}/{repo}/check-suites/{check_suite_id}/rerequest"], + setSuitesPreferences: ["PATCH /repos/{owner}/{repo}/check-suites/preferences"], + update: ["PATCH /repos/{owner}/{repo}/check-runs/{check_run_id}"] + }, + codeScanning: { + deleteAnalysis: ["DELETE /repos/{owner}/{repo}/code-scanning/analyses/{analysis_id}{?confirm_delete}"], + getAlert: ["GET /repos/{owner}/{repo}/code-scanning/alerts/{alert_number}", {}, { + renamedParameters: { + alert_id: "alert_number" + } + }], + getAnalysis: ["GET /repos/{owner}/{repo}/code-scanning/analyses/{analysis_id}"], + getSarif: ["GET /repos/{owner}/{repo}/code-scanning/sarifs/{sarif_id}"], + listAlertInstances: ["GET /repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/instances"], + listAlertsForRepo: ["GET /repos/{owner}/{repo}/code-scanning/alerts"], + listAlertsInstances: ["GET /repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/instances", {}, { + renamed: ["codeScanning", "listAlertInstances"] + }], + listRecentAnalyses: ["GET /repos/{owner}/{repo}/code-scanning/analyses"], + updateAlert: ["PATCH /repos/{owner}/{repo}/code-scanning/alerts/{alert_number}"], + uploadSarif: ["POST /repos/{owner}/{repo}/code-scanning/sarifs"] + }, + codesOfConduct: { + getAllCodesOfConduct: ["GET /codes_of_conduct"], + getConductCode: ["GET /codes_of_conduct/{key}"] + }, + emojis: { + get: ["GET /emojis"] + }, + enterpriseAdmin: { + disableSelectedOrganizationGithubActionsEnterprise: ["DELETE /enterprises/{enterprise}/actions/permissions/organizations/{org_id}"], + enableSelectedOrganizationGithubActionsEnterprise: ["PUT /enterprises/{enterprise}/actions/permissions/organizations/{org_id}"], + getAllowedActionsEnterprise: ["GET /enterprises/{enterprise}/actions/permissions/selected-actions"], + getGithubActionsPermissionsEnterprise: ["GET /enterprises/{enterprise}/actions/permissions"], + listSelectedOrganizationsEnabledGithubActionsEnterprise: ["GET /enterprises/{enterprise}/actions/permissions/organizations"], + setAllowedActionsEnterprise: ["PUT /enterprises/{enterprise}/actions/permissions/selected-actions"], + setGithubActionsPermissionsEnterprise: ["PUT /enterprises/{enterprise}/actions/permissions"], + setSelectedOrganizationsEnabledGithubActionsEnterprise: ["PUT /enterprises/{enterprise}/actions/permissions/organizations"] + }, + gists: { + checkIsStarred: ["GET /gists/{gist_id}/star"], + create: ["POST /gists"], + createComment: ["POST /gists/{gist_id}/comments"], + delete: ["DELETE /gists/{gist_id}"], + deleteComment: ["DELETE /gists/{gist_id}/comments/{comment_id}"], + fork: ["POST /gists/{gist_id}/forks"], + get: ["GET /gists/{gist_id}"], + getComment: ["GET /gists/{gist_id}/comments/{comment_id}"], + getRevision: ["GET /gists/{gist_id}/{sha}"], + list: ["GET /gists"], + listComments: ["GET /gists/{gist_id}/comments"], + listCommits: ["GET /gists/{gist_id}/commits"], + listForUser: ["GET /users/{username}/gists"], + listForks: ["GET /gists/{gist_id}/forks"], + listPublic: ["GET /gists/public"], + listStarred: ["GET /gists/starred"], + star: ["PUT /gists/{gist_id}/star"], + unstar: ["DELETE /gists/{gist_id}/star"], + update: ["PATCH /gists/{gist_id}"], + updateComment: ["PATCH /gists/{gist_id}/comments/{comment_id}"] + }, + git: { + createBlob: ["POST /repos/{owner}/{repo}/git/blobs"], + createCommit: ["POST /repos/{owner}/{repo}/git/commits"], + createRef: ["POST /repos/{owner}/{repo}/git/refs"], + createTag: ["POST /repos/{owner}/{repo}/git/tags"], + createTree: ["POST /repos/{owner}/{repo}/git/trees"], + deleteRef: ["DELETE /repos/{owner}/{repo}/git/refs/{ref}"], + getBlob: ["GET /repos/{owner}/{repo}/git/blobs/{file_sha}"], + getCommit: ["GET /repos/{owner}/{repo}/git/commits/{commit_sha}"], + getRef: ["GET /repos/{owner}/{repo}/git/ref/{ref}"], + getTag: ["GET /repos/{owner}/{repo}/git/tags/{tag_sha}"], + getTree: ["GET /repos/{owner}/{repo}/git/trees/{tree_sha}"], + listMatchingRefs: ["GET /repos/{owner}/{repo}/git/matching-refs/{ref}"], + updateRef: ["PATCH /repos/{owner}/{repo}/git/refs/{ref}"] + }, + gitignore: { + getAllTemplates: ["GET /gitignore/templates"], + getTemplate: ["GET /gitignore/templates/{name}"] + }, + interactions: { + getRestrictionsForAuthenticatedUser: ["GET /user/interaction-limits"], + getRestrictionsForOrg: ["GET /orgs/{org}/interaction-limits"], + getRestrictionsForRepo: ["GET /repos/{owner}/{repo}/interaction-limits"], + getRestrictionsForYourPublicRepos: ["GET /user/interaction-limits", {}, { + renamed: ["interactions", "getRestrictionsForAuthenticatedUser"] + }], + removeRestrictionsForAuthenticatedUser: ["DELETE /user/interaction-limits"], + removeRestrictionsForOrg: ["DELETE /orgs/{org}/interaction-limits"], + removeRestrictionsForRepo: ["DELETE /repos/{owner}/{repo}/interaction-limits"], + removeRestrictionsForYourPublicRepos: ["DELETE /user/interaction-limits", {}, { + renamed: ["interactions", "removeRestrictionsForAuthenticatedUser"] + }], + setRestrictionsForAuthenticatedUser: ["PUT /user/interaction-limits"], + setRestrictionsForOrg: ["PUT /orgs/{org}/interaction-limits"], + setRestrictionsForRepo: ["PUT /repos/{owner}/{repo}/interaction-limits"], + setRestrictionsForYourPublicRepos: ["PUT /user/interaction-limits", {}, { + renamed: ["interactions", "setRestrictionsForAuthenticatedUser"] + }] + }, + issues: { + addAssignees: ["POST /repos/{owner}/{repo}/issues/{issue_number}/assignees"], + addLabels: ["POST /repos/{owner}/{repo}/issues/{issue_number}/labels"], + checkUserCanBeAssigned: ["GET /repos/{owner}/{repo}/assignees/{assignee}"], + create: ["POST /repos/{owner}/{repo}/issues"], + createComment: ["POST /repos/{owner}/{repo}/issues/{issue_number}/comments"], + createLabel: ["POST /repos/{owner}/{repo}/labels"], + createMilestone: ["POST /repos/{owner}/{repo}/milestones"], + deleteComment: ["DELETE /repos/{owner}/{repo}/issues/comments/{comment_id}"], + deleteLabel: ["DELETE /repos/{owner}/{repo}/labels/{name}"], + deleteMilestone: ["DELETE /repos/{owner}/{repo}/milestones/{milestone_number}"], + get: ["GET /repos/{owner}/{repo}/issues/{issue_number}"], + getComment: ["GET /repos/{owner}/{repo}/issues/comments/{comment_id}"], + getEvent: ["GET /repos/{owner}/{repo}/issues/events/{event_id}"], + getLabel: ["GET /repos/{owner}/{repo}/labels/{name}"], + getMilestone: ["GET /repos/{owner}/{repo}/milestones/{milestone_number}"], + list: ["GET /issues"], + listAssignees: ["GET /repos/{owner}/{repo}/assignees"], + listComments: ["GET /repos/{owner}/{repo}/issues/{issue_number}/comments"], + listCommentsForRepo: ["GET /repos/{owner}/{repo}/issues/comments"], + listEvents: ["GET /repos/{owner}/{repo}/issues/{issue_number}/events"], + listEventsForRepo: ["GET /repos/{owner}/{repo}/issues/events"], + listEventsForTimeline: ["GET /repos/{owner}/{repo}/issues/{issue_number}/timeline"], + listForAuthenticatedUser: ["GET /user/issues"], + listForOrg: ["GET /orgs/{org}/issues"], + listForRepo: ["GET /repos/{owner}/{repo}/issues"], + listLabelsForMilestone: ["GET /repos/{owner}/{repo}/milestones/{milestone_number}/labels"], + listLabelsForRepo: ["GET /repos/{owner}/{repo}/labels"], + listLabelsOnIssue: ["GET /repos/{owner}/{repo}/issues/{issue_number}/labels"], + listMilestones: ["GET /repos/{owner}/{repo}/milestones"], + lock: ["PUT /repos/{owner}/{repo}/issues/{issue_number}/lock"], + removeAllLabels: ["DELETE /repos/{owner}/{repo}/issues/{issue_number}/labels"], + removeAssignees: ["DELETE /repos/{owner}/{repo}/issues/{issue_number}/assignees"], + removeLabel: ["DELETE /repos/{owner}/{repo}/issues/{issue_number}/labels/{name}"], + setLabels: ["PUT /repos/{owner}/{repo}/issues/{issue_number}/labels"], + unlock: ["DELETE /repos/{owner}/{repo}/issues/{issue_number}/lock"], + update: ["PATCH /repos/{owner}/{repo}/issues/{issue_number}"], + updateComment: ["PATCH /repos/{owner}/{repo}/issues/comments/{comment_id}"], + updateLabel: ["PATCH /repos/{owner}/{repo}/labels/{name}"], + updateMilestone: ["PATCH /repos/{owner}/{repo}/milestones/{milestone_number}"] + }, + licenses: { + get: ["GET /licenses/{license}"], + getAllCommonlyUsed: ["GET /licenses"], + getForRepo: ["GET /repos/{owner}/{repo}/license"] + }, + markdown: { + render: ["POST /markdown"], + renderRaw: ["POST /markdown/raw", { + headers: { + "content-type": "text/plain; charset=utf-8" + } + }] + }, + meta: { + get: ["GET /meta"], + getOctocat: ["GET /octocat"], + getZen: ["GET /zen"], + root: ["GET /"] + }, + migrations: { + cancelImport: ["DELETE /repos/{owner}/{repo}/import"], + deleteArchiveForAuthenticatedUser: ["DELETE /user/migrations/{migration_id}/archive"], + deleteArchiveForOrg: ["DELETE /orgs/{org}/migrations/{migration_id}/archive"], + downloadArchiveForOrg: ["GET /orgs/{org}/migrations/{migration_id}/archive"], + getArchiveForAuthenticatedUser: ["GET /user/migrations/{migration_id}/archive"], + getCommitAuthors: ["GET /repos/{owner}/{repo}/import/authors"], + getImportStatus: ["GET /repos/{owner}/{repo}/import"], + getLargeFiles: ["GET /repos/{owner}/{repo}/import/large_files"], + getStatusForAuthenticatedUser: ["GET /user/migrations/{migration_id}"], + getStatusForOrg: ["GET /orgs/{org}/migrations/{migration_id}"], + listForAuthenticatedUser: ["GET /user/migrations"], + listForOrg: ["GET /orgs/{org}/migrations"], + listReposForAuthenticatedUser: ["GET /user/migrations/{migration_id}/repositories"], + listReposForOrg: ["GET /orgs/{org}/migrations/{migration_id}/repositories"], + listReposForUser: ["GET /user/migrations/{migration_id}/repositories", {}, { + renamed: ["migrations", "listReposForAuthenticatedUser"] + }], + mapCommitAuthor: ["PATCH /repos/{owner}/{repo}/import/authors/{author_id}"], + setLfsPreference: ["PATCH /repos/{owner}/{repo}/import/lfs"], + startForAuthenticatedUser: ["POST /user/migrations"], + startForOrg: ["POST /orgs/{org}/migrations"], + startImport: ["PUT /repos/{owner}/{repo}/import"], + unlockRepoForAuthenticatedUser: ["DELETE /user/migrations/{migration_id}/repos/{repo_name}/lock"], + unlockRepoForOrg: ["DELETE /orgs/{org}/migrations/{migration_id}/repos/{repo_name}/lock"], + updateImport: ["PATCH /repos/{owner}/{repo}/import"] + }, + orgs: { + blockUser: ["PUT /orgs/{org}/blocks/{username}"], + cancelInvitation: ["DELETE /orgs/{org}/invitations/{invitation_id}"], + checkBlockedUser: ["GET /orgs/{org}/blocks/{username}"], + checkMembershipForUser: ["GET /orgs/{org}/members/{username}"], + checkPublicMembershipForUser: ["GET /orgs/{org}/public_members/{username}"], + convertMemberToOutsideCollaborator: ["PUT /orgs/{org}/outside_collaborators/{username}"], + createInvitation: ["POST /orgs/{org}/invitations"], + createWebhook: ["POST /orgs/{org}/hooks"], + deleteWebhook: ["DELETE /orgs/{org}/hooks/{hook_id}"], + get: ["GET /orgs/{org}"], + getMembershipForAuthenticatedUser: ["GET /user/memberships/orgs/{org}"], + getMembershipForUser: ["GET /orgs/{org}/memberships/{username}"], + getWebhook: ["GET /orgs/{org}/hooks/{hook_id}"], + getWebhookConfigForOrg: ["GET /orgs/{org}/hooks/{hook_id}/config"], + getWebhookDelivery: ["GET /orgs/{org}/hooks/{hook_id}/deliveries/{delivery_id}"], + list: ["GET /organizations"], + listAppInstallations: ["GET /orgs/{org}/installations"], + listBlockedUsers: ["GET /orgs/{org}/blocks"], + listFailedInvitations: ["GET /orgs/{org}/failed_invitations"], + listForAuthenticatedUser: ["GET /user/orgs"], + listForUser: ["GET /users/{username}/orgs"], + listInvitationTeams: ["GET /orgs/{org}/invitations/{invitation_id}/teams"], + listMembers: ["GET /orgs/{org}/members"], + listMembershipsForAuthenticatedUser: ["GET /user/memberships/orgs"], + listOutsideCollaborators: ["GET /orgs/{org}/outside_collaborators"], + listPendingInvitations: ["GET /orgs/{org}/invitations"], + listPublicMembers: ["GET /orgs/{org}/public_members"], + listWebhookDeliveries: ["GET /orgs/{org}/hooks/{hook_id}/deliveries"], + listWebhooks: ["GET /orgs/{org}/hooks"], + pingWebhook: ["POST /orgs/{org}/hooks/{hook_id}/pings"], + redeliverWebhookDelivery: ["POST /orgs/{org}/hooks/{hook_id}/deliveries/{delivery_id}/attempts"], + removeMember: ["DELETE /orgs/{org}/members/{username}"], + removeMembershipForUser: ["DELETE /orgs/{org}/memberships/{username}"], + removeOutsideCollaborator: ["DELETE /orgs/{org}/outside_collaborators/{username}"], + removePublicMembershipForAuthenticatedUser: ["DELETE /orgs/{org}/public_members/{username}"], + setMembershipForUser: ["PUT /orgs/{org}/memberships/{username}"], + setPublicMembershipForAuthenticatedUser: ["PUT /orgs/{org}/public_members/{username}"], + unblockUser: ["DELETE /orgs/{org}/blocks/{username}"], + update: ["PATCH /orgs/{org}"], + updateMembershipForAuthenticatedUser: ["PATCH /user/memberships/orgs/{org}"], + updateWebhook: ["PATCH /orgs/{org}/hooks/{hook_id}"], + updateWebhookConfigForOrg: ["PATCH /orgs/{org}/hooks/{hook_id}/config"] + }, + packages: { + deletePackageForAuthenticatedUser: ["DELETE /user/packages/{package_type}/{package_name}"], + deletePackageForOrg: ["DELETE /orgs/{org}/packages/{package_type}/{package_name}"], + deletePackageForUser: ["DELETE /users/{username}/packages/{package_type}/{package_name}"], + deletePackageVersionForAuthenticatedUser: ["DELETE /user/packages/{package_type}/{package_name}/versions/{package_version_id}"], + deletePackageVersionForOrg: ["DELETE /orgs/{org}/packages/{package_type}/{package_name}/versions/{package_version_id}"], + deletePackageVersionForUser: ["DELETE /users/{username}/packages/{package_type}/{package_name}/versions/{package_version_id}"], + getAllPackageVersionsForAPackageOwnedByAnOrg: ["GET /orgs/{org}/packages/{package_type}/{package_name}/versions", {}, { + renamed: ["packages", "getAllPackageVersionsForPackageOwnedByOrg"] + }], + getAllPackageVersionsForAPackageOwnedByTheAuthenticatedUser: ["GET /user/packages/{package_type}/{package_name}/versions", {}, { + renamed: ["packages", "getAllPackageVersionsForPackageOwnedByAuthenticatedUser"] + }], + getAllPackageVersionsForPackageOwnedByAuthenticatedUser: ["GET /user/packages/{package_type}/{package_name}/versions"], + getAllPackageVersionsForPackageOwnedByOrg: ["GET /orgs/{org}/packages/{package_type}/{package_name}/versions"], + getAllPackageVersionsForPackageOwnedByUser: ["GET /users/{username}/packages/{package_type}/{package_name}/versions"], + getPackageForAuthenticatedUser: ["GET /user/packages/{package_type}/{package_name}"], + getPackageForOrganization: ["GET /orgs/{org}/packages/{package_type}/{package_name}"], + getPackageForUser: ["GET /users/{username}/packages/{package_type}/{package_name}"], + getPackageVersionForAuthenticatedUser: ["GET /user/packages/{package_type}/{package_name}/versions/{package_version_id}"], + getPackageVersionForOrganization: ["GET /orgs/{org}/packages/{package_type}/{package_name}/versions/{package_version_id}"], + getPackageVersionForUser: ["GET /users/{username}/packages/{package_type}/{package_name}/versions/{package_version_id}"], + listPackagesForAuthenticatedUser: ["GET /user/packages"], + listPackagesForOrganization: ["GET /orgs/{org}/packages"], + listPackagesForUser: ["GET /users/{username}/packages"], + restorePackageForAuthenticatedUser: ["POST /user/packages/{package_type}/{package_name}/restore{?token}"], + restorePackageForOrg: ["POST /orgs/{org}/packages/{package_type}/{package_name}/restore{?token}"], + restorePackageForUser: ["POST /users/{username}/packages/{package_type}/{package_name}/restore{?token}"], + restorePackageVersionForAuthenticatedUser: ["POST /user/packages/{package_type}/{package_name}/versions/{package_version_id}/restore"], + restorePackageVersionForOrg: ["POST /orgs/{org}/packages/{package_type}/{package_name}/versions/{package_version_id}/restore"], + restorePackageVersionForUser: ["POST /users/{username}/packages/{package_type}/{package_name}/versions/{package_version_id}/restore"] + }, + projects: { + addCollaborator: ["PUT /projects/{project_id}/collaborators/{username}"], + createCard: ["POST /projects/columns/{column_id}/cards"], + createColumn: ["POST /projects/{project_id}/columns"], + createForAuthenticatedUser: ["POST /user/projects"], + createForOrg: ["POST /orgs/{org}/projects"], + createForRepo: ["POST /repos/{owner}/{repo}/projects"], + delete: ["DELETE /projects/{project_id}"], + deleteCard: ["DELETE /projects/columns/cards/{card_id}"], + deleteColumn: ["DELETE /projects/columns/{column_id}"], + get: ["GET /projects/{project_id}"], + getCard: ["GET /projects/columns/cards/{card_id}"], + getColumn: ["GET /projects/columns/{column_id}"], + getPermissionForUser: ["GET /projects/{project_id}/collaborators/{username}/permission"], + listCards: ["GET /projects/columns/{column_id}/cards"], + listCollaborators: ["GET /projects/{project_id}/collaborators"], + listColumns: ["GET /projects/{project_id}/columns"], + listForOrg: ["GET /orgs/{org}/projects"], + listForRepo: ["GET /repos/{owner}/{repo}/projects"], + listForUser: ["GET /users/{username}/projects"], + moveCard: ["POST /projects/columns/cards/{card_id}/moves"], + moveColumn: ["POST /projects/columns/{column_id}/moves"], + removeCollaborator: ["DELETE /projects/{project_id}/collaborators/{username}"], + update: ["PATCH /projects/{project_id}"], + updateCard: ["PATCH /projects/columns/cards/{card_id}"], + updateColumn: ["PATCH /projects/columns/{column_id}"] + }, + pulls: { + checkIfMerged: ["GET /repos/{owner}/{repo}/pulls/{pull_number}/merge"], + create: ["POST /repos/{owner}/{repo}/pulls"], + createReplyForReviewComment: ["POST /repos/{owner}/{repo}/pulls/{pull_number}/comments/{comment_id}/replies"], + createReview: ["POST /repos/{owner}/{repo}/pulls/{pull_number}/reviews"], + createReviewComment: ["POST /repos/{owner}/{repo}/pulls/{pull_number}/comments"], + deletePendingReview: ["DELETE /repos/{owner}/{repo}/pulls/{pull_number}/reviews/{review_id}"], + deleteReviewComment: ["DELETE /repos/{owner}/{repo}/pulls/comments/{comment_id}"], + dismissReview: ["PUT /repos/{owner}/{repo}/pulls/{pull_number}/reviews/{review_id}/dismissals"], + get: ["GET /repos/{owner}/{repo}/pulls/{pull_number}"], + getReview: ["GET /repos/{owner}/{repo}/pulls/{pull_number}/reviews/{review_id}"], + getReviewComment: ["GET /repos/{owner}/{repo}/pulls/comments/{comment_id}"], + list: ["GET /repos/{owner}/{repo}/pulls"], + listCommentsForReview: ["GET /repos/{owner}/{repo}/pulls/{pull_number}/reviews/{review_id}/comments"], + listCommits: ["GET /repos/{owner}/{repo}/pulls/{pull_number}/commits"], + listFiles: ["GET /repos/{owner}/{repo}/pulls/{pull_number}/files"], + listRequestedReviewers: ["GET /repos/{owner}/{repo}/pulls/{pull_number}/requested_reviewers"], + listReviewComments: ["GET /repos/{owner}/{repo}/pulls/{pull_number}/comments"], + listReviewCommentsForRepo: ["GET /repos/{owner}/{repo}/pulls/comments"], + listReviews: ["GET /repos/{owner}/{repo}/pulls/{pull_number}/reviews"], + merge: ["PUT /repos/{owner}/{repo}/pulls/{pull_number}/merge"], + removeRequestedReviewers: ["DELETE /repos/{owner}/{repo}/pulls/{pull_number}/requested_reviewers"], + requestReviewers: ["POST /repos/{owner}/{repo}/pulls/{pull_number}/requested_reviewers"], + submitReview: ["POST /repos/{owner}/{repo}/pulls/{pull_number}/reviews/{review_id}/events"], + update: ["PATCH /repos/{owner}/{repo}/pulls/{pull_number}"], + updateBranch: ["PUT /repos/{owner}/{repo}/pulls/{pull_number}/update-branch"], + updateReview: ["PUT /repos/{owner}/{repo}/pulls/{pull_number}/reviews/{review_id}"], + updateReviewComment: ["PATCH /repos/{owner}/{repo}/pulls/comments/{comment_id}"] + }, + rateLimit: { + get: ["GET /rate_limit"] + }, + reactions: { + createForCommitComment: ["POST /repos/{owner}/{repo}/comments/{comment_id}/reactions"], + createForIssue: ["POST /repos/{owner}/{repo}/issues/{issue_number}/reactions"], + createForIssueComment: ["POST /repos/{owner}/{repo}/issues/comments/{comment_id}/reactions"], + createForPullRequestReviewComment: ["POST /repos/{owner}/{repo}/pulls/comments/{comment_id}/reactions"], + createForRelease: ["POST /repos/{owner}/{repo}/releases/{release_id}/reactions"], + createForTeamDiscussionCommentInOrg: ["POST /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/comments/{comment_number}/reactions"], + createForTeamDiscussionInOrg: ["POST /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/reactions"], + deleteForCommitComment: ["DELETE /repos/{owner}/{repo}/comments/{comment_id}/reactions/{reaction_id}"], + deleteForIssue: ["DELETE /repos/{owner}/{repo}/issues/{issue_number}/reactions/{reaction_id}"], + deleteForIssueComment: ["DELETE /repos/{owner}/{repo}/issues/comments/{comment_id}/reactions/{reaction_id}"], + deleteForPullRequestComment: ["DELETE /repos/{owner}/{repo}/pulls/comments/{comment_id}/reactions/{reaction_id}"], + deleteForTeamDiscussion: ["DELETE /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/reactions/{reaction_id}"], + deleteForTeamDiscussionComment: ["DELETE /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/comments/{comment_number}/reactions/{reaction_id}"], + listForCommitComment: ["GET /repos/{owner}/{repo}/comments/{comment_id}/reactions"], + listForIssue: ["GET /repos/{owner}/{repo}/issues/{issue_number}/reactions"], + listForIssueComment: ["GET /repos/{owner}/{repo}/issues/comments/{comment_id}/reactions"], + listForPullRequestReviewComment: ["GET /repos/{owner}/{repo}/pulls/comments/{comment_id}/reactions"], + listForTeamDiscussionCommentInOrg: ["GET /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/comments/{comment_number}/reactions"], + listForTeamDiscussionInOrg: ["GET /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/reactions"] + }, + repos: { + acceptInvitation: ["PATCH /user/repository_invitations/{invitation_id}", {}, { + renamed: ["repos", "acceptInvitationForAuthenticatedUser"] + }], + acceptInvitationForAuthenticatedUser: ["PATCH /user/repository_invitations/{invitation_id}"], + addAppAccessRestrictions: ["POST /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/apps", {}, { + mapToData: "apps" + }], + addCollaborator: ["PUT /repos/{owner}/{repo}/collaborators/{username}"], + addStatusCheckContexts: ["POST /repos/{owner}/{repo}/branches/{branch}/protection/required_status_checks/contexts", {}, { + mapToData: "contexts" + }], + addTeamAccessRestrictions: ["POST /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/teams", {}, { + mapToData: "teams" + }], + addUserAccessRestrictions: ["POST /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/users", {}, { + mapToData: "users" + }], + checkCollaborator: ["GET /repos/{owner}/{repo}/collaborators/{username}"], + checkVulnerabilityAlerts: ["GET /repos/{owner}/{repo}/vulnerability-alerts"], + compareCommits: ["GET /repos/{owner}/{repo}/compare/{base}...{head}"], + compareCommitsWithBasehead: ["GET /repos/{owner}/{repo}/compare/{basehead}"], + createAutolink: ["POST /repos/{owner}/{repo}/autolinks"], + createCommitComment: ["POST /repos/{owner}/{repo}/commits/{commit_sha}/comments"], + createCommitSignatureProtection: ["POST /repos/{owner}/{repo}/branches/{branch}/protection/required_signatures"], + createCommitStatus: ["POST /repos/{owner}/{repo}/statuses/{sha}"], + createDeployKey: ["POST /repos/{owner}/{repo}/keys"], + createDeployment: ["POST /repos/{owner}/{repo}/deployments"], + createDeploymentStatus: ["POST /repos/{owner}/{repo}/deployments/{deployment_id}/statuses"], + createDispatchEvent: ["POST /repos/{owner}/{repo}/dispatches"], + createForAuthenticatedUser: ["POST /user/repos"], + createFork: ["POST /repos/{owner}/{repo}/forks"], + createInOrg: ["POST /orgs/{org}/repos"], + createOrUpdateEnvironment: ["PUT /repos/{owner}/{repo}/environments/{environment_name}"], + createOrUpdateFileContents: ["PUT /repos/{owner}/{repo}/contents/{path}"], + createPagesSite: ["POST /repos/{owner}/{repo}/pages"], + createRelease: ["POST /repos/{owner}/{repo}/releases"], + createUsingTemplate: ["POST /repos/{template_owner}/{template_repo}/generate"], + createWebhook: ["POST /repos/{owner}/{repo}/hooks"], + declineInvitation: ["DELETE /user/repository_invitations/{invitation_id}", {}, { + renamed: ["repos", "declineInvitationForAuthenticatedUser"] + }], + declineInvitationForAuthenticatedUser: ["DELETE /user/repository_invitations/{invitation_id}"], + delete: ["DELETE /repos/{owner}/{repo}"], + deleteAccessRestrictions: ["DELETE /repos/{owner}/{repo}/branches/{branch}/protection/restrictions"], + deleteAdminBranchProtection: ["DELETE /repos/{owner}/{repo}/branches/{branch}/protection/enforce_admins"], + deleteAnEnvironment: ["DELETE /repos/{owner}/{repo}/environments/{environment_name}"], + deleteAutolink: ["DELETE /repos/{owner}/{repo}/autolinks/{autolink_id}"], + deleteBranchProtection: ["DELETE /repos/{owner}/{repo}/branches/{branch}/protection"], + deleteCommitComment: ["DELETE /repos/{owner}/{repo}/comments/{comment_id}"], + deleteCommitSignatureProtection: ["DELETE /repos/{owner}/{repo}/branches/{branch}/protection/required_signatures"], + deleteDeployKey: ["DELETE /repos/{owner}/{repo}/keys/{key_id}"], + deleteDeployment: ["DELETE /repos/{owner}/{repo}/deployments/{deployment_id}"], + deleteFile: ["DELETE /repos/{owner}/{repo}/contents/{path}"], + deleteInvitation: ["DELETE /repos/{owner}/{repo}/invitations/{invitation_id}"], + deletePagesSite: ["DELETE /repos/{owner}/{repo}/pages"], + deletePullRequestReviewProtection: ["DELETE /repos/{owner}/{repo}/branches/{branch}/protection/required_pull_request_reviews"], + deleteRelease: ["DELETE /repos/{owner}/{repo}/releases/{release_id}"], + deleteReleaseAsset: ["DELETE /repos/{owner}/{repo}/releases/assets/{asset_id}"], + deleteWebhook: ["DELETE /repos/{owner}/{repo}/hooks/{hook_id}"], + disableAutomatedSecurityFixes: ["DELETE /repos/{owner}/{repo}/automated-security-fixes"], + disableLfsForRepo: ["DELETE /repos/{owner}/{repo}/lfs"], + disableVulnerabilityAlerts: ["DELETE /repos/{owner}/{repo}/vulnerability-alerts"], + downloadArchive: ["GET /repos/{owner}/{repo}/zipball/{ref}", {}, { + renamed: ["repos", "downloadZipballArchive"] + }], + downloadTarballArchive: ["GET /repos/{owner}/{repo}/tarball/{ref}"], + downloadZipballArchive: ["GET /repos/{owner}/{repo}/zipball/{ref}"], + enableAutomatedSecurityFixes: ["PUT /repos/{owner}/{repo}/automated-security-fixes"], + enableLfsForRepo: ["PUT /repos/{owner}/{repo}/lfs"], + enableVulnerabilityAlerts: ["PUT /repos/{owner}/{repo}/vulnerability-alerts"], + generateReleaseNotes: ["POST /repos/{owner}/{repo}/releases/generate-notes"], + get: ["GET /repos/{owner}/{repo}"], + getAccessRestrictions: ["GET /repos/{owner}/{repo}/branches/{branch}/protection/restrictions"], + getAdminBranchProtection: ["GET /repos/{owner}/{repo}/branches/{branch}/protection/enforce_admins"], + getAllEnvironments: ["GET /repos/{owner}/{repo}/environments"], + getAllStatusCheckContexts: ["GET /repos/{owner}/{repo}/branches/{branch}/protection/required_status_checks/contexts"], + getAllTopics: ["GET /repos/{owner}/{repo}/topics", { + mediaType: { + previews: ["mercy"] + } + }], + getAppsWithAccessToProtectedBranch: ["GET /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/apps"], + getAutolink: ["GET /repos/{owner}/{repo}/autolinks/{autolink_id}"], + getBranch: ["GET /repos/{owner}/{repo}/branches/{branch}"], + getBranchProtection: ["GET /repos/{owner}/{repo}/branches/{branch}/protection"], + getClones: ["GET /repos/{owner}/{repo}/traffic/clones"], + getCodeFrequencyStats: ["GET /repos/{owner}/{repo}/stats/code_frequency"], + getCollaboratorPermissionLevel: ["GET /repos/{owner}/{repo}/collaborators/{username}/permission"], + getCombinedStatusForRef: ["GET /repos/{owner}/{repo}/commits/{ref}/status"], + getCommit: ["GET /repos/{owner}/{repo}/commits/{ref}"], + getCommitActivityStats: ["GET /repos/{owner}/{repo}/stats/commit_activity"], + getCommitComment: ["GET /repos/{owner}/{repo}/comments/{comment_id}"], + getCommitSignatureProtection: ["GET /repos/{owner}/{repo}/branches/{branch}/protection/required_signatures"], + getCommunityProfileMetrics: ["GET /repos/{owner}/{repo}/community/profile"], + getContent: ["GET /repos/{owner}/{repo}/contents/{path}"], + getContributorsStats: ["GET /repos/{owner}/{repo}/stats/contributors"], + getDeployKey: ["GET /repos/{owner}/{repo}/keys/{key_id}"], + getDeployment: ["GET /repos/{owner}/{repo}/deployments/{deployment_id}"], + getDeploymentStatus: ["GET /repos/{owner}/{repo}/deployments/{deployment_id}/statuses/{status_id}"], + getEnvironment: ["GET /repos/{owner}/{repo}/environments/{environment_name}"], + getLatestPagesBuild: ["GET /repos/{owner}/{repo}/pages/builds/latest"], + getLatestRelease: ["GET /repos/{owner}/{repo}/releases/latest"], + getPages: ["GET /repos/{owner}/{repo}/pages"], + getPagesBuild: ["GET /repos/{owner}/{repo}/pages/builds/{build_id}"], + getPagesHealthCheck: ["GET /repos/{owner}/{repo}/pages/health"], + getParticipationStats: ["GET /repos/{owner}/{repo}/stats/participation"], + getPullRequestReviewProtection: ["GET /repos/{owner}/{repo}/branches/{branch}/protection/required_pull_request_reviews"], + getPunchCardStats: ["GET /repos/{owner}/{repo}/stats/punch_card"], + getReadme: ["GET /repos/{owner}/{repo}/readme"], + getReadmeInDirectory: ["GET /repos/{owner}/{repo}/readme/{dir}"], + getRelease: ["GET /repos/{owner}/{repo}/releases/{release_id}"], + getReleaseAsset: ["GET /repos/{owner}/{repo}/releases/assets/{asset_id}"], + getReleaseByTag: ["GET /repos/{owner}/{repo}/releases/tags/{tag}"], + getStatusChecksProtection: ["GET /repos/{owner}/{repo}/branches/{branch}/protection/required_status_checks"], + getTeamsWithAccessToProtectedBranch: ["GET /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/teams"], + getTopPaths: ["GET /repos/{owner}/{repo}/traffic/popular/paths"], + getTopReferrers: ["GET /repos/{owner}/{repo}/traffic/popular/referrers"], + getUsersWithAccessToProtectedBranch: ["GET /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/users"], + getViews: ["GET /repos/{owner}/{repo}/traffic/views"], + getWebhook: ["GET /repos/{owner}/{repo}/hooks/{hook_id}"], + getWebhookConfigForRepo: ["GET /repos/{owner}/{repo}/hooks/{hook_id}/config"], + getWebhookDelivery: ["GET /repos/{owner}/{repo}/hooks/{hook_id}/deliveries/{delivery_id}"], + listAutolinks: ["GET /repos/{owner}/{repo}/autolinks"], + listBranches: ["GET /repos/{owner}/{repo}/branches"], + listBranchesForHeadCommit: ["GET /repos/{owner}/{repo}/commits/{commit_sha}/branches-where-head"], + listCollaborators: ["GET /repos/{owner}/{repo}/collaborators"], + listCommentsForCommit: ["GET /repos/{owner}/{repo}/commits/{commit_sha}/comments"], + listCommitCommentsForRepo: ["GET /repos/{owner}/{repo}/comments"], + listCommitStatusesForRef: ["GET /repos/{owner}/{repo}/commits/{ref}/statuses"], + listCommits: ["GET /repos/{owner}/{repo}/commits"], + listContributors: ["GET /repos/{owner}/{repo}/contributors"], + listDeployKeys: ["GET /repos/{owner}/{repo}/keys"], + listDeploymentStatuses: ["GET /repos/{owner}/{repo}/deployments/{deployment_id}/statuses"], + listDeployments: ["GET /repos/{owner}/{repo}/deployments"], + listForAuthenticatedUser: ["GET /user/repos"], + listForOrg: ["GET /orgs/{org}/repos"], + listForUser: ["GET /users/{username}/repos"], + listForks: ["GET /repos/{owner}/{repo}/forks"], + listInvitations: ["GET /repos/{owner}/{repo}/invitations"], + listInvitationsForAuthenticatedUser: ["GET /user/repository_invitations"], + listLanguages: ["GET /repos/{owner}/{repo}/languages"], + listPagesBuilds: ["GET /repos/{owner}/{repo}/pages/builds"], + listPublic: ["GET /repositories"], + listPullRequestsAssociatedWithCommit: ["GET /repos/{owner}/{repo}/commits/{commit_sha}/pulls"], + listReleaseAssets: ["GET /repos/{owner}/{repo}/releases/{release_id}/assets"], + listReleases: ["GET /repos/{owner}/{repo}/releases"], + listTags: ["GET /repos/{owner}/{repo}/tags"], + listTeams: ["GET /repos/{owner}/{repo}/teams"], + listWebhookDeliveries: ["GET /repos/{owner}/{repo}/hooks/{hook_id}/deliveries"], + listWebhooks: ["GET /repos/{owner}/{repo}/hooks"], + merge: ["POST /repos/{owner}/{repo}/merges"], + mergeUpstream: ["POST /repos/{owner}/{repo}/merge-upstream"], + pingWebhook: ["POST /repos/{owner}/{repo}/hooks/{hook_id}/pings"], + redeliverWebhookDelivery: ["POST /repos/{owner}/{repo}/hooks/{hook_id}/deliveries/{delivery_id}/attempts"], + removeAppAccessRestrictions: ["DELETE /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/apps", {}, { + mapToData: "apps" + }], + removeCollaborator: ["DELETE /repos/{owner}/{repo}/collaborators/{username}"], + removeStatusCheckContexts: ["DELETE /repos/{owner}/{repo}/branches/{branch}/protection/required_status_checks/contexts", {}, { + mapToData: "contexts" + }], + removeStatusCheckProtection: ["DELETE /repos/{owner}/{repo}/branches/{branch}/protection/required_status_checks"], + removeTeamAccessRestrictions: ["DELETE /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/teams", {}, { + mapToData: "teams" + }], + removeUserAccessRestrictions: ["DELETE /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/users", {}, { + mapToData: "users" + }], + renameBranch: ["POST /repos/{owner}/{repo}/branches/{branch}/rename"], + replaceAllTopics: ["PUT /repos/{owner}/{repo}/topics", { + mediaType: { + previews: ["mercy"] + } + }], + requestPagesBuild: ["POST /repos/{owner}/{repo}/pages/builds"], + setAdminBranchProtection: ["POST /repos/{owner}/{repo}/branches/{branch}/protection/enforce_admins"], + setAppAccessRestrictions: ["PUT /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/apps", {}, { + mapToData: "apps" + }], + setStatusCheckContexts: ["PUT /repos/{owner}/{repo}/branches/{branch}/protection/required_status_checks/contexts", {}, { + mapToData: "contexts" + }], + setTeamAccessRestrictions: ["PUT /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/teams", {}, { + mapToData: "teams" + }], + setUserAccessRestrictions: ["PUT /repos/{owner}/{repo}/branches/{branch}/protection/restrictions/users", {}, { + mapToData: "users" + }], + testPushWebhook: ["POST /repos/{owner}/{repo}/hooks/{hook_id}/tests"], + transfer: ["POST /repos/{owner}/{repo}/transfer"], + update: ["PATCH /repos/{owner}/{repo}"], + updateBranchProtection: ["PUT /repos/{owner}/{repo}/branches/{branch}/protection"], + updateCommitComment: ["PATCH /repos/{owner}/{repo}/comments/{comment_id}"], + updateInformationAboutPagesSite: ["PUT /repos/{owner}/{repo}/pages"], + updateInvitation: ["PATCH /repos/{owner}/{repo}/invitations/{invitation_id}"], + updatePullRequestReviewProtection: ["PATCH /repos/{owner}/{repo}/branches/{branch}/protection/required_pull_request_reviews"], + updateRelease: ["PATCH /repos/{owner}/{repo}/releases/{release_id}"], + updateReleaseAsset: ["PATCH /repos/{owner}/{repo}/releases/assets/{asset_id}"], + updateStatusCheckPotection: ["PATCH /repos/{owner}/{repo}/branches/{branch}/protection/required_status_checks", {}, { + renamed: ["repos", "updateStatusCheckProtection"] + }], + updateStatusCheckProtection: ["PATCH /repos/{owner}/{repo}/branches/{branch}/protection/required_status_checks"], + updateWebhook: ["PATCH /repos/{owner}/{repo}/hooks/{hook_id}"], + updateWebhookConfigForRepo: ["PATCH /repos/{owner}/{repo}/hooks/{hook_id}/config"], + uploadReleaseAsset: ["POST /repos/{owner}/{repo}/releases/{release_id}/assets{?name,label}", { + baseUrl: "https://uploads.github.com" + }] + }, + search: { + code: ["GET /search/code"], + commits: ["GET /search/commits"], + issuesAndPullRequests: ["GET /search/issues"], + labels: ["GET /search/labels"], + repos: ["GET /search/repositories"], + topics: ["GET /search/topics", { + mediaType: { + previews: ["mercy"] + } + }], + users: ["GET /search/users"] + }, + secretScanning: { + getAlert: ["GET /repos/{owner}/{repo}/secret-scanning/alerts/{alert_number}"], + listAlertsForOrg: ["GET /orgs/{org}/secret-scanning/alerts"], + listAlertsForRepo: ["GET /repos/{owner}/{repo}/secret-scanning/alerts"], + updateAlert: ["PATCH /repos/{owner}/{repo}/secret-scanning/alerts/{alert_number}"] + }, + teams: { + addOrUpdateMembershipForUserInOrg: ["PUT /orgs/{org}/teams/{team_slug}/memberships/{username}"], + addOrUpdateProjectPermissionsInOrg: ["PUT /orgs/{org}/teams/{team_slug}/projects/{project_id}"], + addOrUpdateRepoPermissionsInOrg: ["PUT /orgs/{org}/teams/{team_slug}/repos/{owner}/{repo}"], + checkPermissionsForProjectInOrg: ["GET /orgs/{org}/teams/{team_slug}/projects/{project_id}"], + checkPermissionsForRepoInOrg: ["GET /orgs/{org}/teams/{team_slug}/repos/{owner}/{repo}"], + create: ["POST /orgs/{org}/teams"], + createDiscussionCommentInOrg: ["POST /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/comments"], + createDiscussionInOrg: ["POST /orgs/{org}/teams/{team_slug}/discussions"], + deleteDiscussionCommentInOrg: ["DELETE /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/comments/{comment_number}"], + deleteDiscussionInOrg: ["DELETE /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}"], + deleteInOrg: ["DELETE /orgs/{org}/teams/{team_slug}"], + getByName: ["GET /orgs/{org}/teams/{team_slug}"], + getDiscussionCommentInOrg: ["GET /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/comments/{comment_number}"], + getDiscussionInOrg: ["GET /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}"], + getMembershipForUserInOrg: ["GET /orgs/{org}/teams/{team_slug}/memberships/{username}"], + list: ["GET /orgs/{org}/teams"], + listChildInOrg: ["GET /orgs/{org}/teams/{team_slug}/teams"], + listDiscussionCommentsInOrg: ["GET /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/comments"], + listDiscussionsInOrg: ["GET /orgs/{org}/teams/{team_slug}/discussions"], + listForAuthenticatedUser: ["GET /user/teams"], + listMembersInOrg: ["GET /orgs/{org}/teams/{team_slug}/members"], + listPendingInvitationsInOrg: ["GET /orgs/{org}/teams/{team_slug}/invitations"], + listProjectsInOrg: ["GET /orgs/{org}/teams/{team_slug}/projects"], + listReposInOrg: ["GET /orgs/{org}/teams/{team_slug}/repos"], + removeMembershipForUserInOrg: ["DELETE /orgs/{org}/teams/{team_slug}/memberships/{username}"], + removeProjectInOrg: ["DELETE /orgs/{org}/teams/{team_slug}/projects/{project_id}"], + removeRepoInOrg: ["DELETE /orgs/{org}/teams/{team_slug}/repos/{owner}/{repo}"], + updateDiscussionCommentInOrg: ["PATCH /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}/comments/{comment_number}"], + updateDiscussionInOrg: ["PATCH /orgs/{org}/teams/{team_slug}/discussions/{discussion_number}"], + updateInOrg: ["PATCH /orgs/{org}/teams/{team_slug}"] + }, + users: { + addEmailForAuthenticated: ["POST /user/emails", {}, { + renamed: ["users", "addEmailForAuthenticatedUser"] + }], + addEmailForAuthenticatedUser: ["POST /user/emails"], + block: ["PUT /user/blocks/{username}"], + checkBlocked: ["GET /user/blocks/{username}"], + checkFollowingForUser: ["GET /users/{username}/following/{target_user}"], + checkPersonIsFollowedByAuthenticated: ["GET /user/following/{username}"], + createGpgKeyForAuthenticated: ["POST /user/gpg_keys", {}, { + renamed: ["users", "createGpgKeyForAuthenticatedUser"] + }], + createGpgKeyForAuthenticatedUser: ["POST /user/gpg_keys"], + createPublicSshKeyForAuthenticated: ["POST /user/keys", {}, { + renamed: ["users", "createPublicSshKeyForAuthenticatedUser"] + }], + createPublicSshKeyForAuthenticatedUser: ["POST /user/keys"], + deleteEmailForAuthenticated: ["DELETE /user/emails", {}, { + renamed: ["users", "deleteEmailForAuthenticatedUser"] + }], + deleteEmailForAuthenticatedUser: ["DELETE /user/emails"], + deleteGpgKeyForAuthenticated: ["DELETE /user/gpg_keys/{gpg_key_id}", {}, { + renamed: ["users", "deleteGpgKeyForAuthenticatedUser"] + }], + deleteGpgKeyForAuthenticatedUser: ["DELETE /user/gpg_keys/{gpg_key_id}"], + deletePublicSshKeyForAuthenticated: ["DELETE /user/keys/{key_id}", {}, { + renamed: ["users", "deletePublicSshKeyForAuthenticatedUser"] + }], + deletePublicSshKeyForAuthenticatedUser: ["DELETE /user/keys/{key_id}"], + follow: ["PUT /user/following/{username}"], + getAuthenticated: ["GET /user"], + getByUsername: ["GET /users/{username}"], + getContextForUser: ["GET /users/{username}/hovercard"], + getGpgKeyForAuthenticated: ["GET /user/gpg_keys/{gpg_key_id}", {}, { + renamed: ["users", "getGpgKeyForAuthenticatedUser"] + }], + getGpgKeyForAuthenticatedUser: ["GET /user/gpg_keys/{gpg_key_id}"], + getPublicSshKeyForAuthenticated: ["GET /user/keys/{key_id}", {}, { + renamed: ["users", "getPublicSshKeyForAuthenticatedUser"] + }], + getPublicSshKeyForAuthenticatedUser: ["GET /user/keys/{key_id}"], + list: ["GET /users"], + listBlockedByAuthenticated: ["GET /user/blocks", {}, { + renamed: ["users", "listBlockedByAuthenticatedUser"] + }], + listBlockedByAuthenticatedUser: ["GET /user/blocks"], + listEmailsForAuthenticated: ["GET /user/emails", {}, { + renamed: ["users", "listEmailsForAuthenticatedUser"] + }], + listEmailsForAuthenticatedUser: ["GET /user/emails"], + listFollowedByAuthenticated: ["GET /user/following", {}, { + renamed: ["users", "listFollowedByAuthenticatedUser"] + }], + listFollowedByAuthenticatedUser: ["GET /user/following"], + listFollowersForAuthenticatedUser: ["GET /user/followers"], + listFollowersForUser: ["GET /users/{username}/followers"], + listFollowingForUser: ["GET /users/{username}/following"], + listGpgKeysForAuthenticated: ["GET /user/gpg_keys", {}, { + renamed: ["users", "listGpgKeysForAuthenticatedUser"] + }], + listGpgKeysForAuthenticatedUser: ["GET /user/gpg_keys"], + listGpgKeysForUser: ["GET /users/{username}/gpg_keys"], + listPublicEmailsForAuthenticated: ["GET /user/public_emails", {}, { + renamed: ["users", "listPublicEmailsForAuthenticatedUser"] + }], + listPublicEmailsForAuthenticatedUser: ["GET /user/public_emails"], + listPublicKeysForUser: ["GET /users/{username}/keys"], + listPublicSshKeysForAuthenticated: ["GET /user/keys", {}, { + renamed: ["users", "listPublicSshKeysForAuthenticatedUser"] + }], + listPublicSshKeysForAuthenticatedUser: ["GET /user/keys"], + setPrimaryEmailVisibilityForAuthenticated: ["PATCH /user/email/visibility", {}, { + renamed: ["users", "setPrimaryEmailVisibilityForAuthenticatedUser"] + }], + setPrimaryEmailVisibilityForAuthenticatedUser: ["PATCH /user/email/visibility"], + unblock: ["DELETE /user/blocks/{username}"], + unfollow: ["DELETE /user/following/{username}"], + updateAuthenticated: ["PATCH /user"] + } +}; + +const VERSION = "5.13.0"; + +function endpointsToMethods(octokit, endpointsMap) { + const newMethods = {}; + + for (const [scope, endpoints] of Object.entries(endpointsMap)) { + for (const [methodName, endpoint] of Object.entries(endpoints)) { + const [route, defaults, decorations] = endpoint; + const [method, url] = route.split(/ /); + const endpointDefaults = Object.assign({ + method, + url + }, defaults); + + if (!newMethods[scope]) { + newMethods[scope] = {}; + } + + const scopeMethods = newMethods[scope]; + + if (decorations) { + scopeMethods[methodName] = decorate(octokit, scope, methodName, endpointDefaults, decorations); + continue; + } + + scopeMethods[methodName] = octokit.request.defaults(endpointDefaults); + } + } + + return newMethods; +} + +function decorate(octokit, scope, methodName, defaults, decorations) { + const requestWithDefaults = octokit.request.defaults(defaults); + /* istanbul ignore next */ + + function withDecorations(...args) { + // @ts-ignore https://github.com/microsoft/TypeScript/issues/25488 + let options = requestWithDefaults.endpoint.merge(...args); // There are currently no other decorations than `.mapToData` + + if (decorations.mapToData) { + options = Object.assign({}, options, { + data: options[decorations.mapToData], + [decorations.mapToData]: undefined + }); + return requestWithDefaults(options); + } + + if (decorations.renamed) { + const [newScope, newMethodName] = decorations.renamed; + octokit.log.warn(`octokit.${scope}.${methodName}() has been renamed to octokit.${newScope}.${newMethodName}()`); + } + + if (decorations.deprecated) { + octokit.log.warn(decorations.deprecated); + } + + if (decorations.renamedParameters) { + // @ts-ignore https://github.com/microsoft/TypeScript/issues/25488 + const options = requestWithDefaults.endpoint.merge(...args); + + for (const [name, alias] of Object.entries(decorations.renamedParameters)) { + if (name in options) { + octokit.log.warn(`"${name}" parameter is deprecated for "octokit.${scope}.${methodName}()". Use "${alias}" instead`); + + if (!(alias in options)) { + options[alias] = options[name]; + } + + delete options[name]; + } + } + + return requestWithDefaults(options); + } // @ts-ignore https://github.com/microsoft/TypeScript/issues/25488 + + + return requestWithDefaults(...args); + } + + return Object.assign(withDecorations, requestWithDefaults); +} + +function restEndpointMethods(octokit) { + const api = endpointsToMethods(octokit, Endpoints); + return { + rest: api + }; +} +restEndpointMethods.VERSION = VERSION; +function legacyRestEndpointMethods(octokit) { + const api = endpointsToMethods(octokit, Endpoints); + return _objectSpread2(_objectSpread2({}, api), {}, { + rest: api + }); +} +legacyRestEndpointMethods.VERSION = VERSION; + +exports.legacyRestEndpointMethods = legacyRestEndpointMethods; +exports.restEndpointMethods = restEndpointMethods; +//# sourceMappingURL=index.js.map + + +/***/ }), + +/***/ 537: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +function _interopDefault (ex) { return (ex && (typeof ex === 'object') && 'default' in ex) ? ex['default'] : ex; } + +var deprecation = __nccwpck_require__(8932); +var once = _interopDefault(__nccwpck_require__(1223)); + +const logOnceCode = once(deprecation => console.warn(deprecation)); +const logOnceHeaders = once(deprecation => console.warn(deprecation)); +/** + * Error with extra properties to help with debugging + */ + +class RequestError extends Error { + constructor(message, statusCode, options) { + super(message); // Maintains proper stack trace (only available on V8) + + /* istanbul ignore next */ + + if (Error.captureStackTrace) { + Error.captureStackTrace(this, this.constructor); + } + + this.name = "HttpError"; + this.status = statusCode; + let headers; + + if ("headers" in options && typeof options.headers !== "undefined") { + headers = options.headers; + } + + if ("response" in options) { + this.response = options.response; + headers = options.response.headers; + } // redact request credentials without mutating original request options + + + const requestCopy = Object.assign({}, options.request); + + if (options.request.headers.authorization) { + requestCopy.headers = Object.assign({}, options.request.headers, { + authorization: options.request.headers.authorization.replace(/ .*$/, " [REDACTED]") + }); + } + + requestCopy.url = requestCopy.url // client_id & client_secret can be passed as URL query parameters to increase rate limit + // see https://developer.github.com/v3/#increasing-the-unauthenticated-rate-limit-for-oauth-applications + .replace(/\bclient_secret=\w+/g, "client_secret=[REDACTED]") // OAuth tokens can be passed as URL query parameters, although it is not recommended + // see https://developer.github.com/v3/#oauth2-token-sent-in-a-header + .replace(/\baccess_token=\w+/g, "access_token=[REDACTED]"); + this.request = requestCopy; // deprecations + + Object.defineProperty(this, "code", { + get() { + logOnceCode(new deprecation.Deprecation("[@octokit/request-error] `error.code` is deprecated, use `error.status`.")); + return statusCode; + } + + }); + Object.defineProperty(this, "headers", { + get() { + logOnceHeaders(new deprecation.Deprecation("[@octokit/request-error] `error.headers` is deprecated, use `error.response.headers`.")); + return headers || {}; + } + + }); + } + +} + +exports.RequestError = RequestError; +//# sourceMappingURL=index.js.map + + +/***/ }), + +/***/ 6234: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +function _interopDefault (ex) { return (ex && (typeof ex === 'object') && 'default' in ex) ? ex['default'] : ex; } + +var endpoint = __nccwpck_require__(9440); +var universalUserAgent = __nccwpck_require__(5030); +var isPlainObject = __nccwpck_require__(3287); +var nodeFetch = _interopDefault(__nccwpck_require__(467)); +var requestError = __nccwpck_require__(537); + +const VERSION = "5.6.2"; + +function getBufferResponse(response) { + return response.arrayBuffer(); +} + +function fetchWrapper(requestOptions) { + const log = requestOptions.request && requestOptions.request.log ? requestOptions.request.log : console; + + if (isPlainObject.isPlainObject(requestOptions.body) || Array.isArray(requestOptions.body)) { + requestOptions.body = JSON.stringify(requestOptions.body); + } + + let headers = {}; + let status; + let url; + const fetch = requestOptions.request && requestOptions.request.fetch || nodeFetch; + return fetch(requestOptions.url, Object.assign({ + method: requestOptions.method, + body: requestOptions.body, + headers: requestOptions.headers, + redirect: requestOptions.redirect + }, // `requestOptions.request.agent` type is incompatible + // see https://github.com/octokit/types.ts/pull/264 + requestOptions.request)).then(async response => { + url = response.url; + status = response.status; + + for (const keyAndValue of response.headers) { + headers[keyAndValue[0]] = keyAndValue[1]; + } + + if ("deprecation" in headers) { + const matches = headers.link && headers.link.match(/<([^>]+)>; rel="deprecation"/); + const deprecationLink = matches && matches.pop(); + log.warn(`[@octokit/request] "${requestOptions.method} ${requestOptions.url}" is deprecated. It is scheduled to be removed on ${headers.sunset}${deprecationLink ? `. See ${deprecationLink}` : ""}`); + } + + if (status === 204 || status === 205) { + return; + } // GitHub API returns 200 for HEAD requests + + + if (requestOptions.method === "HEAD") { + if (status < 400) { + return; + } + + throw new requestError.RequestError(response.statusText, status, { + response: { + url, + status, + headers, + data: undefined + }, + request: requestOptions + }); + } + + if (status === 304) { + throw new requestError.RequestError("Not modified", status, { + response: { + url, + status, + headers, + data: await getResponseData(response) + }, + request: requestOptions + }); + } + + if (status >= 400) { + const data = await getResponseData(response); + const error = new requestError.RequestError(toErrorMessage(data), status, { + response: { + url, + status, + headers, + data + }, + request: requestOptions + }); + throw error; + } + + return getResponseData(response); + }).then(data => { + return { + status, + url, + headers, + data + }; + }).catch(error => { + if (error instanceof requestError.RequestError) throw error; + throw new requestError.RequestError(error.message, 500, { + request: requestOptions + }); + }); +} + +async function getResponseData(response) { + const contentType = response.headers.get("content-type"); + + if (/application\/json/.test(contentType)) { + return response.json(); + } + + if (!contentType || /^text\/|charset=utf-8$/.test(contentType)) { + return response.text(); + } + + return getBufferResponse(response); +} + +function toErrorMessage(data) { + if (typeof data === "string") return data; // istanbul ignore else - just in case + + if ("message" in data) { + if (Array.isArray(data.errors)) { + return `${data.message}: ${data.errors.map(JSON.stringify).join(", ")}`; + } + + return data.message; + } // istanbul ignore next - just in case + + + return `Unknown error: ${JSON.stringify(data)}`; +} + +function withDefaults(oldEndpoint, newDefaults) { + const endpoint = oldEndpoint.defaults(newDefaults); + + const newApi = function (route, parameters) { + const endpointOptions = endpoint.merge(route, parameters); + + if (!endpointOptions.request || !endpointOptions.request.hook) { + return fetchWrapper(endpoint.parse(endpointOptions)); + } + + const request = (route, parameters) => { + return fetchWrapper(endpoint.parse(endpoint.merge(route, parameters))); + }; + + Object.assign(request, { + endpoint, + defaults: withDefaults.bind(null, endpoint) + }); + return endpointOptions.request.hook(request, endpointOptions); + }; + + return Object.assign(newApi, { + endpoint, + defaults: withDefaults.bind(null, endpoint) + }); +} + +const request = withDefaults(endpoint.endpoint, { + headers: { + "user-agent": `octokit-request.js/${VERSION} ${universalUserAgent.getUserAgent()}` + } +}); + +exports.request = request; +//# sourceMappingURL=index.js.map + + +/***/ }), + +/***/ 3682: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +var register = __nccwpck_require__(4670) +var addHook = __nccwpck_require__(5549) +var removeHook = __nccwpck_require__(6819) + +// bind with array of arguments: https://stackoverflow.com/a/21792913 +var bind = Function.bind +var bindable = bind.bind(bind) + +function bindApi (hook, state, name) { + var removeHookRef = bindable(removeHook, null).apply(null, name ? [state, name] : [state]) + hook.api = { remove: removeHookRef } + hook.remove = removeHookRef + + ;['before', 'error', 'after', 'wrap'].forEach(function (kind) { + var args = name ? [state, kind, name] : [state, kind] + hook[kind] = hook.api[kind] = bindable(addHook, null).apply(null, args) + }) +} + +function HookSingular () { + var singularHookName = 'h' + var singularHookState = { + registry: {} + } + var singularHook = register.bind(null, singularHookState, singularHookName) + bindApi(singularHook, singularHookState, singularHookName) + return singularHook +} + +function HookCollection () { + var state = { + registry: {} + } + + var hook = register.bind(null, state) + bindApi(hook, state) + + return hook +} + +var collectionHookDeprecationMessageDisplayed = false +function Hook () { + if (!collectionHookDeprecationMessageDisplayed) { + console.warn('[before-after-hook]: "Hook()" repurposing warning, use "Hook.Collection()". Read more: https://git.io/upgrade-before-after-hook-to-1.4') + collectionHookDeprecationMessageDisplayed = true + } + return HookCollection() +} + +Hook.Singular = HookSingular.bind() +Hook.Collection = HookCollection.bind() + +module.exports = Hook +// expose constructors as a named property for TypeScript +module.exports.Hook = Hook +module.exports.Singular = Hook.Singular +module.exports.Collection = Hook.Collection + + +/***/ }), + +/***/ 5549: +/***/ ((module) => { + +module.exports = addHook; + +function addHook(state, kind, name, hook) { + var orig = hook; + if (!state.registry[name]) { + state.registry[name] = []; + } + + if (kind === "before") { + hook = function (method, options) { + return Promise.resolve() + .then(orig.bind(null, options)) + .then(method.bind(null, options)); + }; + } + + if (kind === "after") { + hook = function (method, options) { + var result; + return Promise.resolve() + .then(method.bind(null, options)) + .then(function (result_) { + result = result_; + return orig(result, options); + }) + .then(function () { + return result; + }); + }; + } + + if (kind === "error") { + hook = function (method, options) { + return Promise.resolve() + .then(method.bind(null, options)) + .catch(function (error) { + return orig(error, options); + }); + }; + } + + state.registry[name].push({ + hook: hook, + orig: orig, + }); +} + + +/***/ }), + +/***/ 4670: +/***/ ((module) => { + +module.exports = register; + +function register(state, name, method, options) { + if (typeof method !== "function") { + throw new Error("method for before hook must be a function"); + } + + if (!options) { + options = {}; + } + + if (Array.isArray(name)) { + return name.reverse().reduce(function (callback, name) { + return register.bind(null, state, name, callback, options); + }, method)(); + } + + return Promise.resolve().then(function () { + if (!state.registry[name]) { + return method(options); + } + + return state.registry[name].reduce(function (method, registered) { + return registered.hook.bind(null, method, options); + }, method)(); + }); +} + + +/***/ }), + +/***/ 6819: +/***/ ((module) => { + +module.exports = removeHook; + +function removeHook(state, name, method) { + if (!state.registry[name]) { + return; + } + + var index = state.registry[name] + .map(function (registered) { + return registered.orig; + }) + .indexOf(method); + + if (index === -1) { + return; + } + + state.registry[name].splice(index, 1); +} + + +/***/ }), + +/***/ 8932: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +class Deprecation extends Error { + constructor(message) { + super(message); // Maintains proper stack trace (only available on V8) + + /* istanbul ignore next */ + + if (Error.captureStackTrace) { + Error.captureStackTrace(this, this.constructor); + } + + this.name = 'Deprecation'; + } + +} + +exports.Deprecation = Deprecation; + + +/***/ }), + +/***/ 3287: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +/*! + * is-plain-object + * + * Copyright (c) 2014-2017, Jon Schlinkert. + * Released under the MIT License. + */ + +function isObject(o) { + return Object.prototype.toString.call(o) === '[object Object]'; +} + +function isPlainObject(o) { + var ctor,prot; + + if (isObject(o) === false) return false; + + // If has modified constructor + ctor = o.constructor; + if (ctor === undefined) return true; + + // If has modified prototype + prot = ctor.prototype; + if (isObject(prot) === false) return false; + + // If constructor does not have an Object-specific method + if (prot.hasOwnProperty('isPrototypeOf') === false) { + return false; + } + + // Most likely a plain Object + return true; +} + +exports.isPlainObject = isPlainObject; + + +/***/ }), + +/***/ 9623: /***/ (function(module, __unused_webpack_exports, __nccwpck_require__) { /* module decorator */ module = __nccwpck_require__.nmd(module); @@ -10719,27 +13481,1956 @@ function coerce (version, options) { /***/ }), -/***/ 294: -/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { +/***/ 467: +/***/ ((module, exports, __nccwpck_require__) => { -module.exports = __nccwpck_require__(219); +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +function _interopDefault (ex) { return (ex && (typeof ex === 'object') && 'default' in ex) ? ex['default'] : ex; } + +var Stream = _interopDefault(__nccwpck_require__(2413)); +var http = _interopDefault(__nccwpck_require__(8605)); +var Url = _interopDefault(__nccwpck_require__(8835)); +var whatwgUrl = _interopDefault(__nccwpck_require__(8665)); +var https = _interopDefault(__nccwpck_require__(7211)); +var zlib = _interopDefault(__nccwpck_require__(8761)); + +// Based on https://github.com/tmpvar/jsdom/blob/aa85b2abf07766ff7bf5c1f6daafb3726f2f2db5/lib/jsdom/living/blob.js + +// fix for "Readable" isn't a named export issue +const Readable = Stream.Readable; + +const BUFFER = Symbol('buffer'); +const TYPE = Symbol('type'); + +class Blob { + constructor() { + this[TYPE] = ''; + + const blobParts = arguments[0]; + const options = arguments[1]; + + const buffers = []; + let size = 0; + + if (blobParts) { + const a = blobParts; + const length = Number(a.length); + for (let i = 0; i < length; i++) { + const element = a[i]; + let buffer; + if (element instanceof Buffer) { + buffer = element; + } else if (ArrayBuffer.isView(element)) { + buffer = Buffer.from(element.buffer, element.byteOffset, element.byteLength); + } else if (element instanceof ArrayBuffer) { + buffer = Buffer.from(element); + } else if (element instanceof Blob) { + buffer = element[BUFFER]; + } else { + buffer = Buffer.from(typeof element === 'string' ? element : String(element)); + } + size += buffer.length; + buffers.push(buffer); + } + } + + this[BUFFER] = Buffer.concat(buffers); + + let type = options && options.type !== undefined && String(options.type).toLowerCase(); + if (type && !/[^\u0020-\u007E]/.test(type)) { + this[TYPE] = type; + } + } + get size() { + return this[BUFFER].length; + } + get type() { + return this[TYPE]; + } + text() { + return Promise.resolve(this[BUFFER].toString()); + } + arrayBuffer() { + const buf = this[BUFFER]; + const ab = buf.buffer.slice(buf.byteOffset, buf.byteOffset + buf.byteLength); + return Promise.resolve(ab); + } + stream() { + const readable = new Readable(); + readable._read = function () {}; + readable.push(this[BUFFER]); + readable.push(null); + return readable; + } + toString() { + return '[object Blob]'; + } + slice() { + const size = this.size; + + const start = arguments[0]; + const end = arguments[1]; + let relativeStart, relativeEnd; + if (start === undefined) { + relativeStart = 0; + } else if (start < 0) { + relativeStart = Math.max(size + start, 0); + } else { + relativeStart = Math.min(start, size); + } + if (end === undefined) { + relativeEnd = size; + } else if (end < 0) { + relativeEnd = Math.max(size + end, 0); + } else { + relativeEnd = Math.min(end, size); + } + const span = Math.max(relativeEnd - relativeStart, 0); + + const buffer = this[BUFFER]; + const slicedBuffer = buffer.slice(relativeStart, relativeStart + span); + const blob = new Blob([], { type: arguments[2] }); + blob[BUFFER] = slicedBuffer; + return blob; + } +} + +Object.defineProperties(Blob.prototype, { + size: { enumerable: true }, + type: { enumerable: true }, + slice: { enumerable: true } +}); + +Object.defineProperty(Blob.prototype, Symbol.toStringTag, { + value: 'Blob', + writable: false, + enumerable: false, + configurable: true +}); + +/** + * fetch-error.js + * + * FetchError interface for operational errors + */ + +/** + * Create FetchError instance + * + * @param String message Error message for human + * @param String type Error type for machine + * @param String systemError For Node.js system error + * @return FetchError + */ +function FetchError(message, type, systemError) { + Error.call(this, message); + + this.message = message; + this.type = type; + + // when err.type is `system`, err.code contains system error code + if (systemError) { + this.code = this.errno = systemError.code; + } + + // hide custom error implementation details from end-users + Error.captureStackTrace(this, this.constructor); +} + +FetchError.prototype = Object.create(Error.prototype); +FetchError.prototype.constructor = FetchError; +FetchError.prototype.name = 'FetchError'; + +let convert; +try { + convert = __nccwpck_require__(2877).convert; +} catch (e) {} + +const INTERNALS = Symbol('Body internals'); + +// fix an issue where "PassThrough" isn't a named export for node <10 +const PassThrough = Stream.PassThrough; + +/** + * Body mixin + * + * Ref: https://fetch.spec.whatwg.org/#body + * + * @param Stream body Readable stream + * @param Object opts Response options + * @return Void + */ +function Body(body) { + var _this = this; + + var _ref = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {}, + _ref$size = _ref.size; + + let size = _ref$size === undefined ? 0 : _ref$size; + var _ref$timeout = _ref.timeout; + let timeout = _ref$timeout === undefined ? 0 : _ref$timeout; + + if (body == null) { + // body is undefined or null + body = null; + } else if (isURLSearchParams(body)) { + // body is a URLSearchParams + body = Buffer.from(body.toString()); + } else if (isBlob(body)) ; else if (Buffer.isBuffer(body)) ; else if (Object.prototype.toString.call(body) === '[object ArrayBuffer]') { + // body is ArrayBuffer + body = Buffer.from(body); + } else if (ArrayBuffer.isView(body)) { + // body is ArrayBufferView + body = Buffer.from(body.buffer, body.byteOffset, body.byteLength); + } else if (body instanceof Stream) ; else { + // none of the above + // coerce to string then buffer + body = Buffer.from(String(body)); + } + this[INTERNALS] = { + body, + disturbed: false, + error: null + }; + this.size = size; + this.timeout = timeout; + + if (body instanceof Stream) { + body.on('error', function (err) { + const error = err.name === 'AbortError' ? err : new FetchError(`Invalid response body while trying to fetch ${_this.url}: ${err.message}`, 'system', err); + _this[INTERNALS].error = error; + }); + } +} + +Body.prototype = { + get body() { + return this[INTERNALS].body; + }, + + get bodyUsed() { + return this[INTERNALS].disturbed; + }, + + /** + * Decode response as ArrayBuffer + * + * @return Promise + */ + arrayBuffer() { + return consumeBody.call(this).then(function (buf) { + return buf.buffer.slice(buf.byteOffset, buf.byteOffset + buf.byteLength); + }); + }, + + /** + * Return raw response as Blob + * + * @return Promise + */ + blob() { + let ct = this.headers && this.headers.get('content-type') || ''; + return consumeBody.call(this).then(function (buf) { + return Object.assign( + // Prevent copying + new Blob([], { + type: ct.toLowerCase() + }), { + [BUFFER]: buf + }); + }); + }, + + /** + * Decode response as json + * + * @return Promise + */ + json() { + var _this2 = this; + + return consumeBody.call(this).then(function (buffer) { + try { + return JSON.parse(buffer.toString()); + } catch (err) { + return Body.Promise.reject(new FetchError(`invalid json response body at ${_this2.url} reason: ${err.message}`, 'invalid-json')); + } + }); + }, + + /** + * Decode response as text + * + * @return Promise + */ + text() { + return consumeBody.call(this).then(function (buffer) { + return buffer.toString(); + }); + }, + + /** + * Decode response as buffer (non-spec api) + * + * @return Promise + */ + buffer() { + return consumeBody.call(this); + }, + + /** + * Decode response as text, while automatically detecting the encoding and + * trying to decode to UTF-8 (non-spec api) + * + * @return Promise + */ + textConverted() { + var _this3 = this; + + return consumeBody.call(this).then(function (buffer) { + return convertBody(buffer, _this3.headers); + }); + } +}; + +// In browsers, all properties are enumerable. +Object.defineProperties(Body.prototype, { + body: { enumerable: true }, + bodyUsed: { enumerable: true }, + arrayBuffer: { enumerable: true }, + blob: { enumerable: true }, + json: { enumerable: true }, + text: { enumerable: true } +}); + +Body.mixIn = function (proto) { + for (const name of Object.getOwnPropertyNames(Body.prototype)) { + // istanbul ignore else: future proof + if (!(name in proto)) { + const desc = Object.getOwnPropertyDescriptor(Body.prototype, name); + Object.defineProperty(proto, name, desc); + } + } +}; + +/** + * Consume and convert an entire Body to a Buffer. + * + * Ref: https://fetch.spec.whatwg.org/#concept-body-consume-body + * + * @return Promise + */ +function consumeBody() { + var _this4 = this; + + if (this[INTERNALS].disturbed) { + return Body.Promise.reject(new TypeError(`body used already for: ${this.url}`)); + } + + this[INTERNALS].disturbed = true; + + if (this[INTERNALS].error) { + return Body.Promise.reject(this[INTERNALS].error); + } + + let body = this.body; + + // body is null + if (body === null) { + return Body.Promise.resolve(Buffer.alloc(0)); + } + + // body is blob + if (isBlob(body)) { + body = body.stream(); + } + + // body is buffer + if (Buffer.isBuffer(body)) { + return Body.Promise.resolve(body); + } + + // istanbul ignore if: should never happen + if (!(body instanceof Stream)) { + return Body.Promise.resolve(Buffer.alloc(0)); + } + + // body is stream + // get ready to actually consume the body + let accum = []; + let accumBytes = 0; + let abort = false; + + return new Body.Promise(function (resolve, reject) { + let resTimeout; + + // allow timeout on slow response body + if (_this4.timeout) { + resTimeout = setTimeout(function () { + abort = true; + reject(new FetchError(`Response timeout while trying to fetch ${_this4.url} (over ${_this4.timeout}ms)`, 'body-timeout')); + }, _this4.timeout); + } + + // handle stream errors + body.on('error', function (err) { + if (err.name === 'AbortError') { + // if the request was aborted, reject with this Error + abort = true; + reject(err); + } else { + // other errors, such as incorrect content-encoding + reject(new FetchError(`Invalid response body while trying to fetch ${_this4.url}: ${err.message}`, 'system', err)); + } + }); + + body.on('data', function (chunk) { + if (abort || chunk === null) { + return; + } + + if (_this4.size && accumBytes + chunk.length > _this4.size) { + abort = true; + reject(new FetchError(`content size at ${_this4.url} over limit: ${_this4.size}`, 'max-size')); + return; + } + + accumBytes += chunk.length; + accum.push(chunk); + }); + + body.on('end', function () { + if (abort) { + return; + } + + clearTimeout(resTimeout); + + try { + resolve(Buffer.concat(accum, accumBytes)); + } catch (err) { + // handle streams that have accumulated too much data (issue #414) + reject(new FetchError(`Could not create Buffer from response body for ${_this4.url}: ${err.message}`, 'system', err)); + } + }); + }); +} + +/** + * Detect buffer encoding and convert to target encoding + * ref: http://www.w3.org/TR/2011/WD-html5-20110113/parsing.html#determining-the-character-encoding + * + * @param Buffer buffer Incoming buffer + * @param String encoding Target encoding + * @return String + */ +function convertBody(buffer, headers) { + if (typeof convert !== 'function') { + throw new Error('The package `encoding` must be installed to use the textConverted() function'); + } + + const ct = headers.get('content-type'); + let charset = 'utf-8'; + let res, str; + + // header + if (ct) { + res = /charset=([^;]*)/i.exec(ct); + } + + // no charset in content type, peek at response body for at most 1024 bytes + str = buffer.slice(0, 1024).toString(); + + // html5 + if (!res && str) { + res = / 0 && arguments[0] !== undefined ? arguments[0] : undefined; + + this[MAP] = Object.create(null); + + if (init instanceof Headers) { + const rawHeaders = init.raw(); + const headerNames = Object.keys(rawHeaders); + + for (const headerName of headerNames) { + for (const value of rawHeaders[headerName]) { + this.append(headerName, value); + } + } + + return; + } + + // We don't worry about converting prop to ByteString here as append() + // will handle it. + if (init == null) ; else if (typeof init === 'object') { + const method = init[Symbol.iterator]; + if (method != null) { + if (typeof method !== 'function') { + throw new TypeError('Header pairs must be iterable'); + } + + // sequence> + // Note: per spec we have to first exhaust the lists then process them + const pairs = []; + for (const pair of init) { + if (typeof pair !== 'object' || typeof pair[Symbol.iterator] !== 'function') { + throw new TypeError('Each header pair must be iterable'); + } + pairs.push(Array.from(pair)); + } + + for (const pair of pairs) { + if (pair.length !== 2) { + throw new TypeError('Each header pair must be a name/value tuple'); + } + this.append(pair[0], pair[1]); + } + } else { + // record + for (const key of Object.keys(init)) { + const value = init[key]; + this.append(key, value); + } + } + } else { + throw new TypeError('Provided initializer must be an object'); + } + } + + /** + * Return combined header value given name + * + * @param String name Header name + * @return Mixed + */ + get(name) { + name = `${name}`; + validateName(name); + const key = find(this[MAP], name); + if (key === undefined) { + return null; + } + + return this[MAP][key].join(', '); + } + + /** + * Iterate over all headers + * + * @param Function callback Executed for each item with parameters (value, name, thisArg) + * @param Boolean thisArg `this` context for callback function + * @return Void + */ + forEach(callback) { + let thisArg = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : undefined; + + let pairs = getHeaders(this); + let i = 0; + while (i < pairs.length) { + var _pairs$i = pairs[i]; + const name = _pairs$i[0], + value = _pairs$i[1]; + + callback.call(thisArg, value, name, this); + pairs = getHeaders(this); + i++; + } + } + + /** + * Overwrite header values given name + * + * @param String name Header name + * @param String value Header value + * @return Void + */ + set(name, value) { + name = `${name}`; + value = `${value}`; + validateName(name); + validateValue(value); + const key = find(this[MAP], name); + this[MAP][key !== undefined ? key : name] = [value]; + } + + /** + * Append a value onto existing header + * + * @param String name Header name + * @param String value Header value + * @return Void + */ + append(name, value) { + name = `${name}`; + value = `${value}`; + validateName(name); + validateValue(value); + const key = find(this[MAP], name); + if (key !== undefined) { + this[MAP][key].push(value); + } else { + this[MAP][name] = [value]; + } + } + + /** + * Check for header name existence + * + * @param String name Header name + * @return Boolean + */ + has(name) { + name = `${name}`; + validateName(name); + return find(this[MAP], name) !== undefined; + } + + /** + * Delete all header values given name + * + * @param String name Header name + * @return Void + */ + delete(name) { + name = `${name}`; + validateName(name); + const key = find(this[MAP], name); + if (key !== undefined) { + delete this[MAP][key]; + } + } + + /** + * Return raw headers (non-spec api) + * + * @return Object + */ + raw() { + return this[MAP]; + } + + /** + * Get an iterator on keys. + * + * @return Iterator + */ + keys() { + return createHeadersIterator(this, 'key'); + } + + /** + * Get an iterator on values. + * + * @return Iterator + */ + values() { + return createHeadersIterator(this, 'value'); + } + + /** + * Get an iterator on entries. + * + * This is the default iterator of the Headers object. + * + * @return Iterator + */ + [Symbol.iterator]() { + return createHeadersIterator(this, 'key+value'); + } +} +Headers.prototype.entries = Headers.prototype[Symbol.iterator]; + +Object.defineProperty(Headers.prototype, Symbol.toStringTag, { + value: 'Headers', + writable: false, + enumerable: false, + configurable: true +}); + +Object.defineProperties(Headers.prototype, { + get: { enumerable: true }, + forEach: { enumerable: true }, + set: { enumerable: true }, + append: { enumerable: true }, + has: { enumerable: true }, + delete: { enumerable: true }, + keys: { enumerable: true }, + values: { enumerable: true }, + entries: { enumerable: true } +}); + +function getHeaders(headers) { + let kind = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : 'key+value'; + + const keys = Object.keys(headers[MAP]).sort(); + return keys.map(kind === 'key' ? function (k) { + return k.toLowerCase(); + } : kind === 'value' ? function (k) { + return headers[MAP][k].join(', '); + } : function (k) { + return [k.toLowerCase(), headers[MAP][k].join(', ')]; + }); +} + +const INTERNAL = Symbol('internal'); + +function createHeadersIterator(target, kind) { + const iterator = Object.create(HeadersIteratorPrototype); + iterator[INTERNAL] = { + target, + kind, + index: 0 + }; + return iterator; +} + +const HeadersIteratorPrototype = Object.setPrototypeOf({ + next() { + // istanbul ignore if + if (!this || Object.getPrototypeOf(this) !== HeadersIteratorPrototype) { + throw new TypeError('Value of `this` is not a HeadersIterator'); + } + + var _INTERNAL = this[INTERNAL]; + const target = _INTERNAL.target, + kind = _INTERNAL.kind, + index = _INTERNAL.index; + + const values = getHeaders(target, kind); + const len = values.length; + if (index >= len) { + return { + value: undefined, + done: true + }; + } + + this[INTERNAL].index = index + 1; + + return { + value: values[index], + done: false + }; + } +}, Object.getPrototypeOf(Object.getPrototypeOf([][Symbol.iterator]()))); + +Object.defineProperty(HeadersIteratorPrototype, Symbol.toStringTag, { + value: 'HeadersIterator', + writable: false, + enumerable: false, + configurable: true +}); + +/** + * Export the Headers object in a form that Node.js can consume. + * + * @param Headers headers + * @return Object + */ +function exportNodeCompatibleHeaders(headers) { + const obj = Object.assign({ __proto__: null }, headers[MAP]); + + // http.request() only supports string as Host header. This hack makes + // specifying custom Host header possible. + const hostHeaderKey = find(headers[MAP], 'Host'); + if (hostHeaderKey !== undefined) { + obj[hostHeaderKey] = obj[hostHeaderKey][0]; + } + + return obj; +} + +/** + * Create a Headers object from an object of headers, ignoring those that do + * not conform to HTTP grammar productions. + * + * @param Object obj Object of headers + * @return Headers + */ +function createHeadersLenient(obj) { + const headers = new Headers(); + for (const name of Object.keys(obj)) { + if (invalidTokenRegex.test(name)) { + continue; + } + if (Array.isArray(obj[name])) { + for (const val of obj[name]) { + if (invalidHeaderCharRegex.test(val)) { + continue; + } + if (headers[MAP][name] === undefined) { + headers[MAP][name] = [val]; + } else { + headers[MAP][name].push(val); + } + } + } else if (!invalidHeaderCharRegex.test(obj[name])) { + headers[MAP][name] = [obj[name]]; + } + } + return headers; +} + +const INTERNALS$1 = Symbol('Response internals'); + +// fix an issue where "STATUS_CODES" aren't a named export for node <10 +const STATUS_CODES = http.STATUS_CODES; + +/** + * Response class + * + * @param Stream body Readable stream + * @param Object opts Response options + * @return Void + */ +class Response { + constructor() { + let body = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : null; + let opts = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {}; + + Body.call(this, body, opts); + + const status = opts.status || 200; + const headers = new Headers(opts.headers); + + if (body != null && !headers.has('Content-Type')) { + const contentType = extractContentType(body); + if (contentType) { + headers.append('Content-Type', contentType); + } + } + + this[INTERNALS$1] = { + url: opts.url, + status, + statusText: opts.statusText || STATUS_CODES[status], + headers, + counter: opts.counter + }; + } + + get url() { + return this[INTERNALS$1].url || ''; + } + + get status() { + return this[INTERNALS$1].status; + } + + /** + * Convenience property representing if the request ended normally + */ + get ok() { + return this[INTERNALS$1].status >= 200 && this[INTERNALS$1].status < 300; + } + + get redirected() { + return this[INTERNALS$1].counter > 0; + } + + get statusText() { + return this[INTERNALS$1].statusText; + } + + get headers() { + return this[INTERNALS$1].headers; + } + + /** + * Clone this response + * + * @return Response + */ + clone() { + return new Response(clone(this), { + url: this.url, + status: this.status, + statusText: this.statusText, + headers: this.headers, + ok: this.ok, + redirected: this.redirected + }); + } +} + +Body.mixIn(Response.prototype); + +Object.defineProperties(Response.prototype, { + url: { enumerable: true }, + status: { enumerable: true }, + ok: { enumerable: true }, + redirected: { enumerable: true }, + statusText: { enumerable: true }, + headers: { enumerable: true }, + clone: { enumerable: true } +}); + +Object.defineProperty(Response.prototype, Symbol.toStringTag, { + value: 'Response', + writable: false, + enumerable: false, + configurable: true +}); + +const INTERNALS$2 = Symbol('Request internals'); +const URL = whatwgUrl.URL; + +// fix an issue where "format", "parse" aren't a named export for node <10 +const parse_url = Url.parse; +const format_url = Url.format; + +/** + * Wrapper around `new URL` to handle arbitrary URLs + * + * @param {string} urlStr + * @return {void} + */ +function parseURL(urlStr) { + /* + Check whether the URL is absolute or not + Scheme: https://tools.ietf.org/html/rfc3986#section-3.1 + Absolute URL: https://tools.ietf.org/html/rfc3986#section-4.3 + */ + if (/^[a-zA-Z][a-zA-Z\d+\-.]*:/.exec(urlStr)) { + urlStr = new URL(urlStr).toString(); + } + + // Fallback to old implementation for arbitrary URLs + return parse_url(urlStr); +} + +const streamDestructionSupported = 'destroy' in Stream.Readable.prototype; + +/** + * Check if a value is an instance of Request. + * + * @param Mixed input + * @return Boolean + */ +function isRequest(input) { + return typeof input === 'object' && typeof input[INTERNALS$2] === 'object'; +} + +function isAbortSignal(signal) { + const proto = signal && typeof signal === 'object' && Object.getPrototypeOf(signal); + return !!(proto && proto.constructor.name === 'AbortSignal'); +} + +/** + * Request class + * + * @param Mixed input Url or Request instance + * @param Object init Custom options + * @return Void + */ +class Request { + constructor(input) { + let init = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {}; + + let parsedURL; + + // normalize input + if (!isRequest(input)) { + if (input && input.href) { + // in order to support Node.js' Url objects; though WHATWG's URL objects + // will fall into this branch also (since their `toString()` will return + // `href` property anyway) + parsedURL = parseURL(input.href); + } else { + // coerce input to a string before attempting to parse + parsedURL = parseURL(`${input}`); + } + input = {}; + } else { + parsedURL = parseURL(input.url); + } + + let method = init.method || input.method || 'GET'; + method = method.toUpperCase(); + + if ((init.body != null || isRequest(input) && input.body !== null) && (method === 'GET' || method === 'HEAD')) { + throw new TypeError('Request with GET/HEAD method cannot have body'); + } + + let inputBody = init.body != null ? init.body : isRequest(input) && input.body !== null ? clone(input) : null; + + Body.call(this, inputBody, { + timeout: init.timeout || input.timeout || 0, + size: init.size || input.size || 0 + }); + + const headers = new Headers(init.headers || input.headers || {}); + + if (inputBody != null && !headers.has('Content-Type')) { + const contentType = extractContentType(inputBody); + if (contentType) { + headers.append('Content-Type', contentType); + } + } + + let signal = isRequest(input) ? input.signal : null; + if ('signal' in init) signal = init.signal; + + if (signal != null && !isAbortSignal(signal)) { + throw new TypeError('Expected signal to be an instanceof AbortSignal'); + } + + this[INTERNALS$2] = { + method, + redirect: init.redirect || input.redirect || 'follow', + headers, + parsedURL, + signal + }; + + // node-fetch-only options + this.follow = init.follow !== undefined ? init.follow : input.follow !== undefined ? input.follow : 20; + this.compress = init.compress !== undefined ? init.compress : input.compress !== undefined ? input.compress : true; + this.counter = init.counter || input.counter || 0; + this.agent = init.agent || input.agent; + } + + get method() { + return this[INTERNALS$2].method; + } + + get url() { + return format_url(this[INTERNALS$2].parsedURL); + } + + get headers() { + return this[INTERNALS$2].headers; + } + + get redirect() { + return this[INTERNALS$2].redirect; + } + + get signal() { + return this[INTERNALS$2].signal; + } + + /** + * Clone this request + * + * @return Request + */ + clone() { + return new Request(this); + } +} + +Body.mixIn(Request.prototype); + +Object.defineProperty(Request.prototype, Symbol.toStringTag, { + value: 'Request', + writable: false, + enumerable: false, + configurable: true +}); + +Object.defineProperties(Request.prototype, { + method: { enumerable: true }, + url: { enumerable: true }, + headers: { enumerable: true }, + redirect: { enumerable: true }, + clone: { enumerable: true }, + signal: { enumerable: true } +}); + +/** + * Convert a Request to Node.js http request options. + * + * @param Request A Request instance + * @return Object The options object to be passed to http.request + */ +function getNodeRequestOptions(request) { + const parsedURL = request[INTERNALS$2].parsedURL; + const headers = new Headers(request[INTERNALS$2].headers); + + // fetch step 1.3 + if (!headers.has('Accept')) { + headers.set('Accept', '*/*'); + } + + // Basic fetch + if (!parsedURL.protocol || !parsedURL.hostname) { + throw new TypeError('Only absolute URLs are supported'); + } + + if (!/^https?:$/.test(parsedURL.protocol)) { + throw new TypeError('Only HTTP(S) protocols are supported'); + } + + if (request.signal && request.body instanceof Stream.Readable && !streamDestructionSupported) { + throw new Error('Cancellation of streamed requests with AbortSignal is not supported in node < 8'); + } + + // HTTP-network-or-cache fetch steps 2.4-2.7 + let contentLengthValue = null; + if (request.body == null && /^(POST|PUT)$/i.test(request.method)) { + contentLengthValue = '0'; + } + if (request.body != null) { + const totalBytes = getTotalBytes(request); + if (typeof totalBytes === 'number') { + contentLengthValue = String(totalBytes); + } + } + if (contentLengthValue) { + headers.set('Content-Length', contentLengthValue); + } + + // HTTP-network-or-cache fetch step 2.11 + if (!headers.has('User-Agent')) { + headers.set('User-Agent', 'node-fetch/1.0 (+https://github.com/bitinn/node-fetch)'); + } + + // HTTP-network-or-cache fetch step 2.15 + if (request.compress && !headers.has('Accept-Encoding')) { + headers.set('Accept-Encoding', 'gzip,deflate'); + } + + let agent = request.agent; + if (typeof agent === 'function') { + agent = agent(parsedURL); + } + + if (!headers.has('Connection') && !agent) { + headers.set('Connection', 'close'); + } + + // HTTP-network fetch step 4.2 + // chunked encoding is handled by Node.js + + return Object.assign({}, parsedURL, { + method: request.method, + headers: exportNodeCompatibleHeaders(headers), + agent + }); +} + +/** + * abort-error.js + * + * AbortError interface for cancelled requests + */ + +/** + * Create AbortError instance + * + * @param String message Error message for human + * @return AbortError + */ +function AbortError(message) { + Error.call(this, message); + + this.type = 'aborted'; + this.message = message; + + // hide custom error implementation details from end-users + Error.captureStackTrace(this, this.constructor); +} + +AbortError.prototype = Object.create(Error.prototype); +AbortError.prototype.constructor = AbortError; +AbortError.prototype.name = 'AbortError'; + +// fix an issue where "PassThrough", "resolve" aren't a named export for node <10 +const PassThrough$1 = Stream.PassThrough; +const resolve_url = Url.resolve; + +/** + * Fetch function + * + * @param Mixed url Absolute url or Request instance + * @param Object opts Fetch options + * @return Promise + */ +function fetch(url, opts) { + + // allow custom promise + if (!fetch.Promise) { + throw new Error('native promise missing, set fetch.Promise to your favorite alternative'); + } + + Body.Promise = fetch.Promise; + + // wrap http.request into fetch + return new fetch.Promise(function (resolve, reject) { + // build request object + const request = new Request(url, opts); + const options = getNodeRequestOptions(request); + + const send = (options.protocol === 'https:' ? https : http).request; + const signal = request.signal; + + let response = null; + + const abort = function abort() { + let error = new AbortError('The user aborted a request.'); + reject(error); + if (request.body && request.body instanceof Stream.Readable) { + request.body.destroy(error); + } + if (!response || !response.body) return; + response.body.emit('error', error); + }; + + if (signal && signal.aborted) { + abort(); + return; + } + + const abortAndFinalize = function abortAndFinalize() { + abort(); + finalize(); + }; + + // send request + const req = send(options); + let reqTimeout; + + if (signal) { + signal.addEventListener('abort', abortAndFinalize); + } + + function finalize() { + req.abort(); + if (signal) signal.removeEventListener('abort', abortAndFinalize); + clearTimeout(reqTimeout); + } + + if (request.timeout) { + req.once('socket', function (socket) { + reqTimeout = setTimeout(function () { + reject(new FetchError(`network timeout at: ${request.url}`, 'request-timeout')); + finalize(); + }, request.timeout); + }); + } + + req.on('error', function (err) { + reject(new FetchError(`request to ${request.url} failed, reason: ${err.message}`, 'system', err)); + finalize(); + }); + + req.on('response', function (res) { + clearTimeout(reqTimeout); + + const headers = createHeadersLenient(res.headers); + + // HTTP fetch step 5 + if (fetch.isRedirect(res.statusCode)) { + // HTTP fetch step 5.2 + const location = headers.get('Location'); + + // HTTP fetch step 5.3 + const locationURL = location === null ? null : resolve_url(request.url, location); + + // HTTP fetch step 5.5 + switch (request.redirect) { + case 'error': + reject(new FetchError(`uri requested responds with a redirect, redirect mode is set to error: ${request.url}`, 'no-redirect')); + finalize(); + return; + case 'manual': + // node-fetch-specific step: make manual redirect a bit easier to use by setting the Location header value to the resolved URL. + if (locationURL !== null) { + // handle corrupted header + try { + headers.set('Location', locationURL); + } catch (err) { + // istanbul ignore next: nodejs server prevent invalid response headers, we can't test this through normal request + reject(err); + } + } + break; + case 'follow': + // HTTP-redirect fetch step 2 + if (locationURL === null) { + break; + } + + // HTTP-redirect fetch step 5 + if (request.counter >= request.follow) { + reject(new FetchError(`maximum redirect reached at: ${request.url}`, 'max-redirect')); + finalize(); + return; + } + + // HTTP-redirect fetch step 6 (counter increment) + // Create a new Request object. + const requestOpts = { + headers: new Headers(request.headers), + follow: request.follow, + counter: request.counter + 1, + agent: request.agent, + compress: request.compress, + method: request.method, + body: request.body, + signal: request.signal, + timeout: request.timeout, + size: request.size + }; + + // HTTP-redirect fetch step 9 + if (res.statusCode !== 303 && request.body && getTotalBytes(request) === null) { + reject(new FetchError('Cannot follow redirect with body being a readable stream', 'unsupported-redirect')); + finalize(); + return; + } + + // HTTP-redirect fetch step 11 + if (res.statusCode === 303 || (res.statusCode === 301 || res.statusCode === 302) && request.method === 'POST') { + requestOpts.method = 'GET'; + requestOpts.body = undefined; + requestOpts.headers.delete('content-length'); + } + + // HTTP-redirect fetch step 15 + resolve(fetch(new Request(locationURL, requestOpts))); + finalize(); + return; + } + } + + // prepare response + res.once('end', function () { + if (signal) signal.removeEventListener('abort', abortAndFinalize); + }); + let body = res.pipe(new PassThrough$1()); + + const response_options = { + url: request.url, + status: res.statusCode, + statusText: res.statusMessage, + headers: headers, + size: request.size, + timeout: request.timeout, + counter: request.counter + }; + + // HTTP-network fetch step 12.1.1.3 + const codings = headers.get('Content-Encoding'); + + // HTTP-network fetch step 12.1.1.4: handle content codings + + // in following scenarios we ignore compression support + // 1. compression support is disabled + // 2. HEAD request + // 3. no Content-Encoding header + // 4. no content response (204) + // 5. content not modified response (304) + if (!request.compress || request.method === 'HEAD' || codings === null || res.statusCode === 204 || res.statusCode === 304) { + response = new Response(body, response_options); + resolve(response); + return; + } + + // For Node v6+ + // Be less strict when decoding compressed responses, since sometimes + // servers send slightly invalid responses that are still accepted + // by common browsers. + // Always using Z_SYNC_FLUSH is what cURL does. + const zlibOptions = { + flush: zlib.Z_SYNC_FLUSH, + finishFlush: zlib.Z_SYNC_FLUSH + }; + + // for gzip + if (codings == 'gzip' || codings == 'x-gzip') { + body = body.pipe(zlib.createGunzip(zlibOptions)); + response = new Response(body, response_options); + resolve(response); + return; + } + + // for deflate + if (codings == 'deflate' || codings == 'x-deflate') { + // handle the infamous raw deflate response from old servers + // a hack for old IIS and Apache servers + const raw = res.pipe(new PassThrough$1()); + raw.once('data', function (chunk) { + // see http://stackoverflow.com/questions/37519828 + if ((chunk[0] & 0x0F) === 0x08) { + body = body.pipe(zlib.createInflate()); + } else { + body = body.pipe(zlib.createInflateRaw()); + } + response = new Response(body, response_options); + resolve(response); + }); + return; + } + + // for br + if (codings == 'br' && typeof zlib.createBrotliDecompress === 'function') { + body = body.pipe(zlib.createBrotliDecompress()); + response = new Response(body, response_options); + resolve(response); + return; + } + + // otherwise, use response as-is + response = new Response(body, response_options); + resolve(response); + }); + + writeToStream(req, request); + }); +} +/** + * Redirect code matching + * + * @param Number code Status code + * @return Boolean + */ +fetch.isRedirect = function (code) { + return code === 301 || code === 302 || code === 303 || code === 307 || code === 308; +}; + +// expose Promise +fetch.Promise = global.Promise; + +module.exports = exports = fetch; +Object.defineProperty(exports, "__esModule", ({ value: true })); +exports.default = exports; +exports.Headers = Headers; +exports.Request = Request; +exports.Response = Response; +exports.FetchError = FetchError; /***/ }), -/***/ 219: +/***/ 1223: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +var wrappy = __nccwpck_require__(2940) +module.exports = wrappy(once) +module.exports.strict = wrappy(onceStrict) + +once.proto = once(function () { + Object.defineProperty(Function.prototype, 'once', { + value: function () { + return once(this) + }, + configurable: true + }) + + Object.defineProperty(Function.prototype, 'onceStrict', { + value: function () { + return onceStrict(this) + }, + configurable: true + }) +}) + +function once (fn) { + var f = function () { + if (f.called) return f.value + f.called = true + return f.value = fn.apply(this, arguments) + } + f.called = false + return f +} + +function onceStrict (fn) { + var f = function () { + if (f.called) + throw new Error(f.onceError) + f.called = true + return f.value = fn.apply(this, arguments) + } + var name = fn.name || 'Function wrapped with `once`' + f.onceError = name + " shouldn't be called more than once" + f.called = false + return f +} + + +/***/ }), + +/***/ 4256: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +"use strict"; + + +var punycode = __nccwpck_require__(4213); +var mappingTable = __nccwpck_require__(68); + +var PROCESSING_OPTIONS = { + TRANSITIONAL: 0, + NONTRANSITIONAL: 1 +}; + +function normalize(str) { // fix bug in v8 + return str.split('\u0000').map(function (s) { return s.normalize('NFC'); }).join('\u0000'); +} + +function findStatus(val) { + var start = 0; + var end = mappingTable.length - 1; + + while (start <= end) { + var mid = Math.floor((start + end) / 2); + + var target = mappingTable[mid]; + if (target[0][0] <= val && target[0][1] >= val) { + return target; + } else if (target[0][0] > val) { + end = mid - 1; + } else { + start = mid + 1; + } + } + + return null; +} + +var regexAstralSymbols = /[\uD800-\uDBFF][\uDC00-\uDFFF]/g; + +function countSymbols(string) { + return string + // replace every surrogate pair with a BMP symbol + .replace(regexAstralSymbols, '_') + // then get the length + .length; +} + +function mapChars(domain_name, useSTD3, processing_option) { + var hasError = false; + var processed = ""; + + var len = countSymbols(domain_name); + for (var i = 0; i < len; ++i) { + var codePoint = domain_name.codePointAt(i); + var status = findStatus(codePoint); + + switch (status[1]) { + case "disallowed": + hasError = true; + processed += String.fromCodePoint(codePoint); + break; + case "ignored": + break; + case "mapped": + processed += String.fromCodePoint.apply(String, status[2]); + break; + case "deviation": + if (processing_option === PROCESSING_OPTIONS.TRANSITIONAL) { + processed += String.fromCodePoint.apply(String, status[2]); + } else { + processed += String.fromCodePoint(codePoint); + } + break; + case "valid": + processed += String.fromCodePoint(codePoint); + break; + case "disallowed_STD3_mapped": + if (useSTD3) { + hasError = true; + processed += String.fromCodePoint(codePoint); + } else { + processed += String.fromCodePoint.apply(String, status[2]); + } + break; + case "disallowed_STD3_valid": + if (useSTD3) { + hasError = true; + } + + processed += String.fromCodePoint(codePoint); + break; + } + } + + return { + string: processed, + error: hasError + }; +} + +var combiningMarksRegex = /[\u0300-\u036F\u0483-\u0489\u0591-\u05BD\u05BF\u05C1\u05C2\u05C4\u05C5\u05C7\u0610-\u061A\u064B-\u065F\u0670\u06D6-\u06DC\u06DF-\u06E4\u06E7\u06E8\u06EA-\u06ED\u0711\u0730-\u074A\u07A6-\u07B0\u07EB-\u07F3\u0816-\u0819\u081B-\u0823\u0825-\u0827\u0829-\u082D\u0859-\u085B\u08E4-\u0903\u093A-\u093C\u093E-\u094F\u0951-\u0957\u0962\u0963\u0981-\u0983\u09BC\u09BE-\u09C4\u09C7\u09C8\u09CB-\u09CD\u09D7\u09E2\u09E3\u0A01-\u0A03\u0A3C\u0A3E-\u0A42\u0A47\u0A48\u0A4B-\u0A4D\u0A51\u0A70\u0A71\u0A75\u0A81-\u0A83\u0ABC\u0ABE-\u0AC5\u0AC7-\u0AC9\u0ACB-\u0ACD\u0AE2\u0AE3\u0B01-\u0B03\u0B3C\u0B3E-\u0B44\u0B47\u0B48\u0B4B-\u0B4D\u0B56\u0B57\u0B62\u0B63\u0B82\u0BBE-\u0BC2\u0BC6-\u0BC8\u0BCA-\u0BCD\u0BD7\u0C00-\u0C03\u0C3E-\u0C44\u0C46-\u0C48\u0C4A-\u0C4D\u0C55\u0C56\u0C62\u0C63\u0C81-\u0C83\u0CBC\u0CBE-\u0CC4\u0CC6-\u0CC8\u0CCA-\u0CCD\u0CD5\u0CD6\u0CE2\u0CE3\u0D01-\u0D03\u0D3E-\u0D44\u0D46-\u0D48\u0D4A-\u0D4D\u0D57\u0D62\u0D63\u0D82\u0D83\u0DCA\u0DCF-\u0DD4\u0DD6\u0DD8-\u0DDF\u0DF2\u0DF3\u0E31\u0E34-\u0E3A\u0E47-\u0E4E\u0EB1\u0EB4-\u0EB9\u0EBB\u0EBC\u0EC8-\u0ECD\u0F18\u0F19\u0F35\u0F37\u0F39\u0F3E\u0F3F\u0F71-\u0F84\u0F86\u0F87\u0F8D-\u0F97\u0F99-\u0FBC\u0FC6\u102B-\u103E\u1056-\u1059\u105E-\u1060\u1062-\u1064\u1067-\u106D\u1071-\u1074\u1082-\u108D\u108F\u109A-\u109D\u135D-\u135F\u1712-\u1714\u1732-\u1734\u1752\u1753\u1772\u1773\u17B4-\u17D3\u17DD\u180B-\u180D\u18A9\u1920-\u192B\u1930-\u193B\u19B0-\u19C0\u19C8\u19C9\u1A17-\u1A1B\u1A55-\u1A5E\u1A60-\u1A7C\u1A7F\u1AB0-\u1ABE\u1B00-\u1B04\u1B34-\u1B44\u1B6B-\u1B73\u1B80-\u1B82\u1BA1-\u1BAD\u1BE6-\u1BF3\u1C24-\u1C37\u1CD0-\u1CD2\u1CD4-\u1CE8\u1CED\u1CF2-\u1CF4\u1CF8\u1CF9\u1DC0-\u1DF5\u1DFC-\u1DFF\u20D0-\u20F0\u2CEF-\u2CF1\u2D7F\u2DE0-\u2DFF\u302A-\u302F\u3099\u309A\uA66F-\uA672\uA674-\uA67D\uA69F\uA6F0\uA6F1\uA802\uA806\uA80B\uA823-\uA827\uA880\uA881\uA8B4-\uA8C4\uA8E0-\uA8F1\uA926-\uA92D\uA947-\uA953\uA980-\uA983\uA9B3-\uA9C0\uA9E5\uAA29-\uAA36\uAA43\uAA4C\uAA4D\uAA7B-\uAA7D\uAAB0\uAAB2-\uAAB4\uAAB7\uAAB8\uAABE\uAABF\uAAC1\uAAEB-\uAAEF\uAAF5\uAAF6\uABE3-\uABEA\uABEC\uABED\uFB1E\uFE00-\uFE0F\uFE20-\uFE2D]|\uD800[\uDDFD\uDEE0\uDF76-\uDF7A]|\uD802[\uDE01-\uDE03\uDE05\uDE06\uDE0C-\uDE0F\uDE38-\uDE3A\uDE3F\uDEE5\uDEE6]|\uD804[\uDC00-\uDC02\uDC38-\uDC46\uDC7F-\uDC82\uDCB0-\uDCBA\uDD00-\uDD02\uDD27-\uDD34\uDD73\uDD80-\uDD82\uDDB3-\uDDC0\uDE2C-\uDE37\uDEDF-\uDEEA\uDF01-\uDF03\uDF3C\uDF3E-\uDF44\uDF47\uDF48\uDF4B-\uDF4D\uDF57\uDF62\uDF63\uDF66-\uDF6C\uDF70-\uDF74]|\uD805[\uDCB0-\uDCC3\uDDAF-\uDDB5\uDDB8-\uDDC0\uDE30-\uDE40\uDEAB-\uDEB7]|\uD81A[\uDEF0-\uDEF4\uDF30-\uDF36]|\uD81B[\uDF51-\uDF7E\uDF8F-\uDF92]|\uD82F[\uDC9D\uDC9E]|\uD834[\uDD65-\uDD69\uDD6D-\uDD72\uDD7B-\uDD82\uDD85-\uDD8B\uDDAA-\uDDAD\uDE42-\uDE44]|\uD83A[\uDCD0-\uDCD6]|\uDB40[\uDD00-\uDDEF]/; + +function validateLabel(label, processing_option) { + if (label.substr(0, 4) === "xn--") { + label = punycode.toUnicode(label); + processing_option = PROCESSING_OPTIONS.NONTRANSITIONAL; + } + + var error = false; + + if (normalize(label) !== label || + (label[3] === "-" && label[4] === "-") || + label[0] === "-" || label[label.length - 1] === "-" || + label.indexOf(".") !== -1 || + label.search(combiningMarksRegex) === 0) { + error = true; + } + + var len = countSymbols(label); + for (var i = 0; i < len; ++i) { + var status = findStatus(label.codePointAt(i)); + if ((processing === PROCESSING_OPTIONS.TRANSITIONAL && status[1] !== "valid") || + (processing === PROCESSING_OPTIONS.NONTRANSITIONAL && + status[1] !== "valid" && status[1] !== "deviation")) { + error = true; + break; + } + } + + return { + label: label, + error: error + }; +} + +function processing(domain_name, useSTD3, processing_option) { + var result = mapChars(domain_name, useSTD3, processing_option); + result.string = normalize(result.string); + + var labels = result.string.split("."); + for (var i = 0; i < labels.length; ++i) { + try { + var validation = validateLabel(labels[i]); + labels[i] = validation.label; + result.error = result.error || validation.error; + } catch(e) { + result.error = true; + } + } + + return { + string: labels.join("."), + error: result.error + }; +} + +module.exports.toASCII = function(domain_name, useSTD3, processing_option, verifyDnsLength) { + var result = processing(domain_name, useSTD3, processing_option); + var labels = result.string.split("."); + labels = labels.map(function(l) { + try { + return punycode.toASCII(l); + } catch(e) { + result.error = true; + return l; + } + }); + + if (verifyDnsLength) { + var total = labels.slice(0, labels.length - 1).join(".").length; + if (total.length > 253 || total.length === 0) { + result.error = true; + } + + for (var i=0; i < labels.length; ++i) { + if (labels.length > 63 || labels.length === 0) { + result.error = true; + break; + } + } + } + + if (result.error) return null; + return labels.join("."); +}; + +module.exports.toUnicode = function(domain_name, useSTD3) { + var result = processing(domain_name, useSTD3, PROCESSING_OPTIONS.NONTRANSITIONAL); + + return { + domain: result.string, + error: result.error + }; +}; + +module.exports.PROCESSING_OPTIONS = PROCESSING_OPTIONS; + + +/***/ }), + +/***/ 4294: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +module.exports = __nccwpck_require__(4219); + + +/***/ }), + +/***/ 4219: /***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { "use strict"; -var net = __nccwpck_require__(631); -var tls = __nccwpck_require__(16); -var http = __nccwpck_require__(605); -var https = __nccwpck_require__(211); -var events = __nccwpck_require__(614); -var assert = __nccwpck_require__(357); -var util = __nccwpck_require__(669); +var net = __nccwpck_require__(1631); +var tls = __nccwpck_require__(4016); +var http = __nccwpck_require__(8605); +var https = __nccwpck_require__(7211); +var events = __nccwpck_require__(8614); +var assert = __nccwpck_require__(2357); +var util = __nccwpck_require__(1669); exports.httpOverHttp = httpOverHttp; @@ -10999,7 +15690,33 @@ exports.debug = debug; // for test /***/ }), -/***/ 707: +/***/ 5030: +/***/ ((__unused_webpack_module, exports) => { + +"use strict"; + + +Object.defineProperty(exports, "__esModule", ({ value: true })); + +function getUserAgent() { + if (typeof navigator === "object" && "userAgent" in navigator) { + return navigator.userAgent; + } + + if (typeof process === "object" && "version" in process) { + return `Node.js/${process.version.substr(1)} (${process.platform}; ${process.arch})`; + } + + return ""; +} + +exports.getUserAgent = getUserAgent; +//# sourceMappingURL=index.js.map + + +/***/ }), + +/***/ 2707: /***/ ((module) => { /** @@ -11032,13 +15749,13 @@ module.exports = bytesToUuid; /***/ }), -/***/ 859: +/***/ 5859: /***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { // Unique ID creation requires a high quality random # generator. In node.js // this is pretty straight-forward - we use the crypto API. -var crypto = __nccwpck_require__(417); +var crypto = __nccwpck_require__(6417); module.exports = function nodeRNG() { return crypto.randomBytes(16); @@ -11050,8 +15767,8 @@ module.exports = function nodeRNG() { /***/ 824: /***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { -var rng = __nccwpck_require__(859); -var bytesToUuid = __nccwpck_require__(707); +var rng = __nccwpck_require__(5859); +var bytesToUuid = __nccwpck_require__(2707); function v4(options, buf, offset) { var i = buf && offset || 0; @@ -11083,11 +15800,2012 @@ module.exports = v4; /***/ }), -/***/ 571: +/***/ 4886: +/***/ ((module) => { + +"use strict"; + + +var conversions = {}; +module.exports = conversions; + +function sign(x) { + return x < 0 ? -1 : 1; +} + +function evenRound(x) { + // Round x to the nearest integer, choosing the even integer if it lies halfway between two. + if ((x % 1) === 0.5 && (x & 1) === 0) { // [even number].5; round down (i.e. floor) + return Math.floor(x); + } else { + return Math.round(x); + } +} + +function createNumberConversion(bitLength, typeOpts) { + if (!typeOpts.unsigned) { + --bitLength; + } + const lowerBound = typeOpts.unsigned ? 0 : -Math.pow(2, bitLength); + const upperBound = Math.pow(2, bitLength) - 1; + + const moduloVal = typeOpts.moduloBitLength ? Math.pow(2, typeOpts.moduloBitLength) : Math.pow(2, bitLength); + const moduloBound = typeOpts.moduloBitLength ? Math.pow(2, typeOpts.moduloBitLength - 1) : Math.pow(2, bitLength - 1); + + return function(V, opts) { + if (!opts) opts = {}; + + let x = +V; + + if (opts.enforceRange) { + if (!Number.isFinite(x)) { + throw new TypeError("Argument is not a finite number"); + } + + x = sign(x) * Math.floor(Math.abs(x)); + if (x < lowerBound || x > upperBound) { + throw new TypeError("Argument is not in byte range"); + } + + return x; + } + + if (!isNaN(x) && opts.clamp) { + x = evenRound(x); + + if (x < lowerBound) x = lowerBound; + if (x > upperBound) x = upperBound; + return x; + } + + if (!Number.isFinite(x) || x === 0) { + return 0; + } + + x = sign(x) * Math.floor(Math.abs(x)); + x = x % moduloVal; + + if (!typeOpts.unsigned && x >= moduloBound) { + return x - moduloVal; + } else if (typeOpts.unsigned) { + if (x < 0) { + x += moduloVal; + } else if (x === -0) { // don't return negative zero + return 0; + } + } + + return x; + } +} + +conversions["void"] = function () { + return undefined; +}; + +conversions["boolean"] = function (val) { + return !!val; +}; + +conversions["byte"] = createNumberConversion(8, { unsigned: false }); +conversions["octet"] = createNumberConversion(8, { unsigned: true }); + +conversions["short"] = createNumberConversion(16, { unsigned: false }); +conversions["unsigned short"] = createNumberConversion(16, { unsigned: true }); + +conversions["long"] = createNumberConversion(32, { unsigned: false }); +conversions["unsigned long"] = createNumberConversion(32, { unsigned: true }); + +conversions["long long"] = createNumberConversion(32, { unsigned: false, moduloBitLength: 64 }); +conversions["unsigned long long"] = createNumberConversion(32, { unsigned: true, moduloBitLength: 64 }); + +conversions["double"] = function (V) { + const x = +V; + + if (!Number.isFinite(x)) { + throw new TypeError("Argument is not a finite floating-point value"); + } + + return x; +}; + +conversions["unrestricted double"] = function (V) { + const x = +V; + + if (isNaN(x)) { + throw new TypeError("Argument is NaN"); + } + + return x; +}; + +// not quite valid, but good enough for JS +conversions["float"] = conversions["double"]; +conversions["unrestricted float"] = conversions["unrestricted double"]; + +conversions["DOMString"] = function (V, opts) { + if (!opts) opts = {}; + + if (opts.treatNullAsEmptyString && V === null) { + return ""; + } + + return String(V); +}; + +conversions["ByteString"] = function (V, opts) { + const x = String(V); + let c = undefined; + for (let i = 0; (c = x.codePointAt(i)) !== undefined; ++i) { + if (c > 255) { + throw new TypeError("Argument is not a valid bytestring"); + } + } + + return x; +}; + +conversions["USVString"] = function (V) { + const S = String(V); + const n = S.length; + const U = []; + for (let i = 0; i < n; ++i) { + const c = S.charCodeAt(i); + if (c < 0xD800 || c > 0xDFFF) { + U.push(String.fromCodePoint(c)); + } else if (0xDC00 <= c && c <= 0xDFFF) { + U.push(String.fromCodePoint(0xFFFD)); + } else { + if (i === n - 1) { + U.push(String.fromCodePoint(0xFFFD)); + } else { + const d = S.charCodeAt(i + 1); + if (0xDC00 <= d && d <= 0xDFFF) { + const a = c & 0x3FF; + const b = d & 0x3FF; + U.push(String.fromCodePoint((2 << 15) + (2 << 9) * a + b)); + ++i; + } else { + U.push(String.fromCodePoint(0xFFFD)); + } + } + } + } + + return U.join(''); +}; + +conversions["Date"] = function (V, opts) { + if (!(V instanceof Date)) { + throw new TypeError("Argument is not a Date object"); + } + if (isNaN(V)) { + return undefined; + } + + return V; +}; + +conversions["RegExp"] = function (V, opts) { + if (!(V instanceof RegExp)) { + V = new RegExp(V); + } + + return V; +}; + + +/***/ }), + +/***/ 7537: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + +const usm = __nccwpck_require__(2158); + +exports.implementation = class URLImpl { + constructor(constructorArgs) { + const url = constructorArgs[0]; + const base = constructorArgs[1]; + + let parsedBase = null; + if (base !== undefined) { + parsedBase = usm.basicURLParse(base); + if (parsedBase === "failure") { + throw new TypeError("Invalid base URL"); + } + } + + const parsedURL = usm.basicURLParse(url, { baseURL: parsedBase }); + if (parsedURL === "failure") { + throw new TypeError("Invalid URL"); + } + + this._url = parsedURL; + + // TODO: query stuff + } + + get href() { + return usm.serializeURL(this._url); + } + + set href(v) { + const parsedURL = usm.basicURLParse(v); + if (parsedURL === "failure") { + throw new TypeError("Invalid URL"); + } + + this._url = parsedURL; + } + + get origin() { + return usm.serializeURLOrigin(this._url); + } + + get protocol() { + return this._url.scheme + ":"; + } + + set protocol(v) { + usm.basicURLParse(v + ":", { url: this._url, stateOverride: "scheme start" }); + } + + get username() { + return this._url.username; + } + + set username(v) { + if (usm.cannotHaveAUsernamePasswordPort(this._url)) { + return; + } + + usm.setTheUsername(this._url, v); + } + + get password() { + return this._url.password; + } + + set password(v) { + if (usm.cannotHaveAUsernamePasswordPort(this._url)) { + return; + } + + usm.setThePassword(this._url, v); + } + + get host() { + const url = this._url; + + if (url.host === null) { + return ""; + } + + if (url.port === null) { + return usm.serializeHost(url.host); + } + + return usm.serializeHost(url.host) + ":" + usm.serializeInteger(url.port); + } + + set host(v) { + if (this._url.cannotBeABaseURL) { + return; + } + + usm.basicURLParse(v, { url: this._url, stateOverride: "host" }); + } + + get hostname() { + if (this._url.host === null) { + return ""; + } + + return usm.serializeHost(this._url.host); + } + + set hostname(v) { + if (this._url.cannotBeABaseURL) { + return; + } + + usm.basicURLParse(v, { url: this._url, stateOverride: "hostname" }); + } + + get port() { + if (this._url.port === null) { + return ""; + } + + return usm.serializeInteger(this._url.port); + } + + set port(v) { + if (usm.cannotHaveAUsernamePasswordPort(this._url)) { + return; + } + + if (v === "") { + this._url.port = null; + } else { + usm.basicURLParse(v, { url: this._url, stateOverride: "port" }); + } + } + + get pathname() { + if (this._url.cannotBeABaseURL) { + return this._url.path[0]; + } + + if (this._url.path.length === 0) { + return ""; + } + + return "/" + this._url.path.join("/"); + } + + set pathname(v) { + if (this._url.cannotBeABaseURL) { + return; + } + + this._url.path = []; + usm.basicURLParse(v, { url: this._url, stateOverride: "path start" }); + } + + get search() { + if (this._url.query === null || this._url.query === "") { + return ""; + } + + return "?" + this._url.query; + } + + set search(v) { + // TODO: query stuff + + const url = this._url; + + if (v === "") { + url.query = null; + return; + } + + const input = v[0] === "?" ? v.substring(1) : v; + url.query = ""; + usm.basicURLParse(input, { url, stateOverride: "query" }); + } + + get hash() { + if (this._url.fragment === null || this._url.fragment === "") { + return ""; + } + + return "#" + this._url.fragment; + } + + set hash(v) { + if (v === "") { + this._url.fragment = null; + return; + } + + const input = v[0] === "#" ? v.substring(1) : v; + this._url.fragment = ""; + usm.basicURLParse(input, { url: this._url, stateOverride: "fragment" }); + } + + toJSON() { + return this.href; + } +}; + + +/***/ }), + +/***/ 3394: /***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { -const fs = __nccwpck_require__(747); -const moment = __nccwpck_require__(623) +"use strict"; + + +const conversions = __nccwpck_require__(4886); +const utils = __nccwpck_require__(3185); +const Impl = __nccwpck_require__(7537); + +const impl = utils.implSymbol; + +function URL(url) { + if (!this || this[impl] || !(this instanceof URL)) { + throw new TypeError("Failed to construct 'URL': Please use the 'new' operator, this DOM object constructor cannot be called as a function."); + } + if (arguments.length < 1) { + throw new TypeError("Failed to construct 'URL': 1 argument required, but only " + arguments.length + " present."); + } + const args = []; + for (let i = 0; i < arguments.length && i < 2; ++i) { + args[i] = arguments[i]; + } + args[0] = conversions["USVString"](args[0]); + if (args[1] !== undefined) { + args[1] = conversions["USVString"](args[1]); + } + + module.exports.setup(this, args); +} + +URL.prototype.toJSON = function toJSON() { + if (!this || !module.exports.is(this)) { + throw new TypeError("Illegal invocation"); + } + const args = []; + for (let i = 0; i < arguments.length && i < 0; ++i) { + args[i] = arguments[i]; + } + return this[impl].toJSON.apply(this[impl], args); +}; +Object.defineProperty(URL.prototype, "href", { + get() { + return this[impl].href; + }, + set(V) { + V = conversions["USVString"](V); + this[impl].href = V; + }, + enumerable: true, + configurable: true +}); + +URL.prototype.toString = function () { + if (!this || !module.exports.is(this)) { + throw new TypeError("Illegal invocation"); + } + return this.href; +}; + +Object.defineProperty(URL.prototype, "origin", { + get() { + return this[impl].origin; + }, + enumerable: true, + configurable: true +}); + +Object.defineProperty(URL.prototype, "protocol", { + get() { + return this[impl].protocol; + }, + set(V) { + V = conversions["USVString"](V); + this[impl].protocol = V; + }, + enumerable: true, + configurable: true +}); + +Object.defineProperty(URL.prototype, "username", { + get() { + return this[impl].username; + }, + set(V) { + V = conversions["USVString"](V); + this[impl].username = V; + }, + enumerable: true, + configurable: true +}); + +Object.defineProperty(URL.prototype, "password", { + get() { + return this[impl].password; + }, + set(V) { + V = conversions["USVString"](V); + this[impl].password = V; + }, + enumerable: true, + configurable: true +}); + +Object.defineProperty(URL.prototype, "host", { + get() { + return this[impl].host; + }, + set(V) { + V = conversions["USVString"](V); + this[impl].host = V; + }, + enumerable: true, + configurable: true +}); + +Object.defineProperty(URL.prototype, "hostname", { + get() { + return this[impl].hostname; + }, + set(V) { + V = conversions["USVString"](V); + this[impl].hostname = V; + }, + enumerable: true, + configurable: true +}); + +Object.defineProperty(URL.prototype, "port", { + get() { + return this[impl].port; + }, + set(V) { + V = conversions["USVString"](V); + this[impl].port = V; + }, + enumerable: true, + configurable: true +}); + +Object.defineProperty(URL.prototype, "pathname", { + get() { + return this[impl].pathname; + }, + set(V) { + V = conversions["USVString"](V); + this[impl].pathname = V; + }, + enumerable: true, + configurable: true +}); + +Object.defineProperty(URL.prototype, "search", { + get() { + return this[impl].search; + }, + set(V) { + V = conversions["USVString"](V); + this[impl].search = V; + }, + enumerable: true, + configurable: true +}); + +Object.defineProperty(URL.prototype, "hash", { + get() { + return this[impl].hash; + }, + set(V) { + V = conversions["USVString"](V); + this[impl].hash = V; + }, + enumerable: true, + configurable: true +}); + + +module.exports = { + is(obj) { + return !!obj && obj[impl] instanceof Impl.implementation; + }, + create(constructorArgs, privateData) { + let obj = Object.create(URL.prototype); + this.setup(obj, constructorArgs, privateData); + return obj; + }, + setup(obj, constructorArgs, privateData) { + if (!privateData) privateData = {}; + privateData.wrapper = obj; + + obj[impl] = new Impl.implementation(constructorArgs, privateData); + obj[impl][utils.wrapperSymbol] = obj; + }, + interface: URL, + expose: { + Window: { URL: URL }, + Worker: { URL: URL } + } +}; + + + +/***/ }), + +/***/ 8665: +/***/ ((__unused_webpack_module, exports, __nccwpck_require__) => { + +"use strict"; + + +exports.URL = __nccwpck_require__(3394).interface; +exports.serializeURL = __nccwpck_require__(2158).serializeURL; +exports.serializeURLOrigin = __nccwpck_require__(2158).serializeURLOrigin; +exports.basicURLParse = __nccwpck_require__(2158).basicURLParse; +exports.setTheUsername = __nccwpck_require__(2158).setTheUsername; +exports.setThePassword = __nccwpck_require__(2158).setThePassword; +exports.serializeHost = __nccwpck_require__(2158).serializeHost; +exports.serializeInteger = __nccwpck_require__(2158).serializeInteger; +exports.parseURL = __nccwpck_require__(2158).parseURL; + + +/***/ }), + +/***/ 2158: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +"use strict"; + +const punycode = __nccwpck_require__(4213); +const tr46 = __nccwpck_require__(4256); + +const specialSchemes = { + ftp: 21, + file: null, + gopher: 70, + http: 80, + https: 443, + ws: 80, + wss: 443 +}; + +const failure = Symbol("failure"); + +function countSymbols(str) { + return punycode.ucs2.decode(str).length; +} + +function at(input, idx) { + const c = input[idx]; + return isNaN(c) ? undefined : String.fromCodePoint(c); +} + +function isASCIIDigit(c) { + return c >= 0x30 && c <= 0x39; +} + +function isASCIIAlpha(c) { + return (c >= 0x41 && c <= 0x5A) || (c >= 0x61 && c <= 0x7A); +} + +function isASCIIAlphanumeric(c) { + return isASCIIAlpha(c) || isASCIIDigit(c); +} + +function isASCIIHex(c) { + return isASCIIDigit(c) || (c >= 0x41 && c <= 0x46) || (c >= 0x61 && c <= 0x66); +} + +function isSingleDot(buffer) { + return buffer === "." || buffer.toLowerCase() === "%2e"; +} + +function isDoubleDot(buffer) { + buffer = buffer.toLowerCase(); + return buffer === ".." || buffer === "%2e." || buffer === ".%2e" || buffer === "%2e%2e"; +} + +function isWindowsDriveLetterCodePoints(cp1, cp2) { + return isASCIIAlpha(cp1) && (cp2 === 58 || cp2 === 124); +} + +function isWindowsDriveLetterString(string) { + return string.length === 2 && isASCIIAlpha(string.codePointAt(0)) && (string[1] === ":" || string[1] === "|"); +} + +function isNormalizedWindowsDriveLetterString(string) { + return string.length === 2 && isASCIIAlpha(string.codePointAt(0)) && string[1] === ":"; +} + +function containsForbiddenHostCodePoint(string) { + return string.search(/\u0000|\u0009|\u000A|\u000D|\u0020|#|%|\/|:|\?|@|\[|\\|\]/) !== -1; +} + +function containsForbiddenHostCodePointExcludingPercent(string) { + return string.search(/\u0000|\u0009|\u000A|\u000D|\u0020|#|\/|:|\?|@|\[|\\|\]/) !== -1; +} + +function isSpecialScheme(scheme) { + return specialSchemes[scheme] !== undefined; +} + +function isSpecial(url) { + return isSpecialScheme(url.scheme); +} + +function defaultPort(scheme) { + return specialSchemes[scheme]; +} + +function percentEncode(c) { + let hex = c.toString(16).toUpperCase(); + if (hex.length === 1) { + hex = "0" + hex; + } + + return "%" + hex; +} + +function utf8PercentEncode(c) { + const buf = new Buffer(c); + + let str = ""; + + for (let i = 0; i < buf.length; ++i) { + str += percentEncode(buf[i]); + } + + return str; +} + +function utf8PercentDecode(str) { + const input = new Buffer(str); + const output = []; + for (let i = 0; i < input.length; ++i) { + if (input[i] !== 37) { + output.push(input[i]); + } else if (input[i] === 37 && isASCIIHex(input[i + 1]) && isASCIIHex(input[i + 2])) { + output.push(parseInt(input.slice(i + 1, i + 3).toString(), 16)); + i += 2; + } else { + output.push(input[i]); + } + } + return new Buffer(output).toString(); +} + +function isC0ControlPercentEncode(c) { + return c <= 0x1F || c > 0x7E; +} + +const extraPathPercentEncodeSet = new Set([32, 34, 35, 60, 62, 63, 96, 123, 125]); +function isPathPercentEncode(c) { + return isC0ControlPercentEncode(c) || extraPathPercentEncodeSet.has(c); +} + +const extraUserinfoPercentEncodeSet = + new Set([47, 58, 59, 61, 64, 91, 92, 93, 94, 124]); +function isUserinfoPercentEncode(c) { + return isPathPercentEncode(c) || extraUserinfoPercentEncodeSet.has(c); +} + +function percentEncodeChar(c, encodeSetPredicate) { + const cStr = String.fromCodePoint(c); + + if (encodeSetPredicate(c)) { + return utf8PercentEncode(cStr); + } + + return cStr; +} + +function parseIPv4Number(input) { + let R = 10; + + if (input.length >= 2 && input.charAt(0) === "0" && input.charAt(1).toLowerCase() === "x") { + input = input.substring(2); + R = 16; + } else if (input.length >= 2 && input.charAt(0) === "0") { + input = input.substring(1); + R = 8; + } + + if (input === "") { + return 0; + } + + const regex = R === 10 ? /[^0-9]/ : (R === 16 ? /[^0-9A-Fa-f]/ : /[^0-7]/); + if (regex.test(input)) { + return failure; + } + + return parseInt(input, R); +} + +function parseIPv4(input) { + const parts = input.split("."); + if (parts[parts.length - 1] === "") { + if (parts.length > 1) { + parts.pop(); + } + } + + if (parts.length > 4) { + return input; + } + + const numbers = []; + for (const part of parts) { + if (part === "") { + return input; + } + const n = parseIPv4Number(part); + if (n === failure) { + return input; + } + + numbers.push(n); + } + + for (let i = 0; i < numbers.length - 1; ++i) { + if (numbers[i] > 255) { + return failure; + } + } + if (numbers[numbers.length - 1] >= Math.pow(256, 5 - numbers.length)) { + return failure; + } + + let ipv4 = numbers.pop(); + let counter = 0; + + for (const n of numbers) { + ipv4 += n * Math.pow(256, 3 - counter); + ++counter; + } + + return ipv4; +} + +function serializeIPv4(address) { + let output = ""; + let n = address; + + for (let i = 1; i <= 4; ++i) { + output = String(n % 256) + output; + if (i !== 4) { + output = "." + output; + } + n = Math.floor(n / 256); + } + + return output; +} + +function parseIPv6(input) { + const address = [0, 0, 0, 0, 0, 0, 0, 0]; + let pieceIndex = 0; + let compress = null; + let pointer = 0; + + input = punycode.ucs2.decode(input); + + if (input[pointer] === 58) { + if (input[pointer + 1] !== 58) { + return failure; + } + + pointer += 2; + ++pieceIndex; + compress = pieceIndex; + } + + while (pointer < input.length) { + if (pieceIndex === 8) { + return failure; + } + + if (input[pointer] === 58) { + if (compress !== null) { + return failure; + } + ++pointer; + ++pieceIndex; + compress = pieceIndex; + continue; + } + + let value = 0; + let length = 0; + + while (length < 4 && isASCIIHex(input[pointer])) { + value = value * 0x10 + parseInt(at(input, pointer), 16); + ++pointer; + ++length; + } + + if (input[pointer] === 46) { + if (length === 0) { + return failure; + } + + pointer -= length; + + if (pieceIndex > 6) { + return failure; + } + + let numbersSeen = 0; + + while (input[pointer] !== undefined) { + let ipv4Piece = null; + + if (numbersSeen > 0) { + if (input[pointer] === 46 && numbersSeen < 4) { + ++pointer; + } else { + return failure; + } + } + + if (!isASCIIDigit(input[pointer])) { + return failure; + } + + while (isASCIIDigit(input[pointer])) { + const number = parseInt(at(input, pointer)); + if (ipv4Piece === null) { + ipv4Piece = number; + } else if (ipv4Piece === 0) { + return failure; + } else { + ipv4Piece = ipv4Piece * 10 + number; + } + if (ipv4Piece > 255) { + return failure; + } + ++pointer; + } + + address[pieceIndex] = address[pieceIndex] * 0x100 + ipv4Piece; + + ++numbersSeen; + + if (numbersSeen === 2 || numbersSeen === 4) { + ++pieceIndex; + } + } + + if (numbersSeen !== 4) { + return failure; + } + + break; + } else if (input[pointer] === 58) { + ++pointer; + if (input[pointer] === undefined) { + return failure; + } + } else if (input[pointer] !== undefined) { + return failure; + } + + address[pieceIndex] = value; + ++pieceIndex; + } + + if (compress !== null) { + let swaps = pieceIndex - compress; + pieceIndex = 7; + while (pieceIndex !== 0 && swaps > 0) { + const temp = address[compress + swaps - 1]; + address[compress + swaps - 1] = address[pieceIndex]; + address[pieceIndex] = temp; + --pieceIndex; + --swaps; + } + } else if (compress === null && pieceIndex !== 8) { + return failure; + } + + return address; +} + +function serializeIPv6(address) { + let output = ""; + const seqResult = findLongestZeroSequence(address); + const compress = seqResult.idx; + let ignore0 = false; + + for (let pieceIndex = 0; pieceIndex <= 7; ++pieceIndex) { + if (ignore0 && address[pieceIndex] === 0) { + continue; + } else if (ignore0) { + ignore0 = false; + } + + if (compress === pieceIndex) { + const separator = pieceIndex === 0 ? "::" : ":"; + output += separator; + ignore0 = true; + continue; + } + + output += address[pieceIndex].toString(16); + + if (pieceIndex !== 7) { + output += ":"; + } + } + + return output; +} + +function parseHost(input, isSpecialArg) { + if (input[0] === "[") { + if (input[input.length - 1] !== "]") { + return failure; + } + + return parseIPv6(input.substring(1, input.length - 1)); + } + + if (!isSpecialArg) { + return parseOpaqueHost(input); + } + + const domain = utf8PercentDecode(input); + const asciiDomain = tr46.toASCII(domain, false, tr46.PROCESSING_OPTIONS.NONTRANSITIONAL, false); + if (asciiDomain === null) { + return failure; + } + + if (containsForbiddenHostCodePoint(asciiDomain)) { + return failure; + } + + const ipv4Host = parseIPv4(asciiDomain); + if (typeof ipv4Host === "number" || ipv4Host === failure) { + return ipv4Host; + } + + return asciiDomain; +} + +function parseOpaqueHost(input) { + if (containsForbiddenHostCodePointExcludingPercent(input)) { + return failure; + } + + let output = ""; + const decoded = punycode.ucs2.decode(input); + for (let i = 0; i < decoded.length; ++i) { + output += percentEncodeChar(decoded[i], isC0ControlPercentEncode); + } + return output; +} + +function findLongestZeroSequence(arr) { + let maxIdx = null; + let maxLen = 1; // only find elements > 1 + let currStart = null; + let currLen = 0; + + for (let i = 0; i < arr.length; ++i) { + if (arr[i] !== 0) { + if (currLen > maxLen) { + maxIdx = currStart; + maxLen = currLen; + } + + currStart = null; + currLen = 0; + } else { + if (currStart === null) { + currStart = i; + } + ++currLen; + } + } + + // if trailing zeros + if (currLen > maxLen) { + maxIdx = currStart; + maxLen = currLen; + } + + return { + idx: maxIdx, + len: maxLen + }; +} + +function serializeHost(host) { + if (typeof host === "number") { + return serializeIPv4(host); + } + + // IPv6 serializer + if (host instanceof Array) { + return "[" + serializeIPv6(host) + "]"; + } + + return host; +} + +function trimControlChars(url) { + return url.replace(/^[\u0000-\u001F\u0020]+|[\u0000-\u001F\u0020]+$/g, ""); +} + +function trimTabAndNewline(url) { + return url.replace(/\u0009|\u000A|\u000D/g, ""); +} + +function shortenPath(url) { + const path = url.path; + if (path.length === 0) { + return; + } + if (url.scheme === "file" && path.length === 1 && isNormalizedWindowsDriveLetter(path[0])) { + return; + } + + path.pop(); +} + +function includesCredentials(url) { + return url.username !== "" || url.password !== ""; +} + +function cannotHaveAUsernamePasswordPort(url) { + return url.host === null || url.host === "" || url.cannotBeABaseURL || url.scheme === "file"; +} + +function isNormalizedWindowsDriveLetter(string) { + return /^[A-Za-z]:$/.test(string); +} + +function URLStateMachine(input, base, encodingOverride, url, stateOverride) { + this.pointer = 0; + this.input = input; + this.base = base || null; + this.encodingOverride = encodingOverride || "utf-8"; + this.stateOverride = stateOverride; + this.url = url; + this.failure = false; + this.parseError = false; + + if (!this.url) { + this.url = { + scheme: "", + username: "", + password: "", + host: null, + port: null, + path: [], + query: null, + fragment: null, + + cannotBeABaseURL: false + }; + + const res = trimControlChars(this.input); + if (res !== this.input) { + this.parseError = true; + } + this.input = res; + } + + const res = trimTabAndNewline(this.input); + if (res !== this.input) { + this.parseError = true; + } + this.input = res; + + this.state = stateOverride || "scheme start"; + + this.buffer = ""; + this.atFlag = false; + this.arrFlag = false; + this.passwordTokenSeenFlag = false; + + this.input = punycode.ucs2.decode(this.input); + + for (; this.pointer <= this.input.length; ++this.pointer) { + const c = this.input[this.pointer]; + const cStr = isNaN(c) ? undefined : String.fromCodePoint(c); + + // exec state machine + const ret = this["parse " + this.state](c, cStr); + if (!ret) { + break; // terminate algorithm + } else if (ret === failure) { + this.failure = true; + break; + } + } +} + +URLStateMachine.prototype["parse scheme start"] = function parseSchemeStart(c, cStr) { + if (isASCIIAlpha(c)) { + this.buffer += cStr.toLowerCase(); + this.state = "scheme"; + } else if (!this.stateOverride) { + this.state = "no scheme"; + --this.pointer; + } else { + this.parseError = true; + return failure; + } + + return true; +}; + +URLStateMachine.prototype["parse scheme"] = function parseScheme(c, cStr) { + if (isASCIIAlphanumeric(c) || c === 43 || c === 45 || c === 46) { + this.buffer += cStr.toLowerCase(); + } else if (c === 58) { + if (this.stateOverride) { + if (isSpecial(this.url) && !isSpecialScheme(this.buffer)) { + return false; + } + + if (!isSpecial(this.url) && isSpecialScheme(this.buffer)) { + return false; + } + + if ((includesCredentials(this.url) || this.url.port !== null) && this.buffer === "file") { + return false; + } + + if (this.url.scheme === "file" && (this.url.host === "" || this.url.host === null)) { + return false; + } + } + this.url.scheme = this.buffer; + this.buffer = ""; + if (this.stateOverride) { + return false; + } + if (this.url.scheme === "file") { + if (this.input[this.pointer + 1] !== 47 || this.input[this.pointer + 2] !== 47) { + this.parseError = true; + } + this.state = "file"; + } else if (isSpecial(this.url) && this.base !== null && this.base.scheme === this.url.scheme) { + this.state = "special relative or authority"; + } else if (isSpecial(this.url)) { + this.state = "special authority slashes"; + } else if (this.input[this.pointer + 1] === 47) { + this.state = "path or authority"; + ++this.pointer; + } else { + this.url.cannotBeABaseURL = true; + this.url.path.push(""); + this.state = "cannot-be-a-base-URL path"; + } + } else if (!this.stateOverride) { + this.buffer = ""; + this.state = "no scheme"; + this.pointer = -1; + } else { + this.parseError = true; + return failure; + } + + return true; +}; + +URLStateMachine.prototype["parse no scheme"] = function parseNoScheme(c) { + if (this.base === null || (this.base.cannotBeABaseURL && c !== 35)) { + return failure; + } else if (this.base.cannotBeABaseURL && c === 35) { + this.url.scheme = this.base.scheme; + this.url.path = this.base.path.slice(); + this.url.query = this.base.query; + this.url.fragment = ""; + this.url.cannotBeABaseURL = true; + this.state = "fragment"; + } else if (this.base.scheme === "file") { + this.state = "file"; + --this.pointer; + } else { + this.state = "relative"; + --this.pointer; + } + + return true; +}; + +URLStateMachine.prototype["parse special relative or authority"] = function parseSpecialRelativeOrAuthority(c) { + if (c === 47 && this.input[this.pointer + 1] === 47) { + this.state = "special authority ignore slashes"; + ++this.pointer; + } else { + this.parseError = true; + this.state = "relative"; + --this.pointer; + } + + return true; +}; + +URLStateMachine.prototype["parse path or authority"] = function parsePathOrAuthority(c) { + if (c === 47) { + this.state = "authority"; + } else { + this.state = "path"; + --this.pointer; + } + + return true; +}; + +URLStateMachine.prototype["parse relative"] = function parseRelative(c) { + this.url.scheme = this.base.scheme; + if (isNaN(c)) { + this.url.username = this.base.username; + this.url.password = this.base.password; + this.url.host = this.base.host; + this.url.port = this.base.port; + this.url.path = this.base.path.slice(); + this.url.query = this.base.query; + } else if (c === 47) { + this.state = "relative slash"; + } else if (c === 63) { + this.url.username = this.base.username; + this.url.password = this.base.password; + this.url.host = this.base.host; + this.url.port = this.base.port; + this.url.path = this.base.path.slice(); + this.url.query = ""; + this.state = "query"; + } else if (c === 35) { + this.url.username = this.base.username; + this.url.password = this.base.password; + this.url.host = this.base.host; + this.url.port = this.base.port; + this.url.path = this.base.path.slice(); + this.url.query = this.base.query; + this.url.fragment = ""; + this.state = "fragment"; + } else if (isSpecial(this.url) && c === 92) { + this.parseError = true; + this.state = "relative slash"; + } else { + this.url.username = this.base.username; + this.url.password = this.base.password; + this.url.host = this.base.host; + this.url.port = this.base.port; + this.url.path = this.base.path.slice(0, this.base.path.length - 1); + + this.state = "path"; + --this.pointer; + } + + return true; +}; + +URLStateMachine.prototype["parse relative slash"] = function parseRelativeSlash(c) { + if (isSpecial(this.url) && (c === 47 || c === 92)) { + if (c === 92) { + this.parseError = true; + } + this.state = "special authority ignore slashes"; + } else if (c === 47) { + this.state = "authority"; + } else { + this.url.username = this.base.username; + this.url.password = this.base.password; + this.url.host = this.base.host; + this.url.port = this.base.port; + this.state = "path"; + --this.pointer; + } + + return true; +}; + +URLStateMachine.prototype["parse special authority slashes"] = function parseSpecialAuthoritySlashes(c) { + if (c === 47 && this.input[this.pointer + 1] === 47) { + this.state = "special authority ignore slashes"; + ++this.pointer; + } else { + this.parseError = true; + this.state = "special authority ignore slashes"; + --this.pointer; + } + + return true; +}; + +URLStateMachine.prototype["parse special authority ignore slashes"] = function parseSpecialAuthorityIgnoreSlashes(c) { + if (c !== 47 && c !== 92) { + this.state = "authority"; + --this.pointer; + } else { + this.parseError = true; + } + + return true; +}; + +URLStateMachine.prototype["parse authority"] = function parseAuthority(c, cStr) { + if (c === 64) { + this.parseError = true; + if (this.atFlag) { + this.buffer = "%40" + this.buffer; + } + this.atFlag = true; + + // careful, this is based on buffer and has its own pointer (this.pointer != pointer) and inner chars + const len = countSymbols(this.buffer); + for (let pointer = 0; pointer < len; ++pointer) { + const codePoint = this.buffer.codePointAt(pointer); + + if (codePoint === 58 && !this.passwordTokenSeenFlag) { + this.passwordTokenSeenFlag = true; + continue; + } + const encodedCodePoints = percentEncodeChar(codePoint, isUserinfoPercentEncode); + if (this.passwordTokenSeenFlag) { + this.url.password += encodedCodePoints; + } else { + this.url.username += encodedCodePoints; + } + } + this.buffer = ""; + } else if (isNaN(c) || c === 47 || c === 63 || c === 35 || + (isSpecial(this.url) && c === 92)) { + if (this.atFlag && this.buffer === "") { + this.parseError = true; + return failure; + } + this.pointer -= countSymbols(this.buffer) + 1; + this.buffer = ""; + this.state = "host"; + } else { + this.buffer += cStr; + } + + return true; +}; + +URLStateMachine.prototype["parse hostname"] = +URLStateMachine.prototype["parse host"] = function parseHostName(c, cStr) { + if (this.stateOverride && this.url.scheme === "file") { + --this.pointer; + this.state = "file host"; + } else if (c === 58 && !this.arrFlag) { + if (this.buffer === "") { + this.parseError = true; + return failure; + } + + const host = parseHost(this.buffer, isSpecial(this.url)); + if (host === failure) { + return failure; + } + + this.url.host = host; + this.buffer = ""; + this.state = "port"; + if (this.stateOverride === "hostname") { + return false; + } + } else if (isNaN(c) || c === 47 || c === 63 || c === 35 || + (isSpecial(this.url) && c === 92)) { + --this.pointer; + if (isSpecial(this.url) && this.buffer === "") { + this.parseError = true; + return failure; + } else if (this.stateOverride && this.buffer === "" && + (includesCredentials(this.url) || this.url.port !== null)) { + this.parseError = true; + return false; + } + + const host = parseHost(this.buffer, isSpecial(this.url)); + if (host === failure) { + return failure; + } + + this.url.host = host; + this.buffer = ""; + this.state = "path start"; + if (this.stateOverride) { + return false; + } + } else { + if (c === 91) { + this.arrFlag = true; + } else if (c === 93) { + this.arrFlag = false; + } + this.buffer += cStr; + } + + return true; +}; + +URLStateMachine.prototype["parse port"] = function parsePort(c, cStr) { + if (isASCIIDigit(c)) { + this.buffer += cStr; + } else if (isNaN(c) || c === 47 || c === 63 || c === 35 || + (isSpecial(this.url) && c === 92) || + this.stateOverride) { + if (this.buffer !== "") { + const port = parseInt(this.buffer); + if (port > Math.pow(2, 16) - 1) { + this.parseError = true; + return failure; + } + this.url.port = port === defaultPort(this.url.scheme) ? null : port; + this.buffer = ""; + } + if (this.stateOverride) { + return false; + } + this.state = "path start"; + --this.pointer; + } else { + this.parseError = true; + return failure; + } + + return true; +}; + +const fileOtherwiseCodePoints = new Set([47, 92, 63, 35]); + +URLStateMachine.prototype["parse file"] = function parseFile(c) { + this.url.scheme = "file"; + + if (c === 47 || c === 92) { + if (c === 92) { + this.parseError = true; + } + this.state = "file slash"; + } else if (this.base !== null && this.base.scheme === "file") { + if (isNaN(c)) { + this.url.host = this.base.host; + this.url.path = this.base.path.slice(); + this.url.query = this.base.query; + } else if (c === 63) { + this.url.host = this.base.host; + this.url.path = this.base.path.slice(); + this.url.query = ""; + this.state = "query"; + } else if (c === 35) { + this.url.host = this.base.host; + this.url.path = this.base.path.slice(); + this.url.query = this.base.query; + this.url.fragment = ""; + this.state = "fragment"; + } else { + if (this.input.length - this.pointer - 1 === 0 || // remaining consists of 0 code points + !isWindowsDriveLetterCodePoints(c, this.input[this.pointer + 1]) || + (this.input.length - this.pointer - 1 >= 2 && // remaining has at least 2 code points + !fileOtherwiseCodePoints.has(this.input[this.pointer + 2]))) { + this.url.host = this.base.host; + this.url.path = this.base.path.slice(); + shortenPath(this.url); + } else { + this.parseError = true; + } + + this.state = "path"; + --this.pointer; + } + } else { + this.state = "path"; + --this.pointer; + } + + return true; +}; + +URLStateMachine.prototype["parse file slash"] = function parseFileSlash(c) { + if (c === 47 || c === 92) { + if (c === 92) { + this.parseError = true; + } + this.state = "file host"; + } else { + if (this.base !== null && this.base.scheme === "file") { + if (isNormalizedWindowsDriveLetterString(this.base.path[0])) { + this.url.path.push(this.base.path[0]); + } else { + this.url.host = this.base.host; + } + } + this.state = "path"; + --this.pointer; + } + + return true; +}; + +URLStateMachine.prototype["parse file host"] = function parseFileHost(c, cStr) { + if (isNaN(c) || c === 47 || c === 92 || c === 63 || c === 35) { + --this.pointer; + if (!this.stateOverride && isWindowsDriveLetterString(this.buffer)) { + this.parseError = true; + this.state = "path"; + } else if (this.buffer === "") { + this.url.host = ""; + if (this.stateOverride) { + return false; + } + this.state = "path start"; + } else { + let host = parseHost(this.buffer, isSpecial(this.url)); + if (host === failure) { + return failure; + } + if (host === "localhost") { + host = ""; + } + this.url.host = host; + + if (this.stateOverride) { + return false; + } + + this.buffer = ""; + this.state = "path start"; + } + } else { + this.buffer += cStr; + } + + return true; +}; + +URLStateMachine.prototype["parse path start"] = function parsePathStart(c) { + if (isSpecial(this.url)) { + if (c === 92) { + this.parseError = true; + } + this.state = "path"; + + if (c !== 47 && c !== 92) { + --this.pointer; + } + } else if (!this.stateOverride && c === 63) { + this.url.query = ""; + this.state = "query"; + } else if (!this.stateOverride && c === 35) { + this.url.fragment = ""; + this.state = "fragment"; + } else if (c !== undefined) { + this.state = "path"; + if (c !== 47) { + --this.pointer; + } + } + + return true; +}; + +URLStateMachine.prototype["parse path"] = function parsePath(c) { + if (isNaN(c) || c === 47 || (isSpecial(this.url) && c === 92) || + (!this.stateOverride && (c === 63 || c === 35))) { + if (isSpecial(this.url) && c === 92) { + this.parseError = true; + } + + if (isDoubleDot(this.buffer)) { + shortenPath(this.url); + if (c !== 47 && !(isSpecial(this.url) && c === 92)) { + this.url.path.push(""); + } + } else if (isSingleDot(this.buffer) && c !== 47 && + !(isSpecial(this.url) && c === 92)) { + this.url.path.push(""); + } else if (!isSingleDot(this.buffer)) { + if (this.url.scheme === "file" && this.url.path.length === 0 && isWindowsDriveLetterString(this.buffer)) { + if (this.url.host !== "" && this.url.host !== null) { + this.parseError = true; + this.url.host = ""; + } + this.buffer = this.buffer[0] + ":"; + } + this.url.path.push(this.buffer); + } + this.buffer = ""; + if (this.url.scheme === "file" && (c === undefined || c === 63 || c === 35)) { + while (this.url.path.length > 1 && this.url.path[0] === "") { + this.parseError = true; + this.url.path.shift(); + } + } + if (c === 63) { + this.url.query = ""; + this.state = "query"; + } + if (c === 35) { + this.url.fragment = ""; + this.state = "fragment"; + } + } else { + // TODO: If c is not a URL code point and not "%", parse error. + + if (c === 37 && + (!isASCIIHex(this.input[this.pointer + 1]) || + !isASCIIHex(this.input[this.pointer + 2]))) { + this.parseError = true; + } + + this.buffer += percentEncodeChar(c, isPathPercentEncode); + } + + return true; +}; + +URLStateMachine.prototype["parse cannot-be-a-base-URL path"] = function parseCannotBeABaseURLPath(c) { + if (c === 63) { + this.url.query = ""; + this.state = "query"; + } else if (c === 35) { + this.url.fragment = ""; + this.state = "fragment"; + } else { + // TODO: Add: not a URL code point + if (!isNaN(c) && c !== 37) { + this.parseError = true; + } + + if (c === 37 && + (!isASCIIHex(this.input[this.pointer + 1]) || + !isASCIIHex(this.input[this.pointer + 2]))) { + this.parseError = true; + } + + if (!isNaN(c)) { + this.url.path[0] = this.url.path[0] + percentEncodeChar(c, isC0ControlPercentEncode); + } + } + + return true; +}; + +URLStateMachine.prototype["parse query"] = function parseQuery(c, cStr) { + if (isNaN(c) || (!this.stateOverride && c === 35)) { + if (!isSpecial(this.url) || this.url.scheme === "ws" || this.url.scheme === "wss") { + this.encodingOverride = "utf-8"; + } + + const buffer = new Buffer(this.buffer); // TODO: Use encoding override instead + for (let i = 0; i < buffer.length; ++i) { + if (buffer[i] < 0x21 || buffer[i] > 0x7E || buffer[i] === 0x22 || buffer[i] === 0x23 || + buffer[i] === 0x3C || buffer[i] === 0x3E) { + this.url.query += percentEncode(buffer[i]); + } else { + this.url.query += String.fromCodePoint(buffer[i]); + } + } + + this.buffer = ""; + if (c === 35) { + this.url.fragment = ""; + this.state = "fragment"; + } + } else { + // TODO: If c is not a URL code point and not "%", parse error. + if (c === 37 && + (!isASCIIHex(this.input[this.pointer + 1]) || + !isASCIIHex(this.input[this.pointer + 2]))) { + this.parseError = true; + } + + this.buffer += cStr; + } + + return true; +}; + +URLStateMachine.prototype["parse fragment"] = function parseFragment(c) { + if (isNaN(c)) { // do nothing + } else if (c === 0x0) { + this.parseError = true; + } else { + // TODO: If c is not a URL code point and not "%", parse error. + if (c === 37 && + (!isASCIIHex(this.input[this.pointer + 1]) || + !isASCIIHex(this.input[this.pointer + 2]))) { + this.parseError = true; + } + + this.url.fragment += percentEncodeChar(c, isC0ControlPercentEncode); + } + + return true; +}; + +function serializeURL(url, excludeFragment) { + let output = url.scheme + ":"; + if (url.host !== null) { + output += "//"; + + if (url.username !== "" || url.password !== "") { + output += url.username; + if (url.password !== "") { + output += ":" + url.password; + } + output += "@"; + } + + output += serializeHost(url.host); + + if (url.port !== null) { + output += ":" + url.port; + } + } else if (url.host === null && url.scheme === "file") { + output += "//"; + } + + if (url.cannotBeABaseURL) { + output += url.path[0]; + } else { + for (const string of url.path) { + output += "/" + string; + } + } + + if (url.query !== null) { + output += "?" + url.query; + } + + if (!excludeFragment && url.fragment !== null) { + output += "#" + url.fragment; + } + + return output; +} + +function serializeOrigin(tuple) { + let result = tuple.scheme + "://"; + result += serializeHost(tuple.host); + + if (tuple.port !== null) { + result += ":" + tuple.port; + } + + return result; +} + +module.exports.serializeURL = serializeURL; + +module.exports.serializeURLOrigin = function (url) { + // https://url.spec.whatwg.org/#concept-url-origin + switch (url.scheme) { + case "blob": + try { + return module.exports.serializeURLOrigin(module.exports.parseURL(url.path[0])); + } catch (e) { + // serializing an opaque origin returns "null" + return "null"; + } + case "ftp": + case "gopher": + case "http": + case "https": + case "ws": + case "wss": + return serializeOrigin({ + scheme: url.scheme, + host: url.host, + port: url.port + }); + case "file": + // spec says "exercise to the reader", chrome says "file://" + return "file://"; + default: + // serializing an opaque origin returns "null" + return "null"; + } +}; + +module.exports.basicURLParse = function (input, options) { + if (options === undefined) { + options = {}; + } + + const usm = new URLStateMachine(input, options.baseURL, options.encodingOverride, options.url, options.stateOverride); + if (usm.failure) { + return "failure"; + } + + return usm.url; +}; + +module.exports.setTheUsername = function (url, username) { + url.username = ""; + const decoded = punycode.ucs2.decode(username); + for (let i = 0; i < decoded.length; ++i) { + url.username += percentEncodeChar(decoded[i], isUserinfoPercentEncode); + } +}; + +module.exports.setThePassword = function (url, password) { + url.password = ""; + const decoded = punycode.ucs2.decode(password); + for (let i = 0; i < decoded.length; ++i) { + url.password += percentEncodeChar(decoded[i], isUserinfoPercentEncode); + } +}; + +module.exports.serializeHost = serializeHost; + +module.exports.cannotHaveAUsernamePasswordPort = cannotHaveAUsernamePasswordPort; + +module.exports.serializeInteger = function (integer) { + return String(integer); +}; + +module.exports.parseURL = function (input, options) { + if (options === undefined) { + options = {}; + } + + // We don't handle blobs, so this just delegates: + return module.exports.basicURLParse(input, { baseURL: options.baseURL, encodingOverride: options.encodingOverride }); +}; + + +/***/ }), + +/***/ 3185: +/***/ ((module) => { + +"use strict"; + + +module.exports.mixin = function mixin(target, source) { + const keys = Object.getOwnPropertyNames(source); + for (let i = 0; i < keys.length; ++i) { + Object.defineProperty(target, keys[i], Object.getOwnPropertyDescriptor(source, keys[i])); + } +}; + +module.exports.wrapperSymbol = Symbol("wrapper"); +module.exports.implSymbol = Symbol("impl"); + +module.exports.wrapperForImpl = function (impl) { + return impl[module.exports.wrapperSymbol]; +}; + +module.exports.implForWrapper = function (wrapper) { + return wrapper[module.exports.implSymbol]; +}; + + + +/***/ }), + +/***/ 2940: +/***/ ((module) => { + +// Returns a wrapper function that returns a wrapped callback +// The wrapper function should do some stuff, and return a +// presumably different callback function. +// This makes sure that own properties are retained, so that +// decorations and such are not lost along the way. +module.exports = wrappy +function wrappy (fn, cb) { + if (fn && cb) return wrappy(fn)(cb) + + if (typeof fn !== 'function') + throw new TypeError('need wrapper function') + + Object.keys(fn).forEach(function (k) { + wrapper[k] = fn[k] + }) + + return wrapper + + function wrapper() { + var args = new Array(arguments.length) + for (var i = 0; i < args.length; i++) { + args[i] = arguments[i] + } + var ret = fn.apply(this, args) + var cb = args[args.length-1] + if (typeof ret === 'function' && ret !== cb) { + Object.keys(cb).forEach(function (k) { + ret[k] = cb[k] + }) + } + return ret + } +} + + +/***/ }), + +/***/ 3571: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +const fs = __nccwpck_require__(5747); +const moment = __nccwpck_require__(9623) const kicsLogo = "https://user-images.githubusercontent.com/75368139/136991766-a4e5bc8b-63db-48f7-9384-740e9f15c9f6.png" const severityOrder = ["HIGH", "MEDIUM", "LOW", "INFO", "TRACE"]; @@ -11177,16 +17895,14 @@ module.exports = { /***/ }), -/***/ 430: +/***/ 1430: /***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { -const https = __nccwpck_require__(211) -const filepath = __nccwpck_require__(622); -const tc = __nccwpck_require__(784); -//const releaseDownloader = require('@fohlen/github-release-downloader'); -const os = __nccwpck_require__(87); -//const decompress = require('decompress'); -//const decompressTargz = require('decompress-targz'); +const https = __nccwpck_require__(7211) +const filepath = __nccwpck_require__(5622); +const tc = __nccwpck_require__(7784); +const core = __nccwpck_require__(2186); +const os = __nccwpck_require__(2087); function getVersion(version) { let path = '' @@ -11245,42 +17961,15 @@ function getReleaseInfo(release) { default: targetAsset = { size: 0, browser_download_url: '' }; } - return { size: targetAsset.size, browser_download_url: targetAsset.browser_download_url, version: targetAsset.name }; + return { + binary: 'kics', + size: targetAsset.size, + browser_download_url: targetAsset.browser_download_url, + version: release.tag_name, + arch: arch + }; } -// async function downloadReleaseFile(releaseAsset) { -// const dest = os.homedir(); -// const releaseURL = releaseAsset.browser_download_url; - -// console.log("Downloading", releaseURL); -// const baseName = releaseURL.substr(releaseURL.lastIndexOf("/") + 1); -// return releaseDownloader.downloadAsset(releaseURL, baseName, dest, () => { -// process.stdout.write("."); -// }); -// } - -// function decompressRelease(path) { -// const dest = os.homedir(); -// return decompress(path, filepath.join(dest, 'kics'), { -// plugins: [ -// decompressTargz() -// ] -// }); -// } - -// function getExecutableName() { -// const os = process.platform; -// switch (os) { -// case 'darwin': -// case 'linux': -// return 'kics'; -// case 'win32': -// return 'kics.exe'; -// default: -// return 'kics'; -// } -// } - async function installKICS(kicsVersion) { let release = {}; if (!kicsVersion || kicsVersion == "latest") { @@ -11289,20 +17978,14 @@ async function installKICS(kicsVersion) { release = await getVersion(kicsVersion); } const releaseInfo = getReleaseInfo(release) - - const kicsDownloadPath = await tc.downloadTool(releaseInfo.browser_download_url); - const kicsExtractedFolder = await tc.extractTar(kicsDownloadPath, filepath.join(os.homedir(), 'kics', releaseInfo.version)); - const cachedPath = await tc.cacheDir(kicsExtractedFolder, 'kics', releaseInfo.version); - core.addPath(cachedPath); - - // const releasePath = await downloadReleaseFile(releaseAsset, "./") - // console.log('\nDownloaded KICS release', releasePath); - // const files = await decompressRelease(releasePath); - // console.log('\nDecompressed KICS release', files.map(f => f.path)); - - // const kicsPath = filepath.join(os.homedir(), 'kics', getExecutableName()); - // console.log('\nInstalling KICS to', kicsPath); - return kicsPath; + let kicsPath = tc.find(releaseInfo.binary, releaseInfo.version, releaseInfo.arch); + if (!kicsPath) { + core.info(`Downloading ${releaseInfo.binary} ${releaseInfo.version} ${releaseInfo.arch}`); + const kicsDownloadPath = await tc.downloadTool(releaseInfo.browser_download_url); + const kicsExtractedFolder = await tc.extractTar(kicsDownloadPath, filepath.join(os.homedir(), 'kics', releaseInfo.version)); + kicsPath = await tc.cacheDir(kicsExtractedFolder, 'kics', releaseInfo.version, releaseInfo.arch); + } + core.addPath(kicsPath); } module.exports = { @@ -11311,42 +17994,70 @@ module.exports = { /***/ }), -/***/ 157: +/***/ 3157: /***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { -const exec = __nccwpck_require__(514); +const exec = __nccwpck_require__(1514); -const core = __nccwpck_require__(186); +const core = __nccwpck_require__(2186); -const kicsInputs = { - path: { flag: '--path', value: core.getInput('path') }, - ignore_on_exit: { flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, - fail_on: { flag: '--fail-on', value: core.getInput('fail_on') }, - timeout: { flag: '--timeout', value: core.getInput('timeout') }, - profiling: { flag: '--profiling', value: core.getInput('profiling') }, - config_path: { flag: '--config', value: core.getInput('config_path') }, - payload_path: { flag: '--payload-path', value: core.getInput('payload_path') }, - exclude_paths: { flag: '--exclude-paths', value: core.getInput('exclude_paths') }, - exclude_queries: { flag: '--exclude-queries', value: core.getInput('exclude_queries') }, - exclude_categories: { flag: '--exclude-categories', value: core.getInput('exclude_categories') }, - exclude_results: { flag: '--exclude-results', value: core.getInput('exclude_results') }, - output_formats: { flag: '--report-formats', value: core.getInput('output_formats') }, - output_path: { flag: '--output-path', value: core.getInput('output_path') }, - queries: { flag: '--queries-path', value: core.getInput('queries') }, - verbose: { flag: '--verbose', value: core.getInput('verbose') }, - secrets_regexes_path: { flag: '--secrets-regexes-path', value: core.getInput('secrets_regexes_path') }, - libraries_path: { flag: '--libraries-path', value: core.getInput('libraries-path') }, - disable_secrets: { flag: '--disable-secrets', value: core.getInput('disable_secrets') }, - disable_full_descriptions: { flag: '--disable-full-descriptions', value: core.getInput('disable_full_descriptions') }, - types: { flag: '--types', value: core.getInput('types') }, - bom: { flag: '--bom', value: core.getInput('bom') }, +const kicsBinary = 'kics'; + +const kicsInput = { + path: { value_type: "string", flag: '--path', value: core.getInput('path') }, + ignore_on_exit: { value_type: "list", flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, + fail_on: { value_type: "list", flag: '--fail-on', value: core.getInput('fail_on') }, + timeout: { value_type: "int", flag: '--timeout', value: core.getInput('timeout') }, + profiling: { value_type: "list", flag: '--profiling', value: core.getInput('profiling') }, + config_path: { value_type: "string", flag: '--config', value: core.getInput('config_path') }, + payload_path: { value_type: "string", flag: '--payload-path', value: core.getInput('payload_path') }, + exclude_paths: { value_type: "list", flag: '--exclude-paths', value: core.getInput('exclude_paths') }, + exclude_queries: { value_type: "list", flag: '--exclude-queries', value: core.getInput('exclude_queries') }, + exclude_categories: { value_type: "list", flag: '--exclude-categories', value: core.getInput('exclude_categories') }, + exclude_results: { value_type: "list", flag: '--exclude-results', value: core.getInput('exclude_results') }, + output_formats: { value_type: "list", flag: '--report-formats', value: core.getInput('output_formats') }, + output_path: { value_type: "string", flag: '--output-path', value: core.getInput('output_path') }, + queries: { value_type: "string", flag: '--queries-path', value: core.getInput('queries') }, + verbose: { value_type: "bool", flag: '--verbose', value: core.getInput('verbose') }, + secrets_regexes_path: { value_type: "string", flag: '--secrets-regexes-path', value: core.getInput('secrets_regexes_path') }, + libraries_path: { value_type: "string", flag: '--libraries-path', value: core.getInput('libraries-path') }, + disable_secrets: { value_type: "bool", flag: '--disable-secrets', value: core.getInput('disable_secrets') }, + disable_full_descriptions: { value_type: "bool", flag: '--disable-full-descriptions', value: core.getInput('disable_full_descriptions') }, + types: { value_type: "list", flag: '--types', value: core.getInput('types') }, + bom: { value_type: "bool", flag: '--bom', value: core.getInput('bom') }, }; -async function scanWithKICS(kicsPath) { - let statusCode = 0; - if (kicsInputs.config_path.value) { - statusCode = await exec.exec(`${kicsPath} scan ${kicsInputs.config_path.flag} ${kicsInputs.config_path.value}`); +async function scanWithKICS(enableComments) { + if (!kicsInput.path.value) { + core.error('Path to scan is not set'); + throw new Error('Path to scan is not set'); } + let cmdArgs = []; + for (let input in kicsInput) { + if (kicsInput[input].value_type === 'string') { + if (kicsInput[input].value) { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } + } else if (kicsInput[input].value_type === 'list') { + if (kicsInput[input].value) { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } + } else if (kicsInput[input].value_type === 'bool') { + if (kicsInput[input].value) { + cmdArgs.push(kicsInput[input].flag); + } + } + } + if (enableComments) { + if (!cmdArgs.find(arg => arg == '--output-path')) { + cmdArgs.push('--output-path'); + cmdArgs.push('./'); + } + } + + return await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`) } module.exports = { @@ -11355,7 +18066,23 @@ module.exports = { /***/ }), -/***/ 357: +/***/ 2877: +/***/ ((module) => { + +module.exports = eval("require")("encoding"); + + +/***/ }), + +/***/ 68: +/***/ ((module) => { + +"use strict"; +module.exports = JSON.parse('[[[0,44],"disallowed_STD3_valid"],[[45,46],"valid"],[[47,47],"disallowed_STD3_valid"],[[48,57],"valid"],[[58,64],"disallowed_STD3_valid"],[[65,65],"mapped",[97]],[[66,66],"mapped",[98]],[[67,67],"mapped",[99]],[[68,68],"mapped",[100]],[[69,69],"mapped",[101]],[[70,70],"mapped",[102]],[[71,71],"mapped",[103]],[[72,72],"mapped",[104]],[[73,73],"mapped",[105]],[[74,74],"mapped",[106]],[[75,75],"mapped",[107]],[[76,76],"mapped",[108]],[[77,77],"mapped",[109]],[[78,78],"mapped",[110]],[[79,79],"mapped",[111]],[[80,80],"mapped",[112]],[[81,81],"mapped",[113]],[[82,82],"mapped",[114]],[[83,83],"mapped",[115]],[[84,84],"mapped",[116]],[[85,85],"mapped",[117]],[[86,86],"mapped",[118]],[[87,87],"mapped",[119]],[[88,88],"mapped",[120]],[[89,89],"mapped",[121]],[[90,90],"mapped",[122]],[[91,96],"disallowed_STD3_valid"],[[97,122],"valid"],[[123,127],"disallowed_STD3_valid"],[[128,159],"disallowed"],[[160,160],"disallowed_STD3_mapped",[32]],[[161,167],"valid",[],"NV8"],[[168,168],"disallowed_STD3_mapped",[32,776]],[[169,169],"valid",[],"NV8"],[[170,170],"mapped",[97]],[[171,172],"valid",[],"NV8"],[[173,173],"ignored"],[[174,174],"valid",[],"NV8"],[[175,175],"disallowed_STD3_mapped",[32,772]],[[176,177],"valid",[],"NV8"],[[178,178],"mapped",[50]],[[179,179],"mapped",[51]],[[180,180],"disallowed_STD3_mapped",[32,769]],[[181,181],"mapped",[956]],[[182,182],"valid",[],"NV8"],[[183,183],"valid"],[[184,184],"disallowed_STD3_mapped",[32,807]],[[185,185],"mapped",[49]],[[186,186],"mapped",[111]],[[187,187],"valid",[],"NV8"],[[188,188],"mapped",[49,8260,52]],[[189,189],"mapped",[49,8260,50]],[[190,190],"mapped",[51,8260,52]],[[191,191],"valid",[],"NV8"],[[192,192],"mapped",[224]],[[193,193],"mapped",[225]],[[194,194],"mapped",[226]],[[195,195],"mapped",[227]],[[196,196],"mapped",[228]],[[197,197],"mapped",[229]],[[198,198],"mapped",[230]],[[199,199],"mapped",[231]],[[200,200],"mapped",[232]],[[201,201],"mapped",[233]],[[202,202],"mapped",[234]],[[203,203],"mapped",[235]],[[204,204],"mapped",[236]],[[205,205],"mapped",[237]],[[206,206],"mapped",[238]],[[207,207],"mapped",[239]],[[208,208],"mapped",[240]],[[209,209],"mapped",[241]],[[210,210],"mapped",[242]],[[211,211],"mapped",[243]],[[212,212],"mapped",[244]],[[213,213],"mapped",[245]],[[214,214],"mapped",[246]],[[215,215],"valid",[],"NV8"],[[216,216],"mapped",[248]],[[217,217],"mapped",[249]],[[218,218],"mapped",[250]],[[219,219],"mapped",[251]],[[220,220],"mapped",[252]],[[221,221],"mapped",[253]],[[222,222],"mapped",[254]],[[223,223],"deviation",[115,115]],[[224,246],"valid"],[[247,247],"valid",[],"NV8"],[[248,255],"valid"],[[256,256],"mapped",[257]],[[257,257],"valid"],[[258,258],"mapped",[259]],[[259,259],"valid"],[[260,260],"mapped",[261]],[[261,261],"valid"],[[262,262],"mapped",[263]],[[263,263],"valid"],[[264,264],"mapped",[265]],[[265,265],"valid"],[[266,266],"mapped",[267]],[[267,267],"valid"],[[268,268],"mapped",[269]],[[269,269],"valid"],[[270,270],"mapped",[271]],[[271,271],"valid"],[[272,272],"mapped",[273]],[[273,273],"valid"],[[274,274],"mapped",[275]],[[275,275],"valid"],[[276,276],"mapped",[277]],[[277,277],"valid"],[[278,278],"mapped",[279]],[[279,279],"valid"],[[280,280],"mapped",[281]],[[281,281],"valid"],[[282,282],"mapped",[283]],[[283,283],"valid"],[[284,284],"mapped",[285]],[[285,285],"valid"],[[286,286],"mapped",[287]],[[287,287],"valid"],[[288,288],"mapped",[289]],[[289,289],"valid"],[[290,290],"mapped",[291]],[[291,291],"valid"],[[292,292],"mapped",[293]],[[293,293],"valid"],[[294,294],"mapped",[295]],[[295,295],"valid"],[[296,296],"mapped",[297]],[[297,297],"valid"],[[298,298],"mapped",[299]],[[299,299],"valid"],[[300,300],"mapped",[301]],[[301,301],"valid"],[[302,302],"mapped",[303]],[[303,303],"valid"],[[304,304],"mapped",[105,775]],[[305,305],"valid"],[[306,307],"mapped",[105,106]],[[308,308],"mapped",[309]],[[309,309],"valid"],[[310,310],"mapped",[311]],[[311,312],"valid"],[[313,313],"mapped",[314]],[[314,314],"valid"],[[315,315],"mapped",[316]],[[316,316],"valid"],[[317,317],"mapped",[318]],[[318,318],"valid"],[[319,320],"mapped",[108,183]],[[321,321],"mapped",[322]],[[322,322],"valid"],[[323,323],"mapped",[324]],[[324,324],"valid"],[[325,325],"mapped",[326]],[[326,326],"valid"],[[327,327],"mapped",[328]],[[328,328],"valid"],[[329,329],"mapped",[700,110]],[[330,330],"mapped",[331]],[[331,331],"valid"],[[332,332],"mapped",[333]],[[333,333],"valid"],[[334,334],"mapped",[335]],[[335,335],"valid"],[[336,336],"mapped",[337]],[[337,337],"valid"],[[338,338],"mapped",[339]],[[339,339],"valid"],[[340,340],"mapped",[341]],[[341,341],"valid"],[[342,342],"mapped",[343]],[[343,343],"valid"],[[344,344],"mapped",[345]],[[345,345],"valid"],[[346,346],"mapped",[347]],[[347,347],"valid"],[[348,348],"mapped",[349]],[[349,349],"valid"],[[350,350],"mapped",[351]],[[351,351],"valid"],[[352,352],"mapped",[353]],[[353,353],"valid"],[[354,354],"mapped",[355]],[[355,355],"valid"],[[356,356],"mapped",[357]],[[357,357],"valid"],[[358,358],"mapped",[359]],[[359,359],"valid"],[[360,360],"mapped",[361]],[[361,361],"valid"],[[362,362],"mapped",[363]],[[363,363],"valid"],[[364,364],"mapped",[365]],[[365,365],"valid"],[[366,366],"mapped",[367]],[[367,367],"valid"],[[368,368],"mapped",[369]],[[369,369],"valid"],[[370,370],"mapped",[371]],[[371,371],"valid"],[[372,372],"mapped",[373]],[[373,373],"valid"],[[374,374],"mapped",[375]],[[375,375],"valid"],[[376,376],"mapped",[255]],[[377,377],"mapped",[378]],[[378,378],"valid"],[[379,379],"mapped",[380]],[[380,380],"valid"],[[381,381],"mapped",[382]],[[382,382],"valid"],[[383,383],"mapped",[115]],[[384,384],"valid"],[[385,385],"mapped",[595]],[[386,386],"mapped",[387]],[[387,387],"valid"],[[388,388],"mapped",[389]],[[389,389],"valid"],[[390,390],"mapped",[596]],[[391,391],"mapped",[392]],[[392,392],"valid"],[[393,393],"mapped",[598]],[[394,394],"mapped",[599]],[[395,395],"mapped",[396]],[[396,397],"valid"],[[398,398],"mapped",[477]],[[399,399],"mapped",[601]],[[400,400],"mapped",[603]],[[401,401],"mapped",[402]],[[402,402],"valid"],[[403,403],"mapped",[608]],[[404,404],"mapped",[611]],[[405,405],"valid"],[[406,406],"mapped",[617]],[[407,407],"mapped",[616]],[[408,408],"mapped",[409]],[[409,411],"valid"],[[412,412],"mapped",[623]],[[413,413],"mapped",[626]],[[414,414],"valid"],[[415,415],"mapped",[629]],[[416,416],"mapped",[417]],[[417,417],"valid"],[[418,418],"mapped",[419]],[[419,419],"valid"],[[420,420],"mapped",[421]],[[421,421],"valid"],[[422,422],"mapped",[640]],[[423,423],"mapped",[424]],[[424,424],"valid"],[[425,425],"mapped",[643]],[[426,427],"valid"],[[428,428],"mapped",[429]],[[429,429],"valid"],[[430,430],"mapped",[648]],[[431,431],"mapped",[432]],[[432,432],"valid"],[[433,433],"mapped",[650]],[[434,434],"mapped",[651]],[[435,435],"mapped",[436]],[[436,436],"valid"],[[437,437],"mapped",[438]],[[438,438],"valid"],[[439,439],"mapped",[658]],[[440,440],"mapped",[441]],[[441,443],"valid"],[[444,444],"mapped",[445]],[[445,451],"valid"],[[452,454],"mapped",[100,382]],[[455,457],"mapped",[108,106]],[[458,460],"mapped",[110,106]],[[461,461],"mapped",[462]],[[462,462],"valid"],[[463,463],"mapped",[464]],[[464,464],"valid"],[[465,465],"mapped",[466]],[[466,466],"valid"],[[467,467],"mapped",[468]],[[468,468],"valid"],[[469,469],"mapped",[470]],[[470,470],"valid"],[[471,471],"mapped",[472]],[[472,472],"valid"],[[473,473],"mapped",[474]],[[474,474],"valid"],[[475,475],"mapped",[476]],[[476,477],"valid"],[[478,478],"mapped",[479]],[[479,479],"valid"],[[480,480],"mapped",[481]],[[481,481],"valid"],[[482,482],"mapped",[483]],[[483,483],"valid"],[[484,484],"mapped",[485]],[[485,485],"valid"],[[486,486],"mapped",[487]],[[487,487],"valid"],[[488,488],"mapped",[489]],[[489,489],"valid"],[[490,490],"mapped",[491]],[[491,491],"valid"],[[492,492],"mapped",[493]],[[493,493],"valid"],[[494,494],"mapped",[495]],[[495,496],"valid"],[[497,499],"mapped",[100,122]],[[500,500],"mapped",[501]],[[501,501],"valid"],[[502,502],"mapped",[405]],[[503,503],"mapped",[447]],[[504,504],"mapped",[505]],[[505,505],"valid"],[[506,506],"mapped",[507]],[[507,507],"valid"],[[508,508],"mapped",[509]],[[509,509],"valid"],[[510,510],"mapped",[511]],[[511,511],"valid"],[[512,512],"mapped",[513]],[[513,513],"valid"],[[514,514],"mapped",[515]],[[515,515],"valid"],[[516,516],"mapped",[517]],[[517,517],"valid"],[[518,518],"mapped",[519]],[[519,519],"valid"],[[520,520],"mapped",[521]],[[521,521],"valid"],[[522,522],"mapped",[523]],[[523,523],"valid"],[[524,524],"mapped",[525]],[[525,525],"valid"],[[526,526],"mapped",[527]],[[527,527],"valid"],[[528,528],"mapped",[529]],[[529,529],"valid"],[[530,530],"mapped",[531]],[[531,531],"valid"],[[532,532],"mapped",[533]],[[533,533],"valid"],[[534,534],"mapped",[535]],[[535,535],"valid"],[[536,536],"mapped",[537]],[[537,537],"valid"],[[538,538],"mapped",[539]],[[539,539],"valid"],[[540,540],"mapped",[541]],[[541,541],"valid"],[[542,542],"mapped",[543]],[[543,543],"valid"],[[544,544],"mapped",[414]],[[545,545],"valid"],[[546,546],"mapped",[547]],[[547,547],"valid"],[[548,548],"mapped",[549]],[[549,549],"valid"],[[550,550],"mapped",[551]],[[551,551],"valid"],[[552,552],"mapped",[553]],[[553,553],"valid"],[[554,554],"mapped",[555]],[[555,555],"valid"],[[556,556],"mapped",[557]],[[557,557],"valid"],[[558,558],"mapped",[559]],[[559,559],"valid"],[[560,560],"mapped",[561]],[[561,561],"valid"],[[562,562],"mapped",[563]],[[563,563],"valid"],[[564,566],"valid"],[[567,569],"valid"],[[570,570],"mapped",[11365]],[[571,571],"mapped",[572]],[[572,572],"valid"],[[573,573],"mapped",[410]],[[574,574],"mapped",[11366]],[[575,576],"valid"],[[577,577],"mapped",[578]],[[578,578],"valid"],[[579,579],"mapped",[384]],[[580,580],"mapped",[649]],[[581,581],"mapped",[652]],[[582,582],"mapped",[583]],[[583,583],"valid"],[[584,584],"mapped",[585]],[[585,585],"valid"],[[586,586],"mapped",[587]],[[587,587],"valid"],[[588,588],"mapped",[589]],[[589,589],"valid"],[[590,590],"mapped",[591]],[[591,591],"valid"],[[592,680],"valid"],[[681,685],"valid"],[[686,687],"valid"],[[688,688],"mapped",[104]],[[689,689],"mapped",[614]],[[690,690],"mapped",[106]],[[691,691],"mapped",[114]],[[692,692],"mapped",[633]],[[693,693],"mapped",[635]],[[694,694],"mapped",[641]],[[695,695],"mapped",[119]],[[696,696],"mapped",[121]],[[697,705],"valid"],[[706,709],"valid",[],"NV8"],[[710,721],"valid"],[[722,727],"valid",[],"NV8"],[[728,728],"disallowed_STD3_mapped",[32,774]],[[729,729],"disallowed_STD3_mapped",[32,775]],[[730,730],"disallowed_STD3_mapped",[32,778]],[[731,731],"disallowed_STD3_mapped",[32,808]],[[732,732],"disallowed_STD3_mapped",[32,771]],[[733,733],"disallowed_STD3_mapped",[32,779]],[[734,734],"valid",[],"NV8"],[[735,735],"valid",[],"NV8"],[[736,736],"mapped",[611]],[[737,737],"mapped",[108]],[[738,738],"mapped",[115]],[[739,739],"mapped",[120]],[[740,740],"mapped",[661]],[[741,745],"valid",[],"NV8"],[[746,747],"valid",[],"NV8"],[[748,748],"valid"],[[749,749],"valid",[],"NV8"],[[750,750],"valid"],[[751,767],"valid",[],"NV8"],[[768,831],"valid"],[[832,832],"mapped",[768]],[[833,833],"mapped",[769]],[[834,834],"valid"],[[835,835],"mapped",[787]],[[836,836],"mapped",[776,769]],[[837,837],"mapped",[953]],[[838,846],"valid"],[[847,847],"ignored"],[[848,855],"valid"],[[856,860],"valid"],[[861,863],"valid"],[[864,865],"valid"],[[866,866],"valid"],[[867,879],"valid"],[[880,880],"mapped",[881]],[[881,881],"valid"],[[882,882],"mapped",[883]],[[883,883],"valid"],[[884,884],"mapped",[697]],[[885,885],"valid"],[[886,886],"mapped",[887]],[[887,887],"valid"],[[888,889],"disallowed"],[[890,890],"disallowed_STD3_mapped",[32,953]],[[891,893],"valid"],[[894,894],"disallowed_STD3_mapped",[59]],[[895,895],"mapped",[1011]],[[896,899],"disallowed"],[[900,900],"disallowed_STD3_mapped",[32,769]],[[901,901],"disallowed_STD3_mapped",[32,776,769]],[[902,902],"mapped",[940]],[[903,903],"mapped",[183]],[[904,904],"mapped",[941]],[[905,905],"mapped",[942]],[[906,906],"mapped",[943]],[[907,907],"disallowed"],[[908,908],"mapped",[972]],[[909,909],"disallowed"],[[910,910],"mapped",[973]],[[911,911],"mapped",[974]],[[912,912],"valid"],[[913,913],"mapped",[945]],[[914,914],"mapped",[946]],[[915,915],"mapped",[947]],[[916,916],"mapped",[948]],[[917,917],"mapped",[949]],[[918,918],"mapped",[950]],[[919,919],"mapped",[951]],[[920,920],"mapped",[952]],[[921,921],"mapped",[953]],[[922,922],"mapped",[954]],[[923,923],"mapped",[955]],[[924,924],"mapped",[956]],[[925,925],"mapped",[957]],[[926,926],"mapped",[958]],[[927,927],"mapped",[959]],[[928,928],"mapped",[960]],[[929,929],"mapped",[961]],[[930,930],"disallowed"],[[931,931],"mapped",[963]],[[932,932],"mapped",[964]],[[933,933],"mapped",[965]],[[934,934],"mapped",[966]],[[935,935],"mapped",[967]],[[936,936],"mapped",[968]],[[937,937],"mapped",[969]],[[938,938],"mapped",[970]],[[939,939],"mapped",[971]],[[940,961],"valid"],[[962,962],"deviation",[963]],[[963,974],"valid"],[[975,975],"mapped",[983]],[[976,976],"mapped",[946]],[[977,977],"mapped",[952]],[[978,978],"mapped",[965]],[[979,979],"mapped",[973]],[[980,980],"mapped",[971]],[[981,981],"mapped",[966]],[[982,982],"mapped",[960]],[[983,983],"valid"],[[984,984],"mapped",[985]],[[985,985],"valid"],[[986,986],"mapped",[987]],[[987,987],"valid"],[[988,988],"mapped",[989]],[[989,989],"valid"],[[990,990],"mapped",[991]],[[991,991],"valid"],[[992,992],"mapped",[993]],[[993,993],"valid"],[[994,994],"mapped",[995]],[[995,995],"valid"],[[996,996],"mapped",[997]],[[997,997],"valid"],[[998,998],"mapped",[999]],[[999,999],"valid"],[[1000,1000],"mapped",[1001]],[[1001,1001],"valid"],[[1002,1002],"mapped",[1003]],[[1003,1003],"valid"],[[1004,1004],"mapped",[1005]],[[1005,1005],"valid"],[[1006,1006],"mapped",[1007]],[[1007,1007],"valid"],[[1008,1008],"mapped",[954]],[[1009,1009],"mapped",[961]],[[1010,1010],"mapped",[963]],[[1011,1011],"valid"],[[1012,1012],"mapped",[952]],[[1013,1013],"mapped",[949]],[[1014,1014],"valid",[],"NV8"],[[1015,1015],"mapped",[1016]],[[1016,1016],"valid"],[[1017,1017],"mapped",[963]],[[1018,1018],"mapped",[1019]],[[1019,1019],"valid"],[[1020,1020],"valid"],[[1021,1021],"mapped",[891]],[[1022,1022],"mapped",[892]],[[1023,1023],"mapped",[893]],[[1024,1024],"mapped",[1104]],[[1025,1025],"mapped",[1105]],[[1026,1026],"mapped",[1106]],[[1027,1027],"mapped",[1107]],[[1028,1028],"mapped",[1108]],[[1029,1029],"mapped",[1109]],[[1030,1030],"mapped",[1110]],[[1031,1031],"mapped",[1111]],[[1032,1032],"mapped",[1112]],[[1033,1033],"mapped",[1113]],[[1034,1034],"mapped",[1114]],[[1035,1035],"mapped",[1115]],[[1036,1036],"mapped",[1116]],[[1037,1037],"mapped",[1117]],[[1038,1038],"mapped",[1118]],[[1039,1039],"mapped",[1119]],[[1040,1040],"mapped",[1072]],[[1041,1041],"mapped",[1073]],[[1042,1042],"mapped",[1074]],[[1043,1043],"mapped",[1075]],[[1044,1044],"mapped",[1076]],[[1045,1045],"mapped",[1077]],[[1046,1046],"mapped",[1078]],[[1047,1047],"mapped",[1079]],[[1048,1048],"mapped",[1080]],[[1049,1049],"mapped",[1081]],[[1050,1050],"mapped",[1082]],[[1051,1051],"mapped",[1083]],[[1052,1052],"mapped",[1084]],[[1053,1053],"mapped",[1085]],[[1054,1054],"mapped",[1086]],[[1055,1055],"mapped",[1087]],[[1056,1056],"mapped",[1088]],[[1057,1057],"mapped",[1089]],[[1058,1058],"mapped",[1090]],[[1059,1059],"mapped",[1091]],[[1060,1060],"mapped",[1092]],[[1061,1061],"mapped",[1093]],[[1062,1062],"mapped",[1094]],[[1063,1063],"mapped",[1095]],[[1064,1064],"mapped",[1096]],[[1065,1065],"mapped",[1097]],[[1066,1066],"mapped",[1098]],[[1067,1067],"mapped",[1099]],[[1068,1068],"mapped",[1100]],[[1069,1069],"mapped",[1101]],[[1070,1070],"mapped",[1102]],[[1071,1071],"mapped",[1103]],[[1072,1103],"valid"],[[1104,1104],"valid"],[[1105,1116],"valid"],[[1117,1117],"valid"],[[1118,1119],"valid"],[[1120,1120],"mapped",[1121]],[[1121,1121],"valid"],[[1122,1122],"mapped",[1123]],[[1123,1123],"valid"],[[1124,1124],"mapped",[1125]],[[1125,1125],"valid"],[[1126,1126],"mapped",[1127]],[[1127,1127],"valid"],[[1128,1128],"mapped",[1129]],[[1129,1129],"valid"],[[1130,1130],"mapped",[1131]],[[1131,1131],"valid"],[[1132,1132],"mapped",[1133]],[[1133,1133],"valid"],[[1134,1134],"mapped",[1135]],[[1135,1135],"valid"],[[1136,1136],"mapped",[1137]],[[1137,1137],"valid"],[[1138,1138],"mapped",[1139]],[[1139,1139],"valid"],[[1140,1140],"mapped",[1141]],[[1141,1141],"valid"],[[1142,1142],"mapped",[1143]],[[1143,1143],"valid"],[[1144,1144],"mapped",[1145]],[[1145,1145],"valid"],[[1146,1146],"mapped",[1147]],[[1147,1147],"valid"],[[1148,1148],"mapped",[1149]],[[1149,1149],"valid"],[[1150,1150],"mapped",[1151]],[[1151,1151],"valid"],[[1152,1152],"mapped",[1153]],[[1153,1153],"valid"],[[1154,1154],"valid",[],"NV8"],[[1155,1158],"valid"],[[1159,1159],"valid"],[[1160,1161],"valid",[],"NV8"],[[1162,1162],"mapped",[1163]],[[1163,1163],"valid"],[[1164,1164],"mapped",[1165]],[[1165,1165],"valid"],[[1166,1166],"mapped",[1167]],[[1167,1167],"valid"],[[1168,1168],"mapped",[1169]],[[1169,1169],"valid"],[[1170,1170],"mapped",[1171]],[[1171,1171],"valid"],[[1172,1172],"mapped",[1173]],[[1173,1173],"valid"],[[1174,1174],"mapped",[1175]],[[1175,1175],"valid"],[[1176,1176],"mapped",[1177]],[[1177,1177],"valid"],[[1178,1178],"mapped",[1179]],[[1179,1179],"valid"],[[1180,1180],"mapped",[1181]],[[1181,1181],"valid"],[[1182,1182],"mapped",[1183]],[[1183,1183],"valid"],[[1184,1184],"mapped",[1185]],[[1185,1185],"valid"],[[1186,1186],"mapped",[1187]],[[1187,1187],"valid"],[[1188,1188],"mapped",[1189]],[[1189,1189],"valid"],[[1190,1190],"mapped",[1191]],[[1191,1191],"valid"],[[1192,1192],"mapped",[1193]],[[1193,1193],"valid"],[[1194,1194],"mapped",[1195]],[[1195,1195],"valid"],[[1196,1196],"mapped",[1197]],[[1197,1197],"valid"],[[1198,1198],"mapped",[1199]],[[1199,1199],"valid"],[[1200,1200],"mapped",[1201]],[[1201,1201],"valid"],[[1202,1202],"mapped",[1203]],[[1203,1203],"valid"],[[1204,1204],"mapped",[1205]],[[1205,1205],"valid"],[[1206,1206],"mapped",[1207]],[[1207,1207],"valid"],[[1208,1208],"mapped",[1209]],[[1209,1209],"valid"],[[1210,1210],"mapped",[1211]],[[1211,1211],"valid"],[[1212,1212],"mapped",[1213]],[[1213,1213],"valid"],[[1214,1214],"mapped",[1215]],[[1215,1215],"valid"],[[1216,1216],"disallowed"],[[1217,1217],"mapped",[1218]],[[1218,1218],"valid"],[[1219,1219],"mapped",[1220]],[[1220,1220],"valid"],[[1221,1221],"mapped",[1222]],[[1222,1222],"valid"],[[1223,1223],"mapped",[1224]],[[1224,1224],"valid"],[[1225,1225],"mapped",[1226]],[[1226,1226],"valid"],[[1227,1227],"mapped",[1228]],[[1228,1228],"valid"],[[1229,1229],"mapped",[1230]],[[1230,1230],"valid"],[[1231,1231],"valid"],[[1232,1232],"mapped",[1233]],[[1233,1233],"valid"],[[1234,1234],"mapped",[1235]],[[1235,1235],"valid"],[[1236,1236],"mapped",[1237]],[[1237,1237],"valid"],[[1238,1238],"mapped",[1239]],[[1239,1239],"valid"],[[1240,1240],"mapped",[1241]],[[1241,1241],"valid"],[[1242,1242],"mapped",[1243]],[[1243,1243],"valid"],[[1244,1244],"mapped",[1245]],[[1245,1245],"valid"],[[1246,1246],"mapped",[1247]],[[1247,1247],"valid"],[[1248,1248],"mapped",[1249]],[[1249,1249],"valid"],[[1250,1250],"mapped",[1251]],[[1251,1251],"valid"],[[1252,1252],"mapped",[1253]],[[1253,1253],"valid"],[[1254,1254],"mapped",[1255]],[[1255,1255],"valid"],[[1256,1256],"mapped",[1257]],[[1257,1257],"valid"],[[1258,1258],"mapped",[1259]],[[1259,1259],"valid"],[[1260,1260],"mapped",[1261]],[[1261,1261],"valid"],[[1262,1262],"mapped",[1263]],[[1263,1263],"valid"],[[1264,1264],"mapped",[1265]],[[1265,1265],"valid"],[[1266,1266],"mapped",[1267]],[[1267,1267],"valid"],[[1268,1268],"mapped",[1269]],[[1269,1269],"valid"],[[1270,1270],"mapped",[1271]],[[1271,1271],"valid"],[[1272,1272],"mapped",[1273]],[[1273,1273],"valid"],[[1274,1274],"mapped",[1275]],[[1275,1275],"valid"],[[1276,1276],"mapped",[1277]],[[1277,1277],"valid"],[[1278,1278],"mapped",[1279]],[[1279,1279],"valid"],[[1280,1280],"mapped",[1281]],[[1281,1281],"valid"],[[1282,1282],"mapped",[1283]],[[1283,1283],"valid"],[[1284,1284],"mapped",[1285]],[[1285,1285],"valid"],[[1286,1286],"mapped",[1287]],[[1287,1287],"valid"],[[1288,1288],"mapped",[1289]],[[1289,1289],"valid"],[[1290,1290],"mapped",[1291]],[[1291,1291],"valid"],[[1292,1292],"mapped",[1293]],[[1293,1293],"valid"],[[1294,1294],"mapped",[1295]],[[1295,1295],"valid"],[[1296,1296],"mapped",[1297]],[[1297,1297],"valid"],[[1298,1298],"mapped",[1299]],[[1299,1299],"valid"],[[1300,1300],"mapped",[1301]],[[1301,1301],"valid"],[[1302,1302],"mapped",[1303]],[[1303,1303],"valid"],[[1304,1304],"mapped",[1305]],[[1305,1305],"valid"],[[1306,1306],"mapped",[1307]],[[1307,1307],"valid"],[[1308,1308],"mapped",[1309]],[[1309,1309],"valid"],[[1310,1310],"mapped",[1311]],[[1311,1311],"valid"],[[1312,1312],"mapped",[1313]],[[1313,1313],"valid"],[[1314,1314],"mapped",[1315]],[[1315,1315],"valid"],[[1316,1316],"mapped",[1317]],[[1317,1317],"valid"],[[1318,1318],"mapped",[1319]],[[1319,1319],"valid"],[[1320,1320],"mapped",[1321]],[[1321,1321],"valid"],[[1322,1322],"mapped",[1323]],[[1323,1323],"valid"],[[1324,1324],"mapped",[1325]],[[1325,1325],"valid"],[[1326,1326],"mapped",[1327]],[[1327,1327],"valid"],[[1328,1328],"disallowed"],[[1329,1329],"mapped",[1377]],[[1330,1330],"mapped",[1378]],[[1331,1331],"mapped",[1379]],[[1332,1332],"mapped",[1380]],[[1333,1333],"mapped",[1381]],[[1334,1334],"mapped",[1382]],[[1335,1335],"mapped",[1383]],[[1336,1336],"mapped",[1384]],[[1337,1337],"mapped",[1385]],[[1338,1338],"mapped",[1386]],[[1339,1339],"mapped",[1387]],[[1340,1340],"mapped",[1388]],[[1341,1341],"mapped",[1389]],[[1342,1342],"mapped",[1390]],[[1343,1343],"mapped",[1391]],[[1344,1344],"mapped",[1392]],[[1345,1345],"mapped",[1393]],[[1346,1346],"mapped",[1394]],[[1347,1347],"mapped",[1395]],[[1348,1348],"mapped",[1396]],[[1349,1349],"mapped",[1397]],[[1350,1350],"mapped",[1398]],[[1351,1351],"mapped",[1399]],[[1352,1352],"mapped",[1400]],[[1353,1353],"mapped",[1401]],[[1354,1354],"mapped",[1402]],[[1355,1355],"mapped",[1403]],[[1356,1356],"mapped",[1404]],[[1357,1357],"mapped",[1405]],[[1358,1358],"mapped",[1406]],[[1359,1359],"mapped",[1407]],[[1360,1360],"mapped",[1408]],[[1361,1361],"mapped",[1409]],[[1362,1362],"mapped",[1410]],[[1363,1363],"mapped",[1411]],[[1364,1364],"mapped",[1412]],[[1365,1365],"mapped",[1413]],[[1366,1366],"mapped",[1414]],[[1367,1368],"disallowed"],[[1369,1369],"valid"],[[1370,1375],"valid",[],"NV8"],[[1376,1376],"disallowed"],[[1377,1414],"valid"],[[1415,1415],"mapped",[1381,1410]],[[1416,1416],"disallowed"],[[1417,1417],"valid",[],"NV8"],[[1418,1418],"valid",[],"NV8"],[[1419,1420],"disallowed"],[[1421,1422],"valid",[],"NV8"],[[1423,1423],"valid",[],"NV8"],[[1424,1424],"disallowed"],[[1425,1441],"valid"],[[1442,1442],"valid"],[[1443,1455],"valid"],[[1456,1465],"valid"],[[1466,1466],"valid"],[[1467,1469],"valid"],[[1470,1470],"valid",[],"NV8"],[[1471,1471],"valid"],[[1472,1472],"valid",[],"NV8"],[[1473,1474],"valid"],[[1475,1475],"valid",[],"NV8"],[[1476,1476],"valid"],[[1477,1477],"valid"],[[1478,1478],"valid",[],"NV8"],[[1479,1479],"valid"],[[1480,1487],"disallowed"],[[1488,1514],"valid"],[[1515,1519],"disallowed"],[[1520,1524],"valid"],[[1525,1535],"disallowed"],[[1536,1539],"disallowed"],[[1540,1540],"disallowed"],[[1541,1541],"disallowed"],[[1542,1546],"valid",[],"NV8"],[[1547,1547],"valid",[],"NV8"],[[1548,1548],"valid",[],"NV8"],[[1549,1551],"valid",[],"NV8"],[[1552,1557],"valid"],[[1558,1562],"valid"],[[1563,1563],"valid",[],"NV8"],[[1564,1564],"disallowed"],[[1565,1565],"disallowed"],[[1566,1566],"valid",[],"NV8"],[[1567,1567],"valid",[],"NV8"],[[1568,1568],"valid"],[[1569,1594],"valid"],[[1595,1599],"valid"],[[1600,1600],"valid",[],"NV8"],[[1601,1618],"valid"],[[1619,1621],"valid"],[[1622,1624],"valid"],[[1625,1630],"valid"],[[1631,1631],"valid"],[[1632,1641],"valid"],[[1642,1645],"valid",[],"NV8"],[[1646,1647],"valid"],[[1648,1652],"valid"],[[1653,1653],"mapped",[1575,1652]],[[1654,1654],"mapped",[1608,1652]],[[1655,1655],"mapped",[1735,1652]],[[1656,1656],"mapped",[1610,1652]],[[1657,1719],"valid"],[[1720,1721],"valid"],[[1722,1726],"valid"],[[1727,1727],"valid"],[[1728,1742],"valid"],[[1743,1743],"valid"],[[1744,1747],"valid"],[[1748,1748],"valid",[],"NV8"],[[1749,1756],"valid"],[[1757,1757],"disallowed"],[[1758,1758],"valid",[],"NV8"],[[1759,1768],"valid"],[[1769,1769],"valid",[],"NV8"],[[1770,1773],"valid"],[[1774,1775],"valid"],[[1776,1785],"valid"],[[1786,1790],"valid"],[[1791,1791],"valid"],[[1792,1805],"valid",[],"NV8"],[[1806,1806],"disallowed"],[[1807,1807],"disallowed"],[[1808,1836],"valid"],[[1837,1839],"valid"],[[1840,1866],"valid"],[[1867,1868],"disallowed"],[[1869,1871],"valid"],[[1872,1901],"valid"],[[1902,1919],"valid"],[[1920,1968],"valid"],[[1969,1969],"valid"],[[1970,1983],"disallowed"],[[1984,2037],"valid"],[[2038,2042],"valid",[],"NV8"],[[2043,2047],"disallowed"],[[2048,2093],"valid"],[[2094,2095],"disallowed"],[[2096,2110],"valid",[],"NV8"],[[2111,2111],"disallowed"],[[2112,2139],"valid"],[[2140,2141],"disallowed"],[[2142,2142],"valid",[],"NV8"],[[2143,2207],"disallowed"],[[2208,2208],"valid"],[[2209,2209],"valid"],[[2210,2220],"valid"],[[2221,2226],"valid"],[[2227,2228],"valid"],[[2229,2274],"disallowed"],[[2275,2275],"valid"],[[2276,2302],"valid"],[[2303,2303],"valid"],[[2304,2304],"valid"],[[2305,2307],"valid"],[[2308,2308],"valid"],[[2309,2361],"valid"],[[2362,2363],"valid"],[[2364,2381],"valid"],[[2382,2382],"valid"],[[2383,2383],"valid"],[[2384,2388],"valid"],[[2389,2389],"valid"],[[2390,2391],"valid"],[[2392,2392],"mapped",[2325,2364]],[[2393,2393],"mapped",[2326,2364]],[[2394,2394],"mapped",[2327,2364]],[[2395,2395],"mapped",[2332,2364]],[[2396,2396],"mapped",[2337,2364]],[[2397,2397],"mapped",[2338,2364]],[[2398,2398],"mapped",[2347,2364]],[[2399,2399],"mapped",[2351,2364]],[[2400,2403],"valid"],[[2404,2405],"valid",[],"NV8"],[[2406,2415],"valid"],[[2416,2416],"valid",[],"NV8"],[[2417,2418],"valid"],[[2419,2423],"valid"],[[2424,2424],"valid"],[[2425,2426],"valid"],[[2427,2428],"valid"],[[2429,2429],"valid"],[[2430,2431],"valid"],[[2432,2432],"valid"],[[2433,2435],"valid"],[[2436,2436],"disallowed"],[[2437,2444],"valid"],[[2445,2446],"disallowed"],[[2447,2448],"valid"],[[2449,2450],"disallowed"],[[2451,2472],"valid"],[[2473,2473],"disallowed"],[[2474,2480],"valid"],[[2481,2481],"disallowed"],[[2482,2482],"valid"],[[2483,2485],"disallowed"],[[2486,2489],"valid"],[[2490,2491],"disallowed"],[[2492,2492],"valid"],[[2493,2493],"valid"],[[2494,2500],"valid"],[[2501,2502],"disallowed"],[[2503,2504],"valid"],[[2505,2506],"disallowed"],[[2507,2509],"valid"],[[2510,2510],"valid"],[[2511,2518],"disallowed"],[[2519,2519],"valid"],[[2520,2523],"disallowed"],[[2524,2524],"mapped",[2465,2492]],[[2525,2525],"mapped",[2466,2492]],[[2526,2526],"disallowed"],[[2527,2527],"mapped",[2479,2492]],[[2528,2531],"valid"],[[2532,2533],"disallowed"],[[2534,2545],"valid"],[[2546,2554],"valid",[],"NV8"],[[2555,2555],"valid",[],"NV8"],[[2556,2560],"disallowed"],[[2561,2561],"valid"],[[2562,2562],"valid"],[[2563,2563],"valid"],[[2564,2564],"disallowed"],[[2565,2570],"valid"],[[2571,2574],"disallowed"],[[2575,2576],"valid"],[[2577,2578],"disallowed"],[[2579,2600],"valid"],[[2601,2601],"disallowed"],[[2602,2608],"valid"],[[2609,2609],"disallowed"],[[2610,2610],"valid"],[[2611,2611],"mapped",[2610,2620]],[[2612,2612],"disallowed"],[[2613,2613],"valid"],[[2614,2614],"mapped",[2616,2620]],[[2615,2615],"disallowed"],[[2616,2617],"valid"],[[2618,2619],"disallowed"],[[2620,2620],"valid"],[[2621,2621],"disallowed"],[[2622,2626],"valid"],[[2627,2630],"disallowed"],[[2631,2632],"valid"],[[2633,2634],"disallowed"],[[2635,2637],"valid"],[[2638,2640],"disallowed"],[[2641,2641],"valid"],[[2642,2648],"disallowed"],[[2649,2649],"mapped",[2582,2620]],[[2650,2650],"mapped",[2583,2620]],[[2651,2651],"mapped",[2588,2620]],[[2652,2652],"valid"],[[2653,2653],"disallowed"],[[2654,2654],"mapped",[2603,2620]],[[2655,2661],"disallowed"],[[2662,2676],"valid"],[[2677,2677],"valid"],[[2678,2688],"disallowed"],[[2689,2691],"valid"],[[2692,2692],"disallowed"],[[2693,2699],"valid"],[[2700,2700],"valid"],[[2701,2701],"valid"],[[2702,2702],"disallowed"],[[2703,2705],"valid"],[[2706,2706],"disallowed"],[[2707,2728],"valid"],[[2729,2729],"disallowed"],[[2730,2736],"valid"],[[2737,2737],"disallowed"],[[2738,2739],"valid"],[[2740,2740],"disallowed"],[[2741,2745],"valid"],[[2746,2747],"disallowed"],[[2748,2757],"valid"],[[2758,2758],"disallowed"],[[2759,2761],"valid"],[[2762,2762],"disallowed"],[[2763,2765],"valid"],[[2766,2767],"disallowed"],[[2768,2768],"valid"],[[2769,2783],"disallowed"],[[2784,2784],"valid"],[[2785,2787],"valid"],[[2788,2789],"disallowed"],[[2790,2799],"valid"],[[2800,2800],"valid",[],"NV8"],[[2801,2801],"valid",[],"NV8"],[[2802,2808],"disallowed"],[[2809,2809],"valid"],[[2810,2816],"disallowed"],[[2817,2819],"valid"],[[2820,2820],"disallowed"],[[2821,2828],"valid"],[[2829,2830],"disallowed"],[[2831,2832],"valid"],[[2833,2834],"disallowed"],[[2835,2856],"valid"],[[2857,2857],"disallowed"],[[2858,2864],"valid"],[[2865,2865],"disallowed"],[[2866,2867],"valid"],[[2868,2868],"disallowed"],[[2869,2869],"valid"],[[2870,2873],"valid"],[[2874,2875],"disallowed"],[[2876,2883],"valid"],[[2884,2884],"valid"],[[2885,2886],"disallowed"],[[2887,2888],"valid"],[[2889,2890],"disallowed"],[[2891,2893],"valid"],[[2894,2901],"disallowed"],[[2902,2903],"valid"],[[2904,2907],"disallowed"],[[2908,2908],"mapped",[2849,2876]],[[2909,2909],"mapped",[2850,2876]],[[2910,2910],"disallowed"],[[2911,2913],"valid"],[[2914,2915],"valid"],[[2916,2917],"disallowed"],[[2918,2927],"valid"],[[2928,2928],"valid",[],"NV8"],[[2929,2929],"valid"],[[2930,2935],"valid",[],"NV8"],[[2936,2945],"disallowed"],[[2946,2947],"valid"],[[2948,2948],"disallowed"],[[2949,2954],"valid"],[[2955,2957],"disallowed"],[[2958,2960],"valid"],[[2961,2961],"disallowed"],[[2962,2965],"valid"],[[2966,2968],"disallowed"],[[2969,2970],"valid"],[[2971,2971],"disallowed"],[[2972,2972],"valid"],[[2973,2973],"disallowed"],[[2974,2975],"valid"],[[2976,2978],"disallowed"],[[2979,2980],"valid"],[[2981,2983],"disallowed"],[[2984,2986],"valid"],[[2987,2989],"disallowed"],[[2990,2997],"valid"],[[2998,2998],"valid"],[[2999,3001],"valid"],[[3002,3005],"disallowed"],[[3006,3010],"valid"],[[3011,3013],"disallowed"],[[3014,3016],"valid"],[[3017,3017],"disallowed"],[[3018,3021],"valid"],[[3022,3023],"disallowed"],[[3024,3024],"valid"],[[3025,3030],"disallowed"],[[3031,3031],"valid"],[[3032,3045],"disallowed"],[[3046,3046],"valid"],[[3047,3055],"valid"],[[3056,3058],"valid",[],"NV8"],[[3059,3066],"valid",[],"NV8"],[[3067,3071],"disallowed"],[[3072,3072],"valid"],[[3073,3075],"valid"],[[3076,3076],"disallowed"],[[3077,3084],"valid"],[[3085,3085],"disallowed"],[[3086,3088],"valid"],[[3089,3089],"disallowed"],[[3090,3112],"valid"],[[3113,3113],"disallowed"],[[3114,3123],"valid"],[[3124,3124],"valid"],[[3125,3129],"valid"],[[3130,3132],"disallowed"],[[3133,3133],"valid"],[[3134,3140],"valid"],[[3141,3141],"disallowed"],[[3142,3144],"valid"],[[3145,3145],"disallowed"],[[3146,3149],"valid"],[[3150,3156],"disallowed"],[[3157,3158],"valid"],[[3159,3159],"disallowed"],[[3160,3161],"valid"],[[3162,3162],"valid"],[[3163,3167],"disallowed"],[[3168,3169],"valid"],[[3170,3171],"valid"],[[3172,3173],"disallowed"],[[3174,3183],"valid"],[[3184,3191],"disallowed"],[[3192,3199],"valid",[],"NV8"],[[3200,3200],"disallowed"],[[3201,3201],"valid"],[[3202,3203],"valid"],[[3204,3204],"disallowed"],[[3205,3212],"valid"],[[3213,3213],"disallowed"],[[3214,3216],"valid"],[[3217,3217],"disallowed"],[[3218,3240],"valid"],[[3241,3241],"disallowed"],[[3242,3251],"valid"],[[3252,3252],"disallowed"],[[3253,3257],"valid"],[[3258,3259],"disallowed"],[[3260,3261],"valid"],[[3262,3268],"valid"],[[3269,3269],"disallowed"],[[3270,3272],"valid"],[[3273,3273],"disallowed"],[[3274,3277],"valid"],[[3278,3284],"disallowed"],[[3285,3286],"valid"],[[3287,3293],"disallowed"],[[3294,3294],"valid"],[[3295,3295],"disallowed"],[[3296,3297],"valid"],[[3298,3299],"valid"],[[3300,3301],"disallowed"],[[3302,3311],"valid"],[[3312,3312],"disallowed"],[[3313,3314],"valid"],[[3315,3328],"disallowed"],[[3329,3329],"valid"],[[3330,3331],"valid"],[[3332,3332],"disallowed"],[[3333,3340],"valid"],[[3341,3341],"disallowed"],[[3342,3344],"valid"],[[3345,3345],"disallowed"],[[3346,3368],"valid"],[[3369,3369],"valid"],[[3370,3385],"valid"],[[3386,3386],"valid"],[[3387,3388],"disallowed"],[[3389,3389],"valid"],[[3390,3395],"valid"],[[3396,3396],"valid"],[[3397,3397],"disallowed"],[[3398,3400],"valid"],[[3401,3401],"disallowed"],[[3402,3405],"valid"],[[3406,3406],"valid"],[[3407,3414],"disallowed"],[[3415,3415],"valid"],[[3416,3422],"disallowed"],[[3423,3423],"valid"],[[3424,3425],"valid"],[[3426,3427],"valid"],[[3428,3429],"disallowed"],[[3430,3439],"valid"],[[3440,3445],"valid",[],"NV8"],[[3446,3448],"disallowed"],[[3449,3449],"valid",[],"NV8"],[[3450,3455],"valid"],[[3456,3457],"disallowed"],[[3458,3459],"valid"],[[3460,3460],"disallowed"],[[3461,3478],"valid"],[[3479,3481],"disallowed"],[[3482,3505],"valid"],[[3506,3506],"disallowed"],[[3507,3515],"valid"],[[3516,3516],"disallowed"],[[3517,3517],"valid"],[[3518,3519],"disallowed"],[[3520,3526],"valid"],[[3527,3529],"disallowed"],[[3530,3530],"valid"],[[3531,3534],"disallowed"],[[3535,3540],"valid"],[[3541,3541],"disallowed"],[[3542,3542],"valid"],[[3543,3543],"disallowed"],[[3544,3551],"valid"],[[3552,3557],"disallowed"],[[3558,3567],"valid"],[[3568,3569],"disallowed"],[[3570,3571],"valid"],[[3572,3572],"valid",[],"NV8"],[[3573,3584],"disallowed"],[[3585,3634],"valid"],[[3635,3635],"mapped",[3661,3634]],[[3636,3642],"valid"],[[3643,3646],"disallowed"],[[3647,3647],"valid",[],"NV8"],[[3648,3662],"valid"],[[3663,3663],"valid",[],"NV8"],[[3664,3673],"valid"],[[3674,3675],"valid",[],"NV8"],[[3676,3712],"disallowed"],[[3713,3714],"valid"],[[3715,3715],"disallowed"],[[3716,3716],"valid"],[[3717,3718],"disallowed"],[[3719,3720],"valid"],[[3721,3721],"disallowed"],[[3722,3722],"valid"],[[3723,3724],"disallowed"],[[3725,3725],"valid"],[[3726,3731],"disallowed"],[[3732,3735],"valid"],[[3736,3736],"disallowed"],[[3737,3743],"valid"],[[3744,3744],"disallowed"],[[3745,3747],"valid"],[[3748,3748],"disallowed"],[[3749,3749],"valid"],[[3750,3750],"disallowed"],[[3751,3751],"valid"],[[3752,3753],"disallowed"],[[3754,3755],"valid"],[[3756,3756],"disallowed"],[[3757,3762],"valid"],[[3763,3763],"mapped",[3789,3762]],[[3764,3769],"valid"],[[3770,3770],"disallowed"],[[3771,3773],"valid"],[[3774,3775],"disallowed"],[[3776,3780],"valid"],[[3781,3781],"disallowed"],[[3782,3782],"valid"],[[3783,3783],"disallowed"],[[3784,3789],"valid"],[[3790,3791],"disallowed"],[[3792,3801],"valid"],[[3802,3803],"disallowed"],[[3804,3804],"mapped",[3755,3737]],[[3805,3805],"mapped",[3755,3745]],[[3806,3807],"valid"],[[3808,3839],"disallowed"],[[3840,3840],"valid"],[[3841,3850],"valid",[],"NV8"],[[3851,3851],"valid"],[[3852,3852],"mapped",[3851]],[[3853,3863],"valid",[],"NV8"],[[3864,3865],"valid"],[[3866,3871],"valid",[],"NV8"],[[3872,3881],"valid"],[[3882,3892],"valid",[],"NV8"],[[3893,3893],"valid"],[[3894,3894],"valid",[],"NV8"],[[3895,3895],"valid"],[[3896,3896],"valid",[],"NV8"],[[3897,3897],"valid"],[[3898,3901],"valid",[],"NV8"],[[3902,3906],"valid"],[[3907,3907],"mapped",[3906,4023]],[[3908,3911],"valid"],[[3912,3912],"disallowed"],[[3913,3916],"valid"],[[3917,3917],"mapped",[3916,4023]],[[3918,3921],"valid"],[[3922,3922],"mapped",[3921,4023]],[[3923,3926],"valid"],[[3927,3927],"mapped",[3926,4023]],[[3928,3931],"valid"],[[3932,3932],"mapped",[3931,4023]],[[3933,3944],"valid"],[[3945,3945],"mapped",[3904,4021]],[[3946,3946],"valid"],[[3947,3948],"valid"],[[3949,3952],"disallowed"],[[3953,3954],"valid"],[[3955,3955],"mapped",[3953,3954]],[[3956,3956],"valid"],[[3957,3957],"mapped",[3953,3956]],[[3958,3958],"mapped",[4018,3968]],[[3959,3959],"mapped",[4018,3953,3968]],[[3960,3960],"mapped",[4019,3968]],[[3961,3961],"mapped",[4019,3953,3968]],[[3962,3968],"valid"],[[3969,3969],"mapped",[3953,3968]],[[3970,3972],"valid"],[[3973,3973],"valid",[],"NV8"],[[3974,3979],"valid"],[[3980,3983],"valid"],[[3984,3986],"valid"],[[3987,3987],"mapped",[3986,4023]],[[3988,3989],"valid"],[[3990,3990],"valid"],[[3991,3991],"valid"],[[3992,3992],"disallowed"],[[3993,3996],"valid"],[[3997,3997],"mapped",[3996,4023]],[[3998,4001],"valid"],[[4002,4002],"mapped",[4001,4023]],[[4003,4006],"valid"],[[4007,4007],"mapped",[4006,4023]],[[4008,4011],"valid"],[[4012,4012],"mapped",[4011,4023]],[[4013,4013],"valid"],[[4014,4016],"valid"],[[4017,4023],"valid"],[[4024,4024],"valid"],[[4025,4025],"mapped",[3984,4021]],[[4026,4028],"valid"],[[4029,4029],"disallowed"],[[4030,4037],"valid",[],"NV8"],[[4038,4038],"valid"],[[4039,4044],"valid",[],"NV8"],[[4045,4045],"disallowed"],[[4046,4046],"valid",[],"NV8"],[[4047,4047],"valid",[],"NV8"],[[4048,4049],"valid",[],"NV8"],[[4050,4052],"valid",[],"NV8"],[[4053,4056],"valid",[],"NV8"],[[4057,4058],"valid",[],"NV8"],[[4059,4095],"disallowed"],[[4096,4129],"valid"],[[4130,4130],"valid"],[[4131,4135],"valid"],[[4136,4136],"valid"],[[4137,4138],"valid"],[[4139,4139],"valid"],[[4140,4146],"valid"],[[4147,4149],"valid"],[[4150,4153],"valid"],[[4154,4159],"valid"],[[4160,4169],"valid"],[[4170,4175],"valid",[],"NV8"],[[4176,4185],"valid"],[[4186,4249],"valid"],[[4250,4253],"valid"],[[4254,4255],"valid",[],"NV8"],[[4256,4293],"disallowed"],[[4294,4294],"disallowed"],[[4295,4295],"mapped",[11559]],[[4296,4300],"disallowed"],[[4301,4301],"mapped",[11565]],[[4302,4303],"disallowed"],[[4304,4342],"valid"],[[4343,4344],"valid"],[[4345,4346],"valid"],[[4347,4347],"valid",[],"NV8"],[[4348,4348],"mapped",[4316]],[[4349,4351],"valid"],[[4352,4441],"valid",[],"NV8"],[[4442,4446],"valid",[],"NV8"],[[4447,4448],"disallowed"],[[4449,4514],"valid",[],"NV8"],[[4515,4519],"valid",[],"NV8"],[[4520,4601],"valid",[],"NV8"],[[4602,4607],"valid",[],"NV8"],[[4608,4614],"valid"],[[4615,4615],"valid"],[[4616,4678],"valid"],[[4679,4679],"valid"],[[4680,4680],"valid"],[[4681,4681],"disallowed"],[[4682,4685],"valid"],[[4686,4687],"disallowed"],[[4688,4694],"valid"],[[4695,4695],"disallowed"],[[4696,4696],"valid"],[[4697,4697],"disallowed"],[[4698,4701],"valid"],[[4702,4703],"disallowed"],[[4704,4742],"valid"],[[4743,4743],"valid"],[[4744,4744],"valid"],[[4745,4745],"disallowed"],[[4746,4749],"valid"],[[4750,4751],"disallowed"],[[4752,4782],"valid"],[[4783,4783],"valid"],[[4784,4784],"valid"],[[4785,4785],"disallowed"],[[4786,4789],"valid"],[[4790,4791],"disallowed"],[[4792,4798],"valid"],[[4799,4799],"disallowed"],[[4800,4800],"valid"],[[4801,4801],"disallowed"],[[4802,4805],"valid"],[[4806,4807],"disallowed"],[[4808,4814],"valid"],[[4815,4815],"valid"],[[4816,4822],"valid"],[[4823,4823],"disallowed"],[[4824,4846],"valid"],[[4847,4847],"valid"],[[4848,4878],"valid"],[[4879,4879],"valid"],[[4880,4880],"valid"],[[4881,4881],"disallowed"],[[4882,4885],"valid"],[[4886,4887],"disallowed"],[[4888,4894],"valid"],[[4895,4895],"valid"],[[4896,4934],"valid"],[[4935,4935],"valid"],[[4936,4954],"valid"],[[4955,4956],"disallowed"],[[4957,4958],"valid"],[[4959,4959],"valid"],[[4960,4960],"valid",[],"NV8"],[[4961,4988],"valid",[],"NV8"],[[4989,4991],"disallowed"],[[4992,5007],"valid"],[[5008,5017],"valid",[],"NV8"],[[5018,5023],"disallowed"],[[5024,5108],"valid"],[[5109,5109],"valid"],[[5110,5111],"disallowed"],[[5112,5112],"mapped",[5104]],[[5113,5113],"mapped",[5105]],[[5114,5114],"mapped",[5106]],[[5115,5115],"mapped",[5107]],[[5116,5116],"mapped",[5108]],[[5117,5117],"mapped",[5109]],[[5118,5119],"disallowed"],[[5120,5120],"valid",[],"NV8"],[[5121,5740],"valid"],[[5741,5742],"valid",[],"NV8"],[[5743,5750],"valid"],[[5751,5759],"valid"],[[5760,5760],"disallowed"],[[5761,5786],"valid"],[[5787,5788],"valid",[],"NV8"],[[5789,5791],"disallowed"],[[5792,5866],"valid"],[[5867,5872],"valid",[],"NV8"],[[5873,5880],"valid"],[[5881,5887],"disallowed"],[[5888,5900],"valid"],[[5901,5901],"disallowed"],[[5902,5908],"valid"],[[5909,5919],"disallowed"],[[5920,5940],"valid"],[[5941,5942],"valid",[],"NV8"],[[5943,5951],"disallowed"],[[5952,5971],"valid"],[[5972,5983],"disallowed"],[[5984,5996],"valid"],[[5997,5997],"disallowed"],[[5998,6000],"valid"],[[6001,6001],"disallowed"],[[6002,6003],"valid"],[[6004,6015],"disallowed"],[[6016,6067],"valid"],[[6068,6069],"disallowed"],[[6070,6099],"valid"],[[6100,6102],"valid",[],"NV8"],[[6103,6103],"valid"],[[6104,6107],"valid",[],"NV8"],[[6108,6108],"valid"],[[6109,6109],"valid"],[[6110,6111],"disallowed"],[[6112,6121],"valid"],[[6122,6127],"disallowed"],[[6128,6137],"valid",[],"NV8"],[[6138,6143],"disallowed"],[[6144,6149],"valid",[],"NV8"],[[6150,6150],"disallowed"],[[6151,6154],"valid",[],"NV8"],[[6155,6157],"ignored"],[[6158,6158],"disallowed"],[[6159,6159],"disallowed"],[[6160,6169],"valid"],[[6170,6175],"disallowed"],[[6176,6263],"valid"],[[6264,6271],"disallowed"],[[6272,6313],"valid"],[[6314,6314],"valid"],[[6315,6319],"disallowed"],[[6320,6389],"valid"],[[6390,6399],"disallowed"],[[6400,6428],"valid"],[[6429,6430],"valid"],[[6431,6431],"disallowed"],[[6432,6443],"valid"],[[6444,6447],"disallowed"],[[6448,6459],"valid"],[[6460,6463],"disallowed"],[[6464,6464],"valid",[],"NV8"],[[6465,6467],"disallowed"],[[6468,6469],"valid",[],"NV8"],[[6470,6509],"valid"],[[6510,6511],"disallowed"],[[6512,6516],"valid"],[[6517,6527],"disallowed"],[[6528,6569],"valid"],[[6570,6571],"valid"],[[6572,6575],"disallowed"],[[6576,6601],"valid"],[[6602,6607],"disallowed"],[[6608,6617],"valid"],[[6618,6618],"valid",[],"XV8"],[[6619,6621],"disallowed"],[[6622,6623],"valid",[],"NV8"],[[6624,6655],"valid",[],"NV8"],[[6656,6683],"valid"],[[6684,6685],"disallowed"],[[6686,6687],"valid",[],"NV8"],[[6688,6750],"valid"],[[6751,6751],"disallowed"],[[6752,6780],"valid"],[[6781,6782],"disallowed"],[[6783,6793],"valid"],[[6794,6799],"disallowed"],[[6800,6809],"valid"],[[6810,6815],"disallowed"],[[6816,6822],"valid",[],"NV8"],[[6823,6823],"valid"],[[6824,6829],"valid",[],"NV8"],[[6830,6831],"disallowed"],[[6832,6845],"valid"],[[6846,6846],"valid",[],"NV8"],[[6847,6911],"disallowed"],[[6912,6987],"valid"],[[6988,6991],"disallowed"],[[6992,7001],"valid"],[[7002,7018],"valid",[],"NV8"],[[7019,7027],"valid"],[[7028,7036],"valid",[],"NV8"],[[7037,7039],"disallowed"],[[7040,7082],"valid"],[[7083,7085],"valid"],[[7086,7097],"valid"],[[7098,7103],"valid"],[[7104,7155],"valid"],[[7156,7163],"disallowed"],[[7164,7167],"valid",[],"NV8"],[[7168,7223],"valid"],[[7224,7226],"disallowed"],[[7227,7231],"valid",[],"NV8"],[[7232,7241],"valid"],[[7242,7244],"disallowed"],[[7245,7293],"valid"],[[7294,7295],"valid",[],"NV8"],[[7296,7359],"disallowed"],[[7360,7367],"valid",[],"NV8"],[[7368,7375],"disallowed"],[[7376,7378],"valid"],[[7379,7379],"valid",[],"NV8"],[[7380,7410],"valid"],[[7411,7414],"valid"],[[7415,7415],"disallowed"],[[7416,7417],"valid"],[[7418,7423],"disallowed"],[[7424,7467],"valid"],[[7468,7468],"mapped",[97]],[[7469,7469],"mapped",[230]],[[7470,7470],"mapped",[98]],[[7471,7471],"valid"],[[7472,7472],"mapped",[100]],[[7473,7473],"mapped",[101]],[[7474,7474],"mapped",[477]],[[7475,7475],"mapped",[103]],[[7476,7476],"mapped",[104]],[[7477,7477],"mapped",[105]],[[7478,7478],"mapped",[106]],[[7479,7479],"mapped",[107]],[[7480,7480],"mapped",[108]],[[7481,7481],"mapped",[109]],[[7482,7482],"mapped",[110]],[[7483,7483],"valid"],[[7484,7484],"mapped",[111]],[[7485,7485],"mapped",[547]],[[7486,7486],"mapped",[112]],[[7487,7487],"mapped",[114]],[[7488,7488],"mapped",[116]],[[7489,7489],"mapped",[117]],[[7490,7490],"mapped",[119]],[[7491,7491],"mapped",[97]],[[7492,7492],"mapped",[592]],[[7493,7493],"mapped",[593]],[[7494,7494],"mapped",[7426]],[[7495,7495],"mapped",[98]],[[7496,7496],"mapped",[100]],[[7497,7497],"mapped",[101]],[[7498,7498],"mapped",[601]],[[7499,7499],"mapped",[603]],[[7500,7500],"mapped",[604]],[[7501,7501],"mapped",[103]],[[7502,7502],"valid"],[[7503,7503],"mapped",[107]],[[7504,7504],"mapped",[109]],[[7505,7505],"mapped",[331]],[[7506,7506],"mapped",[111]],[[7507,7507],"mapped",[596]],[[7508,7508],"mapped",[7446]],[[7509,7509],"mapped",[7447]],[[7510,7510],"mapped",[112]],[[7511,7511],"mapped",[116]],[[7512,7512],"mapped",[117]],[[7513,7513],"mapped",[7453]],[[7514,7514],"mapped",[623]],[[7515,7515],"mapped",[118]],[[7516,7516],"mapped",[7461]],[[7517,7517],"mapped",[946]],[[7518,7518],"mapped",[947]],[[7519,7519],"mapped",[948]],[[7520,7520],"mapped",[966]],[[7521,7521],"mapped",[967]],[[7522,7522],"mapped",[105]],[[7523,7523],"mapped",[114]],[[7524,7524],"mapped",[117]],[[7525,7525],"mapped",[118]],[[7526,7526],"mapped",[946]],[[7527,7527],"mapped",[947]],[[7528,7528],"mapped",[961]],[[7529,7529],"mapped",[966]],[[7530,7530],"mapped",[967]],[[7531,7531],"valid"],[[7532,7543],"valid"],[[7544,7544],"mapped",[1085]],[[7545,7578],"valid"],[[7579,7579],"mapped",[594]],[[7580,7580],"mapped",[99]],[[7581,7581],"mapped",[597]],[[7582,7582],"mapped",[240]],[[7583,7583],"mapped",[604]],[[7584,7584],"mapped",[102]],[[7585,7585],"mapped",[607]],[[7586,7586],"mapped",[609]],[[7587,7587],"mapped",[613]],[[7588,7588],"mapped",[616]],[[7589,7589],"mapped",[617]],[[7590,7590],"mapped",[618]],[[7591,7591],"mapped",[7547]],[[7592,7592],"mapped",[669]],[[7593,7593],"mapped",[621]],[[7594,7594],"mapped",[7557]],[[7595,7595],"mapped",[671]],[[7596,7596],"mapped",[625]],[[7597,7597],"mapped",[624]],[[7598,7598],"mapped",[626]],[[7599,7599],"mapped",[627]],[[7600,7600],"mapped",[628]],[[7601,7601],"mapped",[629]],[[7602,7602],"mapped",[632]],[[7603,7603],"mapped",[642]],[[7604,7604],"mapped",[643]],[[7605,7605],"mapped",[427]],[[7606,7606],"mapped",[649]],[[7607,7607],"mapped",[650]],[[7608,7608],"mapped",[7452]],[[7609,7609],"mapped",[651]],[[7610,7610],"mapped",[652]],[[7611,7611],"mapped",[122]],[[7612,7612],"mapped",[656]],[[7613,7613],"mapped",[657]],[[7614,7614],"mapped",[658]],[[7615,7615],"mapped",[952]],[[7616,7619],"valid"],[[7620,7626],"valid"],[[7627,7654],"valid"],[[7655,7669],"valid"],[[7670,7675],"disallowed"],[[7676,7676],"valid"],[[7677,7677],"valid"],[[7678,7679],"valid"],[[7680,7680],"mapped",[7681]],[[7681,7681],"valid"],[[7682,7682],"mapped",[7683]],[[7683,7683],"valid"],[[7684,7684],"mapped",[7685]],[[7685,7685],"valid"],[[7686,7686],"mapped",[7687]],[[7687,7687],"valid"],[[7688,7688],"mapped",[7689]],[[7689,7689],"valid"],[[7690,7690],"mapped",[7691]],[[7691,7691],"valid"],[[7692,7692],"mapped",[7693]],[[7693,7693],"valid"],[[7694,7694],"mapped",[7695]],[[7695,7695],"valid"],[[7696,7696],"mapped",[7697]],[[7697,7697],"valid"],[[7698,7698],"mapped",[7699]],[[7699,7699],"valid"],[[7700,7700],"mapped",[7701]],[[7701,7701],"valid"],[[7702,7702],"mapped",[7703]],[[7703,7703],"valid"],[[7704,7704],"mapped",[7705]],[[7705,7705],"valid"],[[7706,7706],"mapped",[7707]],[[7707,7707],"valid"],[[7708,7708],"mapped",[7709]],[[7709,7709],"valid"],[[7710,7710],"mapped",[7711]],[[7711,7711],"valid"],[[7712,7712],"mapped",[7713]],[[7713,7713],"valid"],[[7714,7714],"mapped",[7715]],[[7715,7715],"valid"],[[7716,7716],"mapped",[7717]],[[7717,7717],"valid"],[[7718,7718],"mapped",[7719]],[[7719,7719],"valid"],[[7720,7720],"mapped",[7721]],[[7721,7721],"valid"],[[7722,7722],"mapped",[7723]],[[7723,7723],"valid"],[[7724,7724],"mapped",[7725]],[[7725,7725],"valid"],[[7726,7726],"mapped",[7727]],[[7727,7727],"valid"],[[7728,7728],"mapped",[7729]],[[7729,7729],"valid"],[[7730,7730],"mapped",[7731]],[[7731,7731],"valid"],[[7732,7732],"mapped",[7733]],[[7733,7733],"valid"],[[7734,7734],"mapped",[7735]],[[7735,7735],"valid"],[[7736,7736],"mapped",[7737]],[[7737,7737],"valid"],[[7738,7738],"mapped",[7739]],[[7739,7739],"valid"],[[7740,7740],"mapped",[7741]],[[7741,7741],"valid"],[[7742,7742],"mapped",[7743]],[[7743,7743],"valid"],[[7744,7744],"mapped",[7745]],[[7745,7745],"valid"],[[7746,7746],"mapped",[7747]],[[7747,7747],"valid"],[[7748,7748],"mapped",[7749]],[[7749,7749],"valid"],[[7750,7750],"mapped",[7751]],[[7751,7751],"valid"],[[7752,7752],"mapped",[7753]],[[7753,7753],"valid"],[[7754,7754],"mapped",[7755]],[[7755,7755],"valid"],[[7756,7756],"mapped",[7757]],[[7757,7757],"valid"],[[7758,7758],"mapped",[7759]],[[7759,7759],"valid"],[[7760,7760],"mapped",[7761]],[[7761,7761],"valid"],[[7762,7762],"mapped",[7763]],[[7763,7763],"valid"],[[7764,7764],"mapped",[7765]],[[7765,7765],"valid"],[[7766,7766],"mapped",[7767]],[[7767,7767],"valid"],[[7768,7768],"mapped",[7769]],[[7769,7769],"valid"],[[7770,7770],"mapped",[7771]],[[7771,7771],"valid"],[[7772,7772],"mapped",[7773]],[[7773,7773],"valid"],[[7774,7774],"mapped",[7775]],[[7775,7775],"valid"],[[7776,7776],"mapped",[7777]],[[7777,7777],"valid"],[[7778,7778],"mapped",[7779]],[[7779,7779],"valid"],[[7780,7780],"mapped",[7781]],[[7781,7781],"valid"],[[7782,7782],"mapped",[7783]],[[7783,7783],"valid"],[[7784,7784],"mapped",[7785]],[[7785,7785],"valid"],[[7786,7786],"mapped",[7787]],[[7787,7787],"valid"],[[7788,7788],"mapped",[7789]],[[7789,7789],"valid"],[[7790,7790],"mapped",[7791]],[[7791,7791],"valid"],[[7792,7792],"mapped",[7793]],[[7793,7793],"valid"],[[7794,7794],"mapped",[7795]],[[7795,7795],"valid"],[[7796,7796],"mapped",[7797]],[[7797,7797],"valid"],[[7798,7798],"mapped",[7799]],[[7799,7799],"valid"],[[7800,7800],"mapped",[7801]],[[7801,7801],"valid"],[[7802,7802],"mapped",[7803]],[[7803,7803],"valid"],[[7804,7804],"mapped",[7805]],[[7805,7805],"valid"],[[7806,7806],"mapped",[7807]],[[7807,7807],"valid"],[[7808,7808],"mapped",[7809]],[[7809,7809],"valid"],[[7810,7810],"mapped",[7811]],[[7811,7811],"valid"],[[7812,7812],"mapped",[7813]],[[7813,7813],"valid"],[[7814,7814],"mapped",[7815]],[[7815,7815],"valid"],[[7816,7816],"mapped",[7817]],[[7817,7817],"valid"],[[7818,7818],"mapped",[7819]],[[7819,7819],"valid"],[[7820,7820],"mapped",[7821]],[[7821,7821],"valid"],[[7822,7822],"mapped",[7823]],[[7823,7823],"valid"],[[7824,7824],"mapped",[7825]],[[7825,7825],"valid"],[[7826,7826],"mapped",[7827]],[[7827,7827],"valid"],[[7828,7828],"mapped",[7829]],[[7829,7833],"valid"],[[7834,7834],"mapped",[97,702]],[[7835,7835],"mapped",[7777]],[[7836,7837],"valid"],[[7838,7838],"mapped",[115,115]],[[7839,7839],"valid"],[[7840,7840],"mapped",[7841]],[[7841,7841],"valid"],[[7842,7842],"mapped",[7843]],[[7843,7843],"valid"],[[7844,7844],"mapped",[7845]],[[7845,7845],"valid"],[[7846,7846],"mapped",[7847]],[[7847,7847],"valid"],[[7848,7848],"mapped",[7849]],[[7849,7849],"valid"],[[7850,7850],"mapped",[7851]],[[7851,7851],"valid"],[[7852,7852],"mapped",[7853]],[[7853,7853],"valid"],[[7854,7854],"mapped",[7855]],[[7855,7855],"valid"],[[7856,7856],"mapped",[7857]],[[7857,7857],"valid"],[[7858,7858],"mapped",[7859]],[[7859,7859],"valid"],[[7860,7860],"mapped",[7861]],[[7861,7861],"valid"],[[7862,7862],"mapped",[7863]],[[7863,7863],"valid"],[[7864,7864],"mapped",[7865]],[[7865,7865],"valid"],[[7866,7866],"mapped",[7867]],[[7867,7867],"valid"],[[7868,7868],"mapped",[7869]],[[7869,7869],"valid"],[[7870,7870],"mapped",[7871]],[[7871,7871],"valid"],[[7872,7872],"mapped",[7873]],[[7873,7873],"valid"],[[7874,7874],"mapped",[7875]],[[7875,7875],"valid"],[[7876,7876],"mapped",[7877]],[[7877,7877],"valid"],[[7878,7878],"mapped",[7879]],[[7879,7879],"valid"],[[7880,7880],"mapped",[7881]],[[7881,7881],"valid"],[[7882,7882],"mapped",[7883]],[[7883,7883],"valid"],[[7884,7884],"mapped",[7885]],[[7885,7885],"valid"],[[7886,7886],"mapped",[7887]],[[7887,7887],"valid"],[[7888,7888],"mapped",[7889]],[[7889,7889],"valid"],[[7890,7890],"mapped",[7891]],[[7891,7891],"valid"],[[7892,7892],"mapped",[7893]],[[7893,7893],"valid"],[[7894,7894],"mapped",[7895]],[[7895,7895],"valid"],[[7896,7896],"mapped",[7897]],[[7897,7897],"valid"],[[7898,7898],"mapped",[7899]],[[7899,7899],"valid"],[[7900,7900],"mapped",[7901]],[[7901,7901],"valid"],[[7902,7902],"mapped",[7903]],[[7903,7903],"valid"],[[7904,7904],"mapped",[7905]],[[7905,7905],"valid"],[[7906,7906],"mapped",[7907]],[[7907,7907],"valid"],[[7908,7908],"mapped",[7909]],[[7909,7909],"valid"],[[7910,7910],"mapped",[7911]],[[7911,7911],"valid"],[[7912,7912],"mapped",[7913]],[[7913,7913],"valid"],[[7914,7914],"mapped",[7915]],[[7915,7915],"valid"],[[7916,7916],"mapped",[7917]],[[7917,7917],"valid"],[[7918,7918],"mapped",[7919]],[[7919,7919],"valid"],[[7920,7920],"mapped",[7921]],[[7921,7921],"valid"],[[7922,7922],"mapped",[7923]],[[7923,7923],"valid"],[[7924,7924],"mapped",[7925]],[[7925,7925],"valid"],[[7926,7926],"mapped",[7927]],[[7927,7927],"valid"],[[7928,7928],"mapped",[7929]],[[7929,7929],"valid"],[[7930,7930],"mapped",[7931]],[[7931,7931],"valid"],[[7932,7932],"mapped",[7933]],[[7933,7933],"valid"],[[7934,7934],"mapped",[7935]],[[7935,7935],"valid"],[[7936,7943],"valid"],[[7944,7944],"mapped",[7936]],[[7945,7945],"mapped",[7937]],[[7946,7946],"mapped",[7938]],[[7947,7947],"mapped",[7939]],[[7948,7948],"mapped",[7940]],[[7949,7949],"mapped",[7941]],[[7950,7950],"mapped",[7942]],[[7951,7951],"mapped",[7943]],[[7952,7957],"valid"],[[7958,7959],"disallowed"],[[7960,7960],"mapped",[7952]],[[7961,7961],"mapped",[7953]],[[7962,7962],"mapped",[7954]],[[7963,7963],"mapped",[7955]],[[7964,7964],"mapped",[7956]],[[7965,7965],"mapped",[7957]],[[7966,7967],"disallowed"],[[7968,7975],"valid"],[[7976,7976],"mapped",[7968]],[[7977,7977],"mapped",[7969]],[[7978,7978],"mapped",[7970]],[[7979,7979],"mapped",[7971]],[[7980,7980],"mapped",[7972]],[[7981,7981],"mapped",[7973]],[[7982,7982],"mapped",[7974]],[[7983,7983],"mapped",[7975]],[[7984,7991],"valid"],[[7992,7992],"mapped",[7984]],[[7993,7993],"mapped",[7985]],[[7994,7994],"mapped",[7986]],[[7995,7995],"mapped",[7987]],[[7996,7996],"mapped",[7988]],[[7997,7997],"mapped",[7989]],[[7998,7998],"mapped",[7990]],[[7999,7999],"mapped",[7991]],[[8000,8005],"valid"],[[8006,8007],"disallowed"],[[8008,8008],"mapped",[8000]],[[8009,8009],"mapped",[8001]],[[8010,8010],"mapped",[8002]],[[8011,8011],"mapped",[8003]],[[8012,8012],"mapped",[8004]],[[8013,8013],"mapped",[8005]],[[8014,8015],"disallowed"],[[8016,8023],"valid"],[[8024,8024],"disallowed"],[[8025,8025],"mapped",[8017]],[[8026,8026],"disallowed"],[[8027,8027],"mapped",[8019]],[[8028,8028],"disallowed"],[[8029,8029],"mapped",[8021]],[[8030,8030],"disallowed"],[[8031,8031],"mapped",[8023]],[[8032,8039],"valid"],[[8040,8040],"mapped",[8032]],[[8041,8041],"mapped",[8033]],[[8042,8042],"mapped",[8034]],[[8043,8043],"mapped",[8035]],[[8044,8044],"mapped",[8036]],[[8045,8045],"mapped",[8037]],[[8046,8046],"mapped",[8038]],[[8047,8047],"mapped",[8039]],[[8048,8048],"valid"],[[8049,8049],"mapped",[940]],[[8050,8050],"valid"],[[8051,8051],"mapped",[941]],[[8052,8052],"valid"],[[8053,8053],"mapped",[942]],[[8054,8054],"valid"],[[8055,8055],"mapped",[943]],[[8056,8056],"valid"],[[8057,8057],"mapped",[972]],[[8058,8058],"valid"],[[8059,8059],"mapped",[973]],[[8060,8060],"valid"],[[8061,8061],"mapped",[974]],[[8062,8063],"disallowed"],[[8064,8064],"mapped",[7936,953]],[[8065,8065],"mapped",[7937,953]],[[8066,8066],"mapped",[7938,953]],[[8067,8067],"mapped",[7939,953]],[[8068,8068],"mapped",[7940,953]],[[8069,8069],"mapped",[7941,953]],[[8070,8070],"mapped",[7942,953]],[[8071,8071],"mapped",[7943,953]],[[8072,8072],"mapped",[7936,953]],[[8073,8073],"mapped",[7937,953]],[[8074,8074],"mapped",[7938,953]],[[8075,8075],"mapped",[7939,953]],[[8076,8076],"mapped",[7940,953]],[[8077,8077],"mapped",[7941,953]],[[8078,8078],"mapped",[7942,953]],[[8079,8079],"mapped",[7943,953]],[[8080,8080],"mapped",[7968,953]],[[8081,8081],"mapped",[7969,953]],[[8082,8082],"mapped",[7970,953]],[[8083,8083],"mapped",[7971,953]],[[8084,8084],"mapped",[7972,953]],[[8085,8085],"mapped",[7973,953]],[[8086,8086],"mapped",[7974,953]],[[8087,8087],"mapped",[7975,953]],[[8088,8088],"mapped",[7968,953]],[[8089,8089],"mapped",[7969,953]],[[8090,8090],"mapped",[7970,953]],[[8091,8091],"mapped",[7971,953]],[[8092,8092],"mapped",[7972,953]],[[8093,8093],"mapped",[7973,953]],[[8094,8094],"mapped",[7974,953]],[[8095,8095],"mapped",[7975,953]],[[8096,8096],"mapped",[8032,953]],[[8097,8097],"mapped",[8033,953]],[[8098,8098],"mapped",[8034,953]],[[8099,8099],"mapped",[8035,953]],[[8100,8100],"mapped",[8036,953]],[[8101,8101],"mapped",[8037,953]],[[8102,8102],"mapped",[8038,953]],[[8103,8103],"mapped",[8039,953]],[[8104,8104],"mapped",[8032,953]],[[8105,8105],"mapped",[8033,953]],[[8106,8106],"mapped",[8034,953]],[[8107,8107],"mapped",[8035,953]],[[8108,8108],"mapped",[8036,953]],[[8109,8109],"mapped",[8037,953]],[[8110,8110],"mapped",[8038,953]],[[8111,8111],"mapped",[8039,953]],[[8112,8113],"valid"],[[8114,8114],"mapped",[8048,953]],[[8115,8115],"mapped",[945,953]],[[8116,8116],"mapped",[940,953]],[[8117,8117],"disallowed"],[[8118,8118],"valid"],[[8119,8119],"mapped",[8118,953]],[[8120,8120],"mapped",[8112]],[[8121,8121],"mapped",[8113]],[[8122,8122],"mapped",[8048]],[[8123,8123],"mapped",[940]],[[8124,8124],"mapped",[945,953]],[[8125,8125],"disallowed_STD3_mapped",[32,787]],[[8126,8126],"mapped",[953]],[[8127,8127],"disallowed_STD3_mapped",[32,787]],[[8128,8128],"disallowed_STD3_mapped",[32,834]],[[8129,8129],"disallowed_STD3_mapped",[32,776,834]],[[8130,8130],"mapped",[8052,953]],[[8131,8131],"mapped",[951,953]],[[8132,8132],"mapped",[942,953]],[[8133,8133],"disallowed"],[[8134,8134],"valid"],[[8135,8135],"mapped",[8134,953]],[[8136,8136],"mapped",[8050]],[[8137,8137],"mapped",[941]],[[8138,8138],"mapped",[8052]],[[8139,8139],"mapped",[942]],[[8140,8140],"mapped",[951,953]],[[8141,8141],"disallowed_STD3_mapped",[32,787,768]],[[8142,8142],"disallowed_STD3_mapped",[32,787,769]],[[8143,8143],"disallowed_STD3_mapped",[32,787,834]],[[8144,8146],"valid"],[[8147,8147],"mapped",[912]],[[8148,8149],"disallowed"],[[8150,8151],"valid"],[[8152,8152],"mapped",[8144]],[[8153,8153],"mapped",[8145]],[[8154,8154],"mapped",[8054]],[[8155,8155],"mapped",[943]],[[8156,8156],"disallowed"],[[8157,8157],"disallowed_STD3_mapped",[32,788,768]],[[8158,8158],"disallowed_STD3_mapped",[32,788,769]],[[8159,8159],"disallowed_STD3_mapped",[32,788,834]],[[8160,8162],"valid"],[[8163,8163],"mapped",[944]],[[8164,8167],"valid"],[[8168,8168],"mapped",[8160]],[[8169,8169],"mapped",[8161]],[[8170,8170],"mapped",[8058]],[[8171,8171],"mapped",[973]],[[8172,8172],"mapped",[8165]],[[8173,8173],"disallowed_STD3_mapped",[32,776,768]],[[8174,8174],"disallowed_STD3_mapped",[32,776,769]],[[8175,8175],"disallowed_STD3_mapped",[96]],[[8176,8177],"disallowed"],[[8178,8178],"mapped",[8060,953]],[[8179,8179],"mapped",[969,953]],[[8180,8180],"mapped",[974,953]],[[8181,8181],"disallowed"],[[8182,8182],"valid"],[[8183,8183],"mapped",[8182,953]],[[8184,8184],"mapped",[8056]],[[8185,8185],"mapped",[972]],[[8186,8186],"mapped",[8060]],[[8187,8187],"mapped",[974]],[[8188,8188],"mapped",[969,953]],[[8189,8189],"disallowed_STD3_mapped",[32,769]],[[8190,8190],"disallowed_STD3_mapped",[32,788]],[[8191,8191],"disallowed"],[[8192,8202],"disallowed_STD3_mapped",[32]],[[8203,8203],"ignored"],[[8204,8205],"deviation",[]],[[8206,8207],"disallowed"],[[8208,8208],"valid",[],"NV8"],[[8209,8209],"mapped",[8208]],[[8210,8214],"valid",[],"NV8"],[[8215,8215],"disallowed_STD3_mapped",[32,819]],[[8216,8227],"valid",[],"NV8"],[[8228,8230],"disallowed"],[[8231,8231],"valid",[],"NV8"],[[8232,8238],"disallowed"],[[8239,8239],"disallowed_STD3_mapped",[32]],[[8240,8242],"valid",[],"NV8"],[[8243,8243],"mapped",[8242,8242]],[[8244,8244],"mapped",[8242,8242,8242]],[[8245,8245],"valid",[],"NV8"],[[8246,8246],"mapped",[8245,8245]],[[8247,8247],"mapped",[8245,8245,8245]],[[8248,8251],"valid",[],"NV8"],[[8252,8252],"disallowed_STD3_mapped",[33,33]],[[8253,8253],"valid",[],"NV8"],[[8254,8254],"disallowed_STD3_mapped",[32,773]],[[8255,8262],"valid",[],"NV8"],[[8263,8263],"disallowed_STD3_mapped",[63,63]],[[8264,8264],"disallowed_STD3_mapped",[63,33]],[[8265,8265],"disallowed_STD3_mapped",[33,63]],[[8266,8269],"valid",[],"NV8"],[[8270,8274],"valid",[],"NV8"],[[8275,8276],"valid",[],"NV8"],[[8277,8278],"valid",[],"NV8"],[[8279,8279],"mapped",[8242,8242,8242,8242]],[[8280,8286],"valid",[],"NV8"],[[8287,8287],"disallowed_STD3_mapped",[32]],[[8288,8288],"ignored"],[[8289,8291],"disallowed"],[[8292,8292],"ignored"],[[8293,8293],"disallowed"],[[8294,8297],"disallowed"],[[8298,8303],"disallowed"],[[8304,8304],"mapped",[48]],[[8305,8305],"mapped",[105]],[[8306,8307],"disallowed"],[[8308,8308],"mapped",[52]],[[8309,8309],"mapped",[53]],[[8310,8310],"mapped",[54]],[[8311,8311],"mapped",[55]],[[8312,8312],"mapped",[56]],[[8313,8313],"mapped",[57]],[[8314,8314],"disallowed_STD3_mapped",[43]],[[8315,8315],"mapped",[8722]],[[8316,8316],"disallowed_STD3_mapped",[61]],[[8317,8317],"disallowed_STD3_mapped",[40]],[[8318,8318],"disallowed_STD3_mapped",[41]],[[8319,8319],"mapped",[110]],[[8320,8320],"mapped",[48]],[[8321,8321],"mapped",[49]],[[8322,8322],"mapped",[50]],[[8323,8323],"mapped",[51]],[[8324,8324],"mapped",[52]],[[8325,8325],"mapped",[53]],[[8326,8326],"mapped",[54]],[[8327,8327],"mapped",[55]],[[8328,8328],"mapped",[56]],[[8329,8329],"mapped",[57]],[[8330,8330],"disallowed_STD3_mapped",[43]],[[8331,8331],"mapped",[8722]],[[8332,8332],"disallowed_STD3_mapped",[61]],[[8333,8333],"disallowed_STD3_mapped",[40]],[[8334,8334],"disallowed_STD3_mapped",[41]],[[8335,8335],"disallowed"],[[8336,8336],"mapped",[97]],[[8337,8337],"mapped",[101]],[[8338,8338],"mapped",[111]],[[8339,8339],"mapped",[120]],[[8340,8340],"mapped",[601]],[[8341,8341],"mapped",[104]],[[8342,8342],"mapped",[107]],[[8343,8343],"mapped",[108]],[[8344,8344],"mapped",[109]],[[8345,8345],"mapped",[110]],[[8346,8346],"mapped",[112]],[[8347,8347],"mapped",[115]],[[8348,8348],"mapped",[116]],[[8349,8351],"disallowed"],[[8352,8359],"valid",[],"NV8"],[[8360,8360],"mapped",[114,115]],[[8361,8362],"valid",[],"NV8"],[[8363,8363],"valid",[],"NV8"],[[8364,8364],"valid",[],"NV8"],[[8365,8367],"valid",[],"NV8"],[[8368,8369],"valid",[],"NV8"],[[8370,8373],"valid",[],"NV8"],[[8374,8376],"valid",[],"NV8"],[[8377,8377],"valid",[],"NV8"],[[8378,8378],"valid",[],"NV8"],[[8379,8381],"valid",[],"NV8"],[[8382,8382],"valid",[],"NV8"],[[8383,8399],"disallowed"],[[8400,8417],"valid",[],"NV8"],[[8418,8419],"valid",[],"NV8"],[[8420,8426],"valid",[],"NV8"],[[8427,8427],"valid",[],"NV8"],[[8428,8431],"valid",[],"NV8"],[[8432,8432],"valid",[],"NV8"],[[8433,8447],"disallowed"],[[8448,8448],"disallowed_STD3_mapped",[97,47,99]],[[8449,8449],"disallowed_STD3_mapped",[97,47,115]],[[8450,8450],"mapped",[99]],[[8451,8451],"mapped",[176,99]],[[8452,8452],"valid",[],"NV8"],[[8453,8453],"disallowed_STD3_mapped",[99,47,111]],[[8454,8454],"disallowed_STD3_mapped",[99,47,117]],[[8455,8455],"mapped",[603]],[[8456,8456],"valid",[],"NV8"],[[8457,8457],"mapped",[176,102]],[[8458,8458],"mapped",[103]],[[8459,8462],"mapped",[104]],[[8463,8463],"mapped",[295]],[[8464,8465],"mapped",[105]],[[8466,8467],"mapped",[108]],[[8468,8468],"valid",[],"NV8"],[[8469,8469],"mapped",[110]],[[8470,8470],"mapped",[110,111]],[[8471,8472],"valid",[],"NV8"],[[8473,8473],"mapped",[112]],[[8474,8474],"mapped",[113]],[[8475,8477],"mapped",[114]],[[8478,8479],"valid",[],"NV8"],[[8480,8480],"mapped",[115,109]],[[8481,8481],"mapped",[116,101,108]],[[8482,8482],"mapped",[116,109]],[[8483,8483],"valid",[],"NV8"],[[8484,8484],"mapped",[122]],[[8485,8485],"valid",[],"NV8"],[[8486,8486],"mapped",[969]],[[8487,8487],"valid",[],"NV8"],[[8488,8488],"mapped",[122]],[[8489,8489],"valid",[],"NV8"],[[8490,8490],"mapped",[107]],[[8491,8491],"mapped",[229]],[[8492,8492],"mapped",[98]],[[8493,8493],"mapped",[99]],[[8494,8494],"valid",[],"NV8"],[[8495,8496],"mapped",[101]],[[8497,8497],"mapped",[102]],[[8498,8498],"disallowed"],[[8499,8499],"mapped",[109]],[[8500,8500],"mapped",[111]],[[8501,8501],"mapped",[1488]],[[8502,8502],"mapped",[1489]],[[8503,8503],"mapped",[1490]],[[8504,8504],"mapped",[1491]],[[8505,8505],"mapped",[105]],[[8506,8506],"valid",[],"NV8"],[[8507,8507],"mapped",[102,97,120]],[[8508,8508],"mapped",[960]],[[8509,8510],"mapped",[947]],[[8511,8511],"mapped",[960]],[[8512,8512],"mapped",[8721]],[[8513,8516],"valid",[],"NV8"],[[8517,8518],"mapped",[100]],[[8519,8519],"mapped",[101]],[[8520,8520],"mapped",[105]],[[8521,8521],"mapped",[106]],[[8522,8523],"valid",[],"NV8"],[[8524,8524],"valid",[],"NV8"],[[8525,8525],"valid",[],"NV8"],[[8526,8526],"valid"],[[8527,8527],"valid",[],"NV8"],[[8528,8528],"mapped",[49,8260,55]],[[8529,8529],"mapped",[49,8260,57]],[[8530,8530],"mapped",[49,8260,49,48]],[[8531,8531],"mapped",[49,8260,51]],[[8532,8532],"mapped",[50,8260,51]],[[8533,8533],"mapped",[49,8260,53]],[[8534,8534],"mapped",[50,8260,53]],[[8535,8535],"mapped",[51,8260,53]],[[8536,8536],"mapped",[52,8260,53]],[[8537,8537],"mapped",[49,8260,54]],[[8538,8538],"mapped",[53,8260,54]],[[8539,8539],"mapped",[49,8260,56]],[[8540,8540],"mapped",[51,8260,56]],[[8541,8541],"mapped",[53,8260,56]],[[8542,8542],"mapped",[55,8260,56]],[[8543,8543],"mapped",[49,8260]],[[8544,8544],"mapped",[105]],[[8545,8545],"mapped",[105,105]],[[8546,8546],"mapped",[105,105,105]],[[8547,8547],"mapped",[105,118]],[[8548,8548],"mapped",[118]],[[8549,8549],"mapped",[118,105]],[[8550,8550],"mapped",[118,105,105]],[[8551,8551],"mapped",[118,105,105,105]],[[8552,8552],"mapped",[105,120]],[[8553,8553],"mapped",[120]],[[8554,8554],"mapped",[120,105]],[[8555,8555],"mapped",[120,105,105]],[[8556,8556],"mapped",[108]],[[8557,8557],"mapped",[99]],[[8558,8558],"mapped",[100]],[[8559,8559],"mapped",[109]],[[8560,8560],"mapped",[105]],[[8561,8561],"mapped",[105,105]],[[8562,8562],"mapped",[105,105,105]],[[8563,8563],"mapped",[105,118]],[[8564,8564],"mapped",[118]],[[8565,8565],"mapped",[118,105]],[[8566,8566],"mapped",[118,105,105]],[[8567,8567],"mapped",[118,105,105,105]],[[8568,8568],"mapped",[105,120]],[[8569,8569],"mapped",[120]],[[8570,8570],"mapped",[120,105]],[[8571,8571],"mapped",[120,105,105]],[[8572,8572],"mapped",[108]],[[8573,8573],"mapped",[99]],[[8574,8574],"mapped",[100]],[[8575,8575],"mapped",[109]],[[8576,8578],"valid",[],"NV8"],[[8579,8579],"disallowed"],[[8580,8580],"valid"],[[8581,8584],"valid",[],"NV8"],[[8585,8585],"mapped",[48,8260,51]],[[8586,8587],"valid",[],"NV8"],[[8588,8591],"disallowed"],[[8592,8682],"valid",[],"NV8"],[[8683,8691],"valid",[],"NV8"],[[8692,8703],"valid",[],"NV8"],[[8704,8747],"valid",[],"NV8"],[[8748,8748],"mapped",[8747,8747]],[[8749,8749],"mapped",[8747,8747,8747]],[[8750,8750],"valid",[],"NV8"],[[8751,8751],"mapped",[8750,8750]],[[8752,8752],"mapped",[8750,8750,8750]],[[8753,8799],"valid",[],"NV8"],[[8800,8800],"disallowed_STD3_valid"],[[8801,8813],"valid",[],"NV8"],[[8814,8815],"disallowed_STD3_valid"],[[8816,8945],"valid",[],"NV8"],[[8946,8959],"valid",[],"NV8"],[[8960,8960],"valid",[],"NV8"],[[8961,8961],"valid",[],"NV8"],[[8962,9000],"valid",[],"NV8"],[[9001,9001],"mapped",[12296]],[[9002,9002],"mapped",[12297]],[[9003,9082],"valid",[],"NV8"],[[9083,9083],"valid",[],"NV8"],[[9084,9084],"valid",[],"NV8"],[[9085,9114],"valid",[],"NV8"],[[9115,9166],"valid",[],"NV8"],[[9167,9168],"valid",[],"NV8"],[[9169,9179],"valid",[],"NV8"],[[9180,9191],"valid",[],"NV8"],[[9192,9192],"valid",[],"NV8"],[[9193,9203],"valid",[],"NV8"],[[9204,9210],"valid",[],"NV8"],[[9211,9215],"disallowed"],[[9216,9252],"valid",[],"NV8"],[[9253,9254],"valid",[],"NV8"],[[9255,9279],"disallowed"],[[9280,9290],"valid",[],"NV8"],[[9291,9311],"disallowed"],[[9312,9312],"mapped",[49]],[[9313,9313],"mapped",[50]],[[9314,9314],"mapped",[51]],[[9315,9315],"mapped",[52]],[[9316,9316],"mapped",[53]],[[9317,9317],"mapped",[54]],[[9318,9318],"mapped",[55]],[[9319,9319],"mapped",[56]],[[9320,9320],"mapped",[57]],[[9321,9321],"mapped",[49,48]],[[9322,9322],"mapped",[49,49]],[[9323,9323],"mapped",[49,50]],[[9324,9324],"mapped",[49,51]],[[9325,9325],"mapped",[49,52]],[[9326,9326],"mapped",[49,53]],[[9327,9327],"mapped",[49,54]],[[9328,9328],"mapped",[49,55]],[[9329,9329],"mapped",[49,56]],[[9330,9330],"mapped",[49,57]],[[9331,9331],"mapped",[50,48]],[[9332,9332],"disallowed_STD3_mapped",[40,49,41]],[[9333,9333],"disallowed_STD3_mapped",[40,50,41]],[[9334,9334],"disallowed_STD3_mapped",[40,51,41]],[[9335,9335],"disallowed_STD3_mapped",[40,52,41]],[[9336,9336],"disallowed_STD3_mapped",[40,53,41]],[[9337,9337],"disallowed_STD3_mapped",[40,54,41]],[[9338,9338],"disallowed_STD3_mapped",[40,55,41]],[[9339,9339],"disallowed_STD3_mapped",[40,56,41]],[[9340,9340],"disallowed_STD3_mapped",[40,57,41]],[[9341,9341],"disallowed_STD3_mapped",[40,49,48,41]],[[9342,9342],"disallowed_STD3_mapped",[40,49,49,41]],[[9343,9343],"disallowed_STD3_mapped",[40,49,50,41]],[[9344,9344],"disallowed_STD3_mapped",[40,49,51,41]],[[9345,9345],"disallowed_STD3_mapped",[40,49,52,41]],[[9346,9346],"disallowed_STD3_mapped",[40,49,53,41]],[[9347,9347],"disallowed_STD3_mapped",[40,49,54,41]],[[9348,9348],"disallowed_STD3_mapped",[40,49,55,41]],[[9349,9349],"disallowed_STD3_mapped",[40,49,56,41]],[[9350,9350],"disallowed_STD3_mapped",[40,49,57,41]],[[9351,9351],"disallowed_STD3_mapped",[40,50,48,41]],[[9352,9371],"disallowed"],[[9372,9372],"disallowed_STD3_mapped",[40,97,41]],[[9373,9373],"disallowed_STD3_mapped",[40,98,41]],[[9374,9374],"disallowed_STD3_mapped",[40,99,41]],[[9375,9375],"disallowed_STD3_mapped",[40,100,41]],[[9376,9376],"disallowed_STD3_mapped",[40,101,41]],[[9377,9377],"disallowed_STD3_mapped",[40,102,41]],[[9378,9378],"disallowed_STD3_mapped",[40,103,41]],[[9379,9379],"disallowed_STD3_mapped",[40,104,41]],[[9380,9380],"disallowed_STD3_mapped",[40,105,41]],[[9381,9381],"disallowed_STD3_mapped",[40,106,41]],[[9382,9382],"disallowed_STD3_mapped",[40,107,41]],[[9383,9383],"disallowed_STD3_mapped",[40,108,41]],[[9384,9384],"disallowed_STD3_mapped",[40,109,41]],[[9385,9385],"disallowed_STD3_mapped",[40,110,41]],[[9386,9386],"disallowed_STD3_mapped",[40,111,41]],[[9387,9387],"disallowed_STD3_mapped",[40,112,41]],[[9388,9388],"disallowed_STD3_mapped",[40,113,41]],[[9389,9389],"disallowed_STD3_mapped",[40,114,41]],[[9390,9390],"disallowed_STD3_mapped",[40,115,41]],[[9391,9391],"disallowed_STD3_mapped",[40,116,41]],[[9392,9392],"disallowed_STD3_mapped",[40,117,41]],[[9393,9393],"disallowed_STD3_mapped",[40,118,41]],[[9394,9394],"disallowed_STD3_mapped",[40,119,41]],[[9395,9395],"disallowed_STD3_mapped",[40,120,41]],[[9396,9396],"disallowed_STD3_mapped",[40,121,41]],[[9397,9397],"disallowed_STD3_mapped",[40,122,41]],[[9398,9398],"mapped",[97]],[[9399,9399],"mapped",[98]],[[9400,9400],"mapped",[99]],[[9401,9401],"mapped",[100]],[[9402,9402],"mapped",[101]],[[9403,9403],"mapped",[102]],[[9404,9404],"mapped",[103]],[[9405,9405],"mapped",[104]],[[9406,9406],"mapped",[105]],[[9407,9407],"mapped",[106]],[[9408,9408],"mapped",[107]],[[9409,9409],"mapped",[108]],[[9410,9410],"mapped",[109]],[[9411,9411],"mapped",[110]],[[9412,9412],"mapped",[111]],[[9413,9413],"mapped",[112]],[[9414,9414],"mapped",[113]],[[9415,9415],"mapped",[114]],[[9416,9416],"mapped",[115]],[[9417,9417],"mapped",[116]],[[9418,9418],"mapped",[117]],[[9419,9419],"mapped",[118]],[[9420,9420],"mapped",[119]],[[9421,9421],"mapped",[120]],[[9422,9422],"mapped",[121]],[[9423,9423],"mapped",[122]],[[9424,9424],"mapped",[97]],[[9425,9425],"mapped",[98]],[[9426,9426],"mapped",[99]],[[9427,9427],"mapped",[100]],[[9428,9428],"mapped",[101]],[[9429,9429],"mapped",[102]],[[9430,9430],"mapped",[103]],[[9431,9431],"mapped",[104]],[[9432,9432],"mapped",[105]],[[9433,9433],"mapped",[106]],[[9434,9434],"mapped",[107]],[[9435,9435],"mapped",[108]],[[9436,9436],"mapped",[109]],[[9437,9437],"mapped",[110]],[[9438,9438],"mapped",[111]],[[9439,9439],"mapped",[112]],[[9440,9440],"mapped",[113]],[[9441,9441],"mapped",[114]],[[9442,9442],"mapped",[115]],[[9443,9443],"mapped",[116]],[[9444,9444],"mapped",[117]],[[9445,9445],"mapped",[118]],[[9446,9446],"mapped",[119]],[[9447,9447],"mapped",[120]],[[9448,9448],"mapped",[121]],[[9449,9449],"mapped",[122]],[[9450,9450],"mapped",[48]],[[9451,9470],"valid",[],"NV8"],[[9471,9471],"valid",[],"NV8"],[[9472,9621],"valid",[],"NV8"],[[9622,9631],"valid",[],"NV8"],[[9632,9711],"valid",[],"NV8"],[[9712,9719],"valid",[],"NV8"],[[9720,9727],"valid",[],"NV8"],[[9728,9747],"valid",[],"NV8"],[[9748,9749],"valid",[],"NV8"],[[9750,9751],"valid",[],"NV8"],[[9752,9752],"valid",[],"NV8"],[[9753,9753],"valid",[],"NV8"],[[9754,9839],"valid",[],"NV8"],[[9840,9841],"valid",[],"NV8"],[[9842,9853],"valid",[],"NV8"],[[9854,9855],"valid",[],"NV8"],[[9856,9865],"valid",[],"NV8"],[[9866,9873],"valid",[],"NV8"],[[9874,9884],"valid",[],"NV8"],[[9885,9885],"valid",[],"NV8"],[[9886,9887],"valid",[],"NV8"],[[9888,9889],"valid",[],"NV8"],[[9890,9905],"valid",[],"NV8"],[[9906,9906],"valid",[],"NV8"],[[9907,9916],"valid",[],"NV8"],[[9917,9919],"valid",[],"NV8"],[[9920,9923],"valid",[],"NV8"],[[9924,9933],"valid",[],"NV8"],[[9934,9934],"valid",[],"NV8"],[[9935,9953],"valid",[],"NV8"],[[9954,9954],"valid",[],"NV8"],[[9955,9955],"valid",[],"NV8"],[[9956,9959],"valid",[],"NV8"],[[9960,9983],"valid",[],"NV8"],[[9984,9984],"valid",[],"NV8"],[[9985,9988],"valid",[],"NV8"],[[9989,9989],"valid",[],"NV8"],[[9990,9993],"valid",[],"NV8"],[[9994,9995],"valid",[],"NV8"],[[9996,10023],"valid",[],"NV8"],[[10024,10024],"valid",[],"NV8"],[[10025,10059],"valid",[],"NV8"],[[10060,10060],"valid",[],"NV8"],[[10061,10061],"valid",[],"NV8"],[[10062,10062],"valid",[],"NV8"],[[10063,10066],"valid",[],"NV8"],[[10067,10069],"valid",[],"NV8"],[[10070,10070],"valid",[],"NV8"],[[10071,10071],"valid",[],"NV8"],[[10072,10078],"valid",[],"NV8"],[[10079,10080],"valid",[],"NV8"],[[10081,10087],"valid",[],"NV8"],[[10088,10101],"valid",[],"NV8"],[[10102,10132],"valid",[],"NV8"],[[10133,10135],"valid",[],"NV8"],[[10136,10159],"valid",[],"NV8"],[[10160,10160],"valid",[],"NV8"],[[10161,10174],"valid",[],"NV8"],[[10175,10175],"valid",[],"NV8"],[[10176,10182],"valid",[],"NV8"],[[10183,10186],"valid",[],"NV8"],[[10187,10187],"valid",[],"NV8"],[[10188,10188],"valid",[],"NV8"],[[10189,10189],"valid",[],"NV8"],[[10190,10191],"valid",[],"NV8"],[[10192,10219],"valid",[],"NV8"],[[10220,10223],"valid",[],"NV8"],[[10224,10239],"valid",[],"NV8"],[[10240,10495],"valid",[],"NV8"],[[10496,10763],"valid",[],"NV8"],[[10764,10764],"mapped",[8747,8747,8747,8747]],[[10765,10867],"valid",[],"NV8"],[[10868,10868],"disallowed_STD3_mapped",[58,58,61]],[[10869,10869],"disallowed_STD3_mapped",[61,61]],[[10870,10870],"disallowed_STD3_mapped",[61,61,61]],[[10871,10971],"valid",[],"NV8"],[[10972,10972],"mapped",[10973,824]],[[10973,11007],"valid",[],"NV8"],[[11008,11021],"valid",[],"NV8"],[[11022,11027],"valid",[],"NV8"],[[11028,11034],"valid",[],"NV8"],[[11035,11039],"valid",[],"NV8"],[[11040,11043],"valid",[],"NV8"],[[11044,11084],"valid",[],"NV8"],[[11085,11087],"valid",[],"NV8"],[[11088,11092],"valid",[],"NV8"],[[11093,11097],"valid",[],"NV8"],[[11098,11123],"valid",[],"NV8"],[[11124,11125],"disallowed"],[[11126,11157],"valid",[],"NV8"],[[11158,11159],"disallowed"],[[11160,11193],"valid",[],"NV8"],[[11194,11196],"disallowed"],[[11197,11208],"valid",[],"NV8"],[[11209,11209],"disallowed"],[[11210,11217],"valid",[],"NV8"],[[11218,11243],"disallowed"],[[11244,11247],"valid",[],"NV8"],[[11248,11263],"disallowed"],[[11264,11264],"mapped",[11312]],[[11265,11265],"mapped",[11313]],[[11266,11266],"mapped",[11314]],[[11267,11267],"mapped",[11315]],[[11268,11268],"mapped",[11316]],[[11269,11269],"mapped",[11317]],[[11270,11270],"mapped",[11318]],[[11271,11271],"mapped",[11319]],[[11272,11272],"mapped",[11320]],[[11273,11273],"mapped",[11321]],[[11274,11274],"mapped",[11322]],[[11275,11275],"mapped",[11323]],[[11276,11276],"mapped",[11324]],[[11277,11277],"mapped",[11325]],[[11278,11278],"mapped",[11326]],[[11279,11279],"mapped",[11327]],[[11280,11280],"mapped",[11328]],[[11281,11281],"mapped",[11329]],[[11282,11282],"mapped",[11330]],[[11283,11283],"mapped",[11331]],[[11284,11284],"mapped",[11332]],[[11285,11285],"mapped",[11333]],[[11286,11286],"mapped",[11334]],[[11287,11287],"mapped",[11335]],[[11288,11288],"mapped",[11336]],[[11289,11289],"mapped",[11337]],[[11290,11290],"mapped",[11338]],[[11291,11291],"mapped",[11339]],[[11292,11292],"mapped",[11340]],[[11293,11293],"mapped",[11341]],[[11294,11294],"mapped",[11342]],[[11295,11295],"mapped",[11343]],[[11296,11296],"mapped",[11344]],[[11297,11297],"mapped",[11345]],[[11298,11298],"mapped",[11346]],[[11299,11299],"mapped",[11347]],[[11300,11300],"mapped",[11348]],[[11301,11301],"mapped",[11349]],[[11302,11302],"mapped",[11350]],[[11303,11303],"mapped",[11351]],[[11304,11304],"mapped",[11352]],[[11305,11305],"mapped",[11353]],[[11306,11306],"mapped",[11354]],[[11307,11307],"mapped",[11355]],[[11308,11308],"mapped",[11356]],[[11309,11309],"mapped",[11357]],[[11310,11310],"mapped",[11358]],[[11311,11311],"disallowed"],[[11312,11358],"valid"],[[11359,11359],"disallowed"],[[11360,11360],"mapped",[11361]],[[11361,11361],"valid"],[[11362,11362],"mapped",[619]],[[11363,11363],"mapped",[7549]],[[11364,11364],"mapped",[637]],[[11365,11366],"valid"],[[11367,11367],"mapped",[11368]],[[11368,11368],"valid"],[[11369,11369],"mapped",[11370]],[[11370,11370],"valid"],[[11371,11371],"mapped",[11372]],[[11372,11372],"valid"],[[11373,11373],"mapped",[593]],[[11374,11374],"mapped",[625]],[[11375,11375],"mapped",[592]],[[11376,11376],"mapped",[594]],[[11377,11377],"valid"],[[11378,11378],"mapped",[11379]],[[11379,11379],"valid"],[[11380,11380],"valid"],[[11381,11381],"mapped",[11382]],[[11382,11383],"valid"],[[11384,11387],"valid"],[[11388,11388],"mapped",[106]],[[11389,11389],"mapped",[118]],[[11390,11390],"mapped",[575]],[[11391,11391],"mapped",[576]],[[11392,11392],"mapped",[11393]],[[11393,11393],"valid"],[[11394,11394],"mapped",[11395]],[[11395,11395],"valid"],[[11396,11396],"mapped",[11397]],[[11397,11397],"valid"],[[11398,11398],"mapped",[11399]],[[11399,11399],"valid"],[[11400,11400],"mapped",[11401]],[[11401,11401],"valid"],[[11402,11402],"mapped",[11403]],[[11403,11403],"valid"],[[11404,11404],"mapped",[11405]],[[11405,11405],"valid"],[[11406,11406],"mapped",[11407]],[[11407,11407],"valid"],[[11408,11408],"mapped",[11409]],[[11409,11409],"valid"],[[11410,11410],"mapped",[11411]],[[11411,11411],"valid"],[[11412,11412],"mapped",[11413]],[[11413,11413],"valid"],[[11414,11414],"mapped",[11415]],[[11415,11415],"valid"],[[11416,11416],"mapped",[11417]],[[11417,11417],"valid"],[[11418,11418],"mapped",[11419]],[[11419,11419],"valid"],[[11420,11420],"mapped",[11421]],[[11421,11421],"valid"],[[11422,11422],"mapped",[11423]],[[11423,11423],"valid"],[[11424,11424],"mapped",[11425]],[[11425,11425],"valid"],[[11426,11426],"mapped",[11427]],[[11427,11427],"valid"],[[11428,11428],"mapped",[11429]],[[11429,11429],"valid"],[[11430,11430],"mapped",[11431]],[[11431,11431],"valid"],[[11432,11432],"mapped",[11433]],[[11433,11433],"valid"],[[11434,11434],"mapped",[11435]],[[11435,11435],"valid"],[[11436,11436],"mapped",[11437]],[[11437,11437],"valid"],[[11438,11438],"mapped",[11439]],[[11439,11439],"valid"],[[11440,11440],"mapped",[11441]],[[11441,11441],"valid"],[[11442,11442],"mapped",[11443]],[[11443,11443],"valid"],[[11444,11444],"mapped",[11445]],[[11445,11445],"valid"],[[11446,11446],"mapped",[11447]],[[11447,11447],"valid"],[[11448,11448],"mapped",[11449]],[[11449,11449],"valid"],[[11450,11450],"mapped",[11451]],[[11451,11451],"valid"],[[11452,11452],"mapped",[11453]],[[11453,11453],"valid"],[[11454,11454],"mapped",[11455]],[[11455,11455],"valid"],[[11456,11456],"mapped",[11457]],[[11457,11457],"valid"],[[11458,11458],"mapped",[11459]],[[11459,11459],"valid"],[[11460,11460],"mapped",[11461]],[[11461,11461],"valid"],[[11462,11462],"mapped",[11463]],[[11463,11463],"valid"],[[11464,11464],"mapped",[11465]],[[11465,11465],"valid"],[[11466,11466],"mapped",[11467]],[[11467,11467],"valid"],[[11468,11468],"mapped",[11469]],[[11469,11469],"valid"],[[11470,11470],"mapped",[11471]],[[11471,11471],"valid"],[[11472,11472],"mapped",[11473]],[[11473,11473],"valid"],[[11474,11474],"mapped",[11475]],[[11475,11475],"valid"],[[11476,11476],"mapped",[11477]],[[11477,11477],"valid"],[[11478,11478],"mapped",[11479]],[[11479,11479],"valid"],[[11480,11480],"mapped",[11481]],[[11481,11481],"valid"],[[11482,11482],"mapped",[11483]],[[11483,11483],"valid"],[[11484,11484],"mapped",[11485]],[[11485,11485],"valid"],[[11486,11486],"mapped",[11487]],[[11487,11487],"valid"],[[11488,11488],"mapped",[11489]],[[11489,11489],"valid"],[[11490,11490],"mapped",[11491]],[[11491,11492],"valid"],[[11493,11498],"valid",[],"NV8"],[[11499,11499],"mapped",[11500]],[[11500,11500],"valid"],[[11501,11501],"mapped",[11502]],[[11502,11505],"valid"],[[11506,11506],"mapped",[11507]],[[11507,11507],"valid"],[[11508,11512],"disallowed"],[[11513,11519],"valid",[],"NV8"],[[11520,11557],"valid"],[[11558,11558],"disallowed"],[[11559,11559],"valid"],[[11560,11564],"disallowed"],[[11565,11565],"valid"],[[11566,11567],"disallowed"],[[11568,11621],"valid"],[[11622,11623],"valid"],[[11624,11630],"disallowed"],[[11631,11631],"mapped",[11617]],[[11632,11632],"valid",[],"NV8"],[[11633,11646],"disallowed"],[[11647,11647],"valid"],[[11648,11670],"valid"],[[11671,11679],"disallowed"],[[11680,11686],"valid"],[[11687,11687],"disallowed"],[[11688,11694],"valid"],[[11695,11695],"disallowed"],[[11696,11702],"valid"],[[11703,11703],"disallowed"],[[11704,11710],"valid"],[[11711,11711],"disallowed"],[[11712,11718],"valid"],[[11719,11719],"disallowed"],[[11720,11726],"valid"],[[11727,11727],"disallowed"],[[11728,11734],"valid"],[[11735,11735],"disallowed"],[[11736,11742],"valid"],[[11743,11743],"disallowed"],[[11744,11775],"valid"],[[11776,11799],"valid",[],"NV8"],[[11800,11803],"valid",[],"NV8"],[[11804,11805],"valid",[],"NV8"],[[11806,11822],"valid",[],"NV8"],[[11823,11823],"valid"],[[11824,11824],"valid",[],"NV8"],[[11825,11825],"valid",[],"NV8"],[[11826,11835],"valid",[],"NV8"],[[11836,11842],"valid",[],"NV8"],[[11843,11903],"disallowed"],[[11904,11929],"valid",[],"NV8"],[[11930,11930],"disallowed"],[[11931,11934],"valid",[],"NV8"],[[11935,11935],"mapped",[27597]],[[11936,12018],"valid",[],"NV8"],[[12019,12019],"mapped",[40863]],[[12020,12031],"disallowed"],[[12032,12032],"mapped",[19968]],[[12033,12033],"mapped",[20008]],[[12034,12034],"mapped",[20022]],[[12035,12035],"mapped",[20031]],[[12036,12036],"mapped",[20057]],[[12037,12037],"mapped",[20101]],[[12038,12038],"mapped",[20108]],[[12039,12039],"mapped",[20128]],[[12040,12040],"mapped",[20154]],[[12041,12041],"mapped",[20799]],[[12042,12042],"mapped",[20837]],[[12043,12043],"mapped",[20843]],[[12044,12044],"mapped",[20866]],[[12045,12045],"mapped",[20886]],[[12046,12046],"mapped",[20907]],[[12047,12047],"mapped",[20960]],[[12048,12048],"mapped",[20981]],[[12049,12049],"mapped",[20992]],[[12050,12050],"mapped",[21147]],[[12051,12051],"mapped",[21241]],[[12052,12052],"mapped",[21269]],[[12053,12053],"mapped",[21274]],[[12054,12054],"mapped",[21304]],[[12055,12055],"mapped",[21313]],[[12056,12056],"mapped",[21340]],[[12057,12057],"mapped",[21353]],[[12058,12058],"mapped",[21378]],[[12059,12059],"mapped",[21430]],[[12060,12060],"mapped",[21448]],[[12061,12061],"mapped",[21475]],[[12062,12062],"mapped",[22231]],[[12063,12063],"mapped",[22303]],[[12064,12064],"mapped",[22763]],[[12065,12065],"mapped",[22786]],[[12066,12066],"mapped",[22794]],[[12067,12067],"mapped",[22805]],[[12068,12068],"mapped",[22823]],[[12069,12069],"mapped",[22899]],[[12070,12070],"mapped",[23376]],[[12071,12071],"mapped",[23424]],[[12072,12072],"mapped",[23544]],[[12073,12073],"mapped",[23567]],[[12074,12074],"mapped",[23586]],[[12075,12075],"mapped",[23608]],[[12076,12076],"mapped",[23662]],[[12077,12077],"mapped",[23665]],[[12078,12078],"mapped",[24027]],[[12079,12079],"mapped",[24037]],[[12080,12080],"mapped",[24049]],[[12081,12081],"mapped",[24062]],[[12082,12082],"mapped",[24178]],[[12083,12083],"mapped",[24186]],[[12084,12084],"mapped",[24191]],[[12085,12085],"mapped",[24308]],[[12086,12086],"mapped",[24318]],[[12087,12087],"mapped",[24331]],[[12088,12088],"mapped",[24339]],[[12089,12089],"mapped",[24400]],[[12090,12090],"mapped",[24417]],[[12091,12091],"mapped",[24435]],[[12092,12092],"mapped",[24515]],[[12093,12093],"mapped",[25096]],[[12094,12094],"mapped",[25142]],[[12095,12095],"mapped",[25163]],[[12096,12096],"mapped",[25903]],[[12097,12097],"mapped",[25908]],[[12098,12098],"mapped",[25991]],[[12099,12099],"mapped",[26007]],[[12100,12100],"mapped",[26020]],[[12101,12101],"mapped",[26041]],[[12102,12102],"mapped",[26080]],[[12103,12103],"mapped",[26085]],[[12104,12104],"mapped",[26352]],[[12105,12105],"mapped",[26376]],[[12106,12106],"mapped",[26408]],[[12107,12107],"mapped",[27424]],[[12108,12108],"mapped",[27490]],[[12109,12109],"mapped",[27513]],[[12110,12110],"mapped",[27571]],[[12111,12111],"mapped",[27595]],[[12112,12112],"mapped",[27604]],[[12113,12113],"mapped",[27611]],[[12114,12114],"mapped",[27663]],[[12115,12115],"mapped",[27668]],[[12116,12116],"mapped",[27700]],[[12117,12117],"mapped",[28779]],[[12118,12118],"mapped",[29226]],[[12119,12119],"mapped",[29238]],[[12120,12120],"mapped",[29243]],[[12121,12121],"mapped",[29247]],[[12122,12122],"mapped",[29255]],[[12123,12123],"mapped",[29273]],[[12124,12124],"mapped",[29275]],[[12125,12125],"mapped",[29356]],[[12126,12126],"mapped",[29572]],[[12127,12127],"mapped",[29577]],[[12128,12128],"mapped",[29916]],[[12129,12129],"mapped",[29926]],[[12130,12130],"mapped",[29976]],[[12131,12131],"mapped",[29983]],[[12132,12132],"mapped",[29992]],[[12133,12133],"mapped",[30000]],[[12134,12134],"mapped",[30091]],[[12135,12135],"mapped",[30098]],[[12136,12136],"mapped",[30326]],[[12137,12137],"mapped",[30333]],[[12138,12138],"mapped",[30382]],[[12139,12139],"mapped",[30399]],[[12140,12140],"mapped",[30446]],[[12141,12141],"mapped",[30683]],[[12142,12142],"mapped",[30690]],[[12143,12143],"mapped",[30707]],[[12144,12144],"mapped",[31034]],[[12145,12145],"mapped",[31160]],[[12146,12146],"mapped",[31166]],[[12147,12147],"mapped",[31348]],[[12148,12148],"mapped",[31435]],[[12149,12149],"mapped",[31481]],[[12150,12150],"mapped",[31859]],[[12151,12151],"mapped",[31992]],[[12152,12152],"mapped",[32566]],[[12153,12153],"mapped",[32593]],[[12154,12154],"mapped",[32650]],[[12155,12155],"mapped",[32701]],[[12156,12156],"mapped",[32769]],[[12157,12157],"mapped",[32780]],[[12158,12158],"mapped",[32786]],[[12159,12159],"mapped",[32819]],[[12160,12160],"mapped",[32895]],[[12161,12161],"mapped",[32905]],[[12162,12162],"mapped",[33251]],[[12163,12163],"mapped",[33258]],[[12164,12164],"mapped",[33267]],[[12165,12165],"mapped",[33276]],[[12166,12166],"mapped",[33292]],[[12167,12167],"mapped",[33307]],[[12168,12168],"mapped",[33311]],[[12169,12169],"mapped",[33390]],[[12170,12170],"mapped",[33394]],[[12171,12171],"mapped",[33400]],[[12172,12172],"mapped",[34381]],[[12173,12173],"mapped",[34411]],[[12174,12174],"mapped",[34880]],[[12175,12175],"mapped",[34892]],[[12176,12176],"mapped",[34915]],[[12177,12177],"mapped",[35198]],[[12178,12178],"mapped",[35211]],[[12179,12179],"mapped",[35282]],[[12180,12180],"mapped",[35328]],[[12181,12181],"mapped",[35895]],[[12182,12182],"mapped",[35910]],[[12183,12183],"mapped",[35925]],[[12184,12184],"mapped",[35960]],[[12185,12185],"mapped",[35997]],[[12186,12186],"mapped",[36196]],[[12187,12187],"mapped",[36208]],[[12188,12188],"mapped",[36275]],[[12189,12189],"mapped",[36523]],[[12190,12190],"mapped",[36554]],[[12191,12191],"mapped",[36763]],[[12192,12192],"mapped",[36784]],[[12193,12193],"mapped",[36789]],[[12194,12194],"mapped",[37009]],[[12195,12195],"mapped",[37193]],[[12196,12196],"mapped",[37318]],[[12197,12197],"mapped",[37324]],[[12198,12198],"mapped",[37329]],[[12199,12199],"mapped",[38263]],[[12200,12200],"mapped",[38272]],[[12201,12201],"mapped",[38428]],[[12202,12202],"mapped",[38582]],[[12203,12203],"mapped",[38585]],[[12204,12204],"mapped",[38632]],[[12205,12205],"mapped",[38737]],[[12206,12206],"mapped",[38750]],[[12207,12207],"mapped",[38754]],[[12208,12208],"mapped",[38761]],[[12209,12209],"mapped",[38859]],[[12210,12210],"mapped",[38893]],[[12211,12211],"mapped",[38899]],[[12212,12212],"mapped",[38913]],[[12213,12213],"mapped",[39080]],[[12214,12214],"mapped",[39131]],[[12215,12215],"mapped",[39135]],[[12216,12216],"mapped",[39318]],[[12217,12217],"mapped",[39321]],[[12218,12218],"mapped",[39340]],[[12219,12219],"mapped",[39592]],[[12220,12220],"mapped",[39640]],[[12221,12221],"mapped",[39647]],[[12222,12222],"mapped",[39717]],[[12223,12223],"mapped",[39727]],[[12224,12224],"mapped",[39730]],[[12225,12225],"mapped",[39740]],[[12226,12226],"mapped",[39770]],[[12227,12227],"mapped",[40165]],[[12228,12228],"mapped",[40565]],[[12229,12229],"mapped",[40575]],[[12230,12230],"mapped",[40613]],[[12231,12231],"mapped",[40635]],[[12232,12232],"mapped",[40643]],[[12233,12233],"mapped",[40653]],[[12234,12234],"mapped",[40657]],[[12235,12235],"mapped",[40697]],[[12236,12236],"mapped",[40701]],[[12237,12237],"mapped",[40718]],[[12238,12238],"mapped",[40723]],[[12239,12239],"mapped",[40736]],[[12240,12240],"mapped",[40763]],[[12241,12241],"mapped",[40778]],[[12242,12242],"mapped",[40786]],[[12243,12243],"mapped",[40845]],[[12244,12244],"mapped",[40860]],[[12245,12245],"mapped",[40864]],[[12246,12271],"disallowed"],[[12272,12283],"disallowed"],[[12284,12287],"disallowed"],[[12288,12288],"disallowed_STD3_mapped",[32]],[[12289,12289],"valid",[],"NV8"],[[12290,12290],"mapped",[46]],[[12291,12292],"valid",[],"NV8"],[[12293,12295],"valid"],[[12296,12329],"valid",[],"NV8"],[[12330,12333],"valid"],[[12334,12341],"valid",[],"NV8"],[[12342,12342],"mapped",[12306]],[[12343,12343],"valid",[],"NV8"],[[12344,12344],"mapped",[21313]],[[12345,12345],"mapped",[21316]],[[12346,12346],"mapped",[21317]],[[12347,12347],"valid",[],"NV8"],[[12348,12348],"valid"],[[12349,12349],"valid",[],"NV8"],[[12350,12350],"valid",[],"NV8"],[[12351,12351],"valid",[],"NV8"],[[12352,12352],"disallowed"],[[12353,12436],"valid"],[[12437,12438],"valid"],[[12439,12440],"disallowed"],[[12441,12442],"valid"],[[12443,12443],"disallowed_STD3_mapped",[32,12441]],[[12444,12444],"disallowed_STD3_mapped",[32,12442]],[[12445,12446],"valid"],[[12447,12447],"mapped",[12424,12426]],[[12448,12448],"valid",[],"NV8"],[[12449,12542],"valid"],[[12543,12543],"mapped",[12467,12488]],[[12544,12548],"disallowed"],[[12549,12588],"valid"],[[12589,12589],"valid"],[[12590,12592],"disallowed"],[[12593,12593],"mapped",[4352]],[[12594,12594],"mapped",[4353]],[[12595,12595],"mapped",[4522]],[[12596,12596],"mapped",[4354]],[[12597,12597],"mapped",[4524]],[[12598,12598],"mapped",[4525]],[[12599,12599],"mapped",[4355]],[[12600,12600],"mapped",[4356]],[[12601,12601],"mapped",[4357]],[[12602,12602],"mapped",[4528]],[[12603,12603],"mapped",[4529]],[[12604,12604],"mapped",[4530]],[[12605,12605],"mapped",[4531]],[[12606,12606],"mapped",[4532]],[[12607,12607],"mapped",[4533]],[[12608,12608],"mapped",[4378]],[[12609,12609],"mapped",[4358]],[[12610,12610],"mapped",[4359]],[[12611,12611],"mapped",[4360]],[[12612,12612],"mapped",[4385]],[[12613,12613],"mapped",[4361]],[[12614,12614],"mapped",[4362]],[[12615,12615],"mapped",[4363]],[[12616,12616],"mapped",[4364]],[[12617,12617],"mapped",[4365]],[[12618,12618],"mapped",[4366]],[[12619,12619],"mapped",[4367]],[[12620,12620],"mapped",[4368]],[[12621,12621],"mapped",[4369]],[[12622,12622],"mapped",[4370]],[[12623,12623],"mapped",[4449]],[[12624,12624],"mapped",[4450]],[[12625,12625],"mapped",[4451]],[[12626,12626],"mapped",[4452]],[[12627,12627],"mapped",[4453]],[[12628,12628],"mapped",[4454]],[[12629,12629],"mapped",[4455]],[[12630,12630],"mapped",[4456]],[[12631,12631],"mapped",[4457]],[[12632,12632],"mapped",[4458]],[[12633,12633],"mapped",[4459]],[[12634,12634],"mapped",[4460]],[[12635,12635],"mapped",[4461]],[[12636,12636],"mapped",[4462]],[[12637,12637],"mapped",[4463]],[[12638,12638],"mapped",[4464]],[[12639,12639],"mapped",[4465]],[[12640,12640],"mapped",[4466]],[[12641,12641],"mapped",[4467]],[[12642,12642],"mapped",[4468]],[[12643,12643],"mapped",[4469]],[[12644,12644],"disallowed"],[[12645,12645],"mapped",[4372]],[[12646,12646],"mapped",[4373]],[[12647,12647],"mapped",[4551]],[[12648,12648],"mapped",[4552]],[[12649,12649],"mapped",[4556]],[[12650,12650],"mapped",[4558]],[[12651,12651],"mapped",[4563]],[[12652,12652],"mapped",[4567]],[[12653,12653],"mapped",[4569]],[[12654,12654],"mapped",[4380]],[[12655,12655],"mapped",[4573]],[[12656,12656],"mapped",[4575]],[[12657,12657],"mapped",[4381]],[[12658,12658],"mapped",[4382]],[[12659,12659],"mapped",[4384]],[[12660,12660],"mapped",[4386]],[[12661,12661],"mapped",[4387]],[[12662,12662],"mapped",[4391]],[[12663,12663],"mapped",[4393]],[[12664,12664],"mapped",[4395]],[[12665,12665],"mapped",[4396]],[[12666,12666],"mapped",[4397]],[[12667,12667],"mapped",[4398]],[[12668,12668],"mapped",[4399]],[[12669,12669],"mapped",[4402]],[[12670,12670],"mapped",[4406]],[[12671,12671],"mapped",[4416]],[[12672,12672],"mapped",[4423]],[[12673,12673],"mapped",[4428]],[[12674,12674],"mapped",[4593]],[[12675,12675],"mapped",[4594]],[[12676,12676],"mapped",[4439]],[[12677,12677],"mapped",[4440]],[[12678,12678],"mapped",[4441]],[[12679,12679],"mapped",[4484]],[[12680,12680],"mapped",[4485]],[[12681,12681],"mapped",[4488]],[[12682,12682],"mapped",[4497]],[[12683,12683],"mapped",[4498]],[[12684,12684],"mapped",[4500]],[[12685,12685],"mapped",[4510]],[[12686,12686],"mapped",[4513]],[[12687,12687],"disallowed"],[[12688,12689],"valid",[],"NV8"],[[12690,12690],"mapped",[19968]],[[12691,12691],"mapped",[20108]],[[12692,12692],"mapped",[19977]],[[12693,12693],"mapped",[22235]],[[12694,12694],"mapped",[19978]],[[12695,12695],"mapped",[20013]],[[12696,12696],"mapped",[19979]],[[12697,12697],"mapped",[30002]],[[12698,12698],"mapped",[20057]],[[12699,12699],"mapped",[19993]],[[12700,12700],"mapped",[19969]],[[12701,12701],"mapped",[22825]],[[12702,12702],"mapped",[22320]],[[12703,12703],"mapped",[20154]],[[12704,12727],"valid"],[[12728,12730],"valid"],[[12731,12735],"disallowed"],[[12736,12751],"valid",[],"NV8"],[[12752,12771],"valid",[],"NV8"],[[12772,12783],"disallowed"],[[12784,12799],"valid"],[[12800,12800],"disallowed_STD3_mapped",[40,4352,41]],[[12801,12801],"disallowed_STD3_mapped",[40,4354,41]],[[12802,12802],"disallowed_STD3_mapped",[40,4355,41]],[[12803,12803],"disallowed_STD3_mapped",[40,4357,41]],[[12804,12804],"disallowed_STD3_mapped",[40,4358,41]],[[12805,12805],"disallowed_STD3_mapped",[40,4359,41]],[[12806,12806],"disallowed_STD3_mapped",[40,4361,41]],[[12807,12807],"disallowed_STD3_mapped",[40,4363,41]],[[12808,12808],"disallowed_STD3_mapped",[40,4364,41]],[[12809,12809],"disallowed_STD3_mapped",[40,4366,41]],[[12810,12810],"disallowed_STD3_mapped",[40,4367,41]],[[12811,12811],"disallowed_STD3_mapped",[40,4368,41]],[[12812,12812],"disallowed_STD3_mapped",[40,4369,41]],[[12813,12813],"disallowed_STD3_mapped",[40,4370,41]],[[12814,12814],"disallowed_STD3_mapped",[40,44032,41]],[[12815,12815],"disallowed_STD3_mapped",[40,45208,41]],[[12816,12816],"disallowed_STD3_mapped",[40,45796,41]],[[12817,12817],"disallowed_STD3_mapped",[40,46972,41]],[[12818,12818],"disallowed_STD3_mapped",[40,47560,41]],[[12819,12819],"disallowed_STD3_mapped",[40,48148,41]],[[12820,12820],"disallowed_STD3_mapped",[40,49324,41]],[[12821,12821],"disallowed_STD3_mapped",[40,50500,41]],[[12822,12822],"disallowed_STD3_mapped",[40,51088,41]],[[12823,12823],"disallowed_STD3_mapped",[40,52264,41]],[[12824,12824],"disallowed_STD3_mapped",[40,52852,41]],[[12825,12825],"disallowed_STD3_mapped",[40,53440,41]],[[12826,12826],"disallowed_STD3_mapped",[40,54028,41]],[[12827,12827],"disallowed_STD3_mapped",[40,54616,41]],[[12828,12828],"disallowed_STD3_mapped",[40,51452,41]],[[12829,12829],"disallowed_STD3_mapped",[40,50724,51204,41]],[[12830,12830],"disallowed_STD3_mapped",[40,50724,54980,41]],[[12831,12831],"disallowed"],[[12832,12832],"disallowed_STD3_mapped",[40,19968,41]],[[12833,12833],"disallowed_STD3_mapped",[40,20108,41]],[[12834,12834],"disallowed_STD3_mapped",[40,19977,41]],[[12835,12835],"disallowed_STD3_mapped",[40,22235,41]],[[12836,12836],"disallowed_STD3_mapped",[40,20116,41]],[[12837,12837],"disallowed_STD3_mapped",[40,20845,41]],[[12838,12838],"disallowed_STD3_mapped",[40,19971,41]],[[12839,12839],"disallowed_STD3_mapped",[40,20843,41]],[[12840,12840],"disallowed_STD3_mapped",[40,20061,41]],[[12841,12841],"disallowed_STD3_mapped",[40,21313,41]],[[12842,12842],"disallowed_STD3_mapped",[40,26376,41]],[[12843,12843],"disallowed_STD3_mapped",[40,28779,41]],[[12844,12844],"disallowed_STD3_mapped",[40,27700,41]],[[12845,12845],"disallowed_STD3_mapped",[40,26408,41]],[[12846,12846],"disallowed_STD3_mapped",[40,37329,41]],[[12847,12847],"disallowed_STD3_mapped",[40,22303,41]],[[12848,12848],"disallowed_STD3_mapped",[40,26085,41]],[[12849,12849],"disallowed_STD3_mapped",[40,26666,41]],[[12850,12850],"disallowed_STD3_mapped",[40,26377,41]],[[12851,12851],"disallowed_STD3_mapped",[40,31038,41]],[[12852,12852],"disallowed_STD3_mapped",[40,21517,41]],[[12853,12853],"disallowed_STD3_mapped",[40,29305,41]],[[12854,12854],"disallowed_STD3_mapped",[40,36001,41]],[[12855,12855],"disallowed_STD3_mapped",[40,31069,41]],[[12856,12856],"disallowed_STD3_mapped",[40,21172,41]],[[12857,12857],"disallowed_STD3_mapped",[40,20195,41]],[[12858,12858],"disallowed_STD3_mapped",[40,21628,41]],[[12859,12859],"disallowed_STD3_mapped",[40,23398,41]],[[12860,12860],"disallowed_STD3_mapped",[40,30435,41]],[[12861,12861],"disallowed_STD3_mapped",[40,20225,41]],[[12862,12862],"disallowed_STD3_mapped",[40,36039,41]],[[12863,12863],"disallowed_STD3_mapped",[40,21332,41]],[[12864,12864],"disallowed_STD3_mapped",[40,31085,41]],[[12865,12865],"disallowed_STD3_mapped",[40,20241,41]],[[12866,12866],"disallowed_STD3_mapped",[40,33258,41]],[[12867,12867],"disallowed_STD3_mapped",[40,33267,41]],[[12868,12868],"mapped",[21839]],[[12869,12869],"mapped",[24188]],[[12870,12870],"mapped",[25991]],[[12871,12871],"mapped",[31631]],[[12872,12879],"valid",[],"NV8"],[[12880,12880],"mapped",[112,116,101]],[[12881,12881],"mapped",[50,49]],[[12882,12882],"mapped",[50,50]],[[12883,12883],"mapped",[50,51]],[[12884,12884],"mapped",[50,52]],[[12885,12885],"mapped",[50,53]],[[12886,12886],"mapped",[50,54]],[[12887,12887],"mapped",[50,55]],[[12888,12888],"mapped",[50,56]],[[12889,12889],"mapped",[50,57]],[[12890,12890],"mapped",[51,48]],[[12891,12891],"mapped",[51,49]],[[12892,12892],"mapped",[51,50]],[[12893,12893],"mapped",[51,51]],[[12894,12894],"mapped",[51,52]],[[12895,12895],"mapped",[51,53]],[[12896,12896],"mapped",[4352]],[[12897,12897],"mapped",[4354]],[[12898,12898],"mapped",[4355]],[[12899,12899],"mapped",[4357]],[[12900,12900],"mapped",[4358]],[[12901,12901],"mapped",[4359]],[[12902,12902],"mapped",[4361]],[[12903,12903],"mapped",[4363]],[[12904,12904],"mapped",[4364]],[[12905,12905],"mapped",[4366]],[[12906,12906],"mapped",[4367]],[[12907,12907],"mapped",[4368]],[[12908,12908],"mapped",[4369]],[[12909,12909],"mapped",[4370]],[[12910,12910],"mapped",[44032]],[[12911,12911],"mapped",[45208]],[[12912,12912],"mapped",[45796]],[[12913,12913],"mapped",[46972]],[[12914,12914],"mapped",[47560]],[[12915,12915],"mapped",[48148]],[[12916,12916],"mapped",[49324]],[[12917,12917],"mapped",[50500]],[[12918,12918],"mapped",[51088]],[[12919,12919],"mapped",[52264]],[[12920,12920],"mapped",[52852]],[[12921,12921],"mapped",[53440]],[[12922,12922],"mapped",[54028]],[[12923,12923],"mapped",[54616]],[[12924,12924],"mapped",[52280,44256]],[[12925,12925],"mapped",[51452,51032]],[[12926,12926],"mapped",[50864]],[[12927,12927],"valid",[],"NV8"],[[12928,12928],"mapped",[19968]],[[12929,12929],"mapped",[20108]],[[12930,12930],"mapped",[19977]],[[12931,12931],"mapped",[22235]],[[12932,12932],"mapped",[20116]],[[12933,12933],"mapped",[20845]],[[12934,12934],"mapped",[19971]],[[12935,12935],"mapped",[20843]],[[12936,12936],"mapped",[20061]],[[12937,12937],"mapped",[21313]],[[12938,12938],"mapped",[26376]],[[12939,12939],"mapped",[28779]],[[12940,12940],"mapped",[27700]],[[12941,12941],"mapped",[26408]],[[12942,12942],"mapped",[37329]],[[12943,12943],"mapped",[22303]],[[12944,12944],"mapped",[26085]],[[12945,12945],"mapped",[26666]],[[12946,12946],"mapped",[26377]],[[12947,12947],"mapped",[31038]],[[12948,12948],"mapped",[21517]],[[12949,12949],"mapped",[29305]],[[12950,12950],"mapped",[36001]],[[12951,12951],"mapped",[31069]],[[12952,12952],"mapped",[21172]],[[12953,12953],"mapped",[31192]],[[12954,12954],"mapped",[30007]],[[12955,12955],"mapped",[22899]],[[12956,12956],"mapped",[36969]],[[12957,12957],"mapped",[20778]],[[12958,12958],"mapped",[21360]],[[12959,12959],"mapped",[27880]],[[12960,12960],"mapped",[38917]],[[12961,12961],"mapped",[20241]],[[12962,12962],"mapped",[20889]],[[12963,12963],"mapped",[27491]],[[12964,12964],"mapped",[19978]],[[12965,12965],"mapped",[20013]],[[12966,12966],"mapped",[19979]],[[12967,12967],"mapped",[24038]],[[12968,12968],"mapped",[21491]],[[12969,12969],"mapped",[21307]],[[12970,12970],"mapped",[23447]],[[12971,12971],"mapped",[23398]],[[12972,12972],"mapped",[30435]],[[12973,12973],"mapped",[20225]],[[12974,12974],"mapped",[36039]],[[12975,12975],"mapped",[21332]],[[12976,12976],"mapped",[22812]],[[12977,12977],"mapped",[51,54]],[[12978,12978],"mapped",[51,55]],[[12979,12979],"mapped",[51,56]],[[12980,12980],"mapped",[51,57]],[[12981,12981],"mapped",[52,48]],[[12982,12982],"mapped",[52,49]],[[12983,12983],"mapped",[52,50]],[[12984,12984],"mapped",[52,51]],[[12985,12985],"mapped",[52,52]],[[12986,12986],"mapped",[52,53]],[[12987,12987],"mapped",[52,54]],[[12988,12988],"mapped",[52,55]],[[12989,12989],"mapped",[52,56]],[[12990,12990],"mapped",[52,57]],[[12991,12991],"mapped",[53,48]],[[12992,12992],"mapped",[49,26376]],[[12993,12993],"mapped",[50,26376]],[[12994,12994],"mapped",[51,26376]],[[12995,12995],"mapped",[52,26376]],[[12996,12996],"mapped",[53,26376]],[[12997,12997],"mapped",[54,26376]],[[12998,12998],"mapped",[55,26376]],[[12999,12999],"mapped",[56,26376]],[[13000,13000],"mapped",[57,26376]],[[13001,13001],"mapped",[49,48,26376]],[[13002,13002],"mapped",[49,49,26376]],[[13003,13003],"mapped",[49,50,26376]],[[13004,13004],"mapped",[104,103]],[[13005,13005],"mapped",[101,114,103]],[[13006,13006],"mapped",[101,118]],[[13007,13007],"mapped",[108,116,100]],[[13008,13008],"mapped",[12450]],[[13009,13009],"mapped",[12452]],[[13010,13010],"mapped",[12454]],[[13011,13011],"mapped",[12456]],[[13012,13012],"mapped",[12458]],[[13013,13013],"mapped",[12459]],[[13014,13014],"mapped",[12461]],[[13015,13015],"mapped",[12463]],[[13016,13016],"mapped",[12465]],[[13017,13017],"mapped",[12467]],[[13018,13018],"mapped",[12469]],[[13019,13019],"mapped",[12471]],[[13020,13020],"mapped",[12473]],[[13021,13021],"mapped",[12475]],[[13022,13022],"mapped",[12477]],[[13023,13023],"mapped",[12479]],[[13024,13024],"mapped",[12481]],[[13025,13025],"mapped",[12484]],[[13026,13026],"mapped",[12486]],[[13027,13027],"mapped",[12488]],[[13028,13028],"mapped",[12490]],[[13029,13029],"mapped",[12491]],[[13030,13030],"mapped",[12492]],[[13031,13031],"mapped",[12493]],[[13032,13032],"mapped",[12494]],[[13033,13033],"mapped",[12495]],[[13034,13034],"mapped",[12498]],[[13035,13035],"mapped",[12501]],[[13036,13036],"mapped",[12504]],[[13037,13037],"mapped",[12507]],[[13038,13038],"mapped",[12510]],[[13039,13039],"mapped",[12511]],[[13040,13040],"mapped",[12512]],[[13041,13041],"mapped",[12513]],[[13042,13042],"mapped",[12514]],[[13043,13043],"mapped",[12516]],[[13044,13044],"mapped",[12518]],[[13045,13045],"mapped",[12520]],[[13046,13046],"mapped",[12521]],[[13047,13047],"mapped",[12522]],[[13048,13048],"mapped",[12523]],[[13049,13049],"mapped",[12524]],[[13050,13050],"mapped",[12525]],[[13051,13051],"mapped",[12527]],[[13052,13052],"mapped",[12528]],[[13053,13053],"mapped",[12529]],[[13054,13054],"mapped",[12530]],[[13055,13055],"disallowed"],[[13056,13056],"mapped",[12450,12497,12540,12488]],[[13057,13057],"mapped",[12450,12523,12501,12449]],[[13058,13058],"mapped",[12450,12531,12506,12450]],[[13059,13059],"mapped",[12450,12540,12523]],[[13060,13060],"mapped",[12452,12491,12531,12464]],[[13061,13061],"mapped",[12452,12531,12481]],[[13062,13062],"mapped",[12454,12457,12531]],[[13063,13063],"mapped",[12456,12473,12463,12540,12489]],[[13064,13064],"mapped",[12456,12540,12459,12540]],[[13065,13065],"mapped",[12458,12531,12473]],[[13066,13066],"mapped",[12458,12540,12512]],[[13067,13067],"mapped",[12459,12452,12522]],[[13068,13068],"mapped",[12459,12521,12483,12488]],[[13069,13069],"mapped",[12459,12525,12522,12540]],[[13070,13070],"mapped",[12460,12525,12531]],[[13071,13071],"mapped",[12460,12531,12510]],[[13072,13072],"mapped",[12462,12460]],[[13073,13073],"mapped",[12462,12491,12540]],[[13074,13074],"mapped",[12461,12517,12522,12540]],[[13075,13075],"mapped",[12462,12523,12480,12540]],[[13076,13076],"mapped",[12461,12525]],[[13077,13077],"mapped",[12461,12525,12464,12521,12512]],[[13078,13078],"mapped",[12461,12525,12513,12540,12488,12523]],[[13079,13079],"mapped",[12461,12525,12527,12483,12488]],[[13080,13080],"mapped",[12464,12521,12512]],[[13081,13081],"mapped",[12464,12521,12512,12488,12531]],[[13082,13082],"mapped",[12463,12523,12476,12452,12525]],[[13083,13083],"mapped",[12463,12525,12540,12493]],[[13084,13084],"mapped",[12465,12540,12473]],[[13085,13085],"mapped",[12467,12523,12490]],[[13086,13086],"mapped",[12467,12540,12509]],[[13087,13087],"mapped",[12469,12452,12463,12523]],[[13088,13088],"mapped",[12469,12531,12481,12540,12512]],[[13089,13089],"mapped",[12471,12522,12531,12464]],[[13090,13090],"mapped",[12475,12531,12481]],[[13091,13091],"mapped",[12475,12531,12488]],[[13092,13092],"mapped",[12480,12540,12473]],[[13093,13093],"mapped",[12487,12471]],[[13094,13094],"mapped",[12489,12523]],[[13095,13095],"mapped",[12488,12531]],[[13096,13096],"mapped",[12490,12494]],[[13097,13097],"mapped",[12494,12483,12488]],[[13098,13098],"mapped",[12495,12452,12484]],[[13099,13099],"mapped",[12497,12540,12475,12531,12488]],[[13100,13100],"mapped",[12497,12540,12484]],[[13101,13101],"mapped",[12496,12540,12524,12523]],[[13102,13102],"mapped",[12500,12450,12473,12488,12523]],[[13103,13103],"mapped",[12500,12463,12523]],[[13104,13104],"mapped",[12500,12467]],[[13105,13105],"mapped",[12499,12523]],[[13106,13106],"mapped",[12501,12449,12521,12483,12489]],[[13107,13107],"mapped",[12501,12451,12540,12488]],[[13108,13108],"mapped",[12502,12483,12471,12455,12523]],[[13109,13109],"mapped",[12501,12521,12531]],[[13110,13110],"mapped",[12504,12463,12479,12540,12523]],[[13111,13111],"mapped",[12506,12477]],[[13112,13112],"mapped",[12506,12491,12498]],[[13113,13113],"mapped",[12504,12523,12484]],[[13114,13114],"mapped",[12506,12531,12473]],[[13115,13115],"mapped",[12506,12540,12472]],[[13116,13116],"mapped",[12505,12540,12479]],[[13117,13117],"mapped",[12509,12452,12531,12488]],[[13118,13118],"mapped",[12508,12523,12488]],[[13119,13119],"mapped",[12507,12531]],[[13120,13120],"mapped",[12509,12531,12489]],[[13121,13121],"mapped",[12507,12540,12523]],[[13122,13122],"mapped",[12507,12540,12531]],[[13123,13123],"mapped",[12510,12452,12463,12525]],[[13124,13124],"mapped",[12510,12452,12523]],[[13125,13125],"mapped",[12510,12483,12495]],[[13126,13126],"mapped",[12510,12523,12463]],[[13127,13127],"mapped",[12510,12531,12471,12519,12531]],[[13128,13128],"mapped",[12511,12463,12525,12531]],[[13129,13129],"mapped",[12511,12522]],[[13130,13130],"mapped",[12511,12522,12496,12540,12523]],[[13131,13131],"mapped",[12513,12460]],[[13132,13132],"mapped",[12513,12460,12488,12531]],[[13133,13133],"mapped",[12513,12540,12488,12523]],[[13134,13134],"mapped",[12516,12540,12489]],[[13135,13135],"mapped",[12516,12540,12523]],[[13136,13136],"mapped",[12518,12450,12531]],[[13137,13137],"mapped",[12522,12483,12488,12523]],[[13138,13138],"mapped",[12522,12521]],[[13139,13139],"mapped",[12523,12500,12540]],[[13140,13140],"mapped",[12523,12540,12502,12523]],[[13141,13141],"mapped",[12524,12512]],[[13142,13142],"mapped",[12524,12531,12488,12466,12531]],[[13143,13143],"mapped",[12527,12483,12488]],[[13144,13144],"mapped",[48,28857]],[[13145,13145],"mapped",[49,28857]],[[13146,13146],"mapped",[50,28857]],[[13147,13147],"mapped",[51,28857]],[[13148,13148],"mapped",[52,28857]],[[13149,13149],"mapped",[53,28857]],[[13150,13150],"mapped",[54,28857]],[[13151,13151],"mapped",[55,28857]],[[13152,13152],"mapped",[56,28857]],[[13153,13153],"mapped",[57,28857]],[[13154,13154],"mapped",[49,48,28857]],[[13155,13155],"mapped",[49,49,28857]],[[13156,13156],"mapped",[49,50,28857]],[[13157,13157],"mapped",[49,51,28857]],[[13158,13158],"mapped",[49,52,28857]],[[13159,13159],"mapped",[49,53,28857]],[[13160,13160],"mapped",[49,54,28857]],[[13161,13161],"mapped",[49,55,28857]],[[13162,13162],"mapped",[49,56,28857]],[[13163,13163],"mapped",[49,57,28857]],[[13164,13164],"mapped",[50,48,28857]],[[13165,13165],"mapped",[50,49,28857]],[[13166,13166],"mapped",[50,50,28857]],[[13167,13167],"mapped",[50,51,28857]],[[13168,13168],"mapped",[50,52,28857]],[[13169,13169],"mapped",[104,112,97]],[[13170,13170],"mapped",[100,97]],[[13171,13171],"mapped",[97,117]],[[13172,13172],"mapped",[98,97,114]],[[13173,13173],"mapped",[111,118]],[[13174,13174],"mapped",[112,99]],[[13175,13175],"mapped",[100,109]],[[13176,13176],"mapped",[100,109,50]],[[13177,13177],"mapped",[100,109,51]],[[13178,13178],"mapped",[105,117]],[[13179,13179],"mapped",[24179,25104]],[[13180,13180],"mapped",[26157,21644]],[[13181,13181],"mapped",[22823,27491]],[[13182,13182],"mapped",[26126,27835]],[[13183,13183],"mapped",[26666,24335,20250,31038]],[[13184,13184],"mapped",[112,97]],[[13185,13185],"mapped",[110,97]],[[13186,13186],"mapped",[956,97]],[[13187,13187],"mapped",[109,97]],[[13188,13188],"mapped",[107,97]],[[13189,13189],"mapped",[107,98]],[[13190,13190],"mapped",[109,98]],[[13191,13191],"mapped",[103,98]],[[13192,13192],"mapped",[99,97,108]],[[13193,13193],"mapped",[107,99,97,108]],[[13194,13194],"mapped",[112,102]],[[13195,13195],"mapped",[110,102]],[[13196,13196],"mapped",[956,102]],[[13197,13197],"mapped",[956,103]],[[13198,13198],"mapped",[109,103]],[[13199,13199],"mapped",[107,103]],[[13200,13200],"mapped",[104,122]],[[13201,13201],"mapped",[107,104,122]],[[13202,13202],"mapped",[109,104,122]],[[13203,13203],"mapped",[103,104,122]],[[13204,13204],"mapped",[116,104,122]],[[13205,13205],"mapped",[956,108]],[[13206,13206],"mapped",[109,108]],[[13207,13207],"mapped",[100,108]],[[13208,13208],"mapped",[107,108]],[[13209,13209],"mapped",[102,109]],[[13210,13210],"mapped",[110,109]],[[13211,13211],"mapped",[956,109]],[[13212,13212],"mapped",[109,109]],[[13213,13213],"mapped",[99,109]],[[13214,13214],"mapped",[107,109]],[[13215,13215],"mapped",[109,109,50]],[[13216,13216],"mapped",[99,109,50]],[[13217,13217],"mapped",[109,50]],[[13218,13218],"mapped",[107,109,50]],[[13219,13219],"mapped",[109,109,51]],[[13220,13220],"mapped",[99,109,51]],[[13221,13221],"mapped",[109,51]],[[13222,13222],"mapped",[107,109,51]],[[13223,13223],"mapped",[109,8725,115]],[[13224,13224],"mapped",[109,8725,115,50]],[[13225,13225],"mapped",[112,97]],[[13226,13226],"mapped",[107,112,97]],[[13227,13227],"mapped",[109,112,97]],[[13228,13228],"mapped",[103,112,97]],[[13229,13229],"mapped",[114,97,100]],[[13230,13230],"mapped",[114,97,100,8725,115]],[[13231,13231],"mapped",[114,97,100,8725,115,50]],[[13232,13232],"mapped",[112,115]],[[13233,13233],"mapped",[110,115]],[[13234,13234],"mapped",[956,115]],[[13235,13235],"mapped",[109,115]],[[13236,13236],"mapped",[112,118]],[[13237,13237],"mapped",[110,118]],[[13238,13238],"mapped",[956,118]],[[13239,13239],"mapped",[109,118]],[[13240,13240],"mapped",[107,118]],[[13241,13241],"mapped",[109,118]],[[13242,13242],"mapped",[112,119]],[[13243,13243],"mapped",[110,119]],[[13244,13244],"mapped",[956,119]],[[13245,13245],"mapped",[109,119]],[[13246,13246],"mapped",[107,119]],[[13247,13247],"mapped",[109,119]],[[13248,13248],"mapped",[107,969]],[[13249,13249],"mapped",[109,969]],[[13250,13250],"disallowed"],[[13251,13251],"mapped",[98,113]],[[13252,13252],"mapped",[99,99]],[[13253,13253],"mapped",[99,100]],[[13254,13254],"mapped",[99,8725,107,103]],[[13255,13255],"disallowed"],[[13256,13256],"mapped",[100,98]],[[13257,13257],"mapped",[103,121]],[[13258,13258],"mapped",[104,97]],[[13259,13259],"mapped",[104,112]],[[13260,13260],"mapped",[105,110]],[[13261,13261],"mapped",[107,107]],[[13262,13262],"mapped",[107,109]],[[13263,13263],"mapped",[107,116]],[[13264,13264],"mapped",[108,109]],[[13265,13265],"mapped",[108,110]],[[13266,13266],"mapped",[108,111,103]],[[13267,13267],"mapped",[108,120]],[[13268,13268],"mapped",[109,98]],[[13269,13269],"mapped",[109,105,108]],[[13270,13270],"mapped",[109,111,108]],[[13271,13271],"mapped",[112,104]],[[13272,13272],"disallowed"],[[13273,13273],"mapped",[112,112,109]],[[13274,13274],"mapped",[112,114]],[[13275,13275],"mapped",[115,114]],[[13276,13276],"mapped",[115,118]],[[13277,13277],"mapped",[119,98]],[[13278,13278],"mapped",[118,8725,109]],[[13279,13279],"mapped",[97,8725,109]],[[13280,13280],"mapped",[49,26085]],[[13281,13281],"mapped",[50,26085]],[[13282,13282],"mapped",[51,26085]],[[13283,13283],"mapped",[52,26085]],[[13284,13284],"mapped",[53,26085]],[[13285,13285],"mapped",[54,26085]],[[13286,13286],"mapped",[55,26085]],[[13287,13287],"mapped",[56,26085]],[[13288,13288],"mapped",[57,26085]],[[13289,13289],"mapped",[49,48,26085]],[[13290,13290],"mapped",[49,49,26085]],[[13291,13291],"mapped",[49,50,26085]],[[13292,13292],"mapped",[49,51,26085]],[[13293,13293],"mapped",[49,52,26085]],[[13294,13294],"mapped",[49,53,26085]],[[13295,13295],"mapped",[49,54,26085]],[[13296,13296],"mapped",[49,55,26085]],[[13297,13297],"mapped",[49,56,26085]],[[13298,13298],"mapped",[49,57,26085]],[[13299,13299],"mapped",[50,48,26085]],[[13300,13300],"mapped",[50,49,26085]],[[13301,13301],"mapped",[50,50,26085]],[[13302,13302],"mapped",[50,51,26085]],[[13303,13303],"mapped",[50,52,26085]],[[13304,13304],"mapped",[50,53,26085]],[[13305,13305],"mapped",[50,54,26085]],[[13306,13306],"mapped",[50,55,26085]],[[13307,13307],"mapped",[50,56,26085]],[[13308,13308],"mapped",[50,57,26085]],[[13309,13309],"mapped",[51,48,26085]],[[13310,13310],"mapped",[51,49,26085]],[[13311,13311],"mapped",[103,97,108]],[[13312,19893],"valid"],[[19894,19903],"disallowed"],[[19904,19967],"valid",[],"NV8"],[[19968,40869],"valid"],[[40870,40891],"valid"],[[40892,40899],"valid"],[[40900,40907],"valid"],[[40908,40908],"valid"],[[40909,40917],"valid"],[[40918,40959],"disallowed"],[[40960,42124],"valid"],[[42125,42127],"disallowed"],[[42128,42145],"valid",[],"NV8"],[[42146,42147],"valid",[],"NV8"],[[42148,42163],"valid",[],"NV8"],[[42164,42164],"valid",[],"NV8"],[[42165,42176],"valid",[],"NV8"],[[42177,42177],"valid",[],"NV8"],[[42178,42180],"valid",[],"NV8"],[[42181,42181],"valid",[],"NV8"],[[42182,42182],"valid",[],"NV8"],[[42183,42191],"disallowed"],[[42192,42237],"valid"],[[42238,42239],"valid",[],"NV8"],[[42240,42508],"valid"],[[42509,42511],"valid",[],"NV8"],[[42512,42539],"valid"],[[42540,42559],"disallowed"],[[42560,42560],"mapped",[42561]],[[42561,42561],"valid"],[[42562,42562],"mapped",[42563]],[[42563,42563],"valid"],[[42564,42564],"mapped",[42565]],[[42565,42565],"valid"],[[42566,42566],"mapped",[42567]],[[42567,42567],"valid"],[[42568,42568],"mapped",[42569]],[[42569,42569],"valid"],[[42570,42570],"mapped",[42571]],[[42571,42571],"valid"],[[42572,42572],"mapped",[42573]],[[42573,42573],"valid"],[[42574,42574],"mapped",[42575]],[[42575,42575],"valid"],[[42576,42576],"mapped",[42577]],[[42577,42577],"valid"],[[42578,42578],"mapped",[42579]],[[42579,42579],"valid"],[[42580,42580],"mapped",[42581]],[[42581,42581],"valid"],[[42582,42582],"mapped",[42583]],[[42583,42583],"valid"],[[42584,42584],"mapped",[42585]],[[42585,42585],"valid"],[[42586,42586],"mapped",[42587]],[[42587,42587],"valid"],[[42588,42588],"mapped",[42589]],[[42589,42589],"valid"],[[42590,42590],"mapped",[42591]],[[42591,42591],"valid"],[[42592,42592],"mapped",[42593]],[[42593,42593],"valid"],[[42594,42594],"mapped",[42595]],[[42595,42595],"valid"],[[42596,42596],"mapped",[42597]],[[42597,42597],"valid"],[[42598,42598],"mapped",[42599]],[[42599,42599],"valid"],[[42600,42600],"mapped",[42601]],[[42601,42601],"valid"],[[42602,42602],"mapped",[42603]],[[42603,42603],"valid"],[[42604,42604],"mapped",[42605]],[[42605,42607],"valid"],[[42608,42611],"valid",[],"NV8"],[[42612,42619],"valid"],[[42620,42621],"valid"],[[42622,42622],"valid",[],"NV8"],[[42623,42623],"valid"],[[42624,42624],"mapped",[42625]],[[42625,42625],"valid"],[[42626,42626],"mapped",[42627]],[[42627,42627],"valid"],[[42628,42628],"mapped",[42629]],[[42629,42629],"valid"],[[42630,42630],"mapped",[42631]],[[42631,42631],"valid"],[[42632,42632],"mapped",[42633]],[[42633,42633],"valid"],[[42634,42634],"mapped",[42635]],[[42635,42635],"valid"],[[42636,42636],"mapped",[42637]],[[42637,42637],"valid"],[[42638,42638],"mapped",[42639]],[[42639,42639],"valid"],[[42640,42640],"mapped",[42641]],[[42641,42641],"valid"],[[42642,42642],"mapped",[42643]],[[42643,42643],"valid"],[[42644,42644],"mapped",[42645]],[[42645,42645],"valid"],[[42646,42646],"mapped",[42647]],[[42647,42647],"valid"],[[42648,42648],"mapped",[42649]],[[42649,42649],"valid"],[[42650,42650],"mapped",[42651]],[[42651,42651],"valid"],[[42652,42652],"mapped",[1098]],[[42653,42653],"mapped",[1100]],[[42654,42654],"valid"],[[42655,42655],"valid"],[[42656,42725],"valid"],[[42726,42735],"valid",[],"NV8"],[[42736,42737],"valid"],[[42738,42743],"valid",[],"NV8"],[[42744,42751],"disallowed"],[[42752,42774],"valid",[],"NV8"],[[42775,42778],"valid"],[[42779,42783],"valid"],[[42784,42785],"valid",[],"NV8"],[[42786,42786],"mapped",[42787]],[[42787,42787],"valid"],[[42788,42788],"mapped",[42789]],[[42789,42789],"valid"],[[42790,42790],"mapped",[42791]],[[42791,42791],"valid"],[[42792,42792],"mapped",[42793]],[[42793,42793],"valid"],[[42794,42794],"mapped",[42795]],[[42795,42795],"valid"],[[42796,42796],"mapped",[42797]],[[42797,42797],"valid"],[[42798,42798],"mapped",[42799]],[[42799,42801],"valid"],[[42802,42802],"mapped",[42803]],[[42803,42803],"valid"],[[42804,42804],"mapped",[42805]],[[42805,42805],"valid"],[[42806,42806],"mapped",[42807]],[[42807,42807],"valid"],[[42808,42808],"mapped",[42809]],[[42809,42809],"valid"],[[42810,42810],"mapped",[42811]],[[42811,42811],"valid"],[[42812,42812],"mapped",[42813]],[[42813,42813],"valid"],[[42814,42814],"mapped",[42815]],[[42815,42815],"valid"],[[42816,42816],"mapped",[42817]],[[42817,42817],"valid"],[[42818,42818],"mapped",[42819]],[[42819,42819],"valid"],[[42820,42820],"mapped",[42821]],[[42821,42821],"valid"],[[42822,42822],"mapped",[42823]],[[42823,42823],"valid"],[[42824,42824],"mapped",[42825]],[[42825,42825],"valid"],[[42826,42826],"mapped",[42827]],[[42827,42827],"valid"],[[42828,42828],"mapped",[42829]],[[42829,42829],"valid"],[[42830,42830],"mapped",[42831]],[[42831,42831],"valid"],[[42832,42832],"mapped",[42833]],[[42833,42833],"valid"],[[42834,42834],"mapped",[42835]],[[42835,42835],"valid"],[[42836,42836],"mapped",[42837]],[[42837,42837],"valid"],[[42838,42838],"mapped",[42839]],[[42839,42839],"valid"],[[42840,42840],"mapped",[42841]],[[42841,42841],"valid"],[[42842,42842],"mapped",[42843]],[[42843,42843],"valid"],[[42844,42844],"mapped",[42845]],[[42845,42845],"valid"],[[42846,42846],"mapped",[42847]],[[42847,42847],"valid"],[[42848,42848],"mapped",[42849]],[[42849,42849],"valid"],[[42850,42850],"mapped",[42851]],[[42851,42851],"valid"],[[42852,42852],"mapped",[42853]],[[42853,42853],"valid"],[[42854,42854],"mapped",[42855]],[[42855,42855],"valid"],[[42856,42856],"mapped",[42857]],[[42857,42857],"valid"],[[42858,42858],"mapped",[42859]],[[42859,42859],"valid"],[[42860,42860],"mapped",[42861]],[[42861,42861],"valid"],[[42862,42862],"mapped",[42863]],[[42863,42863],"valid"],[[42864,42864],"mapped",[42863]],[[42865,42872],"valid"],[[42873,42873],"mapped",[42874]],[[42874,42874],"valid"],[[42875,42875],"mapped",[42876]],[[42876,42876],"valid"],[[42877,42877],"mapped",[7545]],[[42878,42878],"mapped",[42879]],[[42879,42879],"valid"],[[42880,42880],"mapped",[42881]],[[42881,42881],"valid"],[[42882,42882],"mapped",[42883]],[[42883,42883],"valid"],[[42884,42884],"mapped",[42885]],[[42885,42885],"valid"],[[42886,42886],"mapped",[42887]],[[42887,42888],"valid"],[[42889,42890],"valid",[],"NV8"],[[42891,42891],"mapped",[42892]],[[42892,42892],"valid"],[[42893,42893],"mapped",[613]],[[42894,42894],"valid"],[[42895,42895],"valid"],[[42896,42896],"mapped",[42897]],[[42897,42897],"valid"],[[42898,42898],"mapped",[42899]],[[42899,42899],"valid"],[[42900,42901],"valid"],[[42902,42902],"mapped",[42903]],[[42903,42903],"valid"],[[42904,42904],"mapped",[42905]],[[42905,42905],"valid"],[[42906,42906],"mapped",[42907]],[[42907,42907],"valid"],[[42908,42908],"mapped",[42909]],[[42909,42909],"valid"],[[42910,42910],"mapped",[42911]],[[42911,42911],"valid"],[[42912,42912],"mapped",[42913]],[[42913,42913],"valid"],[[42914,42914],"mapped",[42915]],[[42915,42915],"valid"],[[42916,42916],"mapped",[42917]],[[42917,42917],"valid"],[[42918,42918],"mapped",[42919]],[[42919,42919],"valid"],[[42920,42920],"mapped",[42921]],[[42921,42921],"valid"],[[42922,42922],"mapped",[614]],[[42923,42923],"mapped",[604]],[[42924,42924],"mapped",[609]],[[42925,42925],"mapped",[620]],[[42926,42927],"disallowed"],[[42928,42928],"mapped",[670]],[[42929,42929],"mapped",[647]],[[42930,42930],"mapped",[669]],[[42931,42931],"mapped",[43859]],[[42932,42932],"mapped",[42933]],[[42933,42933],"valid"],[[42934,42934],"mapped",[42935]],[[42935,42935],"valid"],[[42936,42998],"disallowed"],[[42999,42999],"valid"],[[43000,43000],"mapped",[295]],[[43001,43001],"mapped",[339]],[[43002,43002],"valid"],[[43003,43007],"valid"],[[43008,43047],"valid"],[[43048,43051],"valid",[],"NV8"],[[43052,43055],"disallowed"],[[43056,43065],"valid",[],"NV8"],[[43066,43071],"disallowed"],[[43072,43123],"valid"],[[43124,43127],"valid",[],"NV8"],[[43128,43135],"disallowed"],[[43136,43204],"valid"],[[43205,43213],"disallowed"],[[43214,43215],"valid",[],"NV8"],[[43216,43225],"valid"],[[43226,43231],"disallowed"],[[43232,43255],"valid"],[[43256,43258],"valid",[],"NV8"],[[43259,43259],"valid"],[[43260,43260],"valid",[],"NV8"],[[43261,43261],"valid"],[[43262,43263],"disallowed"],[[43264,43309],"valid"],[[43310,43311],"valid",[],"NV8"],[[43312,43347],"valid"],[[43348,43358],"disallowed"],[[43359,43359],"valid",[],"NV8"],[[43360,43388],"valid",[],"NV8"],[[43389,43391],"disallowed"],[[43392,43456],"valid"],[[43457,43469],"valid",[],"NV8"],[[43470,43470],"disallowed"],[[43471,43481],"valid"],[[43482,43485],"disallowed"],[[43486,43487],"valid",[],"NV8"],[[43488,43518],"valid"],[[43519,43519],"disallowed"],[[43520,43574],"valid"],[[43575,43583],"disallowed"],[[43584,43597],"valid"],[[43598,43599],"disallowed"],[[43600,43609],"valid"],[[43610,43611],"disallowed"],[[43612,43615],"valid",[],"NV8"],[[43616,43638],"valid"],[[43639,43641],"valid",[],"NV8"],[[43642,43643],"valid"],[[43644,43647],"valid"],[[43648,43714],"valid"],[[43715,43738],"disallowed"],[[43739,43741],"valid"],[[43742,43743],"valid",[],"NV8"],[[43744,43759],"valid"],[[43760,43761],"valid",[],"NV8"],[[43762,43766],"valid"],[[43767,43776],"disallowed"],[[43777,43782],"valid"],[[43783,43784],"disallowed"],[[43785,43790],"valid"],[[43791,43792],"disallowed"],[[43793,43798],"valid"],[[43799,43807],"disallowed"],[[43808,43814],"valid"],[[43815,43815],"disallowed"],[[43816,43822],"valid"],[[43823,43823],"disallowed"],[[43824,43866],"valid"],[[43867,43867],"valid",[],"NV8"],[[43868,43868],"mapped",[42791]],[[43869,43869],"mapped",[43831]],[[43870,43870],"mapped",[619]],[[43871,43871],"mapped",[43858]],[[43872,43875],"valid"],[[43876,43877],"valid"],[[43878,43887],"disallowed"],[[43888,43888],"mapped",[5024]],[[43889,43889],"mapped",[5025]],[[43890,43890],"mapped",[5026]],[[43891,43891],"mapped",[5027]],[[43892,43892],"mapped",[5028]],[[43893,43893],"mapped",[5029]],[[43894,43894],"mapped",[5030]],[[43895,43895],"mapped",[5031]],[[43896,43896],"mapped",[5032]],[[43897,43897],"mapped",[5033]],[[43898,43898],"mapped",[5034]],[[43899,43899],"mapped",[5035]],[[43900,43900],"mapped",[5036]],[[43901,43901],"mapped",[5037]],[[43902,43902],"mapped",[5038]],[[43903,43903],"mapped",[5039]],[[43904,43904],"mapped",[5040]],[[43905,43905],"mapped",[5041]],[[43906,43906],"mapped",[5042]],[[43907,43907],"mapped",[5043]],[[43908,43908],"mapped",[5044]],[[43909,43909],"mapped",[5045]],[[43910,43910],"mapped",[5046]],[[43911,43911],"mapped",[5047]],[[43912,43912],"mapped",[5048]],[[43913,43913],"mapped",[5049]],[[43914,43914],"mapped",[5050]],[[43915,43915],"mapped",[5051]],[[43916,43916],"mapped",[5052]],[[43917,43917],"mapped",[5053]],[[43918,43918],"mapped",[5054]],[[43919,43919],"mapped",[5055]],[[43920,43920],"mapped",[5056]],[[43921,43921],"mapped",[5057]],[[43922,43922],"mapped",[5058]],[[43923,43923],"mapped",[5059]],[[43924,43924],"mapped",[5060]],[[43925,43925],"mapped",[5061]],[[43926,43926],"mapped",[5062]],[[43927,43927],"mapped",[5063]],[[43928,43928],"mapped",[5064]],[[43929,43929],"mapped",[5065]],[[43930,43930],"mapped",[5066]],[[43931,43931],"mapped",[5067]],[[43932,43932],"mapped",[5068]],[[43933,43933],"mapped",[5069]],[[43934,43934],"mapped",[5070]],[[43935,43935],"mapped",[5071]],[[43936,43936],"mapped",[5072]],[[43937,43937],"mapped",[5073]],[[43938,43938],"mapped",[5074]],[[43939,43939],"mapped",[5075]],[[43940,43940],"mapped",[5076]],[[43941,43941],"mapped",[5077]],[[43942,43942],"mapped",[5078]],[[43943,43943],"mapped",[5079]],[[43944,43944],"mapped",[5080]],[[43945,43945],"mapped",[5081]],[[43946,43946],"mapped",[5082]],[[43947,43947],"mapped",[5083]],[[43948,43948],"mapped",[5084]],[[43949,43949],"mapped",[5085]],[[43950,43950],"mapped",[5086]],[[43951,43951],"mapped",[5087]],[[43952,43952],"mapped",[5088]],[[43953,43953],"mapped",[5089]],[[43954,43954],"mapped",[5090]],[[43955,43955],"mapped",[5091]],[[43956,43956],"mapped",[5092]],[[43957,43957],"mapped",[5093]],[[43958,43958],"mapped",[5094]],[[43959,43959],"mapped",[5095]],[[43960,43960],"mapped",[5096]],[[43961,43961],"mapped",[5097]],[[43962,43962],"mapped",[5098]],[[43963,43963],"mapped",[5099]],[[43964,43964],"mapped",[5100]],[[43965,43965],"mapped",[5101]],[[43966,43966],"mapped",[5102]],[[43967,43967],"mapped",[5103]],[[43968,44010],"valid"],[[44011,44011],"valid",[],"NV8"],[[44012,44013],"valid"],[[44014,44015],"disallowed"],[[44016,44025],"valid"],[[44026,44031],"disallowed"],[[44032,55203],"valid"],[[55204,55215],"disallowed"],[[55216,55238],"valid",[],"NV8"],[[55239,55242],"disallowed"],[[55243,55291],"valid",[],"NV8"],[[55292,55295],"disallowed"],[[55296,57343],"disallowed"],[[57344,63743],"disallowed"],[[63744,63744],"mapped",[35912]],[[63745,63745],"mapped",[26356]],[[63746,63746],"mapped",[36554]],[[63747,63747],"mapped",[36040]],[[63748,63748],"mapped",[28369]],[[63749,63749],"mapped",[20018]],[[63750,63750],"mapped",[21477]],[[63751,63752],"mapped",[40860]],[[63753,63753],"mapped",[22865]],[[63754,63754],"mapped",[37329]],[[63755,63755],"mapped",[21895]],[[63756,63756],"mapped",[22856]],[[63757,63757],"mapped",[25078]],[[63758,63758],"mapped",[30313]],[[63759,63759],"mapped",[32645]],[[63760,63760],"mapped",[34367]],[[63761,63761],"mapped",[34746]],[[63762,63762],"mapped",[35064]],[[63763,63763],"mapped",[37007]],[[63764,63764],"mapped",[27138]],[[63765,63765],"mapped",[27931]],[[63766,63766],"mapped",[28889]],[[63767,63767],"mapped",[29662]],[[63768,63768],"mapped",[33853]],[[63769,63769],"mapped",[37226]],[[63770,63770],"mapped",[39409]],[[63771,63771],"mapped",[20098]],[[63772,63772],"mapped",[21365]],[[63773,63773],"mapped",[27396]],[[63774,63774],"mapped",[29211]],[[63775,63775],"mapped",[34349]],[[63776,63776],"mapped",[40478]],[[63777,63777],"mapped",[23888]],[[63778,63778],"mapped",[28651]],[[63779,63779],"mapped",[34253]],[[63780,63780],"mapped",[35172]],[[63781,63781],"mapped",[25289]],[[63782,63782],"mapped",[33240]],[[63783,63783],"mapped",[34847]],[[63784,63784],"mapped",[24266]],[[63785,63785],"mapped",[26391]],[[63786,63786],"mapped",[28010]],[[63787,63787],"mapped",[29436]],[[63788,63788],"mapped",[37070]],[[63789,63789],"mapped",[20358]],[[63790,63790],"mapped",[20919]],[[63791,63791],"mapped",[21214]],[[63792,63792],"mapped",[25796]],[[63793,63793],"mapped",[27347]],[[63794,63794],"mapped",[29200]],[[63795,63795],"mapped",[30439]],[[63796,63796],"mapped",[32769]],[[63797,63797],"mapped",[34310]],[[63798,63798],"mapped",[34396]],[[63799,63799],"mapped",[36335]],[[63800,63800],"mapped",[38706]],[[63801,63801],"mapped",[39791]],[[63802,63802],"mapped",[40442]],[[63803,63803],"mapped",[30860]],[[63804,63804],"mapped",[31103]],[[63805,63805],"mapped",[32160]],[[63806,63806],"mapped",[33737]],[[63807,63807],"mapped",[37636]],[[63808,63808],"mapped",[40575]],[[63809,63809],"mapped",[35542]],[[63810,63810],"mapped",[22751]],[[63811,63811],"mapped",[24324]],[[63812,63812],"mapped",[31840]],[[63813,63813],"mapped",[32894]],[[63814,63814],"mapped",[29282]],[[63815,63815],"mapped",[30922]],[[63816,63816],"mapped",[36034]],[[63817,63817],"mapped",[38647]],[[63818,63818],"mapped",[22744]],[[63819,63819],"mapped",[23650]],[[63820,63820],"mapped",[27155]],[[63821,63821],"mapped",[28122]],[[63822,63822],"mapped",[28431]],[[63823,63823],"mapped",[32047]],[[63824,63824],"mapped",[32311]],[[63825,63825],"mapped",[38475]],[[63826,63826],"mapped",[21202]],[[63827,63827],"mapped",[32907]],[[63828,63828],"mapped",[20956]],[[63829,63829],"mapped",[20940]],[[63830,63830],"mapped",[31260]],[[63831,63831],"mapped",[32190]],[[63832,63832],"mapped",[33777]],[[63833,63833],"mapped",[38517]],[[63834,63834],"mapped",[35712]],[[63835,63835],"mapped",[25295]],[[63836,63836],"mapped",[27138]],[[63837,63837],"mapped",[35582]],[[63838,63838],"mapped",[20025]],[[63839,63839],"mapped",[23527]],[[63840,63840],"mapped",[24594]],[[63841,63841],"mapped",[29575]],[[63842,63842],"mapped",[30064]],[[63843,63843],"mapped",[21271]],[[63844,63844],"mapped",[30971]],[[63845,63845],"mapped",[20415]],[[63846,63846],"mapped",[24489]],[[63847,63847],"mapped",[19981]],[[63848,63848],"mapped",[27852]],[[63849,63849],"mapped",[25976]],[[63850,63850],"mapped",[32034]],[[63851,63851],"mapped",[21443]],[[63852,63852],"mapped",[22622]],[[63853,63853],"mapped",[30465]],[[63854,63854],"mapped",[33865]],[[63855,63855],"mapped",[35498]],[[63856,63856],"mapped",[27578]],[[63857,63857],"mapped",[36784]],[[63858,63858],"mapped",[27784]],[[63859,63859],"mapped",[25342]],[[63860,63860],"mapped",[33509]],[[63861,63861],"mapped",[25504]],[[63862,63862],"mapped",[30053]],[[63863,63863],"mapped",[20142]],[[63864,63864],"mapped",[20841]],[[63865,63865],"mapped",[20937]],[[63866,63866],"mapped",[26753]],[[63867,63867],"mapped",[31975]],[[63868,63868],"mapped",[33391]],[[63869,63869],"mapped",[35538]],[[63870,63870],"mapped",[37327]],[[63871,63871],"mapped",[21237]],[[63872,63872],"mapped",[21570]],[[63873,63873],"mapped",[22899]],[[63874,63874],"mapped",[24300]],[[63875,63875],"mapped",[26053]],[[63876,63876],"mapped",[28670]],[[63877,63877],"mapped",[31018]],[[63878,63878],"mapped",[38317]],[[63879,63879],"mapped",[39530]],[[63880,63880],"mapped",[40599]],[[63881,63881],"mapped",[40654]],[[63882,63882],"mapped",[21147]],[[63883,63883],"mapped",[26310]],[[63884,63884],"mapped",[27511]],[[63885,63885],"mapped",[36706]],[[63886,63886],"mapped",[24180]],[[63887,63887],"mapped",[24976]],[[63888,63888],"mapped",[25088]],[[63889,63889],"mapped",[25754]],[[63890,63890],"mapped",[28451]],[[63891,63891],"mapped",[29001]],[[63892,63892],"mapped",[29833]],[[63893,63893],"mapped",[31178]],[[63894,63894],"mapped",[32244]],[[63895,63895],"mapped",[32879]],[[63896,63896],"mapped",[36646]],[[63897,63897],"mapped",[34030]],[[63898,63898],"mapped",[36899]],[[63899,63899],"mapped",[37706]],[[63900,63900],"mapped",[21015]],[[63901,63901],"mapped",[21155]],[[63902,63902],"mapped",[21693]],[[63903,63903],"mapped",[28872]],[[63904,63904],"mapped",[35010]],[[63905,63905],"mapped",[35498]],[[63906,63906],"mapped",[24265]],[[63907,63907],"mapped",[24565]],[[63908,63908],"mapped",[25467]],[[63909,63909],"mapped",[27566]],[[63910,63910],"mapped",[31806]],[[63911,63911],"mapped",[29557]],[[63912,63912],"mapped",[20196]],[[63913,63913],"mapped",[22265]],[[63914,63914],"mapped",[23527]],[[63915,63915],"mapped",[23994]],[[63916,63916],"mapped",[24604]],[[63917,63917],"mapped",[29618]],[[63918,63918],"mapped",[29801]],[[63919,63919],"mapped",[32666]],[[63920,63920],"mapped",[32838]],[[63921,63921],"mapped",[37428]],[[63922,63922],"mapped",[38646]],[[63923,63923],"mapped",[38728]],[[63924,63924],"mapped",[38936]],[[63925,63925],"mapped",[20363]],[[63926,63926],"mapped",[31150]],[[63927,63927],"mapped",[37300]],[[63928,63928],"mapped",[38584]],[[63929,63929],"mapped",[24801]],[[63930,63930],"mapped",[20102]],[[63931,63931],"mapped",[20698]],[[63932,63932],"mapped",[23534]],[[63933,63933],"mapped",[23615]],[[63934,63934],"mapped",[26009]],[[63935,63935],"mapped",[27138]],[[63936,63936],"mapped",[29134]],[[63937,63937],"mapped",[30274]],[[63938,63938],"mapped",[34044]],[[63939,63939],"mapped",[36988]],[[63940,63940],"mapped",[40845]],[[63941,63941],"mapped",[26248]],[[63942,63942],"mapped",[38446]],[[63943,63943],"mapped",[21129]],[[63944,63944],"mapped",[26491]],[[63945,63945],"mapped",[26611]],[[63946,63946],"mapped",[27969]],[[63947,63947],"mapped",[28316]],[[63948,63948],"mapped",[29705]],[[63949,63949],"mapped",[30041]],[[63950,63950],"mapped",[30827]],[[63951,63951],"mapped",[32016]],[[63952,63952],"mapped",[39006]],[[63953,63953],"mapped",[20845]],[[63954,63954],"mapped",[25134]],[[63955,63955],"mapped",[38520]],[[63956,63956],"mapped",[20523]],[[63957,63957],"mapped",[23833]],[[63958,63958],"mapped",[28138]],[[63959,63959],"mapped",[36650]],[[63960,63960],"mapped",[24459]],[[63961,63961],"mapped",[24900]],[[63962,63962],"mapped",[26647]],[[63963,63963],"mapped",[29575]],[[63964,63964],"mapped",[38534]],[[63965,63965],"mapped",[21033]],[[63966,63966],"mapped",[21519]],[[63967,63967],"mapped",[23653]],[[63968,63968],"mapped",[26131]],[[63969,63969],"mapped",[26446]],[[63970,63970],"mapped",[26792]],[[63971,63971],"mapped",[27877]],[[63972,63972],"mapped",[29702]],[[63973,63973],"mapped",[30178]],[[63974,63974],"mapped",[32633]],[[63975,63975],"mapped",[35023]],[[63976,63976],"mapped",[35041]],[[63977,63977],"mapped",[37324]],[[63978,63978],"mapped",[38626]],[[63979,63979],"mapped",[21311]],[[63980,63980],"mapped",[28346]],[[63981,63981],"mapped",[21533]],[[63982,63982],"mapped",[29136]],[[63983,63983],"mapped",[29848]],[[63984,63984],"mapped",[34298]],[[63985,63985],"mapped",[38563]],[[63986,63986],"mapped",[40023]],[[63987,63987],"mapped",[40607]],[[63988,63988],"mapped",[26519]],[[63989,63989],"mapped",[28107]],[[63990,63990],"mapped",[33256]],[[63991,63991],"mapped",[31435]],[[63992,63992],"mapped",[31520]],[[63993,63993],"mapped",[31890]],[[63994,63994],"mapped",[29376]],[[63995,63995],"mapped",[28825]],[[63996,63996],"mapped",[35672]],[[63997,63997],"mapped",[20160]],[[63998,63998],"mapped",[33590]],[[63999,63999],"mapped",[21050]],[[64000,64000],"mapped",[20999]],[[64001,64001],"mapped",[24230]],[[64002,64002],"mapped",[25299]],[[64003,64003],"mapped",[31958]],[[64004,64004],"mapped",[23429]],[[64005,64005],"mapped",[27934]],[[64006,64006],"mapped",[26292]],[[64007,64007],"mapped",[36667]],[[64008,64008],"mapped",[34892]],[[64009,64009],"mapped",[38477]],[[64010,64010],"mapped",[35211]],[[64011,64011],"mapped",[24275]],[[64012,64012],"mapped",[20800]],[[64013,64013],"mapped",[21952]],[[64014,64015],"valid"],[[64016,64016],"mapped",[22618]],[[64017,64017],"valid"],[[64018,64018],"mapped",[26228]],[[64019,64020],"valid"],[[64021,64021],"mapped",[20958]],[[64022,64022],"mapped",[29482]],[[64023,64023],"mapped",[30410]],[[64024,64024],"mapped",[31036]],[[64025,64025],"mapped",[31070]],[[64026,64026],"mapped",[31077]],[[64027,64027],"mapped",[31119]],[[64028,64028],"mapped",[38742]],[[64029,64029],"mapped",[31934]],[[64030,64030],"mapped",[32701]],[[64031,64031],"valid"],[[64032,64032],"mapped",[34322]],[[64033,64033],"valid"],[[64034,64034],"mapped",[35576]],[[64035,64036],"valid"],[[64037,64037],"mapped",[36920]],[[64038,64038],"mapped",[37117]],[[64039,64041],"valid"],[[64042,64042],"mapped",[39151]],[[64043,64043],"mapped",[39164]],[[64044,64044],"mapped",[39208]],[[64045,64045],"mapped",[40372]],[[64046,64046],"mapped",[37086]],[[64047,64047],"mapped",[38583]],[[64048,64048],"mapped",[20398]],[[64049,64049],"mapped",[20711]],[[64050,64050],"mapped",[20813]],[[64051,64051],"mapped",[21193]],[[64052,64052],"mapped",[21220]],[[64053,64053],"mapped",[21329]],[[64054,64054],"mapped",[21917]],[[64055,64055],"mapped",[22022]],[[64056,64056],"mapped",[22120]],[[64057,64057],"mapped",[22592]],[[64058,64058],"mapped",[22696]],[[64059,64059],"mapped",[23652]],[[64060,64060],"mapped",[23662]],[[64061,64061],"mapped",[24724]],[[64062,64062],"mapped",[24936]],[[64063,64063],"mapped",[24974]],[[64064,64064],"mapped",[25074]],[[64065,64065],"mapped",[25935]],[[64066,64066],"mapped",[26082]],[[64067,64067],"mapped",[26257]],[[64068,64068],"mapped",[26757]],[[64069,64069],"mapped",[28023]],[[64070,64070],"mapped",[28186]],[[64071,64071],"mapped",[28450]],[[64072,64072],"mapped",[29038]],[[64073,64073],"mapped",[29227]],[[64074,64074],"mapped",[29730]],[[64075,64075],"mapped",[30865]],[[64076,64076],"mapped",[31038]],[[64077,64077],"mapped",[31049]],[[64078,64078],"mapped",[31048]],[[64079,64079],"mapped",[31056]],[[64080,64080],"mapped",[31062]],[[64081,64081],"mapped",[31069]],[[64082,64082],"mapped",[31117]],[[64083,64083],"mapped",[31118]],[[64084,64084],"mapped",[31296]],[[64085,64085],"mapped",[31361]],[[64086,64086],"mapped",[31680]],[[64087,64087],"mapped",[32244]],[[64088,64088],"mapped",[32265]],[[64089,64089],"mapped",[32321]],[[64090,64090],"mapped",[32626]],[[64091,64091],"mapped",[32773]],[[64092,64092],"mapped",[33261]],[[64093,64094],"mapped",[33401]],[[64095,64095],"mapped",[33879]],[[64096,64096],"mapped",[35088]],[[64097,64097],"mapped",[35222]],[[64098,64098],"mapped",[35585]],[[64099,64099],"mapped",[35641]],[[64100,64100],"mapped",[36051]],[[64101,64101],"mapped",[36104]],[[64102,64102],"mapped",[36790]],[[64103,64103],"mapped",[36920]],[[64104,64104],"mapped",[38627]],[[64105,64105],"mapped",[38911]],[[64106,64106],"mapped",[38971]],[[64107,64107],"mapped",[24693]],[[64108,64108],"mapped",[148206]],[[64109,64109],"mapped",[33304]],[[64110,64111],"disallowed"],[[64112,64112],"mapped",[20006]],[[64113,64113],"mapped",[20917]],[[64114,64114],"mapped",[20840]],[[64115,64115],"mapped",[20352]],[[64116,64116],"mapped",[20805]],[[64117,64117],"mapped",[20864]],[[64118,64118],"mapped",[21191]],[[64119,64119],"mapped",[21242]],[[64120,64120],"mapped",[21917]],[[64121,64121],"mapped",[21845]],[[64122,64122],"mapped",[21913]],[[64123,64123],"mapped",[21986]],[[64124,64124],"mapped",[22618]],[[64125,64125],"mapped",[22707]],[[64126,64126],"mapped",[22852]],[[64127,64127],"mapped",[22868]],[[64128,64128],"mapped",[23138]],[[64129,64129],"mapped",[23336]],[[64130,64130],"mapped",[24274]],[[64131,64131],"mapped",[24281]],[[64132,64132],"mapped",[24425]],[[64133,64133],"mapped",[24493]],[[64134,64134],"mapped",[24792]],[[64135,64135],"mapped",[24910]],[[64136,64136],"mapped",[24840]],[[64137,64137],"mapped",[24974]],[[64138,64138],"mapped",[24928]],[[64139,64139],"mapped",[25074]],[[64140,64140],"mapped",[25140]],[[64141,64141],"mapped",[25540]],[[64142,64142],"mapped",[25628]],[[64143,64143],"mapped",[25682]],[[64144,64144],"mapped",[25942]],[[64145,64145],"mapped",[26228]],[[64146,64146],"mapped",[26391]],[[64147,64147],"mapped",[26395]],[[64148,64148],"mapped",[26454]],[[64149,64149],"mapped",[27513]],[[64150,64150],"mapped",[27578]],[[64151,64151],"mapped",[27969]],[[64152,64152],"mapped",[28379]],[[64153,64153],"mapped",[28363]],[[64154,64154],"mapped",[28450]],[[64155,64155],"mapped",[28702]],[[64156,64156],"mapped",[29038]],[[64157,64157],"mapped",[30631]],[[64158,64158],"mapped",[29237]],[[64159,64159],"mapped",[29359]],[[64160,64160],"mapped",[29482]],[[64161,64161],"mapped",[29809]],[[64162,64162],"mapped",[29958]],[[64163,64163],"mapped",[30011]],[[64164,64164],"mapped",[30237]],[[64165,64165],"mapped",[30239]],[[64166,64166],"mapped",[30410]],[[64167,64167],"mapped",[30427]],[[64168,64168],"mapped",[30452]],[[64169,64169],"mapped",[30538]],[[64170,64170],"mapped",[30528]],[[64171,64171],"mapped",[30924]],[[64172,64172],"mapped",[31409]],[[64173,64173],"mapped",[31680]],[[64174,64174],"mapped",[31867]],[[64175,64175],"mapped",[32091]],[[64176,64176],"mapped",[32244]],[[64177,64177],"mapped",[32574]],[[64178,64178],"mapped",[32773]],[[64179,64179],"mapped",[33618]],[[64180,64180],"mapped",[33775]],[[64181,64181],"mapped",[34681]],[[64182,64182],"mapped",[35137]],[[64183,64183],"mapped",[35206]],[[64184,64184],"mapped",[35222]],[[64185,64185],"mapped",[35519]],[[64186,64186],"mapped",[35576]],[[64187,64187],"mapped",[35531]],[[64188,64188],"mapped",[35585]],[[64189,64189],"mapped",[35582]],[[64190,64190],"mapped",[35565]],[[64191,64191],"mapped",[35641]],[[64192,64192],"mapped",[35722]],[[64193,64193],"mapped",[36104]],[[64194,64194],"mapped",[36664]],[[64195,64195],"mapped",[36978]],[[64196,64196],"mapped",[37273]],[[64197,64197],"mapped",[37494]],[[64198,64198],"mapped",[38524]],[[64199,64199],"mapped",[38627]],[[64200,64200],"mapped",[38742]],[[64201,64201],"mapped",[38875]],[[64202,64202],"mapped",[38911]],[[64203,64203],"mapped",[38923]],[[64204,64204],"mapped",[38971]],[[64205,64205],"mapped",[39698]],[[64206,64206],"mapped",[40860]],[[64207,64207],"mapped",[141386]],[[64208,64208],"mapped",[141380]],[[64209,64209],"mapped",[144341]],[[64210,64210],"mapped",[15261]],[[64211,64211],"mapped",[16408]],[[64212,64212],"mapped",[16441]],[[64213,64213],"mapped",[152137]],[[64214,64214],"mapped",[154832]],[[64215,64215],"mapped",[163539]],[[64216,64216],"mapped",[40771]],[[64217,64217],"mapped",[40846]],[[64218,64255],"disallowed"],[[64256,64256],"mapped",[102,102]],[[64257,64257],"mapped",[102,105]],[[64258,64258],"mapped",[102,108]],[[64259,64259],"mapped",[102,102,105]],[[64260,64260],"mapped",[102,102,108]],[[64261,64262],"mapped",[115,116]],[[64263,64274],"disallowed"],[[64275,64275],"mapped",[1396,1398]],[[64276,64276],"mapped",[1396,1381]],[[64277,64277],"mapped",[1396,1387]],[[64278,64278],"mapped",[1406,1398]],[[64279,64279],"mapped",[1396,1389]],[[64280,64284],"disallowed"],[[64285,64285],"mapped",[1497,1460]],[[64286,64286],"valid"],[[64287,64287],"mapped",[1522,1463]],[[64288,64288],"mapped",[1506]],[[64289,64289],"mapped",[1488]],[[64290,64290],"mapped",[1491]],[[64291,64291],"mapped",[1492]],[[64292,64292],"mapped",[1499]],[[64293,64293],"mapped",[1500]],[[64294,64294],"mapped",[1501]],[[64295,64295],"mapped",[1512]],[[64296,64296],"mapped",[1514]],[[64297,64297],"disallowed_STD3_mapped",[43]],[[64298,64298],"mapped",[1513,1473]],[[64299,64299],"mapped",[1513,1474]],[[64300,64300],"mapped",[1513,1468,1473]],[[64301,64301],"mapped",[1513,1468,1474]],[[64302,64302],"mapped",[1488,1463]],[[64303,64303],"mapped",[1488,1464]],[[64304,64304],"mapped",[1488,1468]],[[64305,64305],"mapped",[1489,1468]],[[64306,64306],"mapped",[1490,1468]],[[64307,64307],"mapped",[1491,1468]],[[64308,64308],"mapped",[1492,1468]],[[64309,64309],"mapped",[1493,1468]],[[64310,64310],"mapped",[1494,1468]],[[64311,64311],"disallowed"],[[64312,64312],"mapped",[1496,1468]],[[64313,64313],"mapped",[1497,1468]],[[64314,64314],"mapped",[1498,1468]],[[64315,64315],"mapped",[1499,1468]],[[64316,64316],"mapped",[1500,1468]],[[64317,64317],"disallowed"],[[64318,64318],"mapped",[1502,1468]],[[64319,64319],"disallowed"],[[64320,64320],"mapped",[1504,1468]],[[64321,64321],"mapped",[1505,1468]],[[64322,64322],"disallowed"],[[64323,64323],"mapped",[1507,1468]],[[64324,64324],"mapped",[1508,1468]],[[64325,64325],"disallowed"],[[64326,64326],"mapped",[1510,1468]],[[64327,64327],"mapped",[1511,1468]],[[64328,64328],"mapped",[1512,1468]],[[64329,64329],"mapped",[1513,1468]],[[64330,64330],"mapped",[1514,1468]],[[64331,64331],"mapped",[1493,1465]],[[64332,64332],"mapped",[1489,1471]],[[64333,64333],"mapped",[1499,1471]],[[64334,64334],"mapped",[1508,1471]],[[64335,64335],"mapped",[1488,1500]],[[64336,64337],"mapped",[1649]],[[64338,64341],"mapped",[1659]],[[64342,64345],"mapped",[1662]],[[64346,64349],"mapped",[1664]],[[64350,64353],"mapped",[1658]],[[64354,64357],"mapped",[1663]],[[64358,64361],"mapped",[1657]],[[64362,64365],"mapped",[1700]],[[64366,64369],"mapped",[1702]],[[64370,64373],"mapped",[1668]],[[64374,64377],"mapped",[1667]],[[64378,64381],"mapped",[1670]],[[64382,64385],"mapped",[1671]],[[64386,64387],"mapped",[1677]],[[64388,64389],"mapped",[1676]],[[64390,64391],"mapped",[1678]],[[64392,64393],"mapped",[1672]],[[64394,64395],"mapped",[1688]],[[64396,64397],"mapped",[1681]],[[64398,64401],"mapped",[1705]],[[64402,64405],"mapped",[1711]],[[64406,64409],"mapped",[1715]],[[64410,64413],"mapped",[1713]],[[64414,64415],"mapped",[1722]],[[64416,64419],"mapped",[1723]],[[64420,64421],"mapped",[1728]],[[64422,64425],"mapped",[1729]],[[64426,64429],"mapped",[1726]],[[64430,64431],"mapped",[1746]],[[64432,64433],"mapped",[1747]],[[64434,64449],"valid",[],"NV8"],[[64450,64466],"disallowed"],[[64467,64470],"mapped",[1709]],[[64471,64472],"mapped",[1735]],[[64473,64474],"mapped",[1734]],[[64475,64476],"mapped",[1736]],[[64477,64477],"mapped",[1735,1652]],[[64478,64479],"mapped",[1739]],[[64480,64481],"mapped",[1733]],[[64482,64483],"mapped",[1737]],[[64484,64487],"mapped",[1744]],[[64488,64489],"mapped",[1609]],[[64490,64491],"mapped",[1574,1575]],[[64492,64493],"mapped",[1574,1749]],[[64494,64495],"mapped",[1574,1608]],[[64496,64497],"mapped",[1574,1735]],[[64498,64499],"mapped",[1574,1734]],[[64500,64501],"mapped",[1574,1736]],[[64502,64504],"mapped",[1574,1744]],[[64505,64507],"mapped",[1574,1609]],[[64508,64511],"mapped",[1740]],[[64512,64512],"mapped",[1574,1580]],[[64513,64513],"mapped",[1574,1581]],[[64514,64514],"mapped",[1574,1605]],[[64515,64515],"mapped",[1574,1609]],[[64516,64516],"mapped",[1574,1610]],[[64517,64517],"mapped",[1576,1580]],[[64518,64518],"mapped",[1576,1581]],[[64519,64519],"mapped",[1576,1582]],[[64520,64520],"mapped",[1576,1605]],[[64521,64521],"mapped",[1576,1609]],[[64522,64522],"mapped",[1576,1610]],[[64523,64523],"mapped",[1578,1580]],[[64524,64524],"mapped",[1578,1581]],[[64525,64525],"mapped",[1578,1582]],[[64526,64526],"mapped",[1578,1605]],[[64527,64527],"mapped",[1578,1609]],[[64528,64528],"mapped",[1578,1610]],[[64529,64529],"mapped",[1579,1580]],[[64530,64530],"mapped",[1579,1605]],[[64531,64531],"mapped",[1579,1609]],[[64532,64532],"mapped",[1579,1610]],[[64533,64533],"mapped",[1580,1581]],[[64534,64534],"mapped",[1580,1605]],[[64535,64535],"mapped",[1581,1580]],[[64536,64536],"mapped",[1581,1605]],[[64537,64537],"mapped",[1582,1580]],[[64538,64538],"mapped",[1582,1581]],[[64539,64539],"mapped",[1582,1605]],[[64540,64540],"mapped",[1587,1580]],[[64541,64541],"mapped",[1587,1581]],[[64542,64542],"mapped",[1587,1582]],[[64543,64543],"mapped",[1587,1605]],[[64544,64544],"mapped",[1589,1581]],[[64545,64545],"mapped",[1589,1605]],[[64546,64546],"mapped",[1590,1580]],[[64547,64547],"mapped",[1590,1581]],[[64548,64548],"mapped",[1590,1582]],[[64549,64549],"mapped",[1590,1605]],[[64550,64550],"mapped",[1591,1581]],[[64551,64551],"mapped",[1591,1605]],[[64552,64552],"mapped",[1592,1605]],[[64553,64553],"mapped",[1593,1580]],[[64554,64554],"mapped",[1593,1605]],[[64555,64555],"mapped",[1594,1580]],[[64556,64556],"mapped",[1594,1605]],[[64557,64557],"mapped",[1601,1580]],[[64558,64558],"mapped",[1601,1581]],[[64559,64559],"mapped",[1601,1582]],[[64560,64560],"mapped",[1601,1605]],[[64561,64561],"mapped",[1601,1609]],[[64562,64562],"mapped",[1601,1610]],[[64563,64563],"mapped",[1602,1581]],[[64564,64564],"mapped",[1602,1605]],[[64565,64565],"mapped",[1602,1609]],[[64566,64566],"mapped",[1602,1610]],[[64567,64567],"mapped",[1603,1575]],[[64568,64568],"mapped",[1603,1580]],[[64569,64569],"mapped",[1603,1581]],[[64570,64570],"mapped",[1603,1582]],[[64571,64571],"mapped",[1603,1604]],[[64572,64572],"mapped",[1603,1605]],[[64573,64573],"mapped",[1603,1609]],[[64574,64574],"mapped",[1603,1610]],[[64575,64575],"mapped",[1604,1580]],[[64576,64576],"mapped",[1604,1581]],[[64577,64577],"mapped",[1604,1582]],[[64578,64578],"mapped",[1604,1605]],[[64579,64579],"mapped",[1604,1609]],[[64580,64580],"mapped",[1604,1610]],[[64581,64581],"mapped",[1605,1580]],[[64582,64582],"mapped",[1605,1581]],[[64583,64583],"mapped",[1605,1582]],[[64584,64584],"mapped",[1605,1605]],[[64585,64585],"mapped",[1605,1609]],[[64586,64586],"mapped",[1605,1610]],[[64587,64587],"mapped",[1606,1580]],[[64588,64588],"mapped",[1606,1581]],[[64589,64589],"mapped",[1606,1582]],[[64590,64590],"mapped",[1606,1605]],[[64591,64591],"mapped",[1606,1609]],[[64592,64592],"mapped",[1606,1610]],[[64593,64593],"mapped",[1607,1580]],[[64594,64594],"mapped",[1607,1605]],[[64595,64595],"mapped",[1607,1609]],[[64596,64596],"mapped",[1607,1610]],[[64597,64597],"mapped",[1610,1580]],[[64598,64598],"mapped",[1610,1581]],[[64599,64599],"mapped",[1610,1582]],[[64600,64600],"mapped",[1610,1605]],[[64601,64601],"mapped",[1610,1609]],[[64602,64602],"mapped",[1610,1610]],[[64603,64603],"mapped",[1584,1648]],[[64604,64604],"mapped",[1585,1648]],[[64605,64605],"mapped",[1609,1648]],[[64606,64606],"disallowed_STD3_mapped",[32,1612,1617]],[[64607,64607],"disallowed_STD3_mapped",[32,1613,1617]],[[64608,64608],"disallowed_STD3_mapped",[32,1614,1617]],[[64609,64609],"disallowed_STD3_mapped",[32,1615,1617]],[[64610,64610],"disallowed_STD3_mapped",[32,1616,1617]],[[64611,64611],"disallowed_STD3_mapped",[32,1617,1648]],[[64612,64612],"mapped",[1574,1585]],[[64613,64613],"mapped",[1574,1586]],[[64614,64614],"mapped",[1574,1605]],[[64615,64615],"mapped",[1574,1606]],[[64616,64616],"mapped",[1574,1609]],[[64617,64617],"mapped",[1574,1610]],[[64618,64618],"mapped",[1576,1585]],[[64619,64619],"mapped",[1576,1586]],[[64620,64620],"mapped",[1576,1605]],[[64621,64621],"mapped",[1576,1606]],[[64622,64622],"mapped",[1576,1609]],[[64623,64623],"mapped",[1576,1610]],[[64624,64624],"mapped",[1578,1585]],[[64625,64625],"mapped",[1578,1586]],[[64626,64626],"mapped",[1578,1605]],[[64627,64627],"mapped",[1578,1606]],[[64628,64628],"mapped",[1578,1609]],[[64629,64629],"mapped",[1578,1610]],[[64630,64630],"mapped",[1579,1585]],[[64631,64631],"mapped",[1579,1586]],[[64632,64632],"mapped",[1579,1605]],[[64633,64633],"mapped",[1579,1606]],[[64634,64634],"mapped",[1579,1609]],[[64635,64635],"mapped",[1579,1610]],[[64636,64636],"mapped",[1601,1609]],[[64637,64637],"mapped",[1601,1610]],[[64638,64638],"mapped",[1602,1609]],[[64639,64639],"mapped",[1602,1610]],[[64640,64640],"mapped",[1603,1575]],[[64641,64641],"mapped",[1603,1604]],[[64642,64642],"mapped",[1603,1605]],[[64643,64643],"mapped",[1603,1609]],[[64644,64644],"mapped",[1603,1610]],[[64645,64645],"mapped",[1604,1605]],[[64646,64646],"mapped",[1604,1609]],[[64647,64647],"mapped",[1604,1610]],[[64648,64648],"mapped",[1605,1575]],[[64649,64649],"mapped",[1605,1605]],[[64650,64650],"mapped",[1606,1585]],[[64651,64651],"mapped",[1606,1586]],[[64652,64652],"mapped",[1606,1605]],[[64653,64653],"mapped",[1606,1606]],[[64654,64654],"mapped",[1606,1609]],[[64655,64655],"mapped",[1606,1610]],[[64656,64656],"mapped",[1609,1648]],[[64657,64657],"mapped",[1610,1585]],[[64658,64658],"mapped",[1610,1586]],[[64659,64659],"mapped",[1610,1605]],[[64660,64660],"mapped",[1610,1606]],[[64661,64661],"mapped",[1610,1609]],[[64662,64662],"mapped",[1610,1610]],[[64663,64663],"mapped",[1574,1580]],[[64664,64664],"mapped",[1574,1581]],[[64665,64665],"mapped",[1574,1582]],[[64666,64666],"mapped",[1574,1605]],[[64667,64667],"mapped",[1574,1607]],[[64668,64668],"mapped",[1576,1580]],[[64669,64669],"mapped",[1576,1581]],[[64670,64670],"mapped",[1576,1582]],[[64671,64671],"mapped",[1576,1605]],[[64672,64672],"mapped",[1576,1607]],[[64673,64673],"mapped",[1578,1580]],[[64674,64674],"mapped",[1578,1581]],[[64675,64675],"mapped",[1578,1582]],[[64676,64676],"mapped",[1578,1605]],[[64677,64677],"mapped",[1578,1607]],[[64678,64678],"mapped",[1579,1605]],[[64679,64679],"mapped",[1580,1581]],[[64680,64680],"mapped",[1580,1605]],[[64681,64681],"mapped",[1581,1580]],[[64682,64682],"mapped",[1581,1605]],[[64683,64683],"mapped",[1582,1580]],[[64684,64684],"mapped",[1582,1605]],[[64685,64685],"mapped",[1587,1580]],[[64686,64686],"mapped",[1587,1581]],[[64687,64687],"mapped",[1587,1582]],[[64688,64688],"mapped",[1587,1605]],[[64689,64689],"mapped",[1589,1581]],[[64690,64690],"mapped",[1589,1582]],[[64691,64691],"mapped",[1589,1605]],[[64692,64692],"mapped",[1590,1580]],[[64693,64693],"mapped",[1590,1581]],[[64694,64694],"mapped",[1590,1582]],[[64695,64695],"mapped",[1590,1605]],[[64696,64696],"mapped",[1591,1581]],[[64697,64697],"mapped",[1592,1605]],[[64698,64698],"mapped",[1593,1580]],[[64699,64699],"mapped",[1593,1605]],[[64700,64700],"mapped",[1594,1580]],[[64701,64701],"mapped",[1594,1605]],[[64702,64702],"mapped",[1601,1580]],[[64703,64703],"mapped",[1601,1581]],[[64704,64704],"mapped",[1601,1582]],[[64705,64705],"mapped",[1601,1605]],[[64706,64706],"mapped",[1602,1581]],[[64707,64707],"mapped",[1602,1605]],[[64708,64708],"mapped",[1603,1580]],[[64709,64709],"mapped",[1603,1581]],[[64710,64710],"mapped",[1603,1582]],[[64711,64711],"mapped",[1603,1604]],[[64712,64712],"mapped",[1603,1605]],[[64713,64713],"mapped",[1604,1580]],[[64714,64714],"mapped",[1604,1581]],[[64715,64715],"mapped",[1604,1582]],[[64716,64716],"mapped",[1604,1605]],[[64717,64717],"mapped",[1604,1607]],[[64718,64718],"mapped",[1605,1580]],[[64719,64719],"mapped",[1605,1581]],[[64720,64720],"mapped",[1605,1582]],[[64721,64721],"mapped",[1605,1605]],[[64722,64722],"mapped",[1606,1580]],[[64723,64723],"mapped",[1606,1581]],[[64724,64724],"mapped",[1606,1582]],[[64725,64725],"mapped",[1606,1605]],[[64726,64726],"mapped",[1606,1607]],[[64727,64727],"mapped",[1607,1580]],[[64728,64728],"mapped",[1607,1605]],[[64729,64729],"mapped",[1607,1648]],[[64730,64730],"mapped",[1610,1580]],[[64731,64731],"mapped",[1610,1581]],[[64732,64732],"mapped",[1610,1582]],[[64733,64733],"mapped",[1610,1605]],[[64734,64734],"mapped",[1610,1607]],[[64735,64735],"mapped",[1574,1605]],[[64736,64736],"mapped",[1574,1607]],[[64737,64737],"mapped",[1576,1605]],[[64738,64738],"mapped",[1576,1607]],[[64739,64739],"mapped",[1578,1605]],[[64740,64740],"mapped",[1578,1607]],[[64741,64741],"mapped",[1579,1605]],[[64742,64742],"mapped",[1579,1607]],[[64743,64743],"mapped",[1587,1605]],[[64744,64744],"mapped",[1587,1607]],[[64745,64745],"mapped",[1588,1605]],[[64746,64746],"mapped",[1588,1607]],[[64747,64747],"mapped",[1603,1604]],[[64748,64748],"mapped",[1603,1605]],[[64749,64749],"mapped",[1604,1605]],[[64750,64750],"mapped",[1606,1605]],[[64751,64751],"mapped",[1606,1607]],[[64752,64752],"mapped",[1610,1605]],[[64753,64753],"mapped",[1610,1607]],[[64754,64754],"mapped",[1600,1614,1617]],[[64755,64755],"mapped",[1600,1615,1617]],[[64756,64756],"mapped",[1600,1616,1617]],[[64757,64757],"mapped",[1591,1609]],[[64758,64758],"mapped",[1591,1610]],[[64759,64759],"mapped",[1593,1609]],[[64760,64760],"mapped",[1593,1610]],[[64761,64761],"mapped",[1594,1609]],[[64762,64762],"mapped",[1594,1610]],[[64763,64763],"mapped",[1587,1609]],[[64764,64764],"mapped",[1587,1610]],[[64765,64765],"mapped",[1588,1609]],[[64766,64766],"mapped",[1588,1610]],[[64767,64767],"mapped",[1581,1609]],[[64768,64768],"mapped",[1581,1610]],[[64769,64769],"mapped",[1580,1609]],[[64770,64770],"mapped",[1580,1610]],[[64771,64771],"mapped",[1582,1609]],[[64772,64772],"mapped",[1582,1610]],[[64773,64773],"mapped",[1589,1609]],[[64774,64774],"mapped",[1589,1610]],[[64775,64775],"mapped",[1590,1609]],[[64776,64776],"mapped",[1590,1610]],[[64777,64777],"mapped",[1588,1580]],[[64778,64778],"mapped",[1588,1581]],[[64779,64779],"mapped",[1588,1582]],[[64780,64780],"mapped",[1588,1605]],[[64781,64781],"mapped",[1588,1585]],[[64782,64782],"mapped",[1587,1585]],[[64783,64783],"mapped",[1589,1585]],[[64784,64784],"mapped",[1590,1585]],[[64785,64785],"mapped",[1591,1609]],[[64786,64786],"mapped",[1591,1610]],[[64787,64787],"mapped",[1593,1609]],[[64788,64788],"mapped",[1593,1610]],[[64789,64789],"mapped",[1594,1609]],[[64790,64790],"mapped",[1594,1610]],[[64791,64791],"mapped",[1587,1609]],[[64792,64792],"mapped",[1587,1610]],[[64793,64793],"mapped",[1588,1609]],[[64794,64794],"mapped",[1588,1610]],[[64795,64795],"mapped",[1581,1609]],[[64796,64796],"mapped",[1581,1610]],[[64797,64797],"mapped",[1580,1609]],[[64798,64798],"mapped",[1580,1610]],[[64799,64799],"mapped",[1582,1609]],[[64800,64800],"mapped",[1582,1610]],[[64801,64801],"mapped",[1589,1609]],[[64802,64802],"mapped",[1589,1610]],[[64803,64803],"mapped",[1590,1609]],[[64804,64804],"mapped",[1590,1610]],[[64805,64805],"mapped",[1588,1580]],[[64806,64806],"mapped",[1588,1581]],[[64807,64807],"mapped",[1588,1582]],[[64808,64808],"mapped",[1588,1605]],[[64809,64809],"mapped",[1588,1585]],[[64810,64810],"mapped",[1587,1585]],[[64811,64811],"mapped",[1589,1585]],[[64812,64812],"mapped",[1590,1585]],[[64813,64813],"mapped",[1588,1580]],[[64814,64814],"mapped",[1588,1581]],[[64815,64815],"mapped",[1588,1582]],[[64816,64816],"mapped",[1588,1605]],[[64817,64817],"mapped",[1587,1607]],[[64818,64818],"mapped",[1588,1607]],[[64819,64819],"mapped",[1591,1605]],[[64820,64820],"mapped",[1587,1580]],[[64821,64821],"mapped",[1587,1581]],[[64822,64822],"mapped",[1587,1582]],[[64823,64823],"mapped",[1588,1580]],[[64824,64824],"mapped",[1588,1581]],[[64825,64825],"mapped",[1588,1582]],[[64826,64826],"mapped",[1591,1605]],[[64827,64827],"mapped",[1592,1605]],[[64828,64829],"mapped",[1575,1611]],[[64830,64831],"valid",[],"NV8"],[[64832,64847],"disallowed"],[[64848,64848],"mapped",[1578,1580,1605]],[[64849,64850],"mapped",[1578,1581,1580]],[[64851,64851],"mapped",[1578,1581,1605]],[[64852,64852],"mapped",[1578,1582,1605]],[[64853,64853],"mapped",[1578,1605,1580]],[[64854,64854],"mapped",[1578,1605,1581]],[[64855,64855],"mapped",[1578,1605,1582]],[[64856,64857],"mapped",[1580,1605,1581]],[[64858,64858],"mapped",[1581,1605,1610]],[[64859,64859],"mapped",[1581,1605,1609]],[[64860,64860],"mapped",[1587,1581,1580]],[[64861,64861],"mapped",[1587,1580,1581]],[[64862,64862],"mapped",[1587,1580,1609]],[[64863,64864],"mapped",[1587,1605,1581]],[[64865,64865],"mapped",[1587,1605,1580]],[[64866,64867],"mapped",[1587,1605,1605]],[[64868,64869],"mapped",[1589,1581,1581]],[[64870,64870],"mapped",[1589,1605,1605]],[[64871,64872],"mapped",[1588,1581,1605]],[[64873,64873],"mapped",[1588,1580,1610]],[[64874,64875],"mapped",[1588,1605,1582]],[[64876,64877],"mapped",[1588,1605,1605]],[[64878,64878],"mapped",[1590,1581,1609]],[[64879,64880],"mapped",[1590,1582,1605]],[[64881,64882],"mapped",[1591,1605,1581]],[[64883,64883],"mapped",[1591,1605,1605]],[[64884,64884],"mapped",[1591,1605,1610]],[[64885,64885],"mapped",[1593,1580,1605]],[[64886,64887],"mapped",[1593,1605,1605]],[[64888,64888],"mapped",[1593,1605,1609]],[[64889,64889],"mapped",[1594,1605,1605]],[[64890,64890],"mapped",[1594,1605,1610]],[[64891,64891],"mapped",[1594,1605,1609]],[[64892,64893],"mapped",[1601,1582,1605]],[[64894,64894],"mapped",[1602,1605,1581]],[[64895,64895],"mapped",[1602,1605,1605]],[[64896,64896],"mapped",[1604,1581,1605]],[[64897,64897],"mapped",[1604,1581,1610]],[[64898,64898],"mapped",[1604,1581,1609]],[[64899,64900],"mapped",[1604,1580,1580]],[[64901,64902],"mapped",[1604,1582,1605]],[[64903,64904],"mapped",[1604,1605,1581]],[[64905,64905],"mapped",[1605,1581,1580]],[[64906,64906],"mapped",[1605,1581,1605]],[[64907,64907],"mapped",[1605,1581,1610]],[[64908,64908],"mapped",[1605,1580,1581]],[[64909,64909],"mapped",[1605,1580,1605]],[[64910,64910],"mapped",[1605,1582,1580]],[[64911,64911],"mapped",[1605,1582,1605]],[[64912,64913],"disallowed"],[[64914,64914],"mapped",[1605,1580,1582]],[[64915,64915],"mapped",[1607,1605,1580]],[[64916,64916],"mapped",[1607,1605,1605]],[[64917,64917],"mapped",[1606,1581,1605]],[[64918,64918],"mapped",[1606,1581,1609]],[[64919,64920],"mapped",[1606,1580,1605]],[[64921,64921],"mapped",[1606,1580,1609]],[[64922,64922],"mapped",[1606,1605,1610]],[[64923,64923],"mapped",[1606,1605,1609]],[[64924,64925],"mapped",[1610,1605,1605]],[[64926,64926],"mapped",[1576,1582,1610]],[[64927,64927],"mapped",[1578,1580,1610]],[[64928,64928],"mapped",[1578,1580,1609]],[[64929,64929],"mapped",[1578,1582,1610]],[[64930,64930],"mapped",[1578,1582,1609]],[[64931,64931],"mapped",[1578,1605,1610]],[[64932,64932],"mapped",[1578,1605,1609]],[[64933,64933],"mapped",[1580,1605,1610]],[[64934,64934],"mapped",[1580,1581,1609]],[[64935,64935],"mapped",[1580,1605,1609]],[[64936,64936],"mapped",[1587,1582,1609]],[[64937,64937],"mapped",[1589,1581,1610]],[[64938,64938],"mapped",[1588,1581,1610]],[[64939,64939],"mapped",[1590,1581,1610]],[[64940,64940],"mapped",[1604,1580,1610]],[[64941,64941],"mapped",[1604,1605,1610]],[[64942,64942],"mapped",[1610,1581,1610]],[[64943,64943],"mapped",[1610,1580,1610]],[[64944,64944],"mapped",[1610,1605,1610]],[[64945,64945],"mapped",[1605,1605,1610]],[[64946,64946],"mapped",[1602,1605,1610]],[[64947,64947],"mapped",[1606,1581,1610]],[[64948,64948],"mapped",[1602,1605,1581]],[[64949,64949],"mapped",[1604,1581,1605]],[[64950,64950],"mapped",[1593,1605,1610]],[[64951,64951],"mapped",[1603,1605,1610]],[[64952,64952],"mapped",[1606,1580,1581]],[[64953,64953],"mapped",[1605,1582,1610]],[[64954,64954],"mapped",[1604,1580,1605]],[[64955,64955],"mapped",[1603,1605,1605]],[[64956,64956],"mapped",[1604,1580,1605]],[[64957,64957],"mapped",[1606,1580,1581]],[[64958,64958],"mapped",[1580,1581,1610]],[[64959,64959],"mapped",[1581,1580,1610]],[[64960,64960],"mapped",[1605,1580,1610]],[[64961,64961],"mapped",[1601,1605,1610]],[[64962,64962],"mapped",[1576,1581,1610]],[[64963,64963],"mapped",[1603,1605,1605]],[[64964,64964],"mapped",[1593,1580,1605]],[[64965,64965],"mapped",[1589,1605,1605]],[[64966,64966],"mapped",[1587,1582,1610]],[[64967,64967],"mapped",[1606,1580,1610]],[[64968,64975],"disallowed"],[[64976,65007],"disallowed"],[[65008,65008],"mapped",[1589,1604,1746]],[[65009,65009],"mapped",[1602,1604,1746]],[[65010,65010],"mapped",[1575,1604,1604,1607]],[[65011,65011],"mapped",[1575,1603,1576,1585]],[[65012,65012],"mapped",[1605,1581,1605,1583]],[[65013,65013],"mapped",[1589,1604,1593,1605]],[[65014,65014],"mapped",[1585,1587,1608,1604]],[[65015,65015],"mapped",[1593,1604,1610,1607]],[[65016,65016],"mapped",[1608,1587,1604,1605]],[[65017,65017],"mapped",[1589,1604,1609]],[[65018,65018],"disallowed_STD3_mapped",[1589,1604,1609,32,1575,1604,1604,1607,32,1593,1604,1610,1607,32,1608,1587,1604,1605]],[[65019,65019],"disallowed_STD3_mapped",[1580,1604,32,1580,1604,1575,1604,1607]],[[65020,65020],"mapped",[1585,1740,1575,1604]],[[65021,65021],"valid",[],"NV8"],[[65022,65023],"disallowed"],[[65024,65039],"ignored"],[[65040,65040],"disallowed_STD3_mapped",[44]],[[65041,65041],"mapped",[12289]],[[65042,65042],"disallowed"],[[65043,65043],"disallowed_STD3_mapped",[58]],[[65044,65044],"disallowed_STD3_mapped",[59]],[[65045,65045],"disallowed_STD3_mapped",[33]],[[65046,65046],"disallowed_STD3_mapped",[63]],[[65047,65047],"mapped",[12310]],[[65048,65048],"mapped",[12311]],[[65049,65049],"disallowed"],[[65050,65055],"disallowed"],[[65056,65059],"valid"],[[65060,65062],"valid"],[[65063,65069],"valid"],[[65070,65071],"valid"],[[65072,65072],"disallowed"],[[65073,65073],"mapped",[8212]],[[65074,65074],"mapped",[8211]],[[65075,65076],"disallowed_STD3_mapped",[95]],[[65077,65077],"disallowed_STD3_mapped",[40]],[[65078,65078],"disallowed_STD3_mapped",[41]],[[65079,65079],"disallowed_STD3_mapped",[123]],[[65080,65080],"disallowed_STD3_mapped",[125]],[[65081,65081],"mapped",[12308]],[[65082,65082],"mapped",[12309]],[[65083,65083],"mapped",[12304]],[[65084,65084],"mapped",[12305]],[[65085,65085],"mapped",[12298]],[[65086,65086],"mapped",[12299]],[[65087,65087],"mapped",[12296]],[[65088,65088],"mapped",[12297]],[[65089,65089],"mapped",[12300]],[[65090,65090],"mapped",[12301]],[[65091,65091],"mapped",[12302]],[[65092,65092],"mapped",[12303]],[[65093,65094],"valid",[],"NV8"],[[65095,65095],"disallowed_STD3_mapped",[91]],[[65096,65096],"disallowed_STD3_mapped",[93]],[[65097,65100],"disallowed_STD3_mapped",[32,773]],[[65101,65103],"disallowed_STD3_mapped",[95]],[[65104,65104],"disallowed_STD3_mapped",[44]],[[65105,65105],"mapped",[12289]],[[65106,65106],"disallowed"],[[65107,65107],"disallowed"],[[65108,65108],"disallowed_STD3_mapped",[59]],[[65109,65109],"disallowed_STD3_mapped",[58]],[[65110,65110],"disallowed_STD3_mapped",[63]],[[65111,65111],"disallowed_STD3_mapped",[33]],[[65112,65112],"mapped",[8212]],[[65113,65113],"disallowed_STD3_mapped",[40]],[[65114,65114],"disallowed_STD3_mapped",[41]],[[65115,65115],"disallowed_STD3_mapped",[123]],[[65116,65116],"disallowed_STD3_mapped",[125]],[[65117,65117],"mapped",[12308]],[[65118,65118],"mapped",[12309]],[[65119,65119],"disallowed_STD3_mapped",[35]],[[65120,65120],"disallowed_STD3_mapped",[38]],[[65121,65121],"disallowed_STD3_mapped",[42]],[[65122,65122],"disallowed_STD3_mapped",[43]],[[65123,65123],"mapped",[45]],[[65124,65124],"disallowed_STD3_mapped",[60]],[[65125,65125],"disallowed_STD3_mapped",[62]],[[65126,65126],"disallowed_STD3_mapped",[61]],[[65127,65127],"disallowed"],[[65128,65128],"disallowed_STD3_mapped",[92]],[[65129,65129],"disallowed_STD3_mapped",[36]],[[65130,65130],"disallowed_STD3_mapped",[37]],[[65131,65131],"disallowed_STD3_mapped",[64]],[[65132,65135],"disallowed"],[[65136,65136],"disallowed_STD3_mapped",[32,1611]],[[65137,65137],"mapped",[1600,1611]],[[65138,65138],"disallowed_STD3_mapped",[32,1612]],[[65139,65139],"valid"],[[65140,65140],"disallowed_STD3_mapped",[32,1613]],[[65141,65141],"disallowed"],[[65142,65142],"disallowed_STD3_mapped",[32,1614]],[[65143,65143],"mapped",[1600,1614]],[[65144,65144],"disallowed_STD3_mapped",[32,1615]],[[65145,65145],"mapped",[1600,1615]],[[65146,65146],"disallowed_STD3_mapped",[32,1616]],[[65147,65147],"mapped",[1600,1616]],[[65148,65148],"disallowed_STD3_mapped",[32,1617]],[[65149,65149],"mapped",[1600,1617]],[[65150,65150],"disallowed_STD3_mapped",[32,1618]],[[65151,65151],"mapped",[1600,1618]],[[65152,65152],"mapped",[1569]],[[65153,65154],"mapped",[1570]],[[65155,65156],"mapped",[1571]],[[65157,65158],"mapped",[1572]],[[65159,65160],"mapped",[1573]],[[65161,65164],"mapped",[1574]],[[65165,65166],"mapped",[1575]],[[65167,65170],"mapped",[1576]],[[65171,65172],"mapped",[1577]],[[65173,65176],"mapped",[1578]],[[65177,65180],"mapped",[1579]],[[65181,65184],"mapped",[1580]],[[65185,65188],"mapped",[1581]],[[65189,65192],"mapped",[1582]],[[65193,65194],"mapped",[1583]],[[65195,65196],"mapped",[1584]],[[65197,65198],"mapped",[1585]],[[65199,65200],"mapped",[1586]],[[65201,65204],"mapped",[1587]],[[65205,65208],"mapped",[1588]],[[65209,65212],"mapped",[1589]],[[65213,65216],"mapped",[1590]],[[65217,65220],"mapped",[1591]],[[65221,65224],"mapped",[1592]],[[65225,65228],"mapped",[1593]],[[65229,65232],"mapped",[1594]],[[65233,65236],"mapped",[1601]],[[65237,65240],"mapped",[1602]],[[65241,65244],"mapped",[1603]],[[65245,65248],"mapped",[1604]],[[65249,65252],"mapped",[1605]],[[65253,65256],"mapped",[1606]],[[65257,65260],"mapped",[1607]],[[65261,65262],"mapped",[1608]],[[65263,65264],"mapped",[1609]],[[65265,65268],"mapped",[1610]],[[65269,65270],"mapped",[1604,1570]],[[65271,65272],"mapped",[1604,1571]],[[65273,65274],"mapped",[1604,1573]],[[65275,65276],"mapped",[1604,1575]],[[65277,65278],"disallowed"],[[65279,65279],"ignored"],[[65280,65280],"disallowed"],[[65281,65281],"disallowed_STD3_mapped",[33]],[[65282,65282],"disallowed_STD3_mapped",[34]],[[65283,65283],"disallowed_STD3_mapped",[35]],[[65284,65284],"disallowed_STD3_mapped",[36]],[[65285,65285],"disallowed_STD3_mapped",[37]],[[65286,65286],"disallowed_STD3_mapped",[38]],[[65287,65287],"disallowed_STD3_mapped",[39]],[[65288,65288],"disallowed_STD3_mapped",[40]],[[65289,65289],"disallowed_STD3_mapped",[41]],[[65290,65290],"disallowed_STD3_mapped",[42]],[[65291,65291],"disallowed_STD3_mapped",[43]],[[65292,65292],"disallowed_STD3_mapped",[44]],[[65293,65293],"mapped",[45]],[[65294,65294],"mapped",[46]],[[65295,65295],"disallowed_STD3_mapped",[47]],[[65296,65296],"mapped",[48]],[[65297,65297],"mapped",[49]],[[65298,65298],"mapped",[50]],[[65299,65299],"mapped",[51]],[[65300,65300],"mapped",[52]],[[65301,65301],"mapped",[53]],[[65302,65302],"mapped",[54]],[[65303,65303],"mapped",[55]],[[65304,65304],"mapped",[56]],[[65305,65305],"mapped",[57]],[[65306,65306],"disallowed_STD3_mapped",[58]],[[65307,65307],"disallowed_STD3_mapped",[59]],[[65308,65308],"disallowed_STD3_mapped",[60]],[[65309,65309],"disallowed_STD3_mapped",[61]],[[65310,65310],"disallowed_STD3_mapped",[62]],[[65311,65311],"disallowed_STD3_mapped",[63]],[[65312,65312],"disallowed_STD3_mapped",[64]],[[65313,65313],"mapped",[97]],[[65314,65314],"mapped",[98]],[[65315,65315],"mapped",[99]],[[65316,65316],"mapped",[100]],[[65317,65317],"mapped",[101]],[[65318,65318],"mapped",[102]],[[65319,65319],"mapped",[103]],[[65320,65320],"mapped",[104]],[[65321,65321],"mapped",[105]],[[65322,65322],"mapped",[106]],[[65323,65323],"mapped",[107]],[[65324,65324],"mapped",[108]],[[65325,65325],"mapped",[109]],[[65326,65326],"mapped",[110]],[[65327,65327],"mapped",[111]],[[65328,65328],"mapped",[112]],[[65329,65329],"mapped",[113]],[[65330,65330],"mapped",[114]],[[65331,65331],"mapped",[115]],[[65332,65332],"mapped",[116]],[[65333,65333],"mapped",[117]],[[65334,65334],"mapped",[118]],[[65335,65335],"mapped",[119]],[[65336,65336],"mapped",[120]],[[65337,65337],"mapped",[121]],[[65338,65338],"mapped",[122]],[[65339,65339],"disallowed_STD3_mapped",[91]],[[65340,65340],"disallowed_STD3_mapped",[92]],[[65341,65341],"disallowed_STD3_mapped",[93]],[[65342,65342],"disallowed_STD3_mapped",[94]],[[65343,65343],"disallowed_STD3_mapped",[95]],[[65344,65344],"disallowed_STD3_mapped",[96]],[[65345,65345],"mapped",[97]],[[65346,65346],"mapped",[98]],[[65347,65347],"mapped",[99]],[[65348,65348],"mapped",[100]],[[65349,65349],"mapped",[101]],[[65350,65350],"mapped",[102]],[[65351,65351],"mapped",[103]],[[65352,65352],"mapped",[104]],[[65353,65353],"mapped",[105]],[[65354,65354],"mapped",[106]],[[65355,65355],"mapped",[107]],[[65356,65356],"mapped",[108]],[[65357,65357],"mapped",[109]],[[65358,65358],"mapped",[110]],[[65359,65359],"mapped",[111]],[[65360,65360],"mapped",[112]],[[65361,65361],"mapped",[113]],[[65362,65362],"mapped",[114]],[[65363,65363],"mapped",[115]],[[65364,65364],"mapped",[116]],[[65365,65365],"mapped",[117]],[[65366,65366],"mapped",[118]],[[65367,65367],"mapped",[119]],[[65368,65368],"mapped",[120]],[[65369,65369],"mapped",[121]],[[65370,65370],"mapped",[122]],[[65371,65371],"disallowed_STD3_mapped",[123]],[[65372,65372],"disallowed_STD3_mapped",[124]],[[65373,65373],"disallowed_STD3_mapped",[125]],[[65374,65374],"disallowed_STD3_mapped",[126]],[[65375,65375],"mapped",[10629]],[[65376,65376],"mapped",[10630]],[[65377,65377],"mapped",[46]],[[65378,65378],"mapped",[12300]],[[65379,65379],"mapped",[12301]],[[65380,65380],"mapped",[12289]],[[65381,65381],"mapped",[12539]],[[65382,65382],"mapped",[12530]],[[65383,65383],"mapped",[12449]],[[65384,65384],"mapped",[12451]],[[65385,65385],"mapped",[12453]],[[65386,65386],"mapped",[12455]],[[65387,65387],"mapped",[12457]],[[65388,65388],"mapped",[12515]],[[65389,65389],"mapped",[12517]],[[65390,65390],"mapped",[12519]],[[65391,65391],"mapped",[12483]],[[65392,65392],"mapped",[12540]],[[65393,65393],"mapped",[12450]],[[65394,65394],"mapped",[12452]],[[65395,65395],"mapped",[12454]],[[65396,65396],"mapped",[12456]],[[65397,65397],"mapped",[12458]],[[65398,65398],"mapped",[12459]],[[65399,65399],"mapped",[12461]],[[65400,65400],"mapped",[12463]],[[65401,65401],"mapped",[12465]],[[65402,65402],"mapped",[12467]],[[65403,65403],"mapped",[12469]],[[65404,65404],"mapped",[12471]],[[65405,65405],"mapped",[12473]],[[65406,65406],"mapped",[12475]],[[65407,65407],"mapped",[12477]],[[65408,65408],"mapped",[12479]],[[65409,65409],"mapped",[12481]],[[65410,65410],"mapped",[12484]],[[65411,65411],"mapped",[12486]],[[65412,65412],"mapped",[12488]],[[65413,65413],"mapped",[12490]],[[65414,65414],"mapped",[12491]],[[65415,65415],"mapped",[12492]],[[65416,65416],"mapped",[12493]],[[65417,65417],"mapped",[12494]],[[65418,65418],"mapped",[12495]],[[65419,65419],"mapped",[12498]],[[65420,65420],"mapped",[12501]],[[65421,65421],"mapped",[12504]],[[65422,65422],"mapped",[12507]],[[65423,65423],"mapped",[12510]],[[65424,65424],"mapped",[12511]],[[65425,65425],"mapped",[12512]],[[65426,65426],"mapped",[12513]],[[65427,65427],"mapped",[12514]],[[65428,65428],"mapped",[12516]],[[65429,65429],"mapped",[12518]],[[65430,65430],"mapped",[12520]],[[65431,65431],"mapped",[12521]],[[65432,65432],"mapped",[12522]],[[65433,65433],"mapped",[12523]],[[65434,65434],"mapped",[12524]],[[65435,65435],"mapped",[12525]],[[65436,65436],"mapped",[12527]],[[65437,65437],"mapped",[12531]],[[65438,65438],"mapped",[12441]],[[65439,65439],"mapped",[12442]],[[65440,65440],"disallowed"],[[65441,65441],"mapped",[4352]],[[65442,65442],"mapped",[4353]],[[65443,65443],"mapped",[4522]],[[65444,65444],"mapped",[4354]],[[65445,65445],"mapped",[4524]],[[65446,65446],"mapped",[4525]],[[65447,65447],"mapped",[4355]],[[65448,65448],"mapped",[4356]],[[65449,65449],"mapped",[4357]],[[65450,65450],"mapped",[4528]],[[65451,65451],"mapped",[4529]],[[65452,65452],"mapped",[4530]],[[65453,65453],"mapped",[4531]],[[65454,65454],"mapped",[4532]],[[65455,65455],"mapped",[4533]],[[65456,65456],"mapped",[4378]],[[65457,65457],"mapped",[4358]],[[65458,65458],"mapped",[4359]],[[65459,65459],"mapped",[4360]],[[65460,65460],"mapped",[4385]],[[65461,65461],"mapped",[4361]],[[65462,65462],"mapped",[4362]],[[65463,65463],"mapped",[4363]],[[65464,65464],"mapped",[4364]],[[65465,65465],"mapped",[4365]],[[65466,65466],"mapped",[4366]],[[65467,65467],"mapped",[4367]],[[65468,65468],"mapped",[4368]],[[65469,65469],"mapped",[4369]],[[65470,65470],"mapped",[4370]],[[65471,65473],"disallowed"],[[65474,65474],"mapped",[4449]],[[65475,65475],"mapped",[4450]],[[65476,65476],"mapped",[4451]],[[65477,65477],"mapped",[4452]],[[65478,65478],"mapped",[4453]],[[65479,65479],"mapped",[4454]],[[65480,65481],"disallowed"],[[65482,65482],"mapped",[4455]],[[65483,65483],"mapped",[4456]],[[65484,65484],"mapped",[4457]],[[65485,65485],"mapped",[4458]],[[65486,65486],"mapped",[4459]],[[65487,65487],"mapped",[4460]],[[65488,65489],"disallowed"],[[65490,65490],"mapped",[4461]],[[65491,65491],"mapped",[4462]],[[65492,65492],"mapped",[4463]],[[65493,65493],"mapped",[4464]],[[65494,65494],"mapped",[4465]],[[65495,65495],"mapped",[4466]],[[65496,65497],"disallowed"],[[65498,65498],"mapped",[4467]],[[65499,65499],"mapped",[4468]],[[65500,65500],"mapped",[4469]],[[65501,65503],"disallowed"],[[65504,65504],"mapped",[162]],[[65505,65505],"mapped",[163]],[[65506,65506],"mapped",[172]],[[65507,65507],"disallowed_STD3_mapped",[32,772]],[[65508,65508],"mapped",[166]],[[65509,65509],"mapped",[165]],[[65510,65510],"mapped",[8361]],[[65511,65511],"disallowed"],[[65512,65512],"mapped",[9474]],[[65513,65513],"mapped",[8592]],[[65514,65514],"mapped",[8593]],[[65515,65515],"mapped",[8594]],[[65516,65516],"mapped",[8595]],[[65517,65517],"mapped",[9632]],[[65518,65518],"mapped",[9675]],[[65519,65528],"disallowed"],[[65529,65531],"disallowed"],[[65532,65532],"disallowed"],[[65533,65533],"disallowed"],[[65534,65535],"disallowed"],[[65536,65547],"valid"],[[65548,65548],"disallowed"],[[65549,65574],"valid"],[[65575,65575],"disallowed"],[[65576,65594],"valid"],[[65595,65595],"disallowed"],[[65596,65597],"valid"],[[65598,65598],"disallowed"],[[65599,65613],"valid"],[[65614,65615],"disallowed"],[[65616,65629],"valid"],[[65630,65663],"disallowed"],[[65664,65786],"valid"],[[65787,65791],"disallowed"],[[65792,65794],"valid",[],"NV8"],[[65795,65798],"disallowed"],[[65799,65843],"valid",[],"NV8"],[[65844,65846],"disallowed"],[[65847,65855],"valid",[],"NV8"],[[65856,65930],"valid",[],"NV8"],[[65931,65932],"valid",[],"NV8"],[[65933,65935],"disallowed"],[[65936,65947],"valid",[],"NV8"],[[65948,65951],"disallowed"],[[65952,65952],"valid",[],"NV8"],[[65953,65999],"disallowed"],[[66000,66044],"valid",[],"NV8"],[[66045,66045],"valid"],[[66046,66175],"disallowed"],[[66176,66204],"valid"],[[66205,66207],"disallowed"],[[66208,66256],"valid"],[[66257,66271],"disallowed"],[[66272,66272],"valid"],[[66273,66299],"valid",[],"NV8"],[[66300,66303],"disallowed"],[[66304,66334],"valid"],[[66335,66335],"valid"],[[66336,66339],"valid",[],"NV8"],[[66340,66351],"disallowed"],[[66352,66368],"valid"],[[66369,66369],"valid",[],"NV8"],[[66370,66377],"valid"],[[66378,66378],"valid",[],"NV8"],[[66379,66383],"disallowed"],[[66384,66426],"valid"],[[66427,66431],"disallowed"],[[66432,66461],"valid"],[[66462,66462],"disallowed"],[[66463,66463],"valid",[],"NV8"],[[66464,66499],"valid"],[[66500,66503],"disallowed"],[[66504,66511],"valid"],[[66512,66517],"valid",[],"NV8"],[[66518,66559],"disallowed"],[[66560,66560],"mapped",[66600]],[[66561,66561],"mapped",[66601]],[[66562,66562],"mapped",[66602]],[[66563,66563],"mapped",[66603]],[[66564,66564],"mapped",[66604]],[[66565,66565],"mapped",[66605]],[[66566,66566],"mapped",[66606]],[[66567,66567],"mapped",[66607]],[[66568,66568],"mapped",[66608]],[[66569,66569],"mapped",[66609]],[[66570,66570],"mapped",[66610]],[[66571,66571],"mapped",[66611]],[[66572,66572],"mapped",[66612]],[[66573,66573],"mapped",[66613]],[[66574,66574],"mapped",[66614]],[[66575,66575],"mapped",[66615]],[[66576,66576],"mapped",[66616]],[[66577,66577],"mapped",[66617]],[[66578,66578],"mapped",[66618]],[[66579,66579],"mapped",[66619]],[[66580,66580],"mapped",[66620]],[[66581,66581],"mapped",[66621]],[[66582,66582],"mapped",[66622]],[[66583,66583],"mapped",[66623]],[[66584,66584],"mapped",[66624]],[[66585,66585],"mapped",[66625]],[[66586,66586],"mapped",[66626]],[[66587,66587],"mapped",[66627]],[[66588,66588],"mapped",[66628]],[[66589,66589],"mapped",[66629]],[[66590,66590],"mapped",[66630]],[[66591,66591],"mapped",[66631]],[[66592,66592],"mapped",[66632]],[[66593,66593],"mapped",[66633]],[[66594,66594],"mapped",[66634]],[[66595,66595],"mapped",[66635]],[[66596,66596],"mapped",[66636]],[[66597,66597],"mapped",[66637]],[[66598,66598],"mapped",[66638]],[[66599,66599],"mapped",[66639]],[[66600,66637],"valid"],[[66638,66717],"valid"],[[66718,66719],"disallowed"],[[66720,66729],"valid"],[[66730,66815],"disallowed"],[[66816,66855],"valid"],[[66856,66863],"disallowed"],[[66864,66915],"valid"],[[66916,66926],"disallowed"],[[66927,66927],"valid",[],"NV8"],[[66928,67071],"disallowed"],[[67072,67382],"valid"],[[67383,67391],"disallowed"],[[67392,67413],"valid"],[[67414,67423],"disallowed"],[[67424,67431],"valid"],[[67432,67583],"disallowed"],[[67584,67589],"valid"],[[67590,67591],"disallowed"],[[67592,67592],"valid"],[[67593,67593],"disallowed"],[[67594,67637],"valid"],[[67638,67638],"disallowed"],[[67639,67640],"valid"],[[67641,67643],"disallowed"],[[67644,67644],"valid"],[[67645,67646],"disallowed"],[[67647,67647],"valid"],[[67648,67669],"valid"],[[67670,67670],"disallowed"],[[67671,67679],"valid",[],"NV8"],[[67680,67702],"valid"],[[67703,67711],"valid",[],"NV8"],[[67712,67742],"valid"],[[67743,67750],"disallowed"],[[67751,67759],"valid",[],"NV8"],[[67760,67807],"disallowed"],[[67808,67826],"valid"],[[67827,67827],"disallowed"],[[67828,67829],"valid"],[[67830,67834],"disallowed"],[[67835,67839],"valid",[],"NV8"],[[67840,67861],"valid"],[[67862,67865],"valid",[],"NV8"],[[67866,67867],"valid",[],"NV8"],[[67868,67870],"disallowed"],[[67871,67871],"valid",[],"NV8"],[[67872,67897],"valid"],[[67898,67902],"disallowed"],[[67903,67903],"valid",[],"NV8"],[[67904,67967],"disallowed"],[[67968,68023],"valid"],[[68024,68027],"disallowed"],[[68028,68029],"valid",[],"NV8"],[[68030,68031],"valid"],[[68032,68047],"valid",[],"NV8"],[[68048,68049],"disallowed"],[[68050,68095],"valid",[],"NV8"],[[68096,68099],"valid"],[[68100,68100],"disallowed"],[[68101,68102],"valid"],[[68103,68107],"disallowed"],[[68108,68115],"valid"],[[68116,68116],"disallowed"],[[68117,68119],"valid"],[[68120,68120],"disallowed"],[[68121,68147],"valid"],[[68148,68151],"disallowed"],[[68152,68154],"valid"],[[68155,68158],"disallowed"],[[68159,68159],"valid"],[[68160,68167],"valid",[],"NV8"],[[68168,68175],"disallowed"],[[68176,68184],"valid",[],"NV8"],[[68185,68191],"disallowed"],[[68192,68220],"valid"],[[68221,68223],"valid",[],"NV8"],[[68224,68252],"valid"],[[68253,68255],"valid",[],"NV8"],[[68256,68287],"disallowed"],[[68288,68295],"valid"],[[68296,68296],"valid",[],"NV8"],[[68297,68326],"valid"],[[68327,68330],"disallowed"],[[68331,68342],"valid",[],"NV8"],[[68343,68351],"disallowed"],[[68352,68405],"valid"],[[68406,68408],"disallowed"],[[68409,68415],"valid",[],"NV8"],[[68416,68437],"valid"],[[68438,68439],"disallowed"],[[68440,68447],"valid",[],"NV8"],[[68448,68466],"valid"],[[68467,68471],"disallowed"],[[68472,68479],"valid",[],"NV8"],[[68480,68497],"valid"],[[68498,68504],"disallowed"],[[68505,68508],"valid",[],"NV8"],[[68509,68520],"disallowed"],[[68521,68527],"valid",[],"NV8"],[[68528,68607],"disallowed"],[[68608,68680],"valid"],[[68681,68735],"disallowed"],[[68736,68736],"mapped",[68800]],[[68737,68737],"mapped",[68801]],[[68738,68738],"mapped",[68802]],[[68739,68739],"mapped",[68803]],[[68740,68740],"mapped",[68804]],[[68741,68741],"mapped",[68805]],[[68742,68742],"mapped",[68806]],[[68743,68743],"mapped",[68807]],[[68744,68744],"mapped",[68808]],[[68745,68745],"mapped",[68809]],[[68746,68746],"mapped",[68810]],[[68747,68747],"mapped",[68811]],[[68748,68748],"mapped",[68812]],[[68749,68749],"mapped",[68813]],[[68750,68750],"mapped",[68814]],[[68751,68751],"mapped",[68815]],[[68752,68752],"mapped",[68816]],[[68753,68753],"mapped",[68817]],[[68754,68754],"mapped",[68818]],[[68755,68755],"mapped",[68819]],[[68756,68756],"mapped",[68820]],[[68757,68757],"mapped",[68821]],[[68758,68758],"mapped",[68822]],[[68759,68759],"mapped",[68823]],[[68760,68760],"mapped",[68824]],[[68761,68761],"mapped",[68825]],[[68762,68762],"mapped",[68826]],[[68763,68763],"mapped",[68827]],[[68764,68764],"mapped",[68828]],[[68765,68765],"mapped",[68829]],[[68766,68766],"mapped",[68830]],[[68767,68767],"mapped",[68831]],[[68768,68768],"mapped",[68832]],[[68769,68769],"mapped",[68833]],[[68770,68770],"mapped",[68834]],[[68771,68771],"mapped",[68835]],[[68772,68772],"mapped",[68836]],[[68773,68773],"mapped",[68837]],[[68774,68774],"mapped",[68838]],[[68775,68775],"mapped",[68839]],[[68776,68776],"mapped",[68840]],[[68777,68777],"mapped",[68841]],[[68778,68778],"mapped",[68842]],[[68779,68779],"mapped",[68843]],[[68780,68780],"mapped",[68844]],[[68781,68781],"mapped",[68845]],[[68782,68782],"mapped",[68846]],[[68783,68783],"mapped",[68847]],[[68784,68784],"mapped",[68848]],[[68785,68785],"mapped",[68849]],[[68786,68786],"mapped",[68850]],[[68787,68799],"disallowed"],[[68800,68850],"valid"],[[68851,68857],"disallowed"],[[68858,68863],"valid",[],"NV8"],[[68864,69215],"disallowed"],[[69216,69246],"valid",[],"NV8"],[[69247,69631],"disallowed"],[[69632,69702],"valid"],[[69703,69709],"valid",[],"NV8"],[[69710,69713],"disallowed"],[[69714,69733],"valid",[],"NV8"],[[69734,69743],"valid"],[[69744,69758],"disallowed"],[[69759,69759],"valid"],[[69760,69818],"valid"],[[69819,69820],"valid",[],"NV8"],[[69821,69821],"disallowed"],[[69822,69825],"valid",[],"NV8"],[[69826,69839],"disallowed"],[[69840,69864],"valid"],[[69865,69871],"disallowed"],[[69872,69881],"valid"],[[69882,69887],"disallowed"],[[69888,69940],"valid"],[[69941,69941],"disallowed"],[[69942,69951],"valid"],[[69952,69955],"valid",[],"NV8"],[[69956,69967],"disallowed"],[[69968,70003],"valid"],[[70004,70005],"valid",[],"NV8"],[[70006,70006],"valid"],[[70007,70015],"disallowed"],[[70016,70084],"valid"],[[70085,70088],"valid",[],"NV8"],[[70089,70089],"valid",[],"NV8"],[[70090,70092],"valid"],[[70093,70093],"valid",[],"NV8"],[[70094,70095],"disallowed"],[[70096,70105],"valid"],[[70106,70106],"valid"],[[70107,70107],"valid",[],"NV8"],[[70108,70108],"valid"],[[70109,70111],"valid",[],"NV8"],[[70112,70112],"disallowed"],[[70113,70132],"valid",[],"NV8"],[[70133,70143],"disallowed"],[[70144,70161],"valid"],[[70162,70162],"disallowed"],[[70163,70199],"valid"],[[70200,70205],"valid",[],"NV8"],[[70206,70271],"disallowed"],[[70272,70278],"valid"],[[70279,70279],"disallowed"],[[70280,70280],"valid"],[[70281,70281],"disallowed"],[[70282,70285],"valid"],[[70286,70286],"disallowed"],[[70287,70301],"valid"],[[70302,70302],"disallowed"],[[70303,70312],"valid"],[[70313,70313],"valid",[],"NV8"],[[70314,70319],"disallowed"],[[70320,70378],"valid"],[[70379,70383],"disallowed"],[[70384,70393],"valid"],[[70394,70399],"disallowed"],[[70400,70400],"valid"],[[70401,70403],"valid"],[[70404,70404],"disallowed"],[[70405,70412],"valid"],[[70413,70414],"disallowed"],[[70415,70416],"valid"],[[70417,70418],"disallowed"],[[70419,70440],"valid"],[[70441,70441],"disallowed"],[[70442,70448],"valid"],[[70449,70449],"disallowed"],[[70450,70451],"valid"],[[70452,70452],"disallowed"],[[70453,70457],"valid"],[[70458,70459],"disallowed"],[[70460,70468],"valid"],[[70469,70470],"disallowed"],[[70471,70472],"valid"],[[70473,70474],"disallowed"],[[70475,70477],"valid"],[[70478,70479],"disallowed"],[[70480,70480],"valid"],[[70481,70486],"disallowed"],[[70487,70487],"valid"],[[70488,70492],"disallowed"],[[70493,70499],"valid"],[[70500,70501],"disallowed"],[[70502,70508],"valid"],[[70509,70511],"disallowed"],[[70512,70516],"valid"],[[70517,70783],"disallowed"],[[70784,70853],"valid"],[[70854,70854],"valid",[],"NV8"],[[70855,70855],"valid"],[[70856,70863],"disallowed"],[[70864,70873],"valid"],[[70874,71039],"disallowed"],[[71040,71093],"valid"],[[71094,71095],"disallowed"],[[71096,71104],"valid"],[[71105,71113],"valid",[],"NV8"],[[71114,71127],"valid",[],"NV8"],[[71128,71133],"valid"],[[71134,71167],"disallowed"],[[71168,71232],"valid"],[[71233,71235],"valid",[],"NV8"],[[71236,71236],"valid"],[[71237,71247],"disallowed"],[[71248,71257],"valid"],[[71258,71295],"disallowed"],[[71296,71351],"valid"],[[71352,71359],"disallowed"],[[71360,71369],"valid"],[[71370,71423],"disallowed"],[[71424,71449],"valid"],[[71450,71452],"disallowed"],[[71453,71467],"valid"],[[71468,71471],"disallowed"],[[71472,71481],"valid"],[[71482,71487],"valid",[],"NV8"],[[71488,71839],"disallowed"],[[71840,71840],"mapped",[71872]],[[71841,71841],"mapped",[71873]],[[71842,71842],"mapped",[71874]],[[71843,71843],"mapped",[71875]],[[71844,71844],"mapped",[71876]],[[71845,71845],"mapped",[71877]],[[71846,71846],"mapped",[71878]],[[71847,71847],"mapped",[71879]],[[71848,71848],"mapped",[71880]],[[71849,71849],"mapped",[71881]],[[71850,71850],"mapped",[71882]],[[71851,71851],"mapped",[71883]],[[71852,71852],"mapped",[71884]],[[71853,71853],"mapped",[71885]],[[71854,71854],"mapped",[71886]],[[71855,71855],"mapped",[71887]],[[71856,71856],"mapped",[71888]],[[71857,71857],"mapped",[71889]],[[71858,71858],"mapped",[71890]],[[71859,71859],"mapped",[71891]],[[71860,71860],"mapped",[71892]],[[71861,71861],"mapped",[71893]],[[71862,71862],"mapped",[71894]],[[71863,71863],"mapped",[71895]],[[71864,71864],"mapped",[71896]],[[71865,71865],"mapped",[71897]],[[71866,71866],"mapped",[71898]],[[71867,71867],"mapped",[71899]],[[71868,71868],"mapped",[71900]],[[71869,71869],"mapped",[71901]],[[71870,71870],"mapped",[71902]],[[71871,71871],"mapped",[71903]],[[71872,71913],"valid"],[[71914,71922],"valid",[],"NV8"],[[71923,71934],"disallowed"],[[71935,71935],"valid"],[[71936,72383],"disallowed"],[[72384,72440],"valid"],[[72441,73727],"disallowed"],[[73728,74606],"valid"],[[74607,74648],"valid"],[[74649,74649],"valid"],[[74650,74751],"disallowed"],[[74752,74850],"valid",[],"NV8"],[[74851,74862],"valid",[],"NV8"],[[74863,74863],"disallowed"],[[74864,74867],"valid",[],"NV8"],[[74868,74868],"valid",[],"NV8"],[[74869,74879],"disallowed"],[[74880,75075],"valid"],[[75076,77823],"disallowed"],[[77824,78894],"valid"],[[78895,82943],"disallowed"],[[82944,83526],"valid"],[[83527,92159],"disallowed"],[[92160,92728],"valid"],[[92729,92735],"disallowed"],[[92736,92766],"valid"],[[92767,92767],"disallowed"],[[92768,92777],"valid"],[[92778,92781],"disallowed"],[[92782,92783],"valid",[],"NV8"],[[92784,92879],"disallowed"],[[92880,92909],"valid"],[[92910,92911],"disallowed"],[[92912,92916],"valid"],[[92917,92917],"valid",[],"NV8"],[[92918,92927],"disallowed"],[[92928,92982],"valid"],[[92983,92991],"valid",[],"NV8"],[[92992,92995],"valid"],[[92996,92997],"valid",[],"NV8"],[[92998,93007],"disallowed"],[[93008,93017],"valid"],[[93018,93018],"disallowed"],[[93019,93025],"valid",[],"NV8"],[[93026,93026],"disallowed"],[[93027,93047],"valid"],[[93048,93052],"disallowed"],[[93053,93071],"valid"],[[93072,93951],"disallowed"],[[93952,94020],"valid"],[[94021,94031],"disallowed"],[[94032,94078],"valid"],[[94079,94094],"disallowed"],[[94095,94111],"valid"],[[94112,110591],"disallowed"],[[110592,110593],"valid"],[[110594,113663],"disallowed"],[[113664,113770],"valid"],[[113771,113775],"disallowed"],[[113776,113788],"valid"],[[113789,113791],"disallowed"],[[113792,113800],"valid"],[[113801,113807],"disallowed"],[[113808,113817],"valid"],[[113818,113819],"disallowed"],[[113820,113820],"valid",[],"NV8"],[[113821,113822],"valid"],[[113823,113823],"valid",[],"NV8"],[[113824,113827],"ignored"],[[113828,118783],"disallowed"],[[118784,119029],"valid",[],"NV8"],[[119030,119039],"disallowed"],[[119040,119078],"valid",[],"NV8"],[[119079,119080],"disallowed"],[[119081,119081],"valid",[],"NV8"],[[119082,119133],"valid",[],"NV8"],[[119134,119134],"mapped",[119127,119141]],[[119135,119135],"mapped",[119128,119141]],[[119136,119136],"mapped",[119128,119141,119150]],[[119137,119137],"mapped",[119128,119141,119151]],[[119138,119138],"mapped",[119128,119141,119152]],[[119139,119139],"mapped",[119128,119141,119153]],[[119140,119140],"mapped",[119128,119141,119154]],[[119141,119154],"valid",[],"NV8"],[[119155,119162],"disallowed"],[[119163,119226],"valid",[],"NV8"],[[119227,119227],"mapped",[119225,119141]],[[119228,119228],"mapped",[119226,119141]],[[119229,119229],"mapped",[119225,119141,119150]],[[119230,119230],"mapped",[119226,119141,119150]],[[119231,119231],"mapped",[119225,119141,119151]],[[119232,119232],"mapped",[119226,119141,119151]],[[119233,119261],"valid",[],"NV8"],[[119262,119272],"valid",[],"NV8"],[[119273,119295],"disallowed"],[[119296,119365],"valid",[],"NV8"],[[119366,119551],"disallowed"],[[119552,119638],"valid",[],"NV8"],[[119639,119647],"disallowed"],[[119648,119665],"valid",[],"NV8"],[[119666,119807],"disallowed"],[[119808,119808],"mapped",[97]],[[119809,119809],"mapped",[98]],[[119810,119810],"mapped",[99]],[[119811,119811],"mapped",[100]],[[119812,119812],"mapped",[101]],[[119813,119813],"mapped",[102]],[[119814,119814],"mapped",[103]],[[119815,119815],"mapped",[104]],[[119816,119816],"mapped",[105]],[[119817,119817],"mapped",[106]],[[119818,119818],"mapped",[107]],[[119819,119819],"mapped",[108]],[[119820,119820],"mapped",[109]],[[119821,119821],"mapped",[110]],[[119822,119822],"mapped",[111]],[[119823,119823],"mapped",[112]],[[119824,119824],"mapped",[113]],[[119825,119825],"mapped",[114]],[[119826,119826],"mapped",[115]],[[119827,119827],"mapped",[116]],[[119828,119828],"mapped",[117]],[[119829,119829],"mapped",[118]],[[119830,119830],"mapped",[119]],[[119831,119831],"mapped",[120]],[[119832,119832],"mapped",[121]],[[119833,119833],"mapped",[122]],[[119834,119834],"mapped",[97]],[[119835,119835],"mapped",[98]],[[119836,119836],"mapped",[99]],[[119837,119837],"mapped",[100]],[[119838,119838],"mapped",[101]],[[119839,119839],"mapped",[102]],[[119840,119840],"mapped",[103]],[[119841,119841],"mapped",[104]],[[119842,119842],"mapped",[105]],[[119843,119843],"mapped",[106]],[[119844,119844],"mapped",[107]],[[119845,119845],"mapped",[108]],[[119846,119846],"mapped",[109]],[[119847,119847],"mapped",[110]],[[119848,119848],"mapped",[111]],[[119849,119849],"mapped",[112]],[[119850,119850],"mapped",[113]],[[119851,119851],"mapped",[114]],[[119852,119852],"mapped",[115]],[[119853,119853],"mapped",[116]],[[119854,119854],"mapped",[117]],[[119855,119855],"mapped",[118]],[[119856,119856],"mapped",[119]],[[119857,119857],"mapped",[120]],[[119858,119858],"mapped",[121]],[[119859,119859],"mapped",[122]],[[119860,119860],"mapped",[97]],[[119861,119861],"mapped",[98]],[[119862,119862],"mapped",[99]],[[119863,119863],"mapped",[100]],[[119864,119864],"mapped",[101]],[[119865,119865],"mapped",[102]],[[119866,119866],"mapped",[103]],[[119867,119867],"mapped",[104]],[[119868,119868],"mapped",[105]],[[119869,119869],"mapped",[106]],[[119870,119870],"mapped",[107]],[[119871,119871],"mapped",[108]],[[119872,119872],"mapped",[109]],[[119873,119873],"mapped",[110]],[[119874,119874],"mapped",[111]],[[119875,119875],"mapped",[112]],[[119876,119876],"mapped",[113]],[[119877,119877],"mapped",[114]],[[119878,119878],"mapped",[115]],[[119879,119879],"mapped",[116]],[[119880,119880],"mapped",[117]],[[119881,119881],"mapped",[118]],[[119882,119882],"mapped",[119]],[[119883,119883],"mapped",[120]],[[119884,119884],"mapped",[121]],[[119885,119885],"mapped",[122]],[[119886,119886],"mapped",[97]],[[119887,119887],"mapped",[98]],[[119888,119888],"mapped",[99]],[[119889,119889],"mapped",[100]],[[119890,119890],"mapped",[101]],[[119891,119891],"mapped",[102]],[[119892,119892],"mapped",[103]],[[119893,119893],"disallowed"],[[119894,119894],"mapped",[105]],[[119895,119895],"mapped",[106]],[[119896,119896],"mapped",[107]],[[119897,119897],"mapped",[108]],[[119898,119898],"mapped",[109]],[[119899,119899],"mapped",[110]],[[119900,119900],"mapped",[111]],[[119901,119901],"mapped",[112]],[[119902,119902],"mapped",[113]],[[119903,119903],"mapped",[114]],[[119904,119904],"mapped",[115]],[[119905,119905],"mapped",[116]],[[119906,119906],"mapped",[117]],[[119907,119907],"mapped",[118]],[[119908,119908],"mapped",[119]],[[119909,119909],"mapped",[120]],[[119910,119910],"mapped",[121]],[[119911,119911],"mapped",[122]],[[119912,119912],"mapped",[97]],[[119913,119913],"mapped",[98]],[[119914,119914],"mapped",[99]],[[119915,119915],"mapped",[100]],[[119916,119916],"mapped",[101]],[[119917,119917],"mapped",[102]],[[119918,119918],"mapped",[103]],[[119919,119919],"mapped",[104]],[[119920,119920],"mapped",[105]],[[119921,119921],"mapped",[106]],[[119922,119922],"mapped",[107]],[[119923,119923],"mapped",[108]],[[119924,119924],"mapped",[109]],[[119925,119925],"mapped",[110]],[[119926,119926],"mapped",[111]],[[119927,119927],"mapped",[112]],[[119928,119928],"mapped",[113]],[[119929,119929],"mapped",[114]],[[119930,119930],"mapped",[115]],[[119931,119931],"mapped",[116]],[[119932,119932],"mapped",[117]],[[119933,119933],"mapped",[118]],[[119934,119934],"mapped",[119]],[[119935,119935],"mapped",[120]],[[119936,119936],"mapped",[121]],[[119937,119937],"mapped",[122]],[[119938,119938],"mapped",[97]],[[119939,119939],"mapped",[98]],[[119940,119940],"mapped",[99]],[[119941,119941],"mapped",[100]],[[119942,119942],"mapped",[101]],[[119943,119943],"mapped",[102]],[[119944,119944],"mapped",[103]],[[119945,119945],"mapped",[104]],[[119946,119946],"mapped",[105]],[[119947,119947],"mapped",[106]],[[119948,119948],"mapped",[107]],[[119949,119949],"mapped",[108]],[[119950,119950],"mapped",[109]],[[119951,119951],"mapped",[110]],[[119952,119952],"mapped",[111]],[[119953,119953],"mapped",[112]],[[119954,119954],"mapped",[113]],[[119955,119955],"mapped",[114]],[[119956,119956],"mapped",[115]],[[119957,119957],"mapped",[116]],[[119958,119958],"mapped",[117]],[[119959,119959],"mapped",[118]],[[119960,119960],"mapped",[119]],[[119961,119961],"mapped",[120]],[[119962,119962],"mapped",[121]],[[119963,119963],"mapped",[122]],[[119964,119964],"mapped",[97]],[[119965,119965],"disallowed"],[[119966,119966],"mapped",[99]],[[119967,119967],"mapped",[100]],[[119968,119969],"disallowed"],[[119970,119970],"mapped",[103]],[[119971,119972],"disallowed"],[[119973,119973],"mapped",[106]],[[119974,119974],"mapped",[107]],[[119975,119976],"disallowed"],[[119977,119977],"mapped",[110]],[[119978,119978],"mapped",[111]],[[119979,119979],"mapped",[112]],[[119980,119980],"mapped",[113]],[[119981,119981],"disallowed"],[[119982,119982],"mapped",[115]],[[119983,119983],"mapped",[116]],[[119984,119984],"mapped",[117]],[[119985,119985],"mapped",[118]],[[119986,119986],"mapped",[119]],[[119987,119987],"mapped",[120]],[[119988,119988],"mapped",[121]],[[119989,119989],"mapped",[122]],[[119990,119990],"mapped",[97]],[[119991,119991],"mapped",[98]],[[119992,119992],"mapped",[99]],[[119993,119993],"mapped",[100]],[[119994,119994],"disallowed"],[[119995,119995],"mapped",[102]],[[119996,119996],"disallowed"],[[119997,119997],"mapped",[104]],[[119998,119998],"mapped",[105]],[[119999,119999],"mapped",[106]],[[120000,120000],"mapped",[107]],[[120001,120001],"mapped",[108]],[[120002,120002],"mapped",[109]],[[120003,120003],"mapped",[110]],[[120004,120004],"disallowed"],[[120005,120005],"mapped",[112]],[[120006,120006],"mapped",[113]],[[120007,120007],"mapped",[114]],[[120008,120008],"mapped",[115]],[[120009,120009],"mapped",[116]],[[120010,120010],"mapped",[117]],[[120011,120011],"mapped",[118]],[[120012,120012],"mapped",[119]],[[120013,120013],"mapped",[120]],[[120014,120014],"mapped",[121]],[[120015,120015],"mapped",[122]],[[120016,120016],"mapped",[97]],[[120017,120017],"mapped",[98]],[[120018,120018],"mapped",[99]],[[120019,120019],"mapped",[100]],[[120020,120020],"mapped",[101]],[[120021,120021],"mapped",[102]],[[120022,120022],"mapped",[103]],[[120023,120023],"mapped",[104]],[[120024,120024],"mapped",[105]],[[120025,120025],"mapped",[106]],[[120026,120026],"mapped",[107]],[[120027,120027],"mapped",[108]],[[120028,120028],"mapped",[109]],[[120029,120029],"mapped",[110]],[[120030,120030],"mapped",[111]],[[120031,120031],"mapped",[112]],[[120032,120032],"mapped",[113]],[[120033,120033],"mapped",[114]],[[120034,120034],"mapped",[115]],[[120035,120035],"mapped",[116]],[[120036,120036],"mapped",[117]],[[120037,120037],"mapped",[118]],[[120038,120038],"mapped",[119]],[[120039,120039],"mapped",[120]],[[120040,120040],"mapped",[121]],[[120041,120041],"mapped",[122]],[[120042,120042],"mapped",[97]],[[120043,120043],"mapped",[98]],[[120044,120044],"mapped",[99]],[[120045,120045],"mapped",[100]],[[120046,120046],"mapped",[101]],[[120047,120047],"mapped",[102]],[[120048,120048],"mapped",[103]],[[120049,120049],"mapped",[104]],[[120050,120050],"mapped",[105]],[[120051,120051],"mapped",[106]],[[120052,120052],"mapped",[107]],[[120053,120053],"mapped",[108]],[[120054,120054],"mapped",[109]],[[120055,120055],"mapped",[110]],[[120056,120056],"mapped",[111]],[[120057,120057],"mapped",[112]],[[120058,120058],"mapped",[113]],[[120059,120059],"mapped",[114]],[[120060,120060],"mapped",[115]],[[120061,120061],"mapped",[116]],[[120062,120062],"mapped",[117]],[[120063,120063],"mapped",[118]],[[120064,120064],"mapped",[119]],[[120065,120065],"mapped",[120]],[[120066,120066],"mapped",[121]],[[120067,120067],"mapped",[122]],[[120068,120068],"mapped",[97]],[[120069,120069],"mapped",[98]],[[120070,120070],"disallowed"],[[120071,120071],"mapped",[100]],[[120072,120072],"mapped",[101]],[[120073,120073],"mapped",[102]],[[120074,120074],"mapped",[103]],[[120075,120076],"disallowed"],[[120077,120077],"mapped",[106]],[[120078,120078],"mapped",[107]],[[120079,120079],"mapped",[108]],[[120080,120080],"mapped",[109]],[[120081,120081],"mapped",[110]],[[120082,120082],"mapped",[111]],[[120083,120083],"mapped",[112]],[[120084,120084],"mapped",[113]],[[120085,120085],"disallowed"],[[120086,120086],"mapped",[115]],[[120087,120087],"mapped",[116]],[[120088,120088],"mapped",[117]],[[120089,120089],"mapped",[118]],[[120090,120090],"mapped",[119]],[[120091,120091],"mapped",[120]],[[120092,120092],"mapped",[121]],[[120093,120093],"disallowed"],[[120094,120094],"mapped",[97]],[[120095,120095],"mapped",[98]],[[120096,120096],"mapped",[99]],[[120097,120097],"mapped",[100]],[[120098,120098],"mapped",[101]],[[120099,120099],"mapped",[102]],[[120100,120100],"mapped",[103]],[[120101,120101],"mapped",[104]],[[120102,120102],"mapped",[105]],[[120103,120103],"mapped",[106]],[[120104,120104],"mapped",[107]],[[120105,120105],"mapped",[108]],[[120106,120106],"mapped",[109]],[[120107,120107],"mapped",[110]],[[120108,120108],"mapped",[111]],[[120109,120109],"mapped",[112]],[[120110,120110],"mapped",[113]],[[120111,120111],"mapped",[114]],[[120112,120112],"mapped",[115]],[[120113,120113],"mapped",[116]],[[120114,120114],"mapped",[117]],[[120115,120115],"mapped",[118]],[[120116,120116],"mapped",[119]],[[120117,120117],"mapped",[120]],[[120118,120118],"mapped",[121]],[[120119,120119],"mapped",[122]],[[120120,120120],"mapped",[97]],[[120121,120121],"mapped",[98]],[[120122,120122],"disallowed"],[[120123,120123],"mapped",[100]],[[120124,120124],"mapped",[101]],[[120125,120125],"mapped",[102]],[[120126,120126],"mapped",[103]],[[120127,120127],"disallowed"],[[120128,120128],"mapped",[105]],[[120129,120129],"mapped",[106]],[[120130,120130],"mapped",[107]],[[120131,120131],"mapped",[108]],[[120132,120132],"mapped",[109]],[[120133,120133],"disallowed"],[[120134,120134],"mapped",[111]],[[120135,120137],"disallowed"],[[120138,120138],"mapped",[115]],[[120139,120139],"mapped",[116]],[[120140,120140],"mapped",[117]],[[120141,120141],"mapped",[118]],[[120142,120142],"mapped",[119]],[[120143,120143],"mapped",[120]],[[120144,120144],"mapped",[121]],[[120145,120145],"disallowed"],[[120146,120146],"mapped",[97]],[[120147,120147],"mapped",[98]],[[120148,120148],"mapped",[99]],[[120149,120149],"mapped",[100]],[[120150,120150],"mapped",[101]],[[120151,120151],"mapped",[102]],[[120152,120152],"mapped",[103]],[[120153,120153],"mapped",[104]],[[120154,120154],"mapped",[105]],[[120155,120155],"mapped",[106]],[[120156,120156],"mapped",[107]],[[120157,120157],"mapped",[108]],[[120158,120158],"mapped",[109]],[[120159,120159],"mapped",[110]],[[120160,120160],"mapped",[111]],[[120161,120161],"mapped",[112]],[[120162,120162],"mapped",[113]],[[120163,120163],"mapped",[114]],[[120164,120164],"mapped",[115]],[[120165,120165],"mapped",[116]],[[120166,120166],"mapped",[117]],[[120167,120167],"mapped",[118]],[[120168,120168],"mapped",[119]],[[120169,120169],"mapped",[120]],[[120170,120170],"mapped",[121]],[[120171,120171],"mapped",[122]],[[120172,120172],"mapped",[97]],[[120173,120173],"mapped",[98]],[[120174,120174],"mapped",[99]],[[120175,120175],"mapped",[100]],[[120176,120176],"mapped",[101]],[[120177,120177],"mapped",[102]],[[120178,120178],"mapped",[103]],[[120179,120179],"mapped",[104]],[[120180,120180],"mapped",[105]],[[120181,120181],"mapped",[106]],[[120182,120182],"mapped",[107]],[[120183,120183],"mapped",[108]],[[120184,120184],"mapped",[109]],[[120185,120185],"mapped",[110]],[[120186,120186],"mapped",[111]],[[120187,120187],"mapped",[112]],[[120188,120188],"mapped",[113]],[[120189,120189],"mapped",[114]],[[120190,120190],"mapped",[115]],[[120191,120191],"mapped",[116]],[[120192,120192],"mapped",[117]],[[120193,120193],"mapped",[118]],[[120194,120194],"mapped",[119]],[[120195,120195],"mapped",[120]],[[120196,120196],"mapped",[121]],[[120197,120197],"mapped",[122]],[[120198,120198],"mapped",[97]],[[120199,120199],"mapped",[98]],[[120200,120200],"mapped",[99]],[[120201,120201],"mapped",[100]],[[120202,120202],"mapped",[101]],[[120203,120203],"mapped",[102]],[[120204,120204],"mapped",[103]],[[120205,120205],"mapped",[104]],[[120206,120206],"mapped",[105]],[[120207,120207],"mapped",[106]],[[120208,120208],"mapped",[107]],[[120209,120209],"mapped",[108]],[[120210,120210],"mapped",[109]],[[120211,120211],"mapped",[110]],[[120212,120212],"mapped",[111]],[[120213,120213],"mapped",[112]],[[120214,120214],"mapped",[113]],[[120215,120215],"mapped",[114]],[[120216,120216],"mapped",[115]],[[120217,120217],"mapped",[116]],[[120218,120218],"mapped",[117]],[[120219,120219],"mapped",[118]],[[120220,120220],"mapped",[119]],[[120221,120221],"mapped",[120]],[[120222,120222],"mapped",[121]],[[120223,120223],"mapped",[122]],[[120224,120224],"mapped",[97]],[[120225,120225],"mapped",[98]],[[120226,120226],"mapped",[99]],[[120227,120227],"mapped",[100]],[[120228,120228],"mapped",[101]],[[120229,120229],"mapped",[102]],[[120230,120230],"mapped",[103]],[[120231,120231],"mapped",[104]],[[120232,120232],"mapped",[105]],[[120233,120233],"mapped",[106]],[[120234,120234],"mapped",[107]],[[120235,120235],"mapped",[108]],[[120236,120236],"mapped",[109]],[[120237,120237],"mapped",[110]],[[120238,120238],"mapped",[111]],[[120239,120239],"mapped",[112]],[[120240,120240],"mapped",[113]],[[120241,120241],"mapped",[114]],[[120242,120242],"mapped",[115]],[[120243,120243],"mapped",[116]],[[120244,120244],"mapped",[117]],[[120245,120245],"mapped",[118]],[[120246,120246],"mapped",[119]],[[120247,120247],"mapped",[120]],[[120248,120248],"mapped",[121]],[[120249,120249],"mapped",[122]],[[120250,120250],"mapped",[97]],[[120251,120251],"mapped",[98]],[[120252,120252],"mapped",[99]],[[120253,120253],"mapped",[100]],[[120254,120254],"mapped",[101]],[[120255,120255],"mapped",[102]],[[120256,120256],"mapped",[103]],[[120257,120257],"mapped",[104]],[[120258,120258],"mapped",[105]],[[120259,120259],"mapped",[106]],[[120260,120260],"mapped",[107]],[[120261,120261],"mapped",[108]],[[120262,120262],"mapped",[109]],[[120263,120263],"mapped",[110]],[[120264,120264],"mapped",[111]],[[120265,120265],"mapped",[112]],[[120266,120266],"mapped",[113]],[[120267,120267],"mapped",[114]],[[120268,120268],"mapped",[115]],[[120269,120269],"mapped",[116]],[[120270,120270],"mapped",[117]],[[120271,120271],"mapped",[118]],[[120272,120272],"mapped",[119]],[[120273,120273],"mapped",[120]],[[120274,120274],"mapped",[121]],[[120275,120275],"mapped",[122]],[[120276,120276],"mapped",[97]],[[120277,120277],"mapped",[98]],[[120278,120278],"mapped",[99]],[[120279,120279],"mapped",[100]],[[120280,120280],"mapped",[101]],[[120281,120281],"mapped",[102]],[[120282,120282],"mapped",[103]],[[120283,120283],"mapped",[104]],[[120284,120284],"mapped",[105]],[[120285,120285],"mapped",[106]],[[120286,120286],"mapped",[107]],[[120287,120287],"mapped",[108]],[[120288,120288],"mapped",[109]],[[120289,120289],"mapped",[110]],[[120290,120290],"mapped",[111]],[[120291,120291],"mapped",[112]],[[120292,120292],"mapped",[113]],[[120293,120293],"mapped",[114]],[[120294,120294],"mapped",[115]],[[120295,120295],"mapped",[116]],[[120296,120296],"mapped",[117]],[[120297,120297],"mapped",[118]],[[120298,120298],"mapped",[119]],[[120299,120299],"mapped",[120]],[[120300,120300],"mapped",[121]],[[120301,120301],"mapped",[122]],[[120302,120302],"mapped",[97]],[[120303,120303],"mapped",[98]],[[120304,120304],"mapped",[99]],[[120305,120305],"mapped",[100]],[[120306,120306],"mapped",[101]],[[120307,120307],"mapped",[102]],[[120308,120308],"mapped",[103]],[[120309,120309],"mapped",[104]],[[120310,120310],"mapped",[105]],[[120311,120311],"mapped",[106]],[[120312,120312],"mapped",[107]],[[120313,120313],"mapped",[108]],[[120314,120314],"mapped",[109]],[[120315,120315],"mapped",[110]],[[120316,120316],"mapped",[111]],[[120317,120317],"mapped",[112]],[[120318,120318],"mapped",[113]],[[120319,120319],"mapped",[114]],[[120320,120320],"mapped",[115]],[[120321,120321],"mapped",[116]],[[120322,120322],"mapped",[117]],[[120323,120323],"mapped",[118]],[[120324,120324],"mapped",[119]],[[120325,120325],"mapped",[120]],[[120326,120326],"mapped",[121]],[[120327,120327],"mapped",[122]],[[120328,120328],"mapped",[97]],[[120329,120329],"mapped",[98]],[[120330,120330],"mapped",[99]],[[120331,120331],"mapped",[100]],[[120332,120332],"mapped",[101]],[[120333,120333],"mapped",[102]],[[120334,120334],"mapped",[103]],[[120335,120335],"mapped",[104]],[[120336,120336],"mapped",[105]],[[120337,120337],"mapped",[106]],[[120338,120338],"mapped",[107]],[[120339,120339],"mapped",[108]],[[120340,120340],"mapped",[109]],[[120341,120341],"mapped",[110]],[[120342,120342],"mapped",[111]],[[120343,120343],"mapped",[112]],[[120344,120344],"mapped",[113]],[[120345,120345],"mapped",[114]],[[120346,120346],"mapped",[115]],[[120347,120347],"mapped",[116]],[[120348,120348],"mapped",[117]],[[120349,120349],"mapped",[118]],[[120350,120350],"mapped",[119]],[[120351,120351],"mapped",[120]],[[120352,120352],"mapped",[121]],[[120353,120353],"mapped",[122]],[[120354,120354],"mapped",[97]],[[120355,120355],"mapped",[98]],[[120356,120356],"mapped",[99]],[[120357,120357],"mapped",[100]],[[120358,120358],"mapped",[101]],[[120359,120359],"mapped",[102]],[[120360,120360],"mapped",[103]],[[120361,120361],"mapped",[104]],[[120362,120362],"mapped",[105]],[[120363,120363],"mapped",[106]],[[120364,120364],"mapped",[107]],[[120365,120365],"mapped",[108]],[[120366,120366],"mapped",[109]],[[120367,120367],"mapped",[110]],[[120368,120368],"mapped",[111]],[[120369,120369],"mapped",[112]],[[120370,120370],"mapped",[113]],[[120371,120371],"mapped",[114]],[[120372,120372],"mapped",[115]],[[120373,120373],"mapped",[116]],[[120374,120374],"mapped",[117]],[[120375,120375],"mapped",[118]],[[120376,120376],"mapped",[119]],[[120377,120377],"mapped",[120]],[[120378,120378],"mapped",[121]],[[120379,120379],"mapped",[122]],[[120380,120380],"mapped",[97]],[[120381,120381],"mapped",[98]],[[120382,120382],"mapped",[99]],[[120383,120383],"mapped",[100]],[[120384,120384],"mapped",[101]],[[120385,120385],"mapped",[102]],[[120386,120386],"mapped",[103]],[[120387,120387],"mapped",[104]],[[120388,120388],"mapped",[105]],[[120389,120389],"mapped",[106]],[[120390,120390],"mapped",[107]],[[120391,120391],"mapped",[108]],[[120392,120392],"mapped",[109]],[[120393,120393],"mapped",[110]],[[120394,120394],"mapped",[111]],[[120395,120395],"mapped",[112]],[[120396,120396],"mapped",[113]],[[120397,120397],"mapped",[114]],[[120398,120398],"mapped",[115]],[[120399,120399],"mapped",[116]],[[120400,120400],"mapped",[117]],[[120401,120401],"mapped",[118]],[[120402,120402],"mapped",[119]],[[120403,120403],"mapped",[120]],[[120404,120404],"mapped",[121]],[[120405,120405],"mapped",[122]],[[120406,120406],"mapped",[97]],[[120407,120407],"mapped",[98]],[[120408,120408],"mapped",[99]],[[120409,120409],"mapped",[100]],[[120410,120410],"mapped",[101]],[[120411,120411],"mapped",[102]],[[120412,120412],"mapped",[103]],[[120413,120413],"mapped",[104]],[[120414,120414],"mapped",[105]],[[120415,120415],"mapped",[106]],[[120416,120416],"mapped",[107]],[[120417,120417],"mapped",[108]],[[120418,120418],"mapped",[109]],[[120419,120419],"mapped",[110]],[[120420,120420],"mapped",[111]],[[120421,120421],"mapped",[112]],[[120422,120422],"mapped",[113]],[[120423,120423],"mapped",[114]],[[120424,120424],"mapped",[115]],[[120425,120425],"mapped",[116]],[[120426,120426],"mapped",[117]],[[120427,120427],"mapped",[118]],[[120428,120428],"mapped",[119]],[[120429,120429],"mapped",[120]],[[120430,120430],"mapped",[121]],[[120431,120431],"mapped",[122]],[[120432,120432],"mapped",[97]],[[120433,120433],"mapped",[98]],[[120434,120434],"mapped",[99]],[[120435,120435],"mapped",[100]],[[120436,120436],"mapped",[101]],[[120437,120437],"mapped",[102]],[[120438,120438],"mapped",[103]],[[120439,120439],"mapped",[104]],[[120440,120440],"mapped",[105]],[[120441,120441],"mapped",[106]],[[120442,120442],"mapped",[107]],[[120443,120443],"mapped",[108]],[[120444,120444],"mapped",[109]],[[120445,120445],"mapped",[110]],[[120446,120446],"mapped",[111]],[[120447,120447],"mapped",[112]],[[120448,120448],"mapped",[113]],[[120449,120449],"mapped",[114]],[[120450,120450],"mapped",[115]],[[120451,120451],"mapped",[116]],[[120452,120452],"mapped",[117]],[[120453,120453],"mapped",[118]],[[120454,120454],"mapped",[119]],[[120455,120455],"mapped",[120]],[[120456,120456],"mapped",[121]],[[120457,120457],"mapped",[122]],[[120458,120458],"mapped",[97]],[[120459,120459],"mapped",[98]],[[120460,120460],"mapped",[99]],[[120461,120461],"mapped",[100]],[[120462,120462],"mapped",[101]],[[120463,120463],"mapped",[102]],[[120464,120464],"mapped",[103]],[[120465,120465],"mapped",[104]],[[120466,120466],"mapped",[105]],[[120467,120467],"mapped",[106]],[[120468,120468],"mapped",[107]],[[120469,120469],"mapped",[108]],[[120470,120470],"mapped",[109]],[[120471,120471],"mapped",[110]],[[120472,120472],"mapped",[111]],[[120473,120473],"mapped",[112]],[[120474,120474],"mapped",[113]],[[120475,120475],"mapped",[114]],[[120476,120476],"mapped",[115]],[[120477,120477],"mapped",[116]],[[120478,120478],"mapped",[117]],[[120479,120479],"mapped",[118]],[[120480,120480],"mapped",[119]],[[120481,120481],"mapped",[120]],[[120482,120482],"mapped",[121]],[[120483,120483],"mapped",[122]],[[120484,120484],"mapped",[305]],[[120485,120485],"mapped",[567]],[[120486,120487],"disallowed"],[[120488,120488],"mapped",[945]],[[120489,120489],"mapped",[946]],[[120490,120490],"mapped",[947]],[[120491,120491],"mapped",[948]],[[120492,120492],"mapped",[949]],[[120493,120493],"mapped",[950]],[[120494,120494],"mapped",[951]],[[120495,120495],"mapped",[952]],[[120496,120496],"mapped",[953]],[[120497,120497],"mapped",[954]],[[120498,120498],"mapped",[955]],[[120499,120499],"mapped",[956]],[[120500,120500],"mapped",[957]],[[120501,120501],"mapped",[958]],[[120502,120502],"mapped",[959]],[[120503,120503],"mapped",[960]],[[120504,120504],"mapped",[961]],[[120505,120505],"mapped",[952]],[[120506,120506],"mapped",[963]],[[120507,120507],"mapped",[964]],[[120508,120508],"mapped",[965]],[[120509,120509],"mapped",[966]],[[120510,120510],"mapped",[967]],[[120511,120511],"mapped",[968]],[[120512,120512],"mapped",[969]],[[120513,120513],"mapped",[8711]],[[120514,120514],"mapped",[945]],[[120515,120515],"mapped",[946]],[[120516,120516],"mapped",[947]],[[120517,120517],"mapped",[948]],[[120518,120518],"mapped",[949]],[[120519,120519],"mapped",[950]],[[120520,120520],"mapped",[951]],[[120521,120521],"mapped",[952]],[[120522,120522],"mapped",[953]],[[120523,120523],"mapped",[954]],[[120524,120524],"mapped",[955]],[[120525,120525],"mapped",[956]],[[120526,120526],"mapped",[957]],[[120527,120527],"mapped",[958]],[[120528,120528],"mapped",[959]],[[120529,120529],"mapped",[960]],[[120530,120530],"mapped",[961]],[[120531,120532],"mapped",[963]],[[120533,120533],"mapped",[964]],[[120534,120534],"mapped",[965]],[[120535,120535],"mapped",[966]],[[120536,120536],"mapped",[967]],[[120537,120537],"mapped",[968]],[[120538,120538],"mapped",[969]],[[120539,120539],"mapped",[8706]],[[120540,120540],"mapped",[949]],[[120541,120541],"mapped",[952]],[[120542,120542],"mapped",[954]],[[120543,120543],"mapped",[966]],[[120544,120544],"mapped",[961]],[[120545,120545],"mapped",[960]],[[120546,120546],"mapped",[945]],[[120547,120547],"mapped",[946]],[[120548,120548],"mapped",[947]],[[120549,120549],"mapped",[948]],[[120550,120550],"mapped",[949]],[[120551,120551],"mapped",[950]],[[120552,120552],"mapped",[951]],[[120553,120553],"mapped",[952]],[[120554,120554],"mapped",[953]],[[120555,120555],"mapped",[954]],[[120556,120556],"mapped",[955]],[[120557,120557],"mapped",[956]],[[120558,120558],"mapped",[957]],[[120559,120559],"mapped",[958]],[[120560,120560],"mapped",[959]],[[120561,120561],"mapped",[960]],[[120562,120562],"mapped",[961]],[[120563,120563],"mapped",[952]],[[120564,120564],"mapped",[963]],[[120565,120565],"mapped",[964]],[[120566,120566],"mapped",[965]],[[120567,120567],"mapped",[966]],[[120568,120568],"mapped",[967]],[[120569,120569],"mapped",[968]],[[120570,120570],"mapped",[969]],[[120571,120571],"mapped",[8711]],[[120572,120572],"mapped",[945]],[[120573,120573],"mapped",[946]],[[120574,120574],"mapped",[947]],[[120575,120575],"mapped",[948]],[[120576,120576],"mapped",[949]],[[120577,120577],"mapped",[950]],[[120578,120578],"mapped",[951]],[[120579,120579],"mapped",[952]],[[120580,120580],"mapped",[953]],[[120581,120581],"mapped",[954]],[[120582,120582],"mapped",[955]],[[120583,120583],"mapped",[956]],[[120584,120584],"mapped",[957]],[[120585,120585],"mapped",[958]],[[120586,120586],"mapped",[959]],[[120587,120587],"mapped",[960]],[[120588,120588],"mapped",[961]],[[120589,120590],"mapped",[963]],[[120591,120591],"mapped",[964]],[[120592,120592],"mapped",[965]],[[120593,120593],"mapped",[966]],[[120594,120594],"mapped",[967]],[[120595,120595],"mapped",[968]],[[120596,120596],"mapped",[969]],[[120597,120597],"mapped",[8706]],[[120598,120598],"mapped",[949]],[[120599,120599],"mapped",[952]],[[120600,120600],"mapped",[954]],[[120601,120601],"mapped",[966]],[[120602,120602],"mapped",[961]],[[120603,120603],"mapped",[960]],[[120604,120604],"mapped",[945]],[[120605,120605],"mapped",[946]],[[120606,120606],"mapped",[947]],[[120607,120607],"mapped",[948]],[[120608,120608],"mapped",[949]],[[120609,120609],"mapped",[950]],[[120610,120610],"mapped",[951]],[[120611,120611],"mapped",[952]],[[120612,120612],"mapped",[953]],[[120613,120613],"mapped",[954]],[[120614,120614],"mapped",[955]],[[120615,120615],"mapped",[956]],[[120616,120616],"mapped",[957]],[[120617,120617],"mapped",[958]],[[120618,120618],"mapped",[959]],[[120619,120619],"mapped",[960]],[[120620,120620],"mapped",[961]],[[120621,120621],"mapped",[952]],[[120622,120622],"mapped",[963]],[[120623,120623],"mapped",[964]],[[120624,120624],"mapped",[965]],[[120625,120625],"mapped",[966]],[[120626,120626],"mapped",[967]],[[120627,120627],"mapped",[968]],[[120628,120628],"mapped",[969]],[[120629,120629],"mapped",[8711]],[[120630,120630],"mapped",[945]],[[120631,120631],"mapped",[946]],[[120632,120632],"mapped",[947]],[[120633,120633],"mapped",[948]],[[120634,120634],"mapped",[949]],[[120635,120635],"mapped",[950]],[[120636,120636],"mapped",[951]],[[120637,120637],"mapped",[952]],[[120638,120638],"mapped",[953]],[[120639,120639],"mapped",[954]],[[120640,120640],"mapped",[955]],[[120641,120641],"mapped",[956]],[[120642,120642],"mapped",[957]],[[120643,120643],"mapped",[958]],[[120644,120644],"mapped",[959]],[[120645,120645],"mapped",[960]],[[120646,120646],"mapped",[961]],[[120647,120648],"mapped",[963]],[[120649,120649],"mapped",[964]],[[120650,120650],"mapped",[965]],[[120651,120651],"mapped",[966]],[[120652,120652],"mapped",[967]],[[120653,120653],"mapped",[968]],[[120654,120654],"mapped",[969]],[[120655,120655],"mapped",[8706]],[[120656,120656],"mapped",[949]],[[120657,120657],"mapped",[952]],[[120658,120658],"mapped",[954]],[[120659,120659],"mapped",[966]],[[120660,120660],"mapped",[961]],[[120661,120661],"mapped",[960]],[[120662,120662],"mapped",[945]],[[120663,120663],"mapped",[946]],[[120664,120664],"mapped",[947]],[[120665,120665],"mapped",[948]],[[120666,120666],"mapped",[949]],[[120667,120667],"mapped",[950]],[[120668,120668],"mapped",[951]],[[120669,120669],"mapped",[952]],[[120670,120670],"mapped",[953]],[[120671,120671],"mapped",[954]],[[120672,120672],"mapped",[955]],[[120673,120673],"mapped",[956]],[[120674,120674],"mapped",[957]],[[120675,120675],"mapped",[958]],[[120676,120676],"mapped",[959]],[[120677,120677],"mapped",[960]],[[120678,120678],"mapped",[961]],[[120679,120679],"mapped",[952]],[[120680,120680],"mapped",[963]],[[120681,120681],"mapped",[964]],[[120682,120682],"mapped",[965]],[[120683,120683],"mapped",[966]],[[120684,120684],"mapped",[967]],[[120685,120685],"mapped",[968]],[[120686,120686],"mapped",[969]],[[120687,120687],"mapped",[8711]],[[120688,120688],"mapped",[945]],[[120689,120689],"mapped",[946]],[[120690,120690],"mapped",[947]],[[120691,120691],"mapped",[948]],[[120692,120692],"mapped",[949]],[[120693,120693],"mapped",[950]],[[120694,120694],"mapped",[951]],[[120695,120695],"mapped",[952]],[[120696,120696],"mapped",[953]],[[120697,120697],"mapped",[954]],[[120698,120698],"mapped",[955]],[[120699,120699],"mapped",[956]],[[120700,120700],"mapped",[957]],[[120701,120701],"mapped",[958]],[[120702,120702],"mapped",[959]],[[120703,120703],"mapped",[960]],[[120704,120704],"mapped",[961]],[[120705,120706],"mapped",[963]],[[120707,120707],"mapped",[964]],[[120708,120708],"mapped",[965]],[[120709,120709],"mapped",[966]],[[120710,120710],"mapped",[967]],[[120711,120711],"mapped",[968]],[[120712,120712],"mapped",[969]],[[120713,120713],"mapped",[8706]],[[120714,120714],"mapped",[949]],[[120715,120715],"mapped",[952]],[[120716,120716],"mapped",[954]],[[120717,120717],"mapped",[966]],[[120718,120718],"mapped",[961]],[[120719,120719],"mapped",[960]],[[120720,120720],"mapped",[945]],[[120721,120721],"mapped",[946]],[[120722,120722],"mapped",[947]],[[120723,120723],"mapped",[948]],[[120724,120724],"mapped",[949]],[[120725,120725],"mapped",[950]],[[120726,120726],"mapped",[951]],[[120727,120727],"mapped",[952]],[[120728,120728],"mapped",[953]],[[120729,120729],"mapped",[954]],[[120730,120730],"mapped",[955]],[[120731,120731],"mapped",[956]],[[120732,120732],"mapped",[957]],[[120733,120733],"mapped",[958]],[[120734,120734],"mapped",[959]],[[120735,120735],"mapped",[960]],[[120736,120736],"mapped",[961]],[[120737,120737],"mapped",[952]],[[120738,120738],"mapped",[963]],[[120739,120739],"mapped",[964]],[[120740,120740],"mapped",[965]],[[120741,120741],"mapped",[966]],[[120742,120742],"mapped",[967]],[[120743,120743],"mapped",[968]],[[120744,120744],"mapped",[969]],[[120745,120745],"mapped",[8711]],[[120746,120746],"mapped",[945]],[[120747,120747],"mapped",[946]],[[120748,120748],"mapped",[947]],[[120749,120749],"mapped",[948]],[[120750,120750],"mapped",[949]],[[120751,120751],"mapped",[950]],[[120752,120752],"mapped",[951]],[[120753,120753],"mapped",[952]],[[120754,120754],"mapped",[953]],[[120755,120755],"mapped",[954]],[[120756,120756],"mapped",[955]],[[120757,120757],"mapped",[956]],[[120758,120758],"mapped",[957]],[[120759,120759],"mapped",[958]],[[120760,120760],"mapped",[959]],[[120761,120761],"mapped",[960]],[[120762,120762],"mapped",[961]],[[120763,120764],"mapped",[963]],[[120765,120765],"mapped",[964]],[[120766,120766],"mapped",[965]],[[120767,120767],"mapped",[966]],[[120768,120768],"mapped",[967]],[[120769,120769],"mapped",[968]],[[120770,120770],"mapped",[969]],[[120771,120771],"mapped",[8706]],[[120772,120772],"mapped",[949]],[[120773,120773],"mapped",[952]],[[120774,120774],"mapped",[954]],[[120775,120775],"mapped",[966]],[[120776,120776],"mapped",[961]],[[120777,120777],"mapped",[960]],[[120778,120779],"mapped",[989]],[[120780,120781],"disallowed"],[[120782,120782],"mapped",[48]],[[120783,120783],"mapped",[49]],[[120784,120784],"mapped",[50]],[[120785,120785],"mapped",[51]],[[120786,120786],"mapped",[52]],[[120787,120787],"mapped",[53]],[[120788,120788],"mapped",[54]],[[120789,120789],"mapped",[55]],[[120790,120790],"mapped",[56]],[[120791,120791],"mapped",[57]],[[120792,120792],"mapped",[48]],[[120793,120793],"mapped",[49]],[[120794,120794],"mapped",[50]],[[120795,120795],"mapped",[51]],[[120796,120796],"mapped",[52]],[[120797,120797],"mapped",[53]],[[120798,120798],"mapped",[54]],[[120799,120799],"mapped",[55]],[[120800,120800],"mapped",[56]],[[120801,120801],"mapped",[57]],[[120802,120802],"mapped",[48]],[[120803,120803],"mapped",[49]],[[120804,120804],"mapped",[50]],[[120805,120805],"mapped",[51]],[[120806,120806],"mapped",[52]],[[120807,120807],"mapped",[53]],[[120808,120808],"mapped",[54]],[[120809,120809],"mapped",[55]],[[120810,120810],"mapped",[56]],[[120811,120811],"mapped",[57]],[[120812,120812],"mapped",[48]],[[120813,120813],"mapped",[49]],[[120814,120814],"mapped",[50]],[[120815,120815],"mapped",[51]],[[120816,120816],"mapped",[52]],[[120817,120817],"mapped",[53]],[[120818,120818],"mapped",[54]],[[120819,120819],"mapped",[55]],[[120820,120820],"mapped",[56]],[[120821,120821],"mapped",[57]],[[120822,120822],"mapped",[48]],[[120823,120823],"mapped",[49]],[[120824,120824],"mapped",[50]],[[120825,120825],"mapped",[51]],[[120826,120826],"mapped",[52]],[[120827,120827],"mapped",[53]],[[120828,120828],"mapped",[54]],[[120829,120829],"mapped",[55]],[[120830,120830],"mapped",[56]],[[120831,120831],"mapped",[57]],[[120832,121343],"valid",[],"NV8"],[[121344,121398],"valid"],[[121399,121402],"valid",[],"NV8"],[[121403,121452],"valid"],[[121453,121460],"valid",[],"NV8"],[[121461,121461],"valid"],[[121462,121475],"valid",[],"NV8"],[[121476,121476],"valid"],[[121477,121483],"valid",[],"NV8"],[[121484,121498],"disallowed"],[[121499,121503],"valid"],[[121504,121504],"disallowed"],[[121505,121519],"valid"],[[121520,124927],"disallowed"],[[124928,125124],"valid"],[[125125,125126],"disallowed"],[[125127,125135],"valid",[],"NV8"],[[125136,125142],"valid"],[[125143,126463],"disallowed"],[[126464,126464],"mapped",[1575]],[[126465,126465],"mapped",[1576]],[[126466,126466],"mapped",[1580]],[[126467,126467],"mapped",[1583]],[[126468,126468],"disallowed"],[[126469,126469],"mapped",[1608]],[[126470,126470],"mapped",[1586]],[[126471,126471],"mapped",[1581]],[[126472,126472],"mapped",[1591]],[[126473,126473],"mapped",[1610]],[[126474,126474],"mapped",[1603]],[[126475,126475],"mapped",[1604]],[[126476,126476],"mapped",[1605]],[[126477,126477],"mapped",[1606]],[[126478,126478],"mapped",[1587]],[[126479,126479],"mapped",[1593]],[[126480,126480],"mapped",[1601]],[[126481,126481],"mapped",[1589]],[[126482,126482],"mapped",[1602]],[[126483,126483],"mapped",[1585]],[[126484,126484],"mapped",[1588]],[[126485,126485],"mapped",[1578]],[[126486,126486],"mapped",[1579]],[[126487,126487],"mapped",[1582]],[[126488,126488],"mapped",[1584]],[[126489,126489],"mapped",[1590]],[[126490,126490],"mapped",[1592]],[[126491,126491],"mapped",[1594]],[[126492,126492],"mapped",[1646]],[[126493,126493],"mapped",[1722]],[[126494,126494],"mapped",[1697]],[[126495,126495],"mapped",[1647]],[[126496,126496],"disallowed"],[[126497,126497],"mapped",[1576]],[[126498,126498],"mapped",[1580]],[[126499,126499],"disallowed"],[[126500,126500],"mapped",[1607]],[[126501,126502],"disallowed"],[[126503,126503],"mapped",[1581]],[[126504,126504],"disallowed"],[[126505,126505],"mapped",[1610]],[[126506,126506],"mapped",[1603]],[[126507,126507],"mapped",[1604]],[[126508,126508],"mapped",[1605]],[[126509,126509],"mapped",[1606]],[[126510,126510],"mapped",[1587]],[[126511,126511],"mapped",[1593]],[[126512,126512],"mapped",[1601]],[[126513,126513],"mapped",[1589]],[[126514,126514],"mapped",[1602]],[[126515,126515],"disallowed"],[[126516,126516],"mapped",[1588]],[[126517,126517],"mapped",[1578]],[[126518,126518],"mapped",[1579]],[[126519,126519],"mapped",[1582]],[[126520,126520],"disallowed"],[[126521,126521],"mapped",[1590]],[[126522,126522],"disallowed"],[[126523,126523],"mapped",[1594]],[[126524,126529],"disallowed"],[[126530,126530],"mapped",[1580]],[[126531,126534],"disallowed"],[[126535,126535],"mapped",[1581]],[[126536,126536],"disallowed"],[[126537,126537],"mapped",[1610]],[[126538,126538],"disallowed"],[[126539,126539],"mapped",[1604]],[[126540,126540],"disallowed"],[[126541,126541],"mapped",[1606]],[[126542,126542],"mapped",[1587]],[[126543,126543],"mapped",[1593]],[[126544,126544],"disallowed"],[[126545,126545],"mapped",[1589]],[[126546,126546],"mapped",[1602]],[[126547,126547],"disallowed"],[[126548,126548],"mapped",[1588]],[[126549,126550],"disallowed"],[[126551,126551],"mapped",[1582]],[[126552,126552],"disallowed"],[[126553,126553],"mapped",[1590]],[[126554,126554],"disallowed"],[[126555,126555],"mapped",[1594]],[[126556,126556],"disallowed"],[[126557,126557],"mapped",[1722]],[[126558,126558],"disallowed"],[[126559,126559],"mapped",[1647]],[[126560,126560],"disallowed"],[[126561,126561],"mapped",[1576]],[[126562,126562],"mapped",[1580]],[[126563,126563],"disallowed"],[[126564,126564],"mapped",[1607]],[[126565,126566],"disallowed"],[[126567,126567],"mapped",[1581]],[[126568,126568],"mapped",[1591]],[[126569,126569],"mapped",[1610]],[[126570,126570],"mapped",[1603]],[[126571,126571],"disallowed"],[[126572,126572],"mapped",[1605]],[[126573,126573],"mapped",[1606]],[[126574,126574],"mapped",[1587]],[[126575,126575],"mapped",[1593]],[[126576,126576],"mapped",[1601]],[[126577,126577],"mapped",[1589]],[[126578,126578],"mapped",[1602]],[[126579,126579],"disallowed"],[[126580,126580],"mapped",[1588]],[[126581,126581],"mapped",[1578]],[[126582,126582],"mapped",[1579]],[[126583,126583],"mapped",[1582]],[[126584,126584],"disallowed"],[[126585,126585],"mapped",[1590]],[[126586,126586],"mapped",[1592]],[[126587,126587],"mapped",[1594]],[[126588,126588],"mapped",[1646]],[[126589,126589],"disallowed"],[[126590,126590],"mapped",[1697]],[[126591,126591],"disallowed"],[[126592,126592],"mapped",[1575]],[[126593,126593],"mapped",[1576]],[[126594,126594],"mapped",[1580]],[[126595,126595],"mapped",[1583]],[[126596,126596],"mapped",[1607]],[[126597,126597],"mapped",[1608]],[[126598,126598],"mapped",[1586]],[[126599,126599],"mapped",[1581]],[[126600,126600],"mapped",[1591]],[[126601,126601],"mapped",[1610]],[[126602,126602],"disallowed"],[[126603,126603],"mapped",[1604]],[[126604,126604],"mapped",[1605]],[[126605,126605],"mapped",[1606]],[[126606,126606],"mapped",[1587]],[[126607,126607],"mapped",[1593]],[[126608,126608],"mapped",[1601]],[[126609,126609],"mapped",[1589]],[[126610,126610],"mapped",[1602]],[[126611,126611],"mapped",[1585]],[[126612,126612],"mapped",[1588]],[[126613,126613],"mapped",[1578]],[[126614,126614],"mapped",[1579]],[[126615,126615],"mapped",[1582]],[[126616,126616],"mapped",[1584]],[[126617,126617],"mapped",[1590]],[[126618,126618],"mapped",[1592]],[[126619,126619],"mapped",[1594]],[[126620,126624],"disallowed"],[[126625,126625],"mapped",[1576]],[[126626,126626],"mapped",[1580]],[[126627,126627],"mapped",[1583]],[[126628,126628],"disallowed"],[[126629,126629],"mapped",[1608]],[[126630,126630],"mapped",[1586]],[[126631,126631],"mapped",[1581]],[[126632,126632],"mapped",[1591]],[[126633,126633],"mapped",[1610]],[[126634,126634],"disallowed"],[[126635,126635],"mapped",[1604]],[[126636,126636],"mapped",[1605]],[[126637,126637],"mapped",[1606]],[[126638,126638],"mapped",[1587]],[[126639,126639],"mapped",[1593]],[[126640,126640],"mapped",[1601]],[[126641,126641],"mapped",[1589]],[[126642,126642],"mapped",[1602]],[[126643,126643],"mapped",[1585]],[[126644,126644],"mapped",[1588]],[[126645,126645],"mapped",[1578]],[[126646,126646],"mapped",[1579]],[[126647,126647],"mapped",[1582]],[[126648,126648],"mapped",[1584]],[[126649,126649],"mapped",[1590]],[[126650,126650],"mapped",[1592]],[[126651,126651],"mapped",[1594]],[[126652,126703],"disallowed"],[[126704,126705],"valid",[],"NV8"],[[126706,126975],"disallowed"],[[126976,127019],"valid",[],"NV8"],[[127020,127023],"disallowed"],[[127024,127123],"valid",[],"NV8"],[[127124,127135],"disallowed"],[[127136,127150],"valid",[],"NV8"],[[127151,127152],"disallowed"],[[127153,127166],"valid",[],"NV8"],[[127167,127167],"valid",[],"NV8"],[[127168,127168],"disallowed"],[[127169,127183],"valid",[],"NV8"],[[127184,127184],"disallowed"],[[127185,127199],"valid",[],"NV8"],[[127200,127221],"valid",[],"NV8"],[[127222,127231],"disallowed"],[[127232,127232],"disallowed"],[[127233,127233],"disallowed_STD3_mapped",[48,44]],[[127234,127234],"disallowed_STD3_mapped",[49,44]],[[127235,127235],"disallowed_STD3_mapped",[50,44]],[[127236,127236],"disallowed_STD3_mapped",[51,44]],[[127237,127237],"disallowed_STD3_mapped",[52,44]],[[127238,127238],"disallowed_STD3_mapped",[53,44]],[[127239,127239],"disallowed_STD3_mapped",[54,44]],[[127240,127240],"disallowed_STD3_mapped",[55,44]],[[127241,127241],"disallowed_STD3_mapped",[56,44]],[[127242,127242],"disallowed_STD3_mapped",[57,44]],[[127243,127244],"valid",[],"NV8"],[[127245,127247],"disallowed"],[[127248,127248],"disallowed_STD3_mapped",[40,97,41]],[[127249,127249],"disallowed_STD3_mapped",[40,98,41]],[[127250,127250],"disallowed_STD3_mapped",[40,99,41]],[[127251,127251],"disallowed_STD3_mapped",[40,100,41]],[[127252,127252],"disallowed_STD3_mapped",[40,101,41]],[[127253,127253],"disallowed_STD3_mapped",[40,102,41]],[[127254,127254],"disallowed_STD3_mapped",[40,103,41]],[[127255,127255],"disallowed_STD3_mapped",[40,104,41]],[[127256,127256],"disallowed_STD3_mapped",[40,105,41]],[[127257,127257],"disallowed_STD3_mapped",[40,106,41]],[[127258,127258],"disallowed_STD3_mapped",[40,107,41]],[[127259,127259],"disallowed_STD3_mapped",[40,108,41]],[[127260,127260],"disallowed_STD3_mapped",[40,109,41]],[[127261,127261],"disallowed_STD3_mapped",[40,110,41]],[[127262,127262],"disallowed_STD3_mapped",[40,111,41]],[[127263,127263],"disallowed_STD3_mapped",[40,112,41]],[[127264,127264],"disallowed_STD3_mapped",[40,113,41]],[[127265,127265],"disallowed_STD3_mapped",[40,114,41]],[[127266,127266],"disallowed_STD3_mapped",[40,115,41]],[[127267,127267],"disallowed_STD3_mapped",[40,116,41]],[[127268,127268],"disallowed_STD3_mapped",[40,117,41]],[[127269,127269],"disallowed_STD3_mapped",[40,118,41]],[[127270,127270],"disallowed_STD3_mapped",[40,119,41]],[[127271,127271],"disallowed_STD3_mapped",[40,120,41]],[[127272,127272],"disallowed_STD3_mapped",[40,121,41]],[[127273,127273],"disallowed_STD3_mapped",[40,122,41]],[[127274,127274],"mapped",[12308,115,12309]],[[127275,127275],"mapped",[99]],[[127276,127276],"mapped",[114]],[[127277,127277],"mapped",[99,100]],[[127278,127278],"mapped",[119,122]],[[127279,127279],"disallowed"],[[127280,127280],"mapped",[97]],[[127281,127281],"mapped",[98]],[[127282,127282],"mapped",[99]],[[127283,127283],"mapped",[100]],[[127284,127284],"mapped",[101]],[[127285,127285],"mapped",[102]],[[127286,127286],"mapped",[103]],[[127287,127287],"mapped",[104]],[[127288,127288],"mapped",[105]],[[127289,127289],"mapped",[106]],[[127290,127290],"mapped",[107]],[[127291,127291],"mapped",[108]],[[127292,127292],"mapped",[109]],[[127293,127293],"mapped",[110]],[[127294,127294],"mapped",[111]],[[127295,127295],"mapped",[112]],[[127296,127296],"mapped",[113]],[[127297,127297],"mapped",[114]],[[127298,127298],"mapped",[115]],[[127299,127299],"mapped",[116]],[[127300,127300],"mapped",[117]],[[127301,127301],"mapped",[118]],[[127302,127302],"mapped",[119]],[[127303,127303],"mapped",[120]],[[127304,127304],"mapped",[121]],[[127305,127305],"mapped",[122]],[[127306,127306],"mapped",[104,118]],[[127307,127307],"mapped",[109,118]],[[127308,127308],"mapped",[115,100]],[[127309,127309],"mapped",[115,115]],[[127310,127310],"mapped",[112,112,118]],[[127311,127311],"mapped",[119,99]],[[127312,127318],"valid",[],"NV8"],[[127319,127319],"valid",[],"NV8"],[[127320,127326],"valid",[],"NV8"],[[127327,127327],"valid",[],"NV8"],[[127328,127337],"valid",[],"NV8"],[[127338,127338],"mapped",[109,99]],[[127339,127339],"mapped",[109,100]],[[127340,127343],"disallowed"],[[127344,127352],"valid",[],"NV8"],[[127353,127353],"valid",[],"NV8"],[[127354,127354],"valid",[],"NV8"],[[127355,127356],"valid",[],"NV8"],[[127357,127358],"valid",[],"NV8"],[[127359,127359],"valid",[],"NV8"],[[127360,127369],"valid",[],"NV8"],[[127370,127373],"valid",[],"NV8"],[[127374,127375],"valid",[],"NV8"],[[127376,127376],"mapped",[100,106]],[[127377,127386],"valid",[],"NV8"],[[127387,127461],"disallowed"],[[127462,127487],"valid",[],"NV8"],[[127488,127488],"mapped",[12411,12363]],[[127489,127489],"mapped",[12467,12467]],[[127490,127490],"mapped",[12469]],[[127491,127503],"disallowed"],[[127504,127504],"mapped",[25163]],[[127505,127505],"mapped",[23383]],[[127506,127506],"mapped",[21452]],[[127507,127507],"mapped",[12487]],[[127508,127508],"mapped",[20108]],[[127509,127509],"mapped",[22810]],[[127510,127510],"mapped",[35299]],[[127511,127511],"mapped",[22825]],[[127512,127512],"mapped",[20132]],[[127513,127513],"mapped",[26144]],[[127514,127514],"mapped",[28961]],[[127515,127515],"mapped",[26009]],[[127516,127516],"mapped",[21069]],[[127517,127517],"mapped",[24460]],[[127518,127518],"mapped",[20877]],[[127519,127519],"mapped",[26032]],[[127520,127520],"mapped",[21021]],[[127521,127521],"mapped",[32066]],[[127522,127522],"mapped",[29983]],[[127523,127523],"mapped",[36009]],[[127524,127524],"mapped",[22768]],[[127525,127525],"mapped",[21561]],[[127526,127526],"mapped",[28436]],[[127527,127527],"mapped",[25237]],[[127528,127528],"mapped",[25429]],[[127529,127529],"mapped",[19968]],[[127530,127530],"mapped",[19977]],[[127531,127531],"mapped",[36938]],[[127532,127532],"mapped",[24038]],[[127533,127533],"mapped",[20013]],[[127534,127534],"mapped",[21491]],[[127535,127535],"mapped",[25351]],[[127536,127536],"mapped",[36208]],[[127537,127537],"mapped",[25171]],[[127538,127538],"mapped",[31105]],[[127539,127539],"mapped",[31354]],[[127540,127540],"mapped",[21512]],[[127541,127541],"mapped",[28288]],[[127542,127542],"mapped",[26377]],[[127543,127543],"mapped",[26376]],[[127544,127544],"mapped",[30003]],[[127545,127545],"mapped",[21106]],[[127546,127546],"mapped",[21942]],[[127547,127551],"disallowed"],[[127552,127552],"mapped",[12308,26412,12309]],[[127553,127553],"mapped",[12308,19977,12309]],[[127554,127554],"mapped",[12308,20108,12309]],[[127555,127555],"mapped",[12308,23433,12309]],[[127556,127556],"mapped",[12308,28857,12309]],[[127557,127557],"mapped",[12308,25171,12309]],[[127558,127558],"mapped",[12308,30423,12309]],[[127559,127559],"mapped",[12308,21213,12309]],[[127560,127560],"mapped",[12308,25943,12309]],[[127561,127567],"disallowed"],[[127568,127568],"mapped",[24471]],[[127569,127569],"mapped",[21487]],[[127570,127743],"disallowed"],[[127744,127776],"valid",[],"NV8"],[[127777,127788],"valid",[],"NV8"],[[127789,127791],"valid",[],"NV8"],[[127792,127797],"valid",[],"NV8"],[[127798,127798],"valid",[],"NV8"],[[127799,127868],"valid",[],"NV8"],[[127869,127869],"valid",[],"NV8"],[[127870,127871],"valid",[],"NV8"],[[127872,127891],"valid",[],"NV8"],[[127892,127903],"valid",[],"NV8"],[[127904,127940],"valid",[],"NV8"],[[127941,127941],"valid",[],"NV8"],[[127942,127946],"valid",[],"NV8"],[[127947,127950],"valid",[],"NV8"],[[127951,127955],"valid",[],"NV8"],[[127956,127967],"valid",[],"NV8"],[[127968,127984],"valid",[],"NV8"],[[127985,127991],"valid",[],"NV8"],[[127992,127999],"valid",[],"NV8"],[[128000,128062],"valid",[],"NV8"],[[128063,128063],"valid",[],"NV8"],[[128064,128064],"valid",[],"NV8"],[[128065,128065],"valid",[],"NV8"],[[128066,128247],"valid",[],"NV8"],[[128248,128248],"valid",[],"NV8"],[[128249,128252],"valid",[],"NV8"],[[128253,128254],"valid",[],"NV8"],[[128255,128255],"valid",[],"NV8"],[[128256,128317],"valid",[],"NV8"],[[128318,128319],"valid",[],"NV8"],[[128320,128323],"valid",[],"NV8"],[[128324,128330],"valid",[],"NV8"],[[128331,128335],"valid",[],"NV8"],[[128336,128359],"valid",[],"NV8"],[[128360,128377],"valid",[],"NV8"],[[128378,128378],"disallowed"],[[128379,128419],"valid",[],"NV8"],[[128420,128420],"disallowed"],[[128421,128506],"valid",[],"NV8"],[[128507,128511],"valid",[],"NV8"],[[128512,128512],"valid",[],"NV8"],[[128513,128528],"valid",[],"NV8"],[[128529,128529],"valid",[],"NV8"],[[128530,128532],"valid",[],"NV8"],[[128533,128533],"valid",[],"NV8"],[[128534,128534],"valid",[],"NV8"],[[128535,128535],"valid",[],"NV8"],[[128536,128536],"valid",[],"NV8"],[[128537,128537],"valid",[],"NV8"],[[128538,128538],"valid",[],"NV8"],[[128539,128539],"valid",[],"NV8"],[[128540,128542],"valid",[],"NV8"],[[128543,128543],"valid",[],"NV8"],[[128544,128549],"valid",[],"NV8"],[[128550,128551],"valid",[],"NV8"],[[128552,128555],"valid",[],"NV8"],[[128556,128556],"valid",[],"NV8"],[[128557,128557],"valid",[],"NV8"],[[128558,128559],"valid",[],"NV8"],[[128560,128563],"valid",[],"NV8"],[[128564,128564],"valid",[],"NV8"],[[128565,128576],"valid",[],"NV8"],[[128577,128578],"valid",[],"NV8"],[[128579,128580],"valid",[],"NV8"],[[128581,128591],"valid",[],"NV8"],[[128592,128639],"valid",[],"NV8"],[[128640,128709],"valid",[],"NV8"],[[128710,128719],"valid",[],"NV8"],[[128720,128720],"valid",[],"NV8"],[[128721,128735],"disallowed"],[[128736,128748],"valid",[],"NV8"],[[128749,128751],"disallowed"],[[128752,128755],"valid",[],"NV8"],[[128756,128767],"disallowed"],[[128768,128883],"valid",[],"NV8"],[[128884,128895],"disallowed"],[[128896,128980],"valid",[],"NV8"],[[128981,129023],"disallowed"],[[129024,129035],"valid",[],"NV8"],[[129036,129039],"disallowed"],[[129040,129095],"valid",[],"NV8"],[[129096,129103],"disallowed"],[[129104,129113],"valid",[],"NV8"],[[129114,129119],"disallowed"],[[129120,129159],"valid",[],"NV8"],[[129160,129167],"disallowed"],[[129168,129197],"valid",[],"NV8"],[[129198,129295],"disallowed"],[[129296,129304],"valid",[],"NV8"],[[129305,129407],"disallowed"],[[129408,129412],"valid",[],"NV8"],[[129413,129471],"disallowed"],[[129472,129472],"valid",[],"NV8"],[[129473,131069],"disallowed"],[[131070,131071],"disallowed"],[[131072,173782],"valid"],[[173783,173823],"disallowed"],[[173824,177972],"valid"],[[177973,177983],"disallowed"],[[177984,178205],"valid"],[[178206,178207],"disallowed"],[[178208,183969],"valid"],[[183970,194559],"disallowed"],[[194560,194560],"mapped",[20029]],[[194561,194561],"mapped",[20024]],[[194562,194562],"mapped",[20033]],[[194563,194563],"mapped",[131362]],[[194564,194564],"mapped",[20320]],[[194565,194565],"mapped",[20398]],[[194566,194566],"mapped",[20411]],[[194567,194567],"mapped",[20482]],[[194568,194568],"mapped",[20602]],[[194569,194569],"mapped",[20633]],[[194570,194570],"mapped",[20711]],[[194571,194571],"mapped",[20687]],[[194572,194572],"mapped",[13470]],[[194573,194573],"mapped",[132666]],[[194574,194574],"mapped",[20813]],[[194575,194575],"mapped",[20820]],[[194576,194576],"mapped",[20836]],[[194577,194577],"mapped",[20855]],[[194578,194578],"mapped",[132380]],[[194579,194579],"mapped",[13497]],[[194580,194580],"mapped",[20839]],[[194581,194581],"mapped",[20877]],[[194582,194582],"mapped",[132427]],[[194583,194583],"mapped",[20887]],[[194584,194584],"mapped",[20900]],[[194585,194585],"mapped",[20172]],[[194586,194586],"mapped",[20908]],[[194587,194587],"mapped",[20917]],[[194588,194588],"mapped",[168415]],[[194589,194589],"mapped",[20981]],[[194590,194590],"mapped",[20995]],[[194591,194591],"mapped",[13535]],[[194592,194592],"mapped",[21051]],[[194593,194593],"mapped",[21062]],[[194594,194594],"mapped",[21106]],[[194595,194595],"mapped",[21111]],[[194596,194596],"mapped",[13589]],[[194597,194597],"mapped",[21191]],[[194598,194598],"mapped",[21193]],[[194599,194599],"mapped",[21220]],[[194600,194600],"mapped",[21242]],[[194601,194601],"mapped",[21253]],[[194602,194602],"mapped",[21254]],[[194603,194603],"mapped",[21271]],[[194604,194604],"mapped",[21321]],[[194605,194605],"mapped",[21329]],[[194606,194606],"mapped",[21338]],[[194607,194607],"mapped",[21363]],[[194608,194608],"mapped",[21373]],[[194609,194611],"mapped",[21375]],[[194612,194612],"mapped",[133676]],[[194613,194613],"mapped",[28784]],[[194614,194614],"mapped",[21450]],[[194615,194615],"mapped",[21471]],[[194616,194616],"mapped",[133987]],[[194617,194617],"mapped",[21483]],[[194618,194618],"mapped",[21489]],[[194619,194619],"mapped",[21510]],[[194620,194620],"mapped",[21662]],[[194621,194621],"mapped",[21560]],[[194622,194622],"mapped",[21576]],[[194623,194623],"mapped",[21608]],[[194624,194624],"mapped",[21666]],[[194625,194625],"mapped",[21750]],[[194626,194626],"mapped",[21776]],[[194627,194627],"mapped",[21843]],[[194628,194628],"mapped",[21859]],[[194629,194630],"mapped",[21892]],[[194631,194631],"mapped",[21913]],[[194632,194632],"mapped",[21931]],[[194633,194633],"mapped",[21939]],[[194634,194634],"mapped",[21954]],[[194635,194635],"mapped",[22294]],[[194636,194636],"mapped",[22022]],[[194637,194637],"mapped",[22295]],[[194638,194638],"mapped",[22097]],[[194639,194639],"mapped",[22132]],[[194640,194640],"mapped",[20999]],[[194641,194641],"mapped",[22766]],[[194642,194642],"mapped",[22478]],[[194643,194643],"mapped",[22516]],[[194644,194644],"mapped",[22541]],[[194645,194645],"mapped",[22411]],[[194646,194646],"mapped",[22578]],[[194647,194647],"mapped",[22577]],[[194648,194648],"mapped",[22700]],[[194649,194649],"mapped",[136420]],[[194650,194650],"mapped",[22770]],[[194651,194651],"mapped",[22775]],[[194652,194652],"mapped",[22790]],[[194653,194653],"mapped",[22810]],[[194654,194654],"mapped",[22818]],[[194655,194655],"mapped",[22882]],[[194656,194656],"mapped",[136872]],[[194657,194657],"mapped",[136938]],[[194658,194658],"mapped",[23020]],[[194659,194659],"mapped",[23067]],[[194660,194660],"mapped",[23079]],[[194661,194661],"mapped",[23000]],[[194662,194662],"mapped",[23142]],[[194663,194663],"mapped",[14062]],[[194664,194664],"disallowed"],[[194665,194665],"mapped",[23304]],[[194666,194667],"mapped",[23358]],[[194668,194668],"mapped",[137672]],[[194669,194669],"mapped",[23491]],[[194670,194670],"mapped",[23512]],[[194671,194671],"mapped",[23527]],[[194672,194672],"mapped",[23539]],[[194673,194673],"mapped",[138008]],[[194674,194674],"mapped",[23551]],[[194675,194675],"mapped",[23558]],[[194676,194676],"disallowed"],[[194677,194677],"mapped",[23586]],[[194678,194678],"mapped",[14209]],[[194679,194679],"mapped",[23648]],[[194680,194680],"mapped",[23662]],[[194681,194681],"mapped",[23744]],[[194682,194682],"mapped",[23693]],[[194683,194683],"mapped",[138724]],[[194684,194684],"mapped",[23875]],[[194685,194685],"mapped",[138726]],[[194686,194686],"mapped",[23918]],[[194687,194687],"mapped",[23915]],[[194688,194688],"mapped",[23932]],[[194689,194689],"mapped",[24033]],[[194690,194690],"mapped",[24034]],[[194691,194691],"mapped",[14383]],[[194692,194692],"mapped",[24061]],[[194693,194693],"mapped",[24104]],[[194694,194694],"mapped",[24125]],[[194695,194695],"mapped",[24169]],[[194696,194696],"mapped",[14434]],[[194697,194697],"mapped",[139651]],[[194698,194698],"mapped",[14460]],[[194699,194699],"mapped",[24240]],[[194700,194700],"mapped",[24243]],[[194701,194701],"mapped",[24246]],[[194702,194702],"mapped",[24266]],[[194703,194703],"mapped",[172946]],[[194704,194704],"mapped",[24318]],[[194705,194706],"mapped",[140081]],[[194707,194707],"mapped",[33281]],[[194708,194709],"mapped",[24354]],[[194710,194710],"mapped",[14535]],[[194711,194711],"mapped",[144056]],[[194712,194712],"mapped",[156122]],[[194713,194713],"mapped",[24418]],[[194714,194714],"mapped",[24427]],[[194715,194715],"mapped",[14563]],[[194716,194716],"mapped",[24474]],[[194717,194717],"mapped",[24525]],[[194718,194718],"mapped",[24535]],[[194719,194719],"mapped",[24569]],[[194720,194720],"mapped",[24705]],[[194721,194721],"mapped",[14650]],[[194722,194722],"mapped",[14620]],[[194723,194723],"mapped",[24724]],[[194724,194724],"mapped",[141012]],[[194725,194725],"mapped",[24775]],[[194726,194726],"mapped",[24904]],[[194727,194727],"mapped",[24908]],[[194728,194728],"mapped",[24910]],[[194729,194729],"mapped",[24908]],[[194730,194730],"mapped",[24954]],[[194731,194731],"mapped",[24974]],[[194732,194732],"mapped",[25010]],[[194733,194733],"mapped",[24996]],[[194734,194734],"mapped",[25007]],[[194735,194735],"mapped",[25054]],[[194736,194736],"mapped",[25074]],[[194737,194737],"mapped",[25078]],[[194738,194738],"mapped",[25104]],[[194739,194739],"mapped",[25115]],[[194740,194740],"mapped",[25181]],[[194741,194741],"mapped",[25265]],[[194742,194742],"mapped",[25300]],[[194743,194743],"mapped",[25424]],[[194744,194744],"mapped",[142092]],[[194745,194745],"mapped",[25405]],[[194746,194746],"mapped",[25340]],[[194747,194747],"mapped",[25448]],[[194748,194748],"mapped",[25475]],[[194749,194749],"mapped",[25572]],[[194750,194750],"mapped",[142321]],[[194751,194751],"mapped",[25634]],[[194752,194752],"mapped",[25541]],[[194753,194753],"mapped",[25513]],[[194754,194754],"mapped",[14894]],[[194755,194755],"mapped",[25705]],[[194756,194756],"mapped",[25726]],[[194757,194757],"mapped",[25757]],[[194758,194758],"mapped",[25719]],[[194759,194759],"mapped",[14956]],[[194760,194760],"mapped",[25935]],[[194761,194761],"mapped",[25964]],[[194762,194762],"mapped",[143370]],[[194763,194763],"mapped",[26083]],[[194764,194764],"mapped",[26360]],[[194765,194765],"mapped",[26185]],[[194766,194766],"mapped",[15129]],[[194767,194767],"mapped",[26257]],[[194768,194768],"mapped",[15112]],[[194769,194769],"mapped",[15076]],[[194770,194770],"mapped",[20882]],[[194771,194771],"mapped",[20885]],[[194772,194772],"mapped",[26368]],[[194773,194773],"mapped",[26268]],[[194774,194774],"mapped",[32941]],[[194775,194775],"mapped",[17369]],[[194776,194776],"mapped",[26391]],[[194777,194777],"mapped",[26395]],[[194778,194778],"mapped",[26401]],[[194779,194779],"mapped",[26462]],[[194780,194780],"mapped",[26451]],[[194781,194781],"mapped",[144323]],[[194782,194782],"mapped",[15177]],[[194783,194783],"mapped",[26618]],[[194784,194784],"mapped",[26501]],[[194785,194785],"mapped",[26706]],[[194786,194786],"mapped",[26757]],[[194787,194787],"mapped",[144493]],[[194788,194788],"mapped",[26766]],[[194789,194789],"mapped",[26655]],[[194790,194790],"mapped",[26900]],[[194791,194791],"mapped",[15261]],[[194792,194792],"mapped",[26946]],[[194793,194793],"mapped",[27043]],[[194794,194794],"mapped",[27114]],[[194795,194795],"mapped",[27304]],[[194796,194796],"mapped",[145059]],[[194797,194797],"mapped",[27355]],[[194798,194798],"mapped",[15384]],[[194799,194799],"mapped",[27425]],[[194800,194800],"mapped",[145575]],[[194801,194801],"mapped",[27476]],[[194802,194802],"mapped",[15438]],[[194803,194803],"mapped",[27506]],[[194804,194804],"mapped",[27551]],[[194805,194805],"mapped",[27578]],[[194806,194806],"mapped",[27579]],[[194807,194807],"mapped",[146061]],[[194808,194808],"mapped",[138507]],[[194809,194809],"mapped",[146170]],[[194810,194810],"mapped",[27726]],[[194811,194811],"mapped",[146620]],[[194812,194812],"mapped",[27839]],[[194813,194813],"mapped",[27853]],[[194814,194814],"mapped",[27751]],[[194815,194815],"mapped",[27926]],[[194816,194816],"mapped",[27966]],[[194817,194817],"mapped",[28023]],[[194818,194818],"mapped",[27969]],[[194819,194819],"mapped",[28009]],[[194820,194820],"mapped",[28024]],[[194821,194821],"mapped",[28037]],[[194822,194822],"mapped",[146718]],[[194823,194823],"mapped",[27956]],[[194824,194824],"mapped",[28207]],[[194825,194825],"mapped",[28270]],[[194826,194826],"mapped",[15667]],[[194827,194827],"mapped",[28363]],[[194828,194828],"mapped",[28359]],[[194829,194829],"mapped",[147153]],[[194830,194830],"mapped",[28153]],[[194831,194831],"mapped",[28526]],[[194832,194832],"mapped",[147294]],[[194833,194833],"mapped",[147342]],[[194834,194834],"mapped",[28614]],[[194835,194835],"mapped",[28729]],[[194836,194836],"mapped",[28702]],[[194837,194837],"mapped",[28699]],[[194838,194838],"mapped",[15766]],[[194839,194839],"mapped",[28746]],[[194840,194840],"mapped",[28797]],[[194841,194841],"mapped",[28791]],[[194842,194842],"mapped",[28845]],[[194843,194843],"mapped",[132389]],[[194844,194844],"mapped",[28997]],[[194845,194845],"mapped",[148067]],[[194846,194846],"mapped",[29084]],[[194847,194847],"disallowed"],[[194848,194848],"mapped",[29224]],[[194849,194849],"mapped",[29237]],[[194850,194850],"mapped",[29264]],[[194851,194851],"mapped",[149000]],[[194852,194852],"mapped",[29312]],[[194853,194853],"mapped",[29333]],[[194854,194854],"mapped",[149301]],[[194855,194855],"mapped",[149524]],[[194856,194856],"mapped",[29562]],[[194857,194857],"mapped",[29579]],[[194858,194858],"mapped",[16044]],[[194859,194859],"mapped",[29605]],[[194860,194861],"mapped",[16056]],[[194862,194862],"mapped",[29767]],[[194863,194863],"mapped",[29788]],[[194864,194864],"mapped",[29809]],[[194865,194865],"mapped",[29829]],[[194866,194866],"mapped",[29898]],[[194867,194867],"mapped",[16155]],[[194868,194868],"mapped",[29988]],[[194869,194869],"mapped",[150582]],[[194870,194870],"mapped",[30014]],[[194871,194871],"mapped",[150674]],[[194872,194872],"mapped",[30064]],[[194873,194873],"mapped",[139679]],[[194874,194874],"mapped",[30224]],[[194875,194875],"mapped",[151457]],[[194876,194876],"mapped",[151480]],[[194877,194877],"mapped",[151620]],[[194878,194878],"mapped",[16380]],[[194879,194879],"mapped",[16392]],[[194880,194880],"mapped",[30452]],[[194881,194881],"mapped",[151795]],[[194882,194882],"mapped",[151794]],[[194883,194883],"mapped",[151833]],[[194884,194884],"mapped",[151859]],[[194885,194885],"mapped",[30494]],[[194886,194887],"mapped",[30495]],[[194888,194888],"mapped",[30538]],[[194889,194889],"mapped",[16441]],[[194890,194890],"mapped",[30603]],[[194891,194891],"mapped",[16454]],[[194892,194892],"mapped",[16534]],[[194893,194893],"mapped",[152605]],[[194894,194894],"mapped",[30798]],[[194895,194895],"mapped",[30860]],[[194896,194896],"mapped",[30924]],[[194897,194897],"mapped",[16611]],[[194898,194898],"mapped",[153126]],[[194899,194899],"mapped",[31062]],[[194900,194900],"mapped",[153242]],[[194901,194901],"mapped",[153285]],[[194902,194902],"mapped",[31119]],[[194903,194903],"mapped",[31211]],[[194904,194904],"mapped",[16687]],[[194905,194905],"mapped",[31296]],[[194906,194906],"mapped",[31306]],[[194907,194907],"mapped",[31311]],[[194908,194908],"mapped",[153980]],[[194909,194910],"mapped",[154279]],[[194911,194911],"disallowed"],[[194912,194912],"mapped",[16898]],[[194913,194913],"mapped",[154539]],[[194914,194914],"mapped",[31686]],[[194915,194915],"mapped",[31689]],[[194916,194916],"mapped",[16935]],[[194917,194917],"mapped",[154752]],[[194918,194918],"mapped",[31954]],[[194919,194919],"mapped",[17056]],[[194920,194920],"mapped",[31976]],[[194921,194921],"mapped",[31971]],[[194922,194922],"mapped",[32000]],[[194923,194923],"mapped",[155526]],[[194924,194924],"mapped",[32099]],[[194925,194925],"mapped",[17153]],[[194926,194926],"mapped",[32199]],[[194927,194927],"mapped",[32258]],[[194928,194928],"mapped",[32325]],[[194929,194929],"mapped",[17204]],[[194930,194930],"mapped",[156200]],[[194931,194931],"mapped",[156231]],[[194932,194932],"mapped",[17241]],[[194933,194933],"mapped",[156377]],[[194934,194934],"mapped",[32634]],[[194935,194935],"mapped",[156478]],[[194936,194936],"mapped",[32661]],[[194937,194937],"mapped",[32762]],[[194938,194938],"mapped",[32773]],[[194939,194939],"mapped",[156890]],[[194940,194940],"mapped",[156963]],[[194941,194941],"mapped",[32864]],[[194942,194942],"mapped",[157096]],[[194943,194943],"mapped",[32880]],[[194944,194944],"mapped",[144223]],[[194945,194945],"mapped",[17365]],[[194946,194946],"mapped",[32946]],[[194947,194947],"mapped",[33027]],[[194948,194948],"mapped",[17419]],[[194949,194949],"mapped",[33086]],[[194950,194950],"mapped",[23221]],[[194951,194951],"mapped",[157607]],[[194952,194952],"mapped",[157621]],[[194953,194953],"mapped",[144275]],[[194954,194954],"mapped",[144284]],[[194955,194955],"mapped",[33281]],[[194956,194956],"mapped",[33284]],[[194957,194957],"mapped",[36766]],[[194958,194958],"mapped",[17515]],[[194959,194959],"mapped",[33425]],[[194960,194960],"mapped",[33419]],[[194961,194961],"mapped",[33437]],[[194962,194962],"mapped",[21171]],[[194963,194963],"mapped",[33457]],[[194964,194964],"mapped",[33459]],[[194965,194965],"mapped",[33469]],[[194966,194966],"mapped",[33510]],[[194967,194967],"mapped",[158524]],[[194968,194968],"mapped",[33509]],[[194969,194969],"mapped",[33565]],[[194970,194970],"mapped",[33635]],[[194971,194971],"mapped",[33709]],[[194972,194972],"mapped",[33571]],[[194973,194973],"mapped",[33725]],[[194974,194974],"mapped",[33767]],[[194975,194975],"mapped",[33879]],[[194976,194976],"mapped",[33619]],[[194977,194977],"mapped",[33738]],[[194978,194978],"mapped",[33740]],[[194979,194979],"mapped",[33756]],[[194980,194980],"mapped",[158774]],[[194981,194981],"mapped",[159083]],[[194982,194982],"mapped",[158933]],[[194983,194983],"mapped",[17707]],[[194984,194984],"mapped",[34033]],[[194985,194985],"mapped",[34035]],[[194986,194986],"mapped",[34070]],[[194987,194987],"mapped",[160714]],[[194988,194988],"mapped",[34148]],[[194989,194989],"mapped",[159532]],[[194990,194990],"mapped",[17757]],[[194991,194991],"mapped",[17761]],[[194992,194992],"mapped",[159665]],[[194993,194993],"mapped",[159954]],[[194994,194994],"mapped",[17771]],[[194995,194995],"mapped",[34384]],[[194996,194996],"mapped",[34396]],[[194997,194997],"mapped",[34407]],[[194998,194998],"mapped",[34409]],[[194999,194999],"mapped",[34473]],[[195000,195000],"mapped",[34440]],[[195001,195001],"mapped",[34574]],[[195002,195002],"mapped",[34530]],[[195003,195003],"mapped",[34681]],[[195004,195004],"mapped",[34600]],[[195005,195005],"mapped",[34667]],[[195006,195006],"mapped",[34694]],[[195007,195007],"disallowed"],[[195008,195008],"mapped",[34785]],[[195009,195009],"mapped",[34817]],[[195010,195010],"mapped",[17913]],[[195011,195011],"mapped",[34912]],[[195012,195012],"mapped",[34915]],[[195013,195013],"mapped",[161383]],[[195014,195014],"mapped",[35031]],[[195015,195015],"mapped",[35038]],[[195016,195016],"mapped",[17973]],[[195017,195017],"mapped",[35066]],[[195018,195018],"mapped",[13499]],[[195019,195019],"mapped",[161966]],[[195020,195020],"mapped",[162150]],[[195021,195021],"mapped",[18110]],[[195022,195022],"mapped",[18119]],[[195023,195023],"mapped",[35488]],[[195024,195024],"mapped",[35565]],[[195025,195025],"mapped",[35722]],[[195026,195026],"mapped",[35925]],[[195027,195027],"mapped",[162984]],[[195028,195028],"mapped",[36011]],[[195029,195029],"mapped",[36033]],[[195030,195030],"mapped",[36123]],[[195031,195031],"mapped",[36215]],[[195032,195032],"mapped",[163631]],[[195033,195033],"mapped",[133124]],[[195034,195034],"mapped",[36299]],[[195035,195035],"mapped",[36284]],[[195036,195036],"mapped",[36336]],[[195037,195037],"mapped",[133342]],[[195038,195038],"mapped",[36564]],[[195039,195039],"mapped",[36664]],[[195040,195040],"mapped",[165330]],[[195041,195041],"mapped",[165357]],[[195042,195042],"mapped",[37012]],[[195043,195043],"mapped",[37105]],[[195044,195044],"mapped",[37137]],[[195045,195045],"mapped",[165678]],[[195046,195046],"mapped",[37147]],[[195047,195047],"mapped",[37432]],[[195048,195048],"mapped",[37591]],[[195049,195049],"mapped",[37592]],[[195050,195050],"mapped",[37500]],[[195051,195051],"mapped",[37881]],[[195052,195052],"mapped",[37909]],[[195053,195053],"mapped",[166906]],[[195054,195054],"mapped",[38283]],[[195055,195055],"mapped",[18837]],[[195056,195056],"mapped",[38327]],[[195057,195057],"mapped",[167287]],[[195058,195058],"mapped",[18918]],[[195059,195059],"mapped",[38595]],[[195060,195060],"mapped",[23986]],[[195061,195061],"mapped",[38691]],[[195062,195062],"mapped",[168261]],[[195063,195063],"mapped",[168474]],[[195064,195064],"mapped",[19054]],[[195065,195065],"mapped",[19062]],[[195066,195066],"mapped",[38880]],[[195067,195067],"mapped",[168970]],[[195068,195068],"mapped",[19122]],[[195069,195069],"mapped",[169110]],[[195070,195071],"mapped",[38923]],[[195072,195072],"mapped",[38953]],[[195073,195073],"mapped",[169398]],[[195074,195074],"mapped",[39138]],[[195075,195075],"mapped",[19251]],[[195076,195076],"mapped",[39209]],[[195077,195077],"mapped",[39335]],[[195078,195078],"mapped",[39362]],[[195079,195079],"mapped",[39422]],[[195080,195080],"mapped",[19406]],[[195081,195081],"mapped",[170800]],[[195082,195082],"mapped",[39698]],[[195083,195083],"mapped",[40000]],[[195084,195084],"mapped",[40189]],[[195085,195085],"mapped",[19662]],[[195086,195086],"mapped",[19693]],[[195087,195087],"mapped",[40295]],[[195088,195088],"mapped",[172238]],[[195089,195089],"mapped",[19704]],[[195090,195090],"mapped",[172293]],[[195091,195091],"mapped",[172558]],[[195092,195092],"mapped",[172689]],[[195093,195093],"mapped",[40635]],[[195094,195094],"mapped",[19798]],[[195095,195095],"mapped",[40697]],[[195096,195096],"mapped",[40702]],[[195097,195097],"mapped",[40709]],[[195098,195098],"mapped",[40719]],[[195099,195099],"mapped",[40726]],[[195100,195100],"mapped",[40763]],[[195101,195101],"mapped",[173568]],[[195102,196605],"disallowed"],[[196606,196607],"disallowed"],[[196608,262141],"disallowed"],[[262142,262143],"disallowed"],[[262144,327677],"disallowed"],[[327678,327679],"disallowed"],[[327680,393213],"disallowed"],[[393214,393215],"disallowed"],[[393216,458749],"disallowed"],[[458750,458751],"disallowed"],[[458752,524285],"disallowed"],[[524286,524287],"disallowed"],[[524288,589821],"disallowed"],[[589822,589823],"disallowed"],[[589824,655357],"disallowed"],[[655358,655359],"disallowed"],[[655360,720893],"disallowed"],[[720894,720895],"disallowed"],[[720896,786429],"disallowed"],[[786430,786431],"disallowed"],[[786432,851965],"disallowed"],[[851966,851967],"disallowed"],[[851968,917501],"disallowed"],[[917502,917503],"disallowed"],[[917504,917504],"disallowed"],[[917505,917505],"disallowed"],[[917506,917535],"disallowed"],[[917536,917631],"disallowed"],[[917632,917759],"disallowed"],[[917760,917999],"ignored"],[[918000,983037],"disallowed"],[[983038,983039],"disallowed"],[[983040,1048573],"disallowed"],[[1048574,1048575],"disallowed"],[[1048576,1114109],"disallowed"],[[1114110,1114111],"disallowed"]]'); + +/***/ }), + +/***/ 2357: /***/ ((module) => { "use strict"; @@ -11363,7 +18090,7 @@ module.exports = require("assert"); /***/ }), -/***/ 129: +/***/ 3129: /***/ ((module) => { "use strict"; @@ -11371,7 +18098,7 @@ module.exports = require("child_process"); /***/ }), -/***/ 417: +/***/ 6417: /***/ ((module) => { "use strict"; @@ -11379,7 +18106,7 @@ module.exports = require("crypto"); /***/ }), -/***/ 614: +/***/ 8614: /***/ ((module) => { "use strict"; @@ -11387,7 +18114,7 @@ module.exports = require("events"); /***/ }), -/***/ 747: +/***/ 5747: /***/ ((module) => { "use strict"; @@ -11395,7 +18122,7 @@ module.exports = require("fs"); /***/ }), -/***/ 605: +/***/ 8605: /***/ ((module) => { "use strict"; @@ -11403,7 +18130,7 @@ module.exports = require("http"); /***/ }), -/***/ 211: +/***/ 7211: /***/ ((module) => { "use strict"; @@ -11411,7 +18138,7 @@ module.exports = require("https"); /***/ }), -/***/ 631: +/***/ 1631: /***/ ((module) => { "use strict"; @@ -11419,7 +18146,7 @@ module.exports = require("net"); /***/ }), -/***/ 87: +/***/ 2087: /***/ ((module) => { "use strict"; @@ -11427,7 +18154,7 @@ module.exports = require("os"); /***/ }), -/***/ 622: +/***/ 5622: /***/ ((module) => { "use strict"; @@ -11435,7 +18162,15 @@ module.exports = require("path"); /***/ }), -/***/ 413: +/***/ 4213: +/***/ ((module) => { + +"use strict"; +module.exports = require("punycode"); + +/***/ }), + +/***/ 2413: /***/ ((module) => { "use strict"; @@ -11443,7 +18178,7 @@ module.exports = require("stream"); /***/ }), -/***/ 304: +/***/ 4304: /***/ ((module) => { "use strict"; @@ -11451,7 +18186,7 @@ module.exports = require("string_decoder"); /***/ }), -/***/ 213: +/***/ 8213: /***/ ((module) => { "use strict"; @@ -11459,7 +18194,7 @@ module.exports = require("timers"); /***/ }), -/***/ 16: +/***/ 4016: /***/ ((module) => { "use strict"; @@ -11467,12 +18202,28 @@ module.exports = require("tls"); /***/ }), -/***/ 669: +/***/ 8835: +/***/ ((module) => { + +"use strict"; +module.exports = require("url"); + +/***/ }), + +/***/ 1669: /***/ ((module) => { "use strict"; module.exports = require("util"); +/***/ }), + +/***/ 8761: +/***/ ((module) => { + +"use strict"; +module.exports = require("zlib"); + /***/ }) /******/ }); @@ -11528,28 +18279,30 @@ module.exports = require("util"); var __webpack_exports__ = {}; // This entry need to be wrapped in an IIFE because it need to be isolated against other modules in the chunk. (() => { -const install = __nccwpck_require__(430); -const commenter = __nccwpck_require__(571); -const scanner = __nccwpck_require__(157); -const core = __nccwpck_require__(186); +const install = __nccwpck_require__(1430); +const commenter = __nccwpck_require__(3571); +const scanner = __nccwpck_require__(3157); +const core = __nccwpck_require__(2186); +const github = __nccwpck_require__(5438); const actionInputs = { kics_version: { value: core.getInput('kics_version') }, - enable_pr_comments: { value: core.getInput('enable_pr_comments') }, + enable_comments: { value: core.getInput('enable_comments') }, } async function main() { console.log("Running KICS action..."); try { - // const context = github.context; - // const repository = context.repo; - // const pullRequestNumber = context.payload.pull_request.number; - const kicsPath = await install.installKICS(actionInputs.kics_version.value); - console.log("KICS installed at: " + kicsPath); - //await scanner.scanWithKICS(kicsPath); - // if (actionInputs.enable_pr_comments.value === "true") { - // await commenter.commentOnPullRequest(repository, pullRequestNumber); - // } + let enableComments = actionInputs.enable_comments.value.toLocaleLowerCase() === "true"; + const context = github.context; + const repository = context.repo; + console.log(context); + const pullRequestNumber = context.payload.pull_request.number; + await install.installKICS(); + await scanner.scanWithKICS(enableComments); + if (enableComments) { + await commenter.commentOnPullRequest(repository, pullRequestNumber); + } } catch (e) { console.error(e); core.setFailed(e.message); diff --git a/src/install.js b/src/install.js index de08661..ff5b22a 100644 --- a/src/install.js +++ b/src/install.js @@ -1,10 +1,8 @@ const https = require('https') const filepath = require('path'); const tc = require('@actions/tool-cache'); -//const releaseDownloader = require('@fohlen/github-release-downloader'); +const core = require("@actions/core"); const os = require('os'); -//const decompress = require('decompress'); -//const decompressTargz = require('decompress-targz'); function getVersion(version) { let path = '' @@ -63,42 +61,15 @@ function getReleaseInfo(release) { default: targetAsset = { size: 0, browser_download_url: '' }; } - return { size: targetAsset.size, browser_download_url: targetAsset.browser_download_url, version: targetAsset.name }; + return { + binary: 'kics', + size: targetAsset.size, + browser_download_url: targetAsset.browser_download_url, + version: release.tag_name, + arch: arch + }; } -// async function downloadReleaseFile(releaseAsset) { -// const dest = os.homedir(); -// const releaseURL = releaseAsset.browser_download_url; - -// console.log("Downloading", releaseURL); -// const baseName = releaseURL.substr(releaseURL.lastIndexOf("/") + 1); -// return releaseDownloader.downloadAsset(releaseURL, baseName, dest, () => { -// process.stdout.write("."); -// }); -// } - -// function decompressRelease(path) { -// const dest = os.homedir(); -// return decompress(path, filepath.join(dest, 'kics'), { -// plugins: [ -// decompressTargz() -// ] -// }); -// } - -// function getExecutableName() { -// const os = process.platform; -// switch (os) { -// case 'darwin': -// case 'linux': -// return 'kics'; -// case 'win32': -// return 'kics.exe'; -// default: -// return 'kics'; -// } -// } - async function installKICS(kicsVersion) { let release = {}; if (!kicsVersion || kicsVersion == "latest") { @@ -107,20 +78,14 @@ async function installKICS(kicsVersion) { release = await getVersion(kicsVersion); } const releaseInfo = getReleaseInfo(release) - - const kicsDownloadPath = await tc.downloadTool(releaseInfo.browser_download_url); - const kicsExtractedFolder = await tc.extractTar(kicsDownloadPath, filepath.join(os.homedir(), 'kics', releaseInfo.version)); - const cachedPath = await tc.cacheDir(kicsExtractedFolder, 'kics', releaseInfo.version); - core.addPath(cachedPath); - - // const releasePath = await downloadReleaseFile(releaseAsset, "./") - // console.log('\nDownloaded KICS release', releasePath); - // const files = await decompressRelease(releasePath); - // console.log('\nDecompressed KICS release', files.map(f => f.path)); - - // const kicsPath = filepath.join(os.homedir(), 'kics', getExecutableName()); - // console.log('\nInstalling KICS to', kicsPath); - return kicsPath; + let kicsPath = tc.find(releaseInfo.binary, releaseInfo.version, releaseInfo.arch); + if (!kicsPath) { + core.info(`Downloading ${releaseInfo.binary} ${releaseInfo.version} ${releaseInfo.arch}`); + const kicsDownloadPath = await tc.downloadTool(releaseInfo.browser_download_url); + const kicsExtractedFolder = await tc.extractTar(kicsDownloadPath, filepath.join(os.homedir(), 'kics', releaseInfo.version)); + kicsPath = await tc.cacheDir(kicsExtractedFolder, 'kics', releaseInfo.version, releaseInfo.arch); + } + core.addPath(kicsPath); } module.exports = { diff --git a/src/main.js b/src/main.js index 4c7f419..d85b696 100644 --- a/src/main.js +++ b/src/main.js @@ -2,24 +2,26 @@ const install = require("./install"); const commenter = require("./commenter"); const scanner = require("./scanner"); const core = require("@actions/core"); +const github = require("@actions/github"); const actionInputs = { kics_version: { value: core.getInput('kics_version') }, - enable_pr_comments: { value: core.getInput('enable_pr_comments') }, + enable_comments: { value: core.getInput('enable_comments') }, } async function main() { console.log("Running KICS action..."); try { - // const context = github.context; - // const repository = context.repo; - // const pullRequestNumber = context.payload.pull_request.number; - const kicsPath = await install.installKICS(actionInputs.kics_version.value); - console.log("KICS installed at: " + kicsPath); - //await scanner.scanWithKICS(kicsPath); - // if (actionInputs.enable_pr_comments.value === "true") { - // await commenter.commentOnPullRequest(repository, pullRequestNumber); - // } + let enableComments = actionInputs.enable_comments.value.toLocaleLowerCase() === "true"; + const context = github.context; + const repository = context.repo; + console.log(context); + const pullRequestNumber = context.payload.pull_request.number; + await install.installKICS(); + await scanner.scanWithKICS(enableComments); + if (enableComments) { + await commenter.commentOnPullRequest(repository, pullRequestNumber); + } } catch (e) { console.error(e); core.setFailed(e.message); diff --git a/src/scanner.js b/src/scanner.js index 3eac527..9cb2842 100644 --- a/src/scanner.js +++ b/src/scanner.js @@ -2,35 +2,63 @@ const exec = require('@actions/exec'); const core = require("@actions/core"); -const kicsInputs = { - path: { flag: '--path', value: core.getInput('path') }, - ignore_on_exit: { flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, - fail_on: { flag: '--fail-on', value: core.getInput('fail_on') }, - timeout: { flag: '--timeout', value: core.getInput('timeout') }, - profiling: { flag: '--profiling', value: core.getInput('profiling') }, - config_path: { flag: '--config', value: core.getInput('config_path') }, - payload_path: { flag: '--payload-path', value: core.getInput('payload_path') }, - exclude_paths: { flag: '--exclude-paths', value: core.getInput('exclude_paths') }, - exclude_queries: { flag: '--exclude-queries', value: core.getInput('exclude_queries') }, - exclude_categories: { flag: '--exclude-categories', value: core.getInput('exclude_categories') }, - exclude_results: { flag: '--exclude-results', value: core.getInput('exclude_results') }, - output_formats: { flag: '--report-formats', value: core.getInput('output_formats') }, - output_path: { flag: '--output-path', value: core.getInput('output_path') }, - queries: { flag: '--queries-path', value: core.getInput('queries') }, - verbose: { flag: '--verbose', value: core.getInput('verbose') }, - secrets_regexes_path: { flag: '--secrets-regexes-path', value: core.getInput('secrets_regexes_path') }, - libraries_path: { flag: '--libraries-path', value: core.getInput('libraries-path') }, - disable_secrets: { flag: '--disable-secrets', value: core.getInput('disable_secrets') }, - disable_full_descriptions: { flag: '--disable-full-descriptions', value: core.getInput('disable_full_descriptions') }, - types: { flag: '--types', value: core.getInput('types') }, - bom: { flag: '--bom', value: core.getInput('bom') }, +const kicsBinary = 'kics'; + +const kicsInput = { + path: { value_type: "string", flag: '--path', value: core.getInput('path') }, + ignore_on_exit: { value_type: "list", flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, + fail_on: { value_type: "list", flag: '--fail-on', value: core.getInput('fail_on') }, + timeout: { value_type: "int", flag: '--timeout', value: core.getInput('timeout') }, + profiling: { value_type: "list", flag: '--profiling', value: core.getInput('profiling') }, + config_path: { value_type: "string", flag: '--config', value: core.getInput('config_path') }, + payload_path: { value_type: "string", flag: '--payload-path', value: core.getInput('payload_path') }, + exclude_paths: { value_type: "list", flag: '--exclude-paths', value: core.getInput('exclude_paths') }, + exclude_queries: { value_type: "list", flag: '--exclude-queries', value: core.getInput('exclude_queries') }, + exclude_categories: { value_type: "list", flag: '--exclude-categories', value: core.getInput('exclude_categories') }, + exclude_results: { value_type: "list", flag: '--exclude-results', value: core.getInput('exclude_results') }, + output_formats: { value_type: "list", flag: '--report-formats', value: core.getInput('output_formats') }, + output_path: { value_type: "string", flag: '--output-path', value: core.getInput('output_path') }, + queries: { value_type: "string", flag: '--queries-path', value: core.getInput('queries') }, + verbose: { value_type: "bool", flag: '--verbose', value: core.getInput('verbose') }, + secrets_regexes_path: { value_type: "string", flag: '--secrets-regexes-path', value: core.getInput('secrets_regexes_path') }, + libraries_path: { value_type: "string", flag: '--libraries-path', value: core.getInput('libraries-path') }, + disable_secrets: { value_type: "bool", flag: '--disable-secrets', value: core.getInput('disable_secrets') }, + disable_full_descriptions: { value_type: "bool", flag: '--disable-full-descriptions', value: core.getInput('disable_full_descriptions') }, + types: { value_type: "list", flag: '--types', value: core.getInput('types') }, + bom: { value_type: "bool", flag: '--bom', value: core.getInput('bom') }, }; -async function scanWithKICS(kicsPath) { - let statusCode = 0; - if (kicsInputs.config_path.value) { - statusCode = await exec.exec(`${kicsPath} scan ${kicsInputs.config_path.flag} ${kicsInputs.config_path.value}`); +async function scanWithKICS(enableComments) { + if (!kicsInput.path.value) { + core.error('Path to scan is not set'); + throw new Error('Path to scan is not set'); } + let cmdArgs = []; + for (let input in kicsInput) { + if (kicsInput[input].value_type === 'string') { + if (kicsInput[input].value) { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } + } else if (kicsInput[input].value_type === 'list') { + if (kicsInput[input].value) { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } + } else if (kicsInput[input].value_type === 'bool') { + if (kicsInput[input].value) { + cmdArgs.push(kicsInput[input].flag); + } + } + } + if (enableComments) { + if (!cmdArgs.find(arg => arg == '--output-path')) { + cmdArgs.push('--output-path'); + cmdArgs.push('./'); + } + } + + return await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`) } module.exports = { From 2b43759b0b239ab384bb321c5460fb0d5d796d87 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Sat, 16 Oct 2021 10:47:06 +0100 Subject: [PATCH 03/18] feat: converting to javascript action MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Rogério Peixoto --- .github/workflows/test_action.yaml | 7 +- action.yml | 2 +- deps.txt | 3 - dist/index.js | 145 +- entrypoint.sh | 38 - package-lock.json | 2 +- results.json | 27008 --------------------- src/commenter.js | 16 +- src/install.js | 2 +- src/main.js | 87 +- src/scanner.js | 44 +- positive.tf => test/samples/positive1.tf | 0 test/samples/positive2.tf | 13 + 13 files changed, 255 insertions(+), 27112 deletions(-) delete mode 100644 deps.txt delete mode 100644 entrypoint.sh delete mode 100644 results.json rename positive.tf => test/samples/positive1.tf (100%) create mode 100644 test/samples/positive2.tf diff --git a/.github/workflows/test_action.yaml b/.github/workflows/test_action.yaml index b037c5b..e94020c 100644 --- a/.github/workflows/test_action.yaml +++ b/.github/workflows/test_action.yaml @@ -1,6 +1,7 @@ name: Test KICS action on: + workflow_dispatch: pull_request: types: [opened] @@ -12,4 +13,8 @@ jobs: - name: Test KICS action uses: ./ with: - path: positive.tf + path: test/samples/positive1.tf,test/samples/positive2.tf + token: ${{ secrets.GITHUB_TOKEN }} + timeout: 60 + verbose: true + enable_comments: true diff --git a/action.yml b/action.yml index 7552adc..e406694 100644 --- a/action.yml +++ b/action.yml @@ -47,7 +47,7 @@ inputs: description: "formats in which the results report will be exported (json, sarif)" required: false output_path: - description: "file path to store results report (json, sarif)" + description: "directory to store results report" required: false payload_path: description: "file path to store source internal representation in JSON format" diff --git a/deps.txt b/deps.txt deleted file mode 100644 index 008478c..0000000 --- a/deps.txt +++ /dev/null @@ -1,3 +0,0 @@ - "@fohlen/github-release-downloader": "^1.0.0", - "decompress": "^4.2.1", - "decompress-targz": "^4.1.1", \ No newline at end of file diff --git a/dist/index.js b/dist/index.js index 31e1a24..fbfcb7f 100644 --- a/dist/index.js +++ b/dist/index.js @@ -17804,7 +17804,6 @@ function wrappy (fn, cb) { /***/ 3571: /***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { -const fs = __nccwpck_require__(5747); const moment = __nccwpck_require__(9623) const kicsLogo = "https://user-images.githubusercontent.com/75368139/136991766-a4e5bc8b-63db-48f7-9384-740e9f15c9f6.png" @@ -17817,13 +17816,6 @@ const severityIcons = { "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png" } - -function readJSON(filename) { - const rawdata = fs.readFileSync(filename); - const parsedJSON = JSON.parse(rawdata.toString()); - return parsedJSON; -} - function createComment(results) { let message = "![kics-logo](" + kicsLogo + ")\n"; @@ -17855,12 +17847,8 @@ function createComment(results) { return message; } -async function postPRComment(repo, prNumber) { - const githubToken = core.getInput("token"); - const octokit = github.getOctokit(githubToken); - const results = readJSON("results.json"); +async function postPRComment(results, repo, prNumber, octokit) { const message = createComment(results); - console.log(message); const { data: comments } = await octokit.rest.issues.listComments({ ...repo, @@ -17893,6 +17881,7 @@ module.exports = { postPRComment }; + /***/ }), /***/ 1430: @@ -17992,19 +17981,20 @@ module.exports = { installKICS } + /***/ }), /***/ 3157: /***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { const exec = __nccwpck_require__(1514); - const core = __nccwpck_require__(2186); +const filepath = __nccwpck_require__(5622); const kicsBinary = 'kics'; const kicsInput = { - path: { value_type: "string", flag: '--path', value: core.getInput('path') }, + path: { value_type: "list", flag: '--path', value: core.getInput('path') }, ignore_on_exit: { value_type: "list", flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, fail_on: { value_type: "list", flag: '--fail-on', value: core.getInput('fail_on') }, timeout: { value_type: "int", flag: '--timeout', value: core.getInput('timeout') }, @@ -18028,9 +18018,11 @@ const kicsInput = { }; async function scanWithKICS(enableComments) { + let resultsFile; + if (!kicsInput.path.value) { core.error('Path to scan is not set'); - throw new Error('Path to scan is not set'); + core.setFailed('Path to scan is not set'); } let cmdArgs = []; for (let input in kicsInput) { @@ -18041,29 +18033,56 @@ async function scanWithKICS(enableComments) { } } else if (kicsInput[input].value_type === 'list') { if (kicsInput[input].value) { - cmdArgs.push(kicsInput[input].flag); - cmdArgs.push(kicsInput[input].value); + if (kicsInput[input].value.indexOf(',') > -1) { + kicsInput[input].value.split(',').forEach(value => { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(value); + }); + } else { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } } } else if (kicsInput[input].value_type === 'bool') { if (kicsInput[input].value) { cmdArgs.push(kicsInput[input].flag); } + } else if (kicsInput[input].value_type === 'int') { + if (kicsInput[input].value) { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } } } + + // making sure results.json is always created when PR comments are enabled if (enableComments) { if (!cmdArgs.find(arg => arg == '--output-path')) { cmdArgs.push('--output-path'); cmdArgs.push('./'); + resultsFile = './results.json'; + } else { + const outputFormats = core.getInput('output_formats'); + if (!outputFormats.toLowerCase().indexOf('json')) { + cmdArgs.push('--output-formats'); + cmdArgs.push('json'); + } + let resultsDir = core.getInput('output_path'); + resultsFile = filepath.join(resultsDir, '/results.json'); } } - - return await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`) + exitCode = await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`, [], { ignoreReturnCode: true }); + return { + statusCode: exitCode, + resultsFile: resultsFile + }; } module.exports = { scanWithKICS }; + /***/ }), /***/ 2877: @@ -18282,27 +18301,96 @@ var __webpack_exports__ = {}; const install = __nccwpck_require__(1430); const commenter = __nccwpck_require__(3571); const scanner = __nccwpck_require__(3157); + const core = __nccwpck_require__(2186); const github = __nccwpck_require__(5438); +const fs = __nccwpck_require__(5747); + const actionInputs = { kics_version: { value: core.getInput('kics_version') }, enable_comments: { value: core.getInput('enable_comments') }, } +const exitStatus = { + results: { + codes: { + HIGH: 50, + MEDIUM: 40, + LOW: 30, + INFO: 20, + }, + isResultExitStatus: function (exitCode) { + for (const key in this.codes) { + if (this.codes[key] === exitCode) { + return true; + } + } + return false; + } + } +} + +function setWorkflowStatus(statusCode) { + console.log(`KICS scan status code: ${statusCode}`); + + const ignoreOnExit = core.getInput('ignore_on_exit'); + + if (ignoreOnExit.toLowerCase() === 'all') { + console.log(`ignore_on_exit=all :: Ignoring exit code ${statusCode}`); + return; + } + + if (ignoreOnExit.toLowerCase() === 'results') { + if (exitStatus.results.isResultExitStatus(statusCode)) { + console.log(`ignore_on_exit=results :: Ignoring exit code ${statusCode}`); + return; + } + } + if (ignoreOnExit.toLowerCase() === 'errors') { + if (!exitStatus.results.isResultExitStatus(statusCode)) { + console.log(`ignore_on_exit=errors :: Ignoring exit code ${statusCode}`); + return; + } + } + + core.setFailed(`KICS scan failed with exit code ${statusCode}`); +} + +function readJSON(filename) { + const rawdata = fs.readFileSync(filename); + const parsedJSON = JSON.parse(rawdata.toString()); + return parsedJSON; +} + async function main() { console.log("Running KICS action..."); try { + const githubToken = core.getInput("token"); + const octokit = github.getOctokit(githubToken); let enableComments = actionInputs.enable_comments.value.toLocaleLowerCase() === "true"; - const context = github.context; - const repository = context.repo; - console.log(context); - const pullRequestNumber = context.payload.pull_request.number; - await install.installKICS(); - await scanner.scanWithKICS(enableComments); - if (enableComments) { - await commenter.commentOnPullRequest(repository, pullRequestNumber); + let context = {}; + let repo = ''; + let prNumber = ''; + + if (github.context) { + context = github.context; + if (context.repo) { + repo = context.repo; + } + if (context.payload && context.payload.pull_request) { + prNumber = context.payload.pull_request.number; + } } + + await install.installKICS(); + const scanResults = await scanner.scanWithKICS(enableComments); + if (enableComments) { + let parsedResults = readJSON(scanResults.resultsFile); + await commenter.postPRComment(parsedResults, repo, prNumber, octokit); + } + + setWorkflowStatus(scanResults.statusCode); } catch (e) { console.error(e); core.setFailed(e.message); @@ -18310,6 +18398,7 @@ async function main() { } main(); + })(); module.exports = __webpack_exports__; diff --git a/entrypoint.sh b/entrypoint.sh deleted file mode 100644 index 82c4d24..0000000 --- a/entrypoint.sh +++ /dev/null @@ -1,38 +0,0 @@ -#!/bin/bash -DATETIME=$(date '+%H:%M') - -if [ -z "$INPUT_PATH" ] -then - echo "${DATETIME} - ERR input path can't be empty" - exit 1 -else - INPUT_PARAM="-p $INPUT_PATH" -fi - -[[ -n "$INPUT_OUTPUT_PATH" ]] && OUTPUT_PATH_PARAM="-o $INPUT_OUTPUT_PATH" -[[ -n "$INPUT_PAYLOAD_PATH" ]] && PAYLOAD_PATH_PARAM="-d $INPUT_PAYLOAD_PATH" -[[ -n "$INPUT_CONFIG_PATH" ]] && CONFIG_PATH_PARAM="--config $INPUT_CONFIG_PATH" -[[ -n "$INPUT_EXCLUDE_PATHS" ]] && EXCLUDE_PATHS_PARAM="-e $INPUT_EXCLUDE_PATHS" -[[ -n "$INPUT_EXCLUDE_RESULTS" ]] && EXCLUDE_RESULTS_PARAM="-x $INPUT_EXCLUDE_RESULTS" -[[ -n "$INPUT_EXCLUDE_QUERIES" ]] && EXCLUDE_QUERIES_PARAM="--exclude-queries $INPUT_EXCLUDE_QUERIES" -[[ -n "$INPUT_EXCLUDE_CATEGORIES" ]] && EXCLUDE_CATEGORIES_PARAM="--exclude-categories $INPUT_EXCLUDE_CATEGORIES" -[[ -n "$INPUT_OUTPUT_FORMATS" ]] && OUTPUT_FORMATS_PARAM="--report-formats $INPUT_OUTPUT_FORMATS" -[[ -n "$INPUT_PLATFORM_TYPE" ]] && PLATFORM_TYPE_PARAM="--type $INPUT_PLATFORM_TYPE" -[[ -n "$INPUT_IGNORE_ON_EXIT" ]] && IGNORE_ON_EXIT_PARAM="--ignore-on-exit $INPUT_IGNORE_ON_EXIT" -[[ -n "$INPUT_FAIL_ON" ]] && FAIL_ON_PARAM="--fail-on $INPUT_FAIL_ON" -[[ -n "$INPUT_TIMEOUT" ]] && TIMEOUT_PARAM="--timeout $INPUT_TIMEOUT" -[[ -n "$INPUT_PROFILING" ]] && PROFILING_PARAM="--profiling $INPUT_PROFILING" - -[[ -n "$INPUT_VERBOSE" ]] && VERBOSE_PARAM="-v" - -if [ -n "$INPUT_QUERIES" ] -then - QUERIES_PARAM="-q $INPUT_QUERIES" -else - QUERIES_PARAM="-q /app/bin/assets/queries" -fi - -cd "$GITHUB_WORKSPACE" || exit 1 -echo "${DATETIME} - INF : about to scan directory $INPUT_PATH" -echo "${DATETIME} - INF : kics command kics $INPUT_PARAM $OUTPUT_PATH_PARAM $OUTPUT_FORMATS_PARAM $PLATFORM_TYPE_PARAM $PAYLOAD_PATH_PARAM $CONFIG_PATH_PARAM $EXCLUDE_PATHS_PARAM $EXCLUDE_CATEGORIES_PARAM $EXCLUDE_RESULTS_PARAM $EXCLUDE_QUERIES_PARAM $QUERIES_PARAM $VERBOSE_PARAM $IGNORE_ON_EXIT_PARAM $FAIL_ON_PARAM $TIMEOUT_PARAM $PROFILING_PARAM" -/app/bin/kics scan --no-progress "$INPUT_PARAM" "$OUTPUT_PATH_PARAM" "$OUTPUT_FORMATS_PARAM" "$PLATFORM_TYPE_PARAM" "$PAYLOAD_PATH_PARAM" "$CONFIG_PATH_PARAM" "$EXCLUDE_PATHS_PARAM" "$EXCLUDE_CATEGORIES_PARAM" "$EXCLUDE_RESULTS_PARAM" "$EXCLUDE_QUERIES_PARAM" "$QUERIES_PARAM" "$VERBOSE_PARAM" "$IGNORE_ON_EXIT_PARAM" "$FAIL_ON_PARAM" "$TIMEOUT_PARAM" "$PROFILING_PARAM" \ No newline at end of file diff --git a/package-lock.json b/package-lock.json index 4aa2710..cabb309 100644 --- a/package-lock.json +++ b/package-lock.json @@ -539,4 +539,4 @@ "integrity": "sha1-tSQ9jz7BqjXxNkYFvA0QNuMKtp8=" } } -} +} \ No newline at end of file diff --git a/results.json b/results.json deleted file mode 100644 index 5375d64..0000000 --- a/results.json +++ /dev/null @@ -1,27008 +0,0 @@ -{ - "kics_version": "development", - "files_scanned": 843, - "files_parsed": 843, - "files_failed_to_scan": 0, - "queries_total": 91, - "queries_failed_to_execute": 0, - "queries_failed_to_compute_similarity_id": 0, - "scan_id": "console", - "severity_counters": { - "HIGH": 0, - "INFO": 1628, - "LOW": 708, - "MEDIUM": 0, - "TRACE": 62 - }, - "total_counter": 2336, - "total_bom_resources": 62, - "start": "2021-10-12T12:59:43.666198+01:00", - "end": "2021-10-12T12:59:49.056688+01:00", - "paths": [ - "assets/queries/terraform/aws" - ], - "queries": [ - { - "query_name": "ALB Deletion Protection Disabled", - "query_id": "afecd1f1-6378-4f7e-bb3b-60c35801fdd4", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lb#enable_deletion_protection", - "severity": "LOW", - "platform": "Terraform", - "category": "Insecure Configurations", - "description": "Application Load Balancer should have deletion protection enabled", - "description_id": "224b3c6f", - "files": [ - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative1.tf", - "similarity_id": "6e41b4c14440fc42d084ec54de37649d7dff0731870ba949cd6e5a7308df0173", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[enabled]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive6.tf", - "similarity_id": "0586b1fcf7fc544b156c7f766990df91d44b25e59e367f9847e0be38efae6ef9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive1.tf", - "similarity_id": "00c7a5de0048d51284592f915eedcc9b4f3f0acde8c657d8622c9bc97a76ed12", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[disabled_2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_is_not_integrated_with_waf/test/negative.tf", - "similarity_id": "347945dbe47e4dd647bf7069eaef81d45d804976b3663d456e4e876bba2b68d1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[foo33]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", - "similarity_id": "8e2c4790ddcf078f5ee3ccda51f61eccef8540d1c248ab17c3fb5aafe0f80434", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[disabled_1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive6.tf", - "similarity_id": "1020cc6e107aa3e0f06c7a62da1120481a3ab91e74de9370dc72ce9d5c6a5167", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative4.tf", - "similarity_id": "9b8627cd2f542bfc8cd4c46ce61f9f8a3566cff28b186244cfc929ec8d9bbffa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive4.tf", - "similarity_id": "79107a63984e85c1e602bf9b2bad95fe737e1f1b3e79d473213ef281f81f03f8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", - "similarity_id": "37bc9fa516485cccd6089a02271256d8afcf2afcf3f8e17ea383631c7556c6f1", - "line": 28, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive3.tf", - "similarity_id": "79fe377af1d9a8099b871e93b737e0e49eddaff8f565431ce509e19d4b87d304", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_lb[positive3].enable_deletion_protection", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is set to true", - "actual_value": "'enable_deletion_protection' is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive1.tf", - "similarity_id": "b5df7b7fa7f7822a7387fb9ee48544ffbe128e24c9871fc0a4a999477746d2cc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[disabled_1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive4.tf", - "similarity_id": "f9548e390f291fa2aaf8fe8b9cb58e63ba54a949004008f87c5ee75eb8cb864d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "e1a97baefce0eeb08fbb74630e5bed8f7773d733b83ced9d19b30a38436589e5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", - "similarity_id": "ab2dbfcc0ec7097f3905f2971a280f85d22a09ac3fdf534a29069bf7e6f41ad9", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[disabled_2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", - "similarity_id": "36f76cafe1b909883c7de8d12e50bc280c2b59e189891ec73d382000b8ae06ad", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[disabled_1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive1.tf", - "similarity_id": "5605a2534f408e017b591a2b5ca499cd089001f0f1d71dae13e970d309145cb9", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_alb[positive1].enable_deletion_protection", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is set to true", - "actual_value": "'enable_deletion_protection' is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative1.tf", - "similarity_id": "f41a22332bc00c57fe53adeabed25c7f99b93d89251a1d6ce36a17f22677b273", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test33]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", - "similarity_id": "2e6c1ce04a1d0b42ebdc5020a6ce9b0ac90f37b5b6d72535e22c643cc97a5ec4", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[enabled]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative5.tf", - "similarity_id": "a749007a35221207e5f9c8e8a8166a636abf5e54f9370883f41044fa2cdd965d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive5.tf", - "similarity_id": "e9445c6f8155c2dacf56f8747bd8feb08cf1addeb801a25e238412ba29e24840", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[alb]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive1.tf", - "similarity_id": "20ac402e382fa0888bae94571a65b0f05c9c721ed031b51eaa8f71c710063215", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test3]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_is_not_integrated_with_waf/test/positive.tf", - "similarity_id": "e28effb6d1c26cd009d583dcb96405be6e9bc2f42aac2bb100d2997314f1b456", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "7b1810d5e9ed391821c0fa2bc5aab8bdaa40ffc9ed1bd362ecd15da6c5446fcb", - "line": 49, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive2.tf", - "similarity_id": "637ffc6e1680617cc97ac2479450372317f6df5d5acb2df28ef4cab678f4c1ca", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive5.tf", - "similarity_id": "df08dd37db81ade124c03a36e2b9d4e4eb54a748ad6e68b33b3dbf205df4b7b1", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module[alb].enable_deletion_protection", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is set to true", - "actual_value": "'enable_deletion_protection' is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "1830dce5112123f8856e94cf507209143e25443676ec469084ddc37a8f2bce24", - "line": 49, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[test]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", - "similarity_id": "6d3061d0d0de149f7e52bcc08629463415e3c0a86989ffe81369400188cf3372", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[disabled_2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", - "similarity_id": "c79eae1b40a57e59fa0e322b919ccc70ea09bcc4422e32c29735aa095b6b6b19", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_alb[enabled]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative2.tf", - "similarity_id": "eafafcd9b805eb6442ceb40c1ae54e1e68223a9bc22d397b38a13e540bf46143", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[enabled]", - "search_line": 0, - "search_value": "", - "expected_value": "'enable_deletion_protection' is defined and set to true", - "actual_value": "'enable_deletion_protection' is undefined or null" - } - ] - }, - { - "query_name": "API Gateway Deployment Without API Gateway UsagePlan Associated", - "query_id": "b3a59b8e-94a3-403e-b6e2-527abaf12034", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_deployment", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "API Gateway Deployment should have API Gateway UsagePlan defined and associated.", - "description_id": "a5480b6e", - "files": [ - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", - "similarity_id": "315245822a4dc6f97239990f1a8fadee201edb066587086ba3d0ae1aa5e73b49", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[example3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[example3] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[example3] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "e7cad90a71cb564c2a229023b511c18cb3a94117fdc350d3e8d90d129cd340a8", - "line": 38, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[api_gw_deploy]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[api_gw_deploy] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[api_gw_deploy] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "014887ac8a52789a764bbec5ff9c952c0c99622958512a84d85c2090a7c23e99", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "121e5015a86c3ebf9c6c8b0ce0ec2686edcbbf7b1ccfb6bbd7788ebbc0d433ef", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", - "similarity_id": "0557c925f271b9ecb14693a38bd826d755479fcd9a54f20aaa04070c38b619aa", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[example5]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[example5] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[example5] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", - "similarity_id": "fe046182e3c25d5bb59028a62d80d7bfa82f1f2f01334802556b4d4c48ef6405", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[examplee]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[examplee] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[examplee] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", - "similarity_id": "801181d9fc5f41b964e09afb3af9f3f516cb0ffc5bd734ea02ef41bd3b58355c", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_deployment[example4]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_deployment[example4] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_deployment[example4] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - } - ] - }, - { - "query_name": "API Gateway Stage Without API Gateway UsagePlan Associated", - "query_id": "c999cf62-0920-40f8-8dda-0caccd66ed7e", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_stage", - "severity": "LOW", - "platform": "Terraform", - "category": "Resource Management", - "description": "API Gateway Stage should have API Gateway UsagePlan defined and associated.", - "description_id": "72d08d94", - "files": [ - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", - "similarity_id": "ba8fafdf15c4fbfc8194b4c709d01e767f5ec665ec35df243593b62b45007231", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/positive.tf", - "similarity_id": "7290a4d8d2c7bed78dbea097027a0465cdb6f78bfeacc102bd2d10922ac8bbd1", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", - "similarity_id": "30911dee2e97d890162bae4f3896b7eb7f7833a3b4fb9102f76ef6dcee10d743", - "line": 11, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example0]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example0] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example0] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", - "similarity_id": "d025d9988281a2f1f4e12c09e918f8c6f2197cfd3f4303c5f37b9f9fd8d4af7c", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "a17fa417702ebb855c29eac44ecf5dfe9f0a58878bf82f8402dbff64c721aca8", - "line": 72, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[api_gw_stage]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[api_gw_stage] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[api_gw_stage] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", - "similarity_id": "ede6130eace2da0b1b478ba65c005386911acef1ef358a846e5b22b3d67a7b19", - "line": 25, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/negative.tf", - "similarity_id": "e5fcbba9c9307caa16b33c2e174aff2163e6bfb4d9697eb0301d2c7816617324", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", - "similarity_id": "9dcefcee24bda40bd556195645dd87e4b8a2d76c6b38ad55be3eae13433fa620", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example000]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example000] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example000] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", - "similarity_id": "3278c02e08e01be35d5bdd2e3759d263c62c828e34575336d975961f3acb93ee", - "line": 25, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", - "similarity_id": "d2d56759b8a97d15cb9a54e80e02516c6cc1be6714fa63d00ac6e755d4a37355", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", - "similarity_id": "6c8ecef8f3c058e048123f1a01981e31abf1b8b2785f08d6731b10cc8b8cc437", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example0000]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example0000] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example0000] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "4177c00fe8e290d6685d5f059a2bbbffa018444d9f18cdd3e9767b109a0a4fa9", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/negative.tf", - "similarity_id": "b574b6f19ca5a42f9d251f0ae4a047aca822bdd1058a53886a0a9c4dd9752395", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", - "similarity_id": "364c3a493b69e6ef422f918abca0ecfecfdc8d2d2a4bb07dad11779e1277d37d", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[example00]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[example00] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[example00] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", - "similarity_id": "82bf61396f5968348529fd295b861b8281cf657c2b9d3880b1bba2982902a1aa", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[postive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[postive1] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[postive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "fdb3ad0c037b1bf4d9e6b3b9c0331067d78cf75b3b917f7a6027fe5a7f4a2b15", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_stage[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ", - "actual_value": "aws_api_gateway_stage[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated." - } - ] - }, - { - "query_name": "Autoscaling Groups Supply Tags", - "query_id": "ba48df05-eaa1-4d64-905e-4a4b051e7587", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/autoscaling_group#tag-and-tags", - "severity": "LOW", - "platform": "Terraform", - "category": "Availability", - "description": "Autoscaling groups should supply tags to configurate", - "description_id": "83cb6386", - "files": [ - { - "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive2.tf", - "similarity_id": "4b64336cb86910fd3b0ec7df632b9c21325b4cc3cf09b79ed6109a9dc54fe697", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[asg]", - "search_line": 0, - "search_value": "", - "expected_value": "'tags' is defined and not null", - "actual_value": "'tags' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive1.tf", - "similarity_id": "e4eac97be633ce885a0622e2a8f446dc9c27bd961fdebafa0202475c3c2df8ac", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[bar]", - "search_line": 0, - "search_value": "", - "expected_value": "'tags' or 'tag' are defined and not null", - "actual_value": "'tags' and 'tag' are undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/negative1.tf", - "similarity_id": "a9f0a7cb5b3de45f09f331b99d7df70d4ad4984fc647de044421fac9b46ea121", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[bar3]", - "search_line": 0, - "search_value": "", - "expected_value": "'tags' or 'tag' are defined and not null", - "actual_value": "'tags' and 'tag' are undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive1.tf", - "similarity_id": "e3d2b17430bfcc7aa31ec8cddede4d099f60b4ce56c137c4a06c4b3157d0aacc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'tags' or 'tag' are defined and not null", - "actual_value": "'tags' and 'tag' are undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive2.tf", - "similarity_id": "855ccf9d37c241f1f932c3a9497082bec7de9e77618541262116e4dce4892f49", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'tags' or 'tag' are defined and not null", - "actual_value": "'tags' and 'tag' are undefined or null" - } - ] - }, - { - "query_name": "CDN Configuration Is Missing", - "query_id": "1bc367f6-901d-4870-ad0c-71d79762ef52", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution", - "severity": "LOW", - "platform": "Terraform", - "category": "Best Practices", - "description": "Content Delivery Network (CDN) service is used within an AWS account to secure and accelerate the delivery of websites. The use of a CDN can provide a layer of security between your origin content and the destination.", - "description_id": "1b311401", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "a50999b453c2a91e688f200ed03da738eaecf52b045e309fbd8362d9ad020f57", - "line": 11, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudfront_distribution[positive1].enabled", - "search_line": 0, - "search_value": "", - "expected_value": "resource.aws_cloudfront_distribution[positive1].enabled is set to 'true'", - "actual_value": "resource.aws_cloudfront_distribution[positive1].enabled is configured as 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "19c7b053e95a18ffd075c07c51db2befd75a489bff933004a81ff386710ef96d", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "resource.aws_cloudfront_distribution[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "resource.aws_cloudfront_distribution[positive2].origin is defined", - "actual_value": "resource.aws_cloudfront_distribution[positive2].origin is not defined" - } - ] - }, - { - "query_name": "CloudTrail Log File Validation Disabled", - "query_id": "52ffcfa6-6c70-4ea6-8376-d828d3961669", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#enable_log_file_validation", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "CloudTrail log file validation should be enabled", - "description_id": "1d528dfd", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive3.tf", - "similarity_id": "a644ff00b637d969d67c1ff91dcd2180accff0bfe3e8857a5a3c25dcbf7711fd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive3].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive3].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "76336683b96b3742355aa571b6ca0cffe892c99f391d70bc92552d4f7c7fcc50", - "line": 60, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "61d53a9f6fedd7bed8f878030a1fda24e3a81cc70b86b7e88a28298e23cebb4f", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[foobar]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", - "similarity_id": "c7fa60d2f6768a67312d4ebb3f9465c8d9ccccff513e840291b467b747e8c0a4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", - "similarity_id": "8d9b7ccb5c82e7f9905af895b1fa86f25da01bb09ba3a9bc30033c6790e9689f", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[foobar]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", - "similarity_id": "008058f43801fa2b8fa1b92a01cc24b355920d7957090072970c42e09a9d017b", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[foobar]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", - "similarity_id": "db916720db93863f94607917068ec869ac3b500271ea13f854ef32d977f7d1e8", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[example]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[example].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[example].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "ce483994d3ccef6e0ac93fdf809153723d388ce73e29fdb8f9d1fde7469fa0ad", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/positive.tf", - "similarity_id": "fdd5821e0c98579b4cf5ee75faa7f5e434a6aaf61aa05a65b4b48090e2d2fd86", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive1.tf", - "similarity_id": "0011f0ca60acd3ebbc298f6f6104fc924841d9246018fdc9ac265262534f1f04", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "79e3be003184d4c0dc2ff15c32d9b826757c1b7645a286d844911749ba528718", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", - "similarity_id": "b7abb2b55853ff94df0666bb3a67e22f1c8169c749044a3f2b65983d42c76341", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive2.tf", - "similarity_id": "75923477f39ba943d5f2649335e245bcfcf85d68630357379d21c9a79db36242", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/negative.tf", - "similarity_id": "1aa5a74fd5e820cd5efdbaf5399c2d67e240e884ab74c98b9b570ac1f030f712", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/positive.tf", - "similarity_id": "29f29b9ca0551f596f5a10c202b23d067a1a0f9cab337ea750005d97bc245eec", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "a670b0a5c796f9c50012b8971d72b52ce7ee766020e7752ef25b0eb561bfe57d", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[foobar2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "ee8ce3974034ba131e8ed0fccd9ac5b8c53b9bc60c5d62d8df65857f543fe769", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[example3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[example3].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[example3].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/negative.tf", - "similarity_id": "db1b16c2d9f79c9c8d68042a82cf6e1872c5a29f6ab155482a9c1dcc3f25f848", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "d0fd62bcc627a4a265dbcf526a93ca11b6a1d60892512ee05dc633f99d4e405c", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[foobar2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/negative.tf", - "similarity_id": "5e3a274b03e3eb27e9faab53b36703bb57917e05b8695a4deffb06b162798f3f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", - "similarity_id": "15206ad120a03c8fd30ddb618bdbb98012dd6a71d949ecf1a073280d2ed3193b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", - "similarity_id": "ff65a715f530ab65b9ebc3247755baf7b51ff16e7e5f44851bc8b1ec3a40e223", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_cloudtrail[positive2].enable_log_file_validation", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is true", - "actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is false" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive2.tf", - "similarity_id": "df887b84fdea925c13acd9ae76de9f88cda905b713f4f9286e29e86cdd6a8216", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[example2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[example2].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[example2].enable_log_file_validation' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", - "similarity_id": "6242d5ee925cfc828ac3814c0c30c3ece06bebebda18f581d0fe58b9fda73ce0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set", - "actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined" - } - ] - }, - { - "query_name": "CloudWatch AWS Config Configuration Changes Alarm Missing", - "query_id": "5b8d7527-de8e-4114-b9dd-9d988f1f418f", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Ensure a log metric filter and alarm exist for AWS Config configuration changes", - "description_id": "698457eb", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "28f87bb0f29a1c98757f28b377a63b8314b918e3e975eba584744032c95c2e57", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "2e076476ecf6a3f22f3403f73506d504a9aa9a53db3dcbe75e33baa57313543c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "59b3ec0f7fdd6a31c942cbca94e6a997dfe0e770b5db89bc742842a87d0030ae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "074d53bb2102b9871082ade06d2c663285c0f6bb5105a81abeefa0140282df6f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "c94d127e3ed0c1572e0cf28a3cedf2b8fb012b324f9dcb93f3e255039c4caade", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "b62912d4a0d653b3859e256d083f82e889b2e98094fd55a3b76f6be718577c0f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "ccaa6439cd0fcc70434fc1484404cd2a18aa02df306f5ccaf71ebf8ff702f9b3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "9cd4244c2691de9b6ceadd71653340414d841446960942ea2ed470c136807e8d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "c6333e70a3f9835e5e9651674e5c1a800e6cc512d5e4c9fafe2ff0fbccfdd3a2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "ecefc086516cdce3a07e986022ad62b2df13a5e532fd75611d9dde322ba15908", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "b4ca7a986f97b9b166b0123d5ded78f3e475601365e5a049c061856d2142c413", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "b276336bdf94aa4eb10581351004ae6b00b74a1d0fd7545a16bda080e612f944", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "e412e90921de50cfb66b29448c6363e1e62d2ee0fdf27e1409f1e387b4365a81", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "65b4a94cbb3aa115a625e23a2f15ead1e443255c1aca3c2f69b59d6df5715343", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "a834e8872e49b3a752827b6f04ce83c4b87071401563c99fda0990bb99f92b90", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "0d226ae52afd4ce3df7f683f6bd3b23ef90690958379d349d277cac18f442943", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "44f5013ed83bd2ab95752d150a45c3611566646bf021fd9e07635557ff7f33fc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", - "similarity_id": "a6269e470632414562ab4177408397cce637fc6702d293780458439ec7f54599", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "335cc2a7fcb18aefd2d8fb960bf5ad3a38f367499cbb74a6c0962095525fbc26", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "6ae20fa38ff7e1c97c2d046589a45c6b74c1e4cfd2e27feb4cab66204b930a60", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "a21f8539e1028b57564ab81ef706d0f757fd6668c6a2503c89b67d18cdb2a099", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "65a39bf06af3d685acef8c2b4b109951d483c63160ceb4b14ad591f18d2d6b6f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "043a223432dfa607862f178ee01b5de3523b883150f86c3201d48f06625557c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "fcb8555af68319cd26d1cb7269597c11b88b767f61aec40540a8386a9c894061", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "7c1a73d47fe7dcca24abd8250612afc66acfa873198a6e085cebb2808c4ba52c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "5b5e7e1ce37cb5537749613c15002a89b5cf3afe32fc9e5c013009bb47e4b8ab", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", - "similarity_id": "04e9b1ba138b3afb3a1b7957d5745cdff05d32800d951f884db8eb79d4d09193", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "55ccfdb69438e2f921f85d9574a2f1318cddca42240d17edc1598470342539f8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "7cb19bad2001702b2b3a74a1b88fc09380ca5872b07361f9392586a68c6ea32e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "da6c720072286d021cbe6aaa6a86d316971819c43193bb62f0c8b4373e5d4781", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "b93c9b9f92fd3a703e9cd883479625d8a96834b08fc422dd32e8aa3cb0366cfb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "7529218b0891ec78e6d2d0feed8a28804c6d7362af163818a104f8e9a385e497", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "74671108c5a4c16a44d5ddd213aac8335882d66e56fea9f5a7696474f8055c62", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "f12c8016108020ecab5441d6d6c57e5390f0dcc6b34d8e3450c247928f5b6063", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "2c740cc1300c105688774751c276fbd5b850c66fe6bbdb7a5b53c50a55852b76", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "b1ac557a63053a01dfe8b382280a37ca1f71de8d3f640fe82ce274c307a6c609", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "2f39af1c579386638e083768d08dc27669271bb77159056b5fd8c8e978197263", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "1fcc438f115fdcc4c4754acaaf3b8c2e3dc07287500dccb02ef95b71f4cd233d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "02b8f48a29d1c0e79e3a6089b74518dab3065d8bf653ae42a4c030c284029c59", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "b300a1b2d46e4fd672fa8e71a773e10cea6e61f6cba2a2a13690e04c2be3c563", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "f3e520e4560f6259264fa7d38501fc7cab4bf57ed620c9f8cc4686068ea5e4bd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "9081c8bef2daa3bf24ae285d9f4d95b3653b80569d293493a63aa23dc87048e6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "fa442d97d2facfbb9435046e640ace7af831b786f82eb492e22b8e6da169deb9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "7e1ed3f47b10346218be2a1dfbb39cf5898f221ebd5412ff339ea76dc0e80c3a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "b6d6912628dd64fda3d1ea8577682bc6d077b371854a23a42101eaef09b45b9c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "274df2558ff5ef7226542716f620e3178781b226ed625c035bdff8a951746f90", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "d8ae9645e2c534b4eaaf76fb7ea2af32775d088b36809660c963766c028bcf39", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "f8405e844341b177a1383ebe7b749235ca60b7f03794e34b1f736de35a7ab772", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "9a2adc925423e4ab36d70969ad0a2ca2f12594e9eba011334ae620cca52d6e4a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "0277550cfa8d9f99d9ce3ac56754cf18a58cebeb04279748df8de210d52c30cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "ecc26d71ccc531303fbf652725b25fd84afbdb4b79f248d76ae147e5d8fc5003", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "88b2014ac2f47ac791682cf1c2ca53822d16f19ad6f3dc36661ec01eea55b05d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "4685abb28751888cd15122fa27ee1831636a7da404828faf024befac00e88966", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "a83c37218caccd906f54028f77f80f57c84e3230a390ac238a8a1661c9581677", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "42db9b5953ffd4ce0f43bba9ae43dc47554d7a3030d2df77a3bc68ea0fa9ce27", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "86180f0cd176e1fd3f1e75ac049556dac6016c46ff891fd6081fd0374bf00971", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "7752aa5a9968c1ad337779ea051b4a90c4e14b55f7d948d04ae2b97b6c29cece", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "8d9e5a04a5ba7f75c0b0ce8c5815fdcfe5af2dfe6472403d30fe85ba8ed41f6c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "049693902d84a83a657cb7e204806c9e88c5b57569283dc50648f0d6de07c39e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "55f260444f9b71bfb45f22c8c9d259360fae4cc2679ae7dcedf3d0d860dbb8d4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "1252ead1dc8b9b681b9ec987437bf5dcdf8d73b6621ad11de5276e782da8faf7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "647389548c331aea315d77f17a2ab165dda086d471d294e0e20165f9fba271cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm" - } - ] - }, - { - "query_name": "CloudWatch Changes To NACL Alarm Missing", - "query_id": "0a8e8dc5-b6fc-44fc-b5a1-969ec950f9b0", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Ensure a log metric filter and alarm exist for changes to NACL", - "description_id": "0a8e8dc5", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "6903debe27292f8b3c0a424a2597e9be6573dd2cd0aa36fa8f609d48912dbcba", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "485745ba95ec0a8997592fe4f47701ba55225e1b7b694763f2cdb2d9bf173bc5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "249352fc5abd4e080e58c75e6f86388079749c863e45a9ea977c7ee92af10668", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "d93c96fb13ae98878e434649c183d291d26423a361d1d358e2f49ad7795b058f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "65845737215fadc5dd2643d2e8948371b7357d5510a4277e5589df18adfb2f63", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "b92d35e9ded8e4d5ecad815f861f57d208830465e15785a40e449fbf7aa57c07", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "be76d95f00873a3b109046fb88cae8f4f93d356175cbb884fcf716e451cebfdd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "2307e0a5d574326cb23eb9511ccecc35ccdf134d402da6f0950cea9708f24937", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "94f4efaab306065c84eb1c7a9321d7d80254988f1bc7b40fa956e1dcbb9e8552", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "9ae953e7c2a5c4adc7b5ba35f232b0c71774fb74326a594516d16c6a31f5cc6c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "1433a773893e6eab9b5f3641245e35b9c2b48458d19a6cc184ce9fcc82f5a3a2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "9e157e89bfee691e474555ea313473faf0bd400f12c0a7b2c86a11404b83f8bb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "a844b32718ea690fdfd052a25fed490bd355e5aaf2e6cb1fefbbbf15eed09048", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "f9a50789122dfcce1819d1f826db0fd2de1f69ad922b4f01043658a63251a900", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "70b614d2064abcdc579b73ddd4c14539d241e7bd22f65fb2d7d66e3288dca931", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "6323b4c11ea7b1919b4f01d003c81635f415e17bca3be8fa8d4b89b419015f4d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", - "similarity_id": "a7f7e4882e792cdfdbf05bddfb7e23ba51c4838d2b5c1cef1fc88c529b6fb76c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "159d125f26b67eb1859093536e003aa91b0942a199b17811fd5bb4ba66d9976e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "f8b527a9d9be588b6045d24ea1e2d204df7fad8d158f3d1942852784d9c7b571", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", - "similarity_id": "71c4bd33bedaf8b90d98e1fd763d2a221285f1a3d8eae7e6ce80adf4edc62f0b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "7958aee25634b1b364c256b800df93bb8f912ceb42c9eb0fbef45f1749c504cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "05f279e147a429dec1aec7efb2c3b71fcc24bb3533c178fbe5fdcc164cc3f451", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "b714c77fa2f094d9b788b0b01896ff7ef3bdba01611fbebb3b6b098c80b5beb3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "465558f068b5c835eb1f7dcc68bbe5260c4434c283d2ee29f02717d02f2c0c68", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "b281b765980341e64a53da3483b543a1257f16ea3781eb54f786acf9f0ce5805", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "98a798f9e4f69097fdb1f53a2a43e4cf2e259deef094f28faa4ae844b991134d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "2f55fa58ea005a436fbb461a9e29d93d8b48fc41b136dcb19e15f7445ea47363", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "3f65270c622b900fa56da691dc85ad8542053e3f450b0e5eec1afe073dafc38c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "037110ae7740689f8d70973200f808ce3b6df9138fb4704356ac1984a2cea84b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "652229c4fb678aa74cbbdf379ae864e5c9cac99dcd7debc1d7d6277cf64bcaa2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "7a2b1dfd6aaa24a3633d750fde31ecbb6f1f45b8fe0cd40d1843ef1338f5bf01", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "1ff9187a94b9eb1b57a641b399804ed95ec1fa100bc776de6040ff03d2de5ac3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "bf0ac8dcdf6ee7525f7acfee11b66dfdc31b2f59f58a96c26163afdeee105318", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "689986cc262ffd0b41b1ec127317ea1862b4e5712060e492e1343b9bb4b34d96", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "df1ffb23b4fd72edbb9abc58f3cb6a971c69fc9bb0e1feb8fb8d4e1c02c0aea1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "b5cc6bdc84f7c0120c4876348826cdcd0ed29f64d05251de9cbf7526c0086aab", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "12477a036b22810870095fcd2650c3ec463536f7a035caa7446580655379200e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "2672d93331e77df454da295ad66151d5d163fb9c2f9beb9c2ee68627a5ec9b78", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "291299fe4a86c7f6bc03ec8a12bfeff6f0394da259a33ff06649aa9522910897", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "0994a5bbfc9f71c539061df8cfb663bdbc26aff30ca4d96a85046fc47e680522", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "1075895c6e5ca3185b3e7eaa8f67d5b131ddb6021ba901fe4504745c8437eb28", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "5d5c03f6c5810ea5eddde285e6d214b3f96f76c7f6394fcc3c38edf1f00a4c73", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "d5be0cefcc8a54578269bcfa43552d3f786d58d0080173cac06f9cc04958ca5b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "c77a4887f7efc62d54e65bbde23162a68698576fc16307e8483c93eead158152", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "648d6c84aae55e0cf6e43c642c77c539ead27730668166dceca10c2e1b4d7f96", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "834310e001b17c9e3c20b118c28a0cb2af4c75680096b58f75f8a5acd319e517", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "dfdb1caff5bfcf063775e47bc3489fd5d44e1435739e5b587916560afdb72e3b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "dd66f94a42a0e11a06b28d64ef9bacd9ff2c2f4370e75c397aca9e9902a2e603", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "463fa47b5589756f95711cc14ace2b5bbe6735f986ab021434c2fd58388909b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "b3bd5928e92f1a88fd2b79867da95120314d24de8ecd61d0bcac98d9a8914459", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "e9249b9bec36c56155b2a31240e8ce4da6a71583c0795cc43efc7e2f16bbb5b3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "291adb3d12d2527aa0ab1c6352aa4df64aa7bec549385fbf4eded296e1d7e398", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "9aa19a3c50addb7f6e3cd910aa7c0df76b9a95428de4502e189ee9cddd0bc00d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "6764112c98ed214c8fafa07c98f78e8361672d7d8d02e4d2278732cde894aa30", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "feb61d9212b82c4f0a8b26ce2a6732e338bfb30b7ae0958e219a415ab131cc9a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "ba017180f52f3205ac4a95a0dccb8d9ef7b9e91f465136c5020b92f87b67ae60", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "b2046312cd53cb96dbc6e4f03e68813cdb3e45033fc4396e71d50070f65418fe", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "ade7006ffbdddf8a86374dcd4f9e6ba5e6ada45d6680263004f9f458988a2d44", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "d672914d3abe349fae6f44fce8e3207696137b0ef7253fa26456793024f9a399", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "cc69dffa94d82474ed937d70bd84582846c69aea8eb156a0de3e836e4e90da58", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "91a5667d72ba097455047c306e8f1c3fc15aef712396476eb8027a2c12b481cc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "be22f6deefaa0648c755ac4d9df6b693552676b562cdfc0444577f717b75952d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm" - } - ] - }, - { - "query_name": "CloudWatch Network Gateways Changes Alarm Missing", - "query_id": "6b6874fe-4c2f-4eea-8b90-7cceaa4a125e", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Ensure a log metric filter and alarm exist for network gateways changes", - "description_id": "aa3e331d", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "3b23051ef50faeb0b44ffe056697c4f9534cfe36ee95a797a6dcfaaca11b65d3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "72eb98c2d2e83856ebc61685892701facaeaf3333a68601d8801d8798585300e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "336eeb58d45806d01927fa831e1e6438b6105a8d1205bfa2edf979b634e61be3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "6948b44813ff70d53b626d93cda53332f572be68cfcfd3ae54a863a7a49a0279", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "f156927b8f94fed6c5d07af2620a53c278441cb1c66e9862b687d8d40abb4285", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "b70fa2bf38bf27c514359c6c451b902be1a348f27688fa6953b6ac537050a793", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "58ac88b9422f86def946c1cce50cee5e86287d88a3ff0e00623dac784a3dbda2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "3b0d523a12cbceffaa4b2e933ed1dc37601a5c2c2ae5ab9af6f04667618a3a85", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "5f041053857cadb0774e8e8e1fa83001df3b204fd5227542925f3d666fd34ce7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "401d4110b6d1657a4db7bfd73f5b33be2cfac98f346667611ab3183e561e391a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "c93f9e28643027830395e95a6e1ec88523c65ae458de2b5d91d372e5f0fa398c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "5fc1cecfaa01a5ba4319bc40f74126209c5f6359c311598b59d4897eb035818f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "74e8c7a5f913805c1c3120cb8ca323b683ad3911acc7e136aca206ba88eb9d10", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "41a04c0d0892ac538682268f35850eca087895a6de3651b0b5c59b5abfbea6d1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "200a8bf334ca6bd48a2cb467bd12457dfe5293079963e67df042f3b562a23ee1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "c142860e6a4720f16956d9089f7335eeb38aff66e9909f2752b36ed7a5cca024", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "874bdfeb4d4c377caad144c24759530aeb9c868e05d9c0395c39cc29788abc21", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "dd840fdc51271dbc29fc6d639f68c8b917687726f23f5568ee9e5fe6830f4e82", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "728fbe9f99d91aadffd4a604026001f54e54afb2f8eb907182d5e5c9ae1801d3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "28be4d164a460322039b32ae22839e3e05239d3384eab3274c53e982b2ea642f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "bdc8427bfbcaf28d8056c0dde93ab3e61f271a93c1fd82286030764f37a11009", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "bb9e798bc79c461d373bf3495826e6d2cf3758a76e83b8d73452dffacced96b6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "632002730849b6dde19e1f95fcedae79fe2b446fd9fe6467fb992c23dad07e40", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "c1ac16b479874f7eb9750f0c4c03848f7dbb2fff563581a3650de74a533795e4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "ac42875da20a5dca32ca257af03c8ddd776bf2d40904f6a730220082933d3f68", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "d447febd06bd32d027b3116466b5e41f4d26975a305b0a8d91afd0ae3eeb10f5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "09f83dc75b82b907d540ba959a3241d2cdc5a9609f59fd95c85d1cb49c4ceaa1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "42a0056bf2810b9f2f23926da45240d646f39dc848e218169fe3554368d36e1f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "7cbd47b5e6bac6df1e7cd8aa2556dc977381dea6c222cafa19f28f96b0694944", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "910ca628294f24f35e935b83e45a9bed21d8dc0df1c648688147f2d5096d63d2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "385f84c9a828eefb9866de2d4ba6c159e2694ed1550a709b05270aa89d9e8d77", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "fcc6c07f8ad7d0d415d6d37c584bc0c1857c4b92e2f1f8d90019736b86042a21", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "665038c4b61988f3c75cb397c06946d787823eff54afa9247e2a87e4d790479f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "8fa4184becce81c1a8712a8424fccbb2209cc32c499b0760be24ab6b7bc36c8b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "b57e7f711e5288c7e68bb748f25ed7ee1c18dad137ddc4700276fbbae4d9509c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", - "similarity_id": "c1dacad7a3b1e22ae90cee4a9acb7b6200d3dda20aded774a0cae23b4cc2c6b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "c9133dba00e783e02621aab9ae721e38c5e2feaa5d023505807b690a8f78738f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "951ecb0bcb86b80de8e2535813e4060a14279914f3d789b4249dc1c569d62f67", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "b945f43cfa089d8ad757d1fc3df7994c9a14023c81e5675df6399276f1e73419", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "85f0cbca7d629baf95da3463a31d11dfa3da24ab7e3899192082661db11cdc48", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "65611ed109b8c52fed5f6ab3c242be0dd510c9fa8a8540ea8c5c7c1c465810ec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "f8cec98b168eecb15f2d691010096a785e33ce6a52dc8ff678a26054b47a59c9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "edabe700b3bad1be302d6fd547c8f137d44947a8030c21d8b83f88c9a9427997", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "c2f89b882f00d3a20fe3181e881758dbdcb5ddd94a4b5f2db2e83542b992b55c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "b44d3211e8ac140ad48b30f1406a07c08f6d5288793756d35fcadf2f8e9fb4f9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "e827f68c19ff9a19243d5f79dce8781505fc34232c31f6eca43071bf4a39aca2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "5294b0970d4ee5046af4bba0608fb620c24a593c168205fdda84100c6980a7d0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "869bb74e042641698a9e7df1675f5903207e1d588ee5babafa72a573e07a9516", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "4a53fcad0c85593ef2bfbe82526e4e172307ea6be50bea5f247f0a6da6f73973", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "6f3127d45094652a171a0cbf10819d296645397d4b641f57fd5535920c365408", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "e5cf9d34b2f053c7a473a6a9fba41d29f512a46e70020b5447558ca25e911851", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "e1e179f493fbfd9c7017ef570dd253f1f8fe9336962af467a925ba875b1e3075", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "5dcb6d07e329415a468aed124837a2bc32033b9a0d0ecf204d41788dcae893ec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "a72df7df02e361991c3a2e11969dc6e1aac724bcd165e201c13be1f563171596", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "36e1ba47ebd74af7a70aae8b49f7afb2702b9d1159e394fc8db8d58d521b4b59", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "84a55b5f1ca8ff66610cf824cb204d5e23484c0166152fc60df88f7674da131f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "ad248dd8fc79b68eaa1ab978d53ddb62242a937fb0a91d57a5365a2468a97d83", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "b7a4fa2b37836d1d5a6bc6406e4ead9f195fc71a15e25af3e36d209c023d4de2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "66bf5935a275d3549a384506e7907a773410fb137ed7a99746c048a889e8ef0d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "b11a7784b2e4e061be0bc6bf6d010fee5af6f0834d07e2dfc0c6fa8a18763d42", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "4270ec6885597c3b4eaa91a0e1718b92a380c2be79d674745d04bed83737a536", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "264d50985cfee37b425d82f87e07d904a6f0df08fbfca0f1fd2ac4173d3918c5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm" - } - ] - }, - { - "query_name": "CloudWatch Route Table Changes Alarm Missing", - "query_id": "2285e608-ddbc-47f3-ba54-ce7121e31216", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Ensure a log metric filter and alarm exist for route table changes", - "description_id": "de601959", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "5f4de854b65c2f67683eaac8f6780fa56fb102c267982ce4280f2c30a7910c89", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "3fc8da94a2be9d30ca3cb2f03a6451d5523aaa373521d041e81b29c1889168d1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "8d5792151098a66a1aa429d7ad4a3f69a7d531f30319a36de2acd80d22b6ba03", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "9b6417e4e20eacd7ef4ca63399721bcfcb618825881856e250cf1761294ce887", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "744004275ac12a397e73ad98b64a5cd8c3b9ff618d9a1d4271225e8d02af2cd6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "9010c5d88f95cf61813737a6be3c2343ec1f8e9312edb0fa5e251c5274660ead", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "fcca10ec92cb5db4284e2ec27e6d37a41193111579754c5b369531c563fd8f86", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "dc2ec4c61a39af10312fa4204c06967c8752eb128e0a7efd34ea8eee8b84af6d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "e85ee6b2c7910d2b1e16daef14afd4327a9e7c227f5cf692b59cede6b8e3bb45", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "4408b8fe65e29d894f70352519bcbec360cb750aca4c70480be652167ebc4a75", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "299cfb68d22bef4f83c848a7a4b94304b55a164b3ff29d3bb68a16de33586c6e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "f3f91fa8fbfd3392008c6862290df9f83c645e81667dc99ffb6195f78ac2ebe0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "818879350d986f73b41becddc585d19bc13b2f6fb78a2997d81c7ba2bcf252d1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "ce09dc668248c96186d24abf7905f43e53e0852feb4cd52ca5577d9a72713c84", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "fbff85124c847bf9a5a6cfb847ac2a2cdcee5a7e825e245479504d18d3bf526c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "8768dfa6fd9811f173cfb1db02dd8dfbf1fe6b48af944d6b72f6766fb25f1ecb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "408fbeb6c77dfa85b16efc3671db86f145a24c09266370a0148738515768cd18", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "43479d6fea094c3a706b398ec57d24ac7fdde35bb06a69e762a4822ae4649559", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "a5154b5e8653743c074ead09516866dcde8e4799ea6cbc44b3d5a2b0057be7ae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "a898a7ef8fa71f4da5408b8ad7c78af82528fdbb5c1d44e9d6decdf686bfe102", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "bb67d5d84aab9dafa4b197421386056f13c14b4e6f329b52866157eff061e52d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "382a860570bc6cba4f8eb326c4046c1477bb1708c31afa90afdd32c2a99571fa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "c51474f8a7f6853d09b919fc90a88d48fb8b23def94f563c306623f043af7f54", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "09a16093c3109ee2cff2c98b289325cd8036fb8fc2602c21b1d7bd761fd97550", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "68b9a7df12ce98bb30c54a92eab0424eec55074c704d5d6de565dfbed90f52a2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "d573532eb89d2ddf8a48a7f221f7dac0e5ac26264a33a31f7631152c4c593abf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "3f9dae31110032114c585de5b64363a1c91afa6fec91f56e4ae8c2ea7b444c16", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", - "similarity_id": "8fe37bf227ce3525cd879f89a31a02ea131a25d682b9659205dc0da19992001a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "1346d996ef997a03fbab68e90c6b3a56a324e52af6898509c4fd478888f2752e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "7521c790f8078a7cb377623e783f103d392dfa5fc911e066f989f7ca56ec1c4b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "782615d3c12204944dd01793feb71678fcf038a50d61382f0039be4a0a5a8faa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "58f395815f35e5edeebe7c8ad1bcbcb96a7ad1b43e0805e04f047510f6ebb95c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "54cb927716e2e78f8abe277f1b63e1f261a3b53096935b1394aa5e062af28a90", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "7f2d6e125af065b98c1706512f9592821638c70f7f3193dd45e83d5c58429bd3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "bfc011b73cba3e2415398c442629aeeb3feb435e7757e27d72a24ca43ab56b80", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "85807e5bd8ae70da946d69b52883008be232c84536f9ba7abae56a35b214152c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "4a824d05364ddcfffb9f1519ef230759527e14564a9364f1f95d8957ebc893d1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "8304bb77d73cb94b7dab02387d5f72a42d396a0ea3810b72124dd3e1ea6ad816", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "8a5abde40e2c5082485b9aa07bf9790d7bfc79574fafdd933c19722520cf9522", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "42dbe9c5904dbb08473cd0e66b2c31e3e4efd2aa24f78751eb5f38d9ad46ec74", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "274c213fe5ba284dfe630b901b949ffbc3f5e57c025dd608da1e5f11a47a72ef", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "b6dcb9d5dedf19bdaff7106a5b11c0a2a13afb11240e32247d28afc5818939cb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "3e35a47d4d4d42ff76ea022597476a247967de21f9059c90d00d3e43bd6992be", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "18c17b09f2aea09de7ab2490d8276d36cae7e80f12f7dc248ca1266265662652", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "0dc872dd2c1e46d3532c5031ed8bfb552987ea3001b8e9ade07d726cd00fc26b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "b478f7cc1cfb08f95ff8b2248e9f0072844fcb876ee7f7cd8a452c7f13fde6b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "d418fd73f9e54cd84b5a3861e394348803c5d41935952217d825b9b3beac632e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "24ec9eb2d1b4d2ffb0d4bff6e140b603321fccd840b471ca893b98f2323cd7e3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "c31cd39b7fe08018896cea9dd4abd72fd25f1f10102cd02795827958f562b394", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "9a7a046f057673c9ee9d61cffc4082d8f5f2880b233ebabe0f73b4fc1d746842", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "fbd3e216c154ed0b7d4ef71c6ce0f83fcb9d468c44fc32e61252dbd1cc8a0bdb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "ddcb2be72c6172120455bae21d1a2df73c56337aacd35829917da6351b4b416d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "7d6b5e8b4c7205adb3debafafbe424a43664e9270d98b2333d91d50cc357161d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "be7e0430dd9d7d8cda1fd68465f958c6fa08f92cc543c60c506ed98c1ae93806", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "4e8ac4f969157ba544337ae63db2b05c54ae32f709aacf4ab2e4c84dc79fc542", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "a2845656a46d520d08f05cca7d4e18edf5122da36d648e7f26562f48fb6d1d49", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "c8d228540fd790bc85d4631b3fad2d576112bd40856901e80487aeaeb6b3c4ce", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "16ff25fe1c0d12c809b2513f66e868295448666c1998aa44a5e288b16578e77d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "35b04d8a9f78ff67b42b747ee870db727dac015805c7b4f6e6bc730d09731321", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "9b7d2bdcc84f0d91ee7e17a1631e4282954f1e92381283b7806bfcd120bd80a3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "08bdd5f12695ad3fa4c759e50f952c0264ef5a264f807f8a01d730b8b061fbb1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "9c8ba3055a2aa1d520fd5dc051b959e8d4451b078fc05e8b10a52bcc1c1f9cc4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm" - } - ] - }, - { - "query_name": "CloudWatch VPC Changes Alarm Missing", - "query_id": "9d0d4512-1959-43a2-a17f-72360ff06d1b", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Ensure a log metric filter and alarm exist for VPC changes", - "description_id": "6159556d", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "f78c4387e5a3d3c800b90bb179938fa2a00a902a2b6d141629d6710a1a15a3c5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "3eb6be622cd81951dd69546d846297283a8048094af0c466a96999e4268dd310", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "9b12d1e66bc898859bd8d6ca5f91ce8d4c180f298b59708c4a0b90219c565d15", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "93929468076cef9bc2dd1f31dfcf1fcf4407a88c1e2b5b09e9257ef60e9529a1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "aabf760db73489e89f5a362d649bbdaafd55c508c2d61bfcdde07a18da5d6c01", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "fc1773e959a8190b2cd1750a833864aa436600d8c0805ee124d481e7c80ff8ca", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "235ef3c222b16c81d2f1a5b501b998f69d3e8f8e744e828eb58d97c295e52d01", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "71eb4314bc802ecd15f9a58b153e157bb2fe946c263a17a85d5049104aa80ed2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "8075e728d058c0f7f98cb65180beef6636fb788339c58b9699de5c2b76b89705", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "e57d99f09101aa8733a3fcf31c3238c3ac965e13e60c218c808c9bfecd78066b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "62b3b1f39ef150054e8576d5acb9529b1fdecc921a0533c2d4fdfb1a90b1e3f3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "f7f31cd7837eb069c7840749615ce89c4c72a8b3bd7c81a7f3b570abdd91a3aa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "41e1a5a2b98d81369f7266fa736ac8cc4fe4a1f0db99ee2cfa9664eced06df39", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "43da36605491c399f3d009e25bf77db4572ba20c84825b0b296bbe145f8d6d3b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "ca4fb6a5313179fad4fd8afd7a7f467a16f4294ad86b47d17aec972127406788", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "30a647a4997f43851b5e73006547a61a7df8f601850feb1e2812ddf23c498acb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "1f1fdf2736d9401518c6705556d366a07ecff33e4d220715dd1a1017084ee8cf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "d87dff25ea446205eff3bce27baa6083ba82d8a7c283ae9c7aff4f0c15ab0382", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "2d8cb2554affefc7fadaedc282082eb5e12fb635c0dafcb59604355f4e74374a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "f5495de9230c5ad8adccfa79a3f05b27904720b95d2f92a451d356ef856bd5b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "b2dc1cadcc721c30bdd3bd331105f6f10b58177a8dc0cc5a6d3ebe497468aa0e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "8bdea07bfec18400f9f5606ff8c51d4e5205d43cd92341a8c67098d6053d0eda", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "ed47ae20c9b65e049849d6de52d8c98eed9e56cfd5d2543c30ad8fb1d9adb59a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "ed19fd4ba86ee48e3e331b7c7a84a32c69b3c066e89ce86a55e7c2d9ea1a48b7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "3c6a380b65379e454579905cb146839aec504dc65851ca38e0ee4f28a5682403", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "8a11c75c62da0b3e476b15fa285b6e9ab0ab15d7c09ea87c3e8e917c48fe4974", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "1677ff343f734c85312f5271b3b458f8ab35cb5c180cfae65b0a715c7d657b74", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "82bd442524d21326497c31080dfec42cd908fb679e3e4f446ed3b46c07c6ca43", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "5035d36d56444f548960427a10a0b8e19ef36d58c643d75ec907ad4ae0bce75b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "154d640130fa237b2a736372e9e435563e38420c126b43274ed973dcbe8495c0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "72df2ec0c46e40447b2d415f559521b078753f15a77d322688d24c05583810d7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "f8c4b0583d63bb7e1003c39946bb1dee502782d2234c4ebe636784513c2a439a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "0b9cb397e700c0bae275fd6cc0e3a07ebc180761bdf245eeef8d8da348b5519a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "b9ce2007d1ef3f76125e7a6e1fa34712e959a18be2f616089801cc0223c9a33a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "771c92742ecb061b7622dd5a00e156b5336339276bc0a28944e4cffe6328f9ae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "abe8f41d49fac229bdf379fad6145ba95a8ab80a6a841c63e36633d23587c0e5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "19104bd661e8e1a4be741f6db3c057c4d105929dd01d6e652f481af71ba29972", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "98d62797501e521825edd8fd730c8bb014cb23d6c10ef0e93ff1e9ea518e2324", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "68cc9c5e7d311b50531816623bfc2ff99d5e1cda0df1ddee7c3ebc19a73c4cdc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "7a1ec01d5ad2f9c26989664f0dbbc6d0995a015d78192e568f29265eabd8a0e4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "bb5bccf311faeb93a7231f345e83f4a8cbeaa9a502bf5fe09a68520dfdb941cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "d3ff8a30e1a04eebef8b36665c016818c403661f1f450fd89d4af4f030179826", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "3ed651176f008e3fcfcc3b0b44475b6162818db767d56f9757a745a78553d0ac", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "6921930607adf03a8fb84dafaa23cf6e4f01b644538b419d56f4be6da4499e61", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "5f63a8330663349641ae2ba4717ff116c26798b2c2099f2e2a6a3c30f3445cb0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "ea9794bc190133c33f31e2961690fa5369a79e9c98693924f419682d2416d10a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", - "similarity_id": "f8409fef601d328265f9c8595d78f3697966b327198543e1dfe74e564f0f09da", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", - "similarity_id": "4de7ec03f90a1a0ab5c4dc30fca41900429e65318542032631370079069da1b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "4d3548f002c256cb97d6edbcce6c838f53c1c0b959fb32f682a7a262a9e3f837", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "e59fbbaa754ac18e15835af9cc0f983ca3ad6231f9737794f38e8902179c9dc4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "856cd1946e9fffd710aa6544894cf316e7ba68ffe28474326674df86862d18e8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "f02c446f87b5dcb41cfdae80cbad8a1002a652a235976efedb06811c07e4f711", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "28b6b122ca98316681a2ca6434b10b82a3fab327214faa7140426637adf89443", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "f247aa47069ccfe50fce9945e4efa95a157e8c3cf087612ee11458c0a9ddf49d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "933ae9755689363c0ac942297991008be76f532c4f8d67e4514deac1ebf6815c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "d9ea1dbad6228d3ff28802bb4c4befd739ff5bb6b224200420201fb77746777c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "307cbc80158aedd51634508b0b9f661610131d2ccf5c1621e22951fc3ea2c3d3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "0c845d82315f1b992b49ff4940d80377bc165f2c19073e459b9242e532e7b9ba", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "3809462c9f6aa7145329e83e7ae4660c86181907e963802f4762ef092f001450", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "84f8c06f130b93e09dd4785ae74f25512999582d1781a3551da76ba32df96c21", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "c5e252fc71a3990d7f0bc27b8cba855f26a20389fbf0f5890088d66d69c4b2cb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "017ab77d147cfe88489aa58ae9a12e14fc69176d5347d483c9f5c3dd2f2cf29c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "resource", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm", - "actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm" - } - ] - }, - { - "query_name": "Cloudfront Without WAF", - "query_id": "1419b4c6-6d5c-4534-9cf6-6a5266085333", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution", - "severity": "LOW", - "platform": "Terraform", - "category": "Networking and Firewall", - "description": "All AWS CloudFront distributions should be integrated with the Web Application Firewall (AWS WAF) service", - "description_id": "8fa5ef1b", - "files": [ - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "614ba989c920734697749e1246a49e9b09d9db8eaaead0134c48035869e6fced", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive3].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/negative.tf", - "similarity_id": "74e5b1ac6610157f9753860776e3f2bb26aae3d70ffebd5c978f7409c412dc30", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/positive.tf", - "similarity_id": "8fd5d3f1e64c52c665b91ce0ad5c24b1c2d45cc2f59e6689228e64bb22e9a50a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", - "similarity_id": "e61ce49e54b2e99fff2e4d13dec99fbe9f0119c03c3bc1bb122f225e5a02ba16", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "94ce01e7edb2ddddd7727bd1e8b7a4e8d026685da1e2fcb525c4b77eacd2433a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/positive.tf", - "similarity_id": "637892cd770753a39b05f680e94569adb73dd3880e475c7534cc35ddb4413238", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/negative.tf", - "similarity_id": "11112b047d2b794a69d3d92b67d95448f58c3ee5ef592304d70eac0f70bea1cf", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_waf/test/positive.tf", - "similarity_id": "e54b8771b654e3506c1649c60d713aeaeb0cb20d50dc8f79cdbfa23f647436b1", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/negative.tf", - "similarity_id": "3c97a44d4372669f0bb1ade1e55e160643edcc4544c26a6e3baf6cfb0708c45a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "0ed44be96870c83d8f3ff83f0ed56b2cb50a221cf7383abc70b6f41a7ee121f1", - "line": 93, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive4].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "f69b0a30cb7cd2aa05cf24afba01584fdd00ea4d6d83b9123e7590b861bb8ff7", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "decdc872d4373042167414f3eb04e440954c03da7a00298ce1ee45d639f5e943", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", - "similarity_id": "dab7339ffcedf08d0a9f9c035892fb47e421ff6a49ff842ea019c403eb76c012", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", - "similarity_id": "2890871bf4c747cfe2a40230381fd3fc41f94e714278da51418138604a2dbad3", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", - "similarity_id": "b57fcbc3947500adb08854118b601a4fd53312e5bf71d4f3ab5ab04f9e406970", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "c24f3424dcf5440647d32ca99826c718099f0387d6df2a9e5a9b2e585407025e", - "line": 52, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive3].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "3a1fea1ab92c64433b9744422188808531d5d557758d5c3104ea89a1cd6a6efb", - "line": 108, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive5].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "0b651b88654cdeb77c694c5d866fbcfd70e486fc7790e1373c76aa5032205ecf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", - "similarity_id": "651aaca58a1616f445eadc407753e6f5ee3234622043dbc2909e4d87aafbf1ee", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "ea2436a00b727f768b593c8066f78f12ec11ca02aa507a9cccf5a4d51104264b", - "line": 24, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive2].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative2.tf", - "similarity_id": "89b11af93e7499b0fdef7ab3b7dc499646c39536dd9ba00131fa1cc95626b97a", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative1.tf", - "similarity_id": "ee07c0db46cda988efc438b430114a881c47629ef376a0050bf7e86104641e57", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[negative1].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "c197cc682669f747680473fc43f47c02634c6f4b04bfde2ed97fd9dd30d7de15", - "line": 80, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[positive4].web_acl_id", - "search_line": 0, - "search_value": "", - "expected_value": "'web_acl_id' exists", - "actual_value": "'web_acl_id' is missing" - } - ] - }, - { - "query_name": "DocDB Logging Is Disabled", - "query_id": "56f6a008-1b14-4af4-b9b2-ab7cf7e27641", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/docdb_cluster#enabled_cloudwatch_logs_exports", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "DocDB logging should be enabled", - "description_id": "7a864a61", - "files": [ - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/positive.tf", - "similarity_id": "8f12796b960e04e4f65cf18cf8cc84471173946efac2720160c616a69e74910e", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "874f5afbad57a39b95efd136528556452f0f9dbb9958976dcdc2a67a884f4723", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive3.tf", - "similarity_id": "45a315e81ffcef96e753ab25c26e9683775bf58e89fbfe041d4a2ace5bfeabd1", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_docdb_cluster[{{positive3}}].enabled_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports has the following missing values: audit" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive1.tf", - "similarity_id": "98893f97db03b6aad45ffa7ae146dad1a7351000186f08255c2461ccb17c40b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/positive1.tf", - "similarity_id": "61cb676a01e8f49da419c2dcc14c68da0bbc4f4bcaa5bb6ddf0f9a281c7d0977", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive2.tf", - "similarity_id": "859e9b8b1bb4442c840d58a5f63358a5cc363ec4dd44f99b377e99e99f60601b", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_docdb_cluster[{{positive2}}].enabled_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is empty" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/negative1.tf", - "similarity_id": "2e78978fbab4c93daa78087d6e937893d52cac0c3c626db8dcb10dbfd4a244b8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "8ecbd41282330a2ab81733ee362b72448ce57bd6cc3d0e4236fc03505f96ba4c", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{test22}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "756b22ceb308d139e2080fa707269acd4e4b9a90219039a8254d47722018c707", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive4.tf", - "similarity_id": "bc3f1b2c18ca435da800633338d7d4cb48a7e4ef20c9fdfbb4aef26b71322fa4", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_docdb_cluster[{{positive4}}].enabled_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports has the following missing values: profiler" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/negative1.tf", - "similarity_id": "38b3732e02cd499832a6b29818dae2aa145c4ccfa32321925deec5ff43495b62", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined", - "actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined" - } - ] - }, - { - "query_name": "EC2 Instance Using API Keys", - "query_id": "0b93729a-d882-4803-bdc3-ac429a21f158", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#iam_instance_profile", - "severity": "LOW", - "platform": "Terraform", - "category": "Access Control", - "description": "EC2 instances should use roles to be granted access to other AWS services", - "description_id": "ffd8ce80", - "files": [ - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "3b9048ec403ca5568afcd7009c62f7818c33de5e3c54bbbc22ebe70b03008213", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "aws_instance[positive9].provisioner", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive9].provisioner.remote-exec is being used to configure AWS API keys", - "actual_value": "aws_instance[positive9] should be using iam_instance_profile to assign a role with permissions" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", - "similarity_id": "1d31d8fd477624e1b2bec35b5f2dbdb2e0a2952d6932d97c9e5accc7e1dc6ac6", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive4] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive4].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", - "similarity_id": "8b960cbb8314ac6223873176945424304c4bdf8895a46b3c6ed31bc27e20c582", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[negative1] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[negative1].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", - "similarity_id": "217c237e4fedb4f26901ac634a77fa3f5a038f77e281e20262c4227a375f5246", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive5]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive5] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive5].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", - "similarity_id": "b25dc52221b54a4d444722c6c1426ea2600b883e3a8902d2103b0ad67cd7fb39", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", - "similarity_id": "f0b088791ecd7665268128f96ce073fe3bf5770caf641d632f5a919cd72bbaae", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive3] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive3].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "66a635b9822727e7f632d75ecaa2e8f433f02707a34b66803d159d83d8c3af23", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive1] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive1].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", - "similarity_id": "2a04a674a6521a4d42415d33d3c4dfa5da68ae752bf96e7e6d63961ed032cd02", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", - "similarity_id": "84d74e39b8bfa3b2d7126265dcd281d632737137db2309bd687414473a055f76", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive1] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive1].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "06b2706778746d1f6a328132e6c8b0d7a591d5e3b7095a553b5f48954e7ede4a", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "aws_instance[positive7].provisioner", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive7].provisioner.remote-exec is being used to configure AWS API keys", - "actual_value": "aws_instance[positive7] should be using iam_instance_profile to assign a role with permissions" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", - "similarity_id": "7cbad8835bcf7c1a276767bfb2f12ecc7c4a82821becc219509a56941c184161", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive2] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive2].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", - "similarity_id": "e172b01cb18ce6733142f2b15df47b8abadc50dd7049712f835b5d4cb8758411", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "aws_instance[positive8].provisioner", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive8].provisioner.file is being used to configure AWS API keys", - "actual_value": "aws_instance[positive8] should be using iam_instance_profile to assign a role with permissions" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", - "similarity_id": "510a8aba1db8ca85d154d119507f1071ca6d17f53c55920ff20152ec51674cc6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", - "similarity_id": "239ad16a6d0ec2682d109bf01a62eee515b0f6402dc6a645e55acb33c022d54d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", - "similarity_id": "4d02e13e7176172a01c31ebe82649c010717abf870eb661d2497a6641ae161ab", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[positive6]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[positive6] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "aws_instance[positive6].user_data is being used to configure AWS API keys" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", - "similarity_id": "50259ca980dd7c2fcdb79a83a03b8b0664db76b63e673184508bbc2b24df3a79", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions", - "actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys" - } - ] - }, - { - "query_name": "ECR Repository Without Policy", - "query_id": "69e7c320-b65d-41bb-be02-d63ecc0bcc9d", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecr_repository_policy", - "severity": "LOW", - "platform": "Terraform", - "category": "Best Practices", - "description": "ECR Repository should have Policies attached to it", - "description_id": "cb9636f6", - "files": [ - { - "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive1.tf", - "similarity_id": "61f8661cbfe9003245484573a2b55043d4746658682994710279d0012ae554bc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo] has policies attached", - "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", - "similarity_id": "fcfc88f5d76e524fe25d71598bcd01ec6e7c8e22c325d32e5f1e2e074223810c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo2] has policies attached", - "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/negative.tf", - "similarity_id": "eecb04681d7dbe9dda52097a1f00e2ad386f4d087eeb0158379b08748bf2a8ba", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo] has policies attached", - "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/negative.tf", - "similarity_id": "7eab93cb1a5b09b51350948962465e8b963389e244438fcc02ea3a88510c255a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[negative1] has policies attached", - "actual_value": "aws_ecr_repository[negative1] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive2.tf", - "similarity_id": "76cc7a9461ccae1d77aabc54d2144139a0b701363a0072ff1672d0f293f9f76b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo2] has policies attached", - "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", - "similarity_id": "ab39e455167805805c4cdb1f557862c901655f74dfc3b59e8e1cfcbaae11a2df", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[positive2] has policies attached", - "actual_value": "aws_ecr_repository[positive2] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", - "similarity_id": "41d8b392ad235c3edc21ad1949cb2dea672f8b2eb66f34c6aa034806305fa8d1", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo3] has policies attached", - "actual_value": "aws_ecr_repository[foo3] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/negative.tf", - "similarity_id": "ecd63d0819ee39da31f410c815a244766cf42f32cfe0cb4c2236ec19db2b3259", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[negative1] has policies attached", - "actual_value": "aws_ecr_repository[negative1] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/negative.tf", - "similarity_id": "92a07dc4b4c5d1ff71a7894317c5ec66fc318281499385282fc6ae148012ee48", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo2] has policies attached", - "actual_value": "aws_ecr_repository[foo2] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/positive.tf", - "similarity_id": "a3a3b0ddb0c3347f42fbbdd1a3df6a05be7fc4641821b5b94df24172713e7a39", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[positive1] has policies attached", - "actual_value": "aws_ecr_repository[positive1] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/positive.tf", - "similarity_id": "6e70fd5a74b4785fb59ad8ade508ffcb22add60de80d56738dd010ef90d79f8e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[foo] has policies attached", - "actual_value": "aws_ecr_repository[foo] doesn't have policies attached" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", - "similarity_id": "928eb27755a917965f50bc22837bd086a9720e3a3b408cd92028b49246daea36", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[positive1] has policies attached", - "actual_value": "aws_ecr_repository[positive1] doesn't have policies attached" - } - ] - }, - { - "query_name": "ECS Cluster with Container Insights Disabled", - "query_id": "97cb0688-369a-4d26-b1f7-86c4c91231bc", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_cluster#setting", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "ECS Cluster should enable container insights", - "description_id": "b48a7a70", - "files": [ - { - "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/positive.tf", - "similarity_id": "fd7ce63ec0c27eede371cd75faa44d20b7857668219142aa30643548b1ce7a46", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_ecs_cluster[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_ecs_cluster[foo].setting.name' is set to 'containerInsights' and 'aws_ecs_cluster[foo].setting.value' is set to 'enabled'", - "actual_value": "'aws_ecs_cluster[foo].setting.name' is not set to 'containerInsights' and/or 'aws_ecs_cluster[foo].setting.value' is not set to 'enabled'" - } - ] - }, - { - "query_name": "EKS cluster logging is not enabled", - "query_id": "37304d3f-f852-40b8-ae3f-725e87a7cedf", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_cluster#enabled_cluster_log_types", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Amazon EKS control plane logging is not enabled", - "description_id": "80a41f88", - "files": [ - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", - "similarity_id": "ea23cd17cdc6af671a04d24087afdb603c526339b6bbc49b3a050ce1a479953a", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", - "similarity_id": "9af86bc9ad868c65f393ea73969843547349912266ffaf73998cb7bbddf1c300", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", - "similarity_id": "5ef537c677a6afba218fbb49a0d2912a9ca4421dbd290905794a4fca73d147c5", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", - "similarity_id": "aa38638821da64182ba6325b3108229b568f6fc86d8e34bf4cb54f712ecd3e64", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", - "similarity_id": "12e2f7ef77d7217d1efac4505c8f6ffd3dd1bf7f74da0ea29feaabf853a5cec8", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", - "similarity_id": "474ec310269cb47c2e8c502f9780dd00c88229c360f81bf46098b61de4b09566", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", - "similarity_id": "acf0d6fe41f3ee63b4cdd8dfd44c11daeda14f66851c0fa4a923a108f5f4311f", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "506a86eef7b5f37f51868cd6b50172d6676e2ba4e9fa298ddb40b2474ac12b13", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "7952c870e2b60992948cb69971ebf217cd3bbd3ffa20d1aef570779e7b4c6c3e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' is defined and not null", - "actual_value": "'enabled_cluster_log_types' is undefined or null" - } - ] - }, - { - "query_name": "Global Accelerator Flow Logs Disabled", - "query_id": "96e8183b-e985-457b-90cd-61c0503a3369", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/globalaccelerator_accelerator#flow_logs_enabled", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Global Accelerator should have flow logs enabled", - "description_id": "3670731d", - "files": [ - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive3.tf", - "similarity_id": "5062e9e4c9a1fd516ce32e402bc055890601539522e8e9970dd89b7d16609e7e", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled is true", - "actual_value": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled is false" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive2.tf", - "similarity_id": "d3974b027b3698a009d0c9fad7eb69e174b34f2e530ef08f9025cf0303e21a89", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{positive2}}].attributes", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive2}}].flow_logs_enabled is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{positive2}}].flow_logs_enabled is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive1.tf", - "similarity_id": "7b17dea423272ac3111dd9c1defb6a5cb28358653af1b6766c2571474fbf0289", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive1}}].flow_logs_enabled is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{positive1}}].flow_logs_enabled is undefined or null" - } - ] - }, - { - "query_name": "Hardcoded AWS Access Key", - "query_id": "d7b9d850-3e06-4a75-852f-c46c2e92240b", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance", - "severity": "LOW", - "platform": "Terraform", - "category": "Secret Management", - "description": "Hard-coded AWS access key / secret key exists in EC2 user data", - "description_id": "9e8cbdfb", - "files": [ - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", - "similarity_id": "386eb6c894a751bb4c089aa6904a34450480e1be590711023a2a68ee14da0796", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "module[ec2_instance].user_data", - "search_line": 0, - "search_value": "", - "expected_value": "'user_data' doesn't contain hardcoded access key", - "actual_value": "'user_data' contains hardcoded access key" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "28ca023b3095df8bcdd8113702d7b4e7e6d7565bbcfdf27b4a8b0320b95299c9", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "aws_instance[positive1].user_data", - "search_line": 0, - "search_value": "", - "expected_value": "'user_data' doesn't contain hardcoded access key", - "actual_value": "'user_data' contains hardcoded access key" - } - ] - }, - { - "query_name": "IAM Group Without Users", - "query_id": "fc101ca7-c9dd-4198-a1eb-0fbe92e80044", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_membership#users", - "severity": "LOW", - "platform": "Terraform", - "category": "Access Control", - "description": "IAM Group should have at least one user associated", - "description_id": "c5730db9", - "files": [ - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", - "similarity_id": "285761394d82852ad596055c04de19f70aaf315c615e1076931a22a9073a79eb", - "line": 33, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_group[group3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_group[group3] is associated with an aws_iam_group_membership that has at least one user set", - "actual_value": "aws_iam_group[group3] is not associated with an aws_iam_group_membership that has at least one user set" - }, - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", - "similarity_id": "805610ace38cf5a2e87c2ef32b969ac655106aa0fbfbad6b1dd257dec660c6ae", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_group[group2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_group[group2] is associated with an aws_iam_group_membership that has at least one user set", - "actual_value": "aws_iam_group[group2] is not associated with an aws_iam_group_membership that has at least one user set" - } - ] - }, - { - "query_name": "IAM Policies Attached To User", - "query_id": "b4378389-a9aa-44ee-91e7-ef183f11079e", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment", - "severity": "LOW", - "platform": "Terraform", - "category": "Best Practices", - "description": "IAM policies should be attached only to groups or roles", - "description_id": "32ec58ec", - "files": [ - { - "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/positive.tf", - "similarity_id": "4619351e06f1202125fc936249bf43cd1ff9f8aa11aa8cf5c2aebbfe70366175", - "line": 16, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive1.tf", - "similarity_id": "679e2c76614e5e49869059447940cc5e3165f92a31f48ade26047523c14fda95", - "line": 21, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive1}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", - "similarity_id": "1b1a88ebb0d04ce7b81d092077fc19c5bc8b0adc573cfd58ef281b72f254ad8d", - "line": 16, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{negative3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", - "similarity_id": "1bf8f2601c8486a9708416092f309ea29a76b7cf51ef881d796ba9c7f1b793bd", - "line": 18, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{negative3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", - "similarity_id": "6419b72051973e4c00d7d54b48f55c34c1cfca8bf8c75fd495d41b5747f04328", - "line": 18, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive2_3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", - "similarity_id": "6fe36dca7250fca742b2bd26a5cf6d1f181d7718357d641fe1ce1571b0cf3c36", - "line": 14, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive5}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", - "similarity_id": "1448f6502362444803952fac7aa4babd5c2e85d8bb7978861404a2d1f4c3e93e", - "line": 14, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive4}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", - "similarity_id": "d3dc6076fb6b17fbb5ba5f8c0696525805a43326323500b351eb474286337656", - "line": 18, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", - "similarity_id": "52e90dd603b1b654528c98bd55be8a6165eb0db29d1a4160f5741bfbd7ea547e", - "line": 41, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{negative4}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", - "similarity_id": "b0eec0b0ac66adb9d0af4160872d383af75648d0ef158c475eb861a72bc3d2d4", - "line": 18, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_policy_attachment[{{positive1_3}}].users", - "search_line": 0, - "search_value": "", - "expected_value": "'users' is redundant", - "actual_value": "'users' exists" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", - "similarity_id": "16394178b78c3b4d7fec4930b6a69874934510ee21d280106ef3d21ac31cad5d", - "line": 27, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy_attachment[{{test-attach}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive2.tf", - "similarity_id": "cdaf19088a4051d29f0ebc58892b68aa195bd43b1ff5429b60e07eee8fbb3663", - "line": 17, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{positive2}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", - "similarity_id": "640d8318e35394c2680e0d8a3abda32dc62fc3b523acd771c26346edbe721838", - "line": 14, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{negative3}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/negative.tf", - "similarity_id": "0027672efbb7f9c72af92fcfdb70fde73a68685dcdf81354b5bb5c30d00004ed", - "line": 21, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_user_policy[{{negative1}}].user", - "search_line": 0, - "search_value": "", - "expected_value": "'user' is redundant", - "actual_value": "'user' exists" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", - "similarity_id": "67dc74aaa73e6f5da59f0d8f445dcfd966fd7c16aa365f4b5af2013497a6baad", - "line": 51, - "issue_type": "RedundantAttribute", - "search_key": "aws_iam_policy_attachment[{{test-attach}}].users", - "search_line": 0, - "search_value": "", - "expected_value": "'users' is redundant", - "actual_value": "'users' exists" - } - ] - }, - { - "query_name": "IAM Policy Grants 'AssumeRole' Permission Across All Services", - "query_id": "bcdcbdc6-a350-4855-ae7c-d1e6436f7c97", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role", - "severity": "LOW", - "platform": "Terraform", - "category": "Access Control", - "description": "IAM role allows All services or principals to assume it", - "description_id": "948aa2ac", - "files": [ - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "a8586916c33865b58fdc9484bca98bc9f510eb2858b0a32abf2ca2f6f612b89c", - "line": 70, - "issue_type": "IncorrectValue", - "search_key": "aws_iam_role[positive2].assume_role_policy", - "search_line": 0, - "search_value": "", - "expected_value": "'assume_role_policy.Statement.Principal' doesn't contain '*'", - "actual_value": "'assume_role_policy.Statement.Principal' contains '*'" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "2b9c4a71c4d061182cf960f68ccedd0222857f876febf7fbc615a39d81c230fd", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_iam_role[positive1].assume_role_policy", - "search_line": 0, - "search_value": "", - "expected_value": "'assume_role_policy.Statement.Principal' doesn't contain '*'", - "actual_value": "'assume_role_policy.Statement.Principal' contains '*'" - } - ] - }, - { - "query_name": "IAM Role Allows All Principals To Assume", - "query_id": "12b7e704-37f0-4d1e-911a-44bf60c48c21", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role", - "severity": "LOW", - "platform": "Terraform", - "category": "Access Control", - "description": "IAM role allows all services or principals to assume it", - "description_id": "a54d0d27", - "files": [ - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", - "similarity_id": "c394fc4d53436ed1caef5982a81ff45e0700de56565da09f93f3ab704199195c", - "line": 37, - "issue_type": "IncorrectValue", - "search_key": "aws_iam_role[positive2].assume_role_policy.Principal.AWS", - "search_line": 0, - "search_value": "", - "expected_value": "'assume_role_policy.Statement.Principal.AWS' does not contain ':root'", - "actual_value": "'assume_role_policy.Statement.Principal.AWS' contains ':root'" - } - ] - }, - { - "query_name": "Lambda Functions Without X-Ray Tracing", - "query_id": "8152e0cf-d2f0-47ad-96d5-d003a76eabd1", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function#tracing_config", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "AWS Lambda functions should have TracingConfig enabled. For this, property 'tracing_Config.mode' should have the value 'Active'", - "description_id": "2f90e1e9", - "files": [ - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", - "similarity_id": "90c962f52ea5fed37397420fb45e01ab7d02ee5d6707eb50f951ccbdf1a9e0e9", - "line": 42, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[positive3].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[positive3].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/positive.tf", - "similarity_id": "221c1316482638700a2f8404f25ec36edf60cf4788960eaffbbd4e2cb6e19619", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[example]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[example].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[example].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", - "similarity_id": "879dd6eaf9117579e428fd7c9764df817b53612e481a9701cac2fef30a866eaa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[negative1].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[negative1].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", - "similarity_id": "f9a59c4f008029eb7cafa5be32b4bcdfce73aa126222b82f5fd1795a638f9570", - "line": 45, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[test_lambda3]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[test_lambda3].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[test_lambda3].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/positive.tf", - "similarity_id": "da77dde7226b2785bb929bd0569096bbf06dfed82552a22db0f0269ed02e4d0a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[positive1].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[positive1].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", - "similarity_id": "e267a4abe1ea25b3bcd73fe6c1032c04a2f98c5396b792ad8df4c83c8a554956", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[negative2].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[negative2].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/negative.tf", - "similarity_id": "1ae5ef4c9c9b4fbe3a29775913c97c179493c7fa2056cffd7613d6197a888ff4", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[example]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[example].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[example].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", - "similarity_id": "9c97c2999f97ddefa91676d42f4fc80fa0ece58b5d3aad894168e51b3f0676ac", - "line": 28, - "issue_type": "IncorrectValue", - "search_key": "aws_lambda_function[test_lambda2].tracing_config.mode", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[test_lambda2].tracing_config.mode is set to 'Active'", - "actual_value": "aws_lambda_function[test_lambda2].tracing_config.mode is set to 'PassThrough'" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "c36c67bbf19e43571a3f0c25cd25d8a0d02b75f347310432f0235f9f577dca51", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[my-lambda]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[my-lambda].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[my-lambda].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", - "similarity_id": "4281231e68cfa1f32f1d8548bb255521f0556a0590581b416a20ac4c11449fb4", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[positive2].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[positive2].tracing_config is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", - "similarity_id": "2ccbdaf936a8640323ff8f4571e340c35b10b037a4acecb72967560db09213fe", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[test_lambda]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[test_lambda].tracing_config is defined and not null", - "actual_value": "aws_lambda_function[test_lambda].tracing_config is undefined or null" - } - ] - }, - { - "query_name": "Lambda Permission Misconfigured", - "query_id": "75ec6890-83af-4bf1-9f16-e83726df0bd0", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission", - "severity": "LOW", - "platform": "Terraform", - "category": "Best Practices", - "description": "Lambda permission may be misconfigured if the action field is not filled in by 'lambda:InvokeFunction'", - "description_id": "8fb6f06e", - "files": [ - { - "file_name": "assets/queries/terraform/aws/lambda_permission_misconfigured/test/positive.tf", - "similarity_id": "b8cc9c2cf47dbd3e2763ae84228a73c6e4d8f1b1372d1df2e530bc0ca1a645a0", - "line": 2, - "issue_type": "IncorrectValue", - "search_key": "aws_lambda_permission[positive1].action", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_permission[name].action is 'lambda:InvokeFunction'%!(EXTRA string=positive1)", - "actual_value": "aws_lambda_permission[name].action is positive1%!(EXTRA string=lambda:DeleteFunction)" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "7de0da40985af94826cf7e9ac79ceebe2450d6023499fe28ae74f514e2e60955", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "aws_lambda_permission[all].action", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_permission[name].action is 'lambda:InvokeFunction'%!(EXTRA string=all)", - "actual_value": "aws_lambda_permission[name].action is all%!(EXTRA string=lambda:*)" - } - ] - }, - { - "query_name": "Missing Cluster Log Types", - "query_id": "66f130d9-b81d-4e8e-9b08-da74b9c891df", - "query_url": "https://www.terraform.io/docs/providers/aws/r/eks_cluster.html", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "Amazon EKS control plane logging don't enabled for all log types", - "description_id": "e89d4ffb", - "files": [ - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", - "similarity_id": "29c1c63896bc934cb28fc15f46bd6b5b3e0503472fcc18a0684a51906332225f", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_eks_cluster[positive1].enabled_cluster_log_types", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cluster_log_types' has all log types", - "actual_value": "'enabled_cluster_log_types' has missing log types" - } - ] - }, - { - "query_name": "Open Access To Resources Through API", - "query_id": "108aa260-6dab-4a75-ae3f-de917d634840", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_method", - "severity": "LOW", - "platform": "Terraform", - "category": "Insecure Configurations", - "description": "Open access to back-end resources through API", - "description_id": "13e1db34", - "files": [ - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/positive.tf", - "similarity_id": "b5186c7355c674a759a119eadf0ea62d9e92b31f634d6ecca779fbdaa91e0410", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[positive1].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - }, - { - "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/positive.tf", - "similarity_id": "7fc688aee3afc1726301df553ea23582bd273e8d5da9efcc6c0faad15668d10e", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[positive3].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/positive.tf", - "similarity_id": "a604af7dbec02fc8fe1003ea1b5d40ef5af5f2a992926ff84de55b87cadd3c44", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[positive1].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/negative.tf", - "similarity_id": "e1422fdec41b14fbe25c139e7d3afe1230e677fa2493c7c63885ef292fa8d368", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[negative1].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/positive.tf", - "similarity_id": "428222b967fd3426fb88fd8b8dffe7bea17c413eb467ace7881de81cc32896c0", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[positive2].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "479900699128eaabffa3c92959cb9f0abca3d57479dd45d55385d3f9fb745274", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "aws_api_gateway_method[api_gw_method].authorization", - "search_line": 0, - "search_value": "", - "expected_value": "'authorization' is not equal 'NONE'", - "actual_value": "'authorization' is equal 'NONE'" - } - ] - }, - { - "query_name": "S3 Bucket Logging Disabled", - "query_id": "f861041c-8c9f-4156-acfc-5e6e524f5884", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket", - "severity": "LOW", - "platform": "Terraform", - "category": "Observability", - "description": "S3 bucket without logging", - "description_id": "fa5c7c72", - "files": [ - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", - "similarity_id": "0915aa52adbb371bb4a7488155e4ef394d35f37ed1c890a4f8f12f1f186c8752", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", - "similarity_id": "cc9bf4dae29fd0f2bc32e10d8d92e1912ee7c4fd592b08539b0336d6d3ed22d6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "08d2f1ba393b422a98ae80ecb6474eb1ac6fee1fa8eb9f19bf4510a9296409bf", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative2.tf", - "similarity_id": "81ac236433d26b714167f13fd591d8a3ad06464d31d765fbd872ef39335c3ee5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative2.tf", - "similarity_id": "73d4acf2a493d9205572152fa1ae35fe19df7217bee1c155bdc768f5821142d9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive2.tf", - "similarity_id": "72527cd0cae9f92f3bfe3288682e583b00c131e969c03fd54ffc328f1087c5e4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive2.tf", - "similarity_id": "7d7d60194b30a7ba7c453791434402407a8b6401f1573a70d9fda7ae436f3c41", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", - "similarity_id": "681c66faf22b5e1e1e967afa02622bdafa82545607fe5cf81641b4bc3657549e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", - "similarity_id": "8d0898acec0a1ba12648a3b4d44702f66878f2795166157fd319ca1ca42142aa", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive3.tf", - "similarity_id": "c0d8b47c8bd16658a8446cbeb7146fb7ad4320b8d03b79a4c52ad3ab6ed3b7e0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", - "similarity_id": "d94db8aac11974b9d146f092656796518f48ccce376e51f8b9623802921c7a24", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive2.tf", - "similarity_id": "1dd387eb9dff7e7dcf6f1d587943420283e10d846cf4c193c79f2b20f4d35593", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", - "similarity_id": "03cee6b520cecf1a644965448af933afc876c602f901b1b3fe5c634ffd3d5b67", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[examplebucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative2.tf", - "similarity_id": "6a33cd534b0a399020fec16e495133041119626663561f662edda39679589f7b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", - "similarity_id": "ec018561940182f367feed6138921073f5dac046ba59c870555859e171c83d2a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", - "similarity_id": "8477c4328c2315f099d0ff9e1a0545f9b95393f78c76ad712f7a32e94340093d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", - "similarity_id": "f4c9b343b949dc66ce7458589cc6f5e2462b69bd31ae61a6852fe659270d1114", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "deb195785555f0c7744824380d5fd584f0241f64bd66d3f0ba6b0389ea838714", - "line": 20, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[foo3]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", - "similarity_id": "6aa4bc5549c7e8abc450cf57da0b34bdcae87d5167bda63cb64618b6454e36d2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive2.tf", - "similarity_id": "15c731818a0518c1cbd40cfd9a081f21672f9df569b04f43b6ac5f3ce21c184a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", - "similarity_id": "fe333664110b55936296c58e8f0dd89292300a89cf18a5e08927ee4b6f652876", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive2.tf", - "similarity_id": "f88320680c17805355e0ba4d193f0799d9500db8965342087ea0663b38ae0b89", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", - "similarity_id": "1ed6def5a4f456db5c42e770f725f9167ca4512256e86d7bfafbdb2e6bbf28fc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[examplebucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive3.tf", - "similarity_id": "0f45afc602dc017e4d3d51b3e3d457c3ba3d14df77dadd4f14d41d02b483af89", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", - "similarity_id": "a1787bcb105b7d684f4d275c74708a5f4bcfc9172025de79c7832df2feae319e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", - "similarity_id": "70095ecc46abad3919fe45647a7ef9dbe372e3be0b578ab590add42a1319e82e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive6.tf", - "similarity_id": "9d4be52e420a24181dfb42916f1f7ddaeb7bf4fc86c942aa081684ff48fa416c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive6.tf", - "similarity_id": "8065e73c191fe04b214bcee64205162309d146debceafb9c6f1f2fd205cc4708", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative2.tf", - "similarity_id": "41de94e33d79f2f5ceb94789cb2266dc502f6237b08814d3dc1fa641bcc1a9da", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/negative2.tf", - "similarity_id": "3ab80c87b6a52b8f6ea28304a0aa5e66e7fff00b3f68ab2525ded6bc96be0f1f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", - "similarity_id": "39aaecdf77977a57260bab5f6eb8e175a8835477dc7d6802456ac8153c2295b1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", - "similarity_id": "260607d6f88cba8d3758db9d6c48ed9c9f77675557a600e78751f1a506606795", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", - "similarity_id": "b9c22b6443fb1c72003d54b42ce03b29ab342831be3c8fef591e2069a49bc9b5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[hoge]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive3.tf", - "similarity_id": "1ca1a3389568cd4a212e00b24d6815592d41128a893f4a981c71e409b1138fc1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive4.tf", - "similarity_id": "3b86147e87ac88cd34567124e616ab4272f1aee209abf5dbfbb559d542a1c389", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", - "similarity_id": "d9df5ecb82ba61b3b1f4d11c2a835f8a6d6ec6f2abf72553094a643f9d1c1d96", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative2.tf", - "similarity_id": "b902ca93d0dd65dec9401d421fc8551ce95b9e01fe376fd1c63dc289b49964ca", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", - "similarity_id": "0315960ed11da1920ddcd1c88590284897e8960428dc3f9029fb54c8682a64fa", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[public-bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "ea12bb651a66eb7ef1ef19e1cf74888cf9939eafda0595c20c38733554cb4d6a", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative2.tf", - "similarity_id": "634cb860e1eb17b6b2ea7823138f533ed1de06e73a6f8211630b60dc993dbc2b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive2.tf", - "similarity_id": "ab2c99c73f0517c204ef944863cfc24a334d7decae6a278c026c88c452a4ae9c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive5.tf", - "similarity_id": "2573b12ac2dbdf6ea55ea97db3082db15a486d7874205d3155562eb5a7ce0605", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative2.tf", - "similarity_id": "a3a0615a6c74c17c71e86faab892abae8abe4f564142ad45743549e62ebc95cf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive5.tf", - "similarity_id": "3988d7d4b1e7c3f11f8982e6710721bf80fdadc5b3935de4dfa569440fee00c7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", - "similarity_id": "9aa262582ff7169dd37bf14666416bfcade926adf997a9cb66c6f4a0b3b215f1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/positive3.tf", - "similarity_id": "dbd6f9d2ef166a294a9716425ae89bd7dddccf9dffeaa1da594f949bb8664364", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "7d7b7fdd970ce0417c7e568ba68c96e67b301cf998d8da975cee54d95e3fc0f5", - "line": 69, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", - "similarity_id": "01ebbbc0814026249abe28d344f7c9685a2cfdc3f7da904b04ac5e81a331e3ee", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", - "similarity_id": "b75cb331e1a12cb3c57313e105d1fa3f18fd95336be85b1461eca2ed3c6ee7fa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", - "similarity_id": "d7807cdc2179397472f3afc58aae2b649abc46bc9dfc91f467d4565b86b4d6e7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "6df8fa568d393e4afaa9ef9f0c68db065e79edd30269354a4aead732b78351e5", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", - "similarity_id": "daabe0b8ab0b25989d23980f116645dd15ffadafd6b2dc87f3425040fb3a765f", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", - "similarity_id": "54bb5a2e86fb1ef979a54344d1cf84af0d3b3d2db5333e2c93b8558c353b56e0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", - "similarity_id": "d4ebc6b252560b21b287c3cf9dca6241be0c4212d96c66d3de450ea9d5cfc32b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", - "similarity_id": "c9797a7a687eb64048e7a67e177250875cafd9d8f20ddbc2ec911cd4997b1e47", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", - "similarity_id": "ac31511dfa5fcd27c24e6785143f4b997d3f83d0f29c58c4ebf6f2d112722f39", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", - "similarity_id": "9afe4fd52fb3e57d863b9c43c4a4053017a8f750cb7cf082d48adf1dbbae8f6b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative2.tf", - "similarity_id": "023e1312fa46619b8e401bb8088657f70ae7eecefad946566e4b8e3131c9f649", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive2.tf", - "similarity_id": "6ae7fe45f53495b56d1bbf45cb61f185bac67a03754f0d69115f9590a86449a0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", - "similarity_id": "39a30aa9b09b75a2ecbc508760f6e68d2f1757a70463a061137ded98c0520842", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", - "similarity_id": "8eb933ca43156e90261b896b7b181596e56a174b61d7c73af3c785f2f91cb298", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", - "similarity_id": "8e16d8e4c29e049641699297906e71b844137a471c31f72d5bf8ccd0ad39f936", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[public-bucket2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", - "similarity_id": "0dc544083130ec1fcaa0db8fc0ff334ee442e1b65fb7258ccb5524d2e344cb19", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive2.tf", - "similarity_id": "4e636d1f97e1f2cfa3c0db39a86ab833e2048cb602cfbeed5e69db546ec480a6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive2.tf", - "similarity_id": "b6bd290c669cc5a290e14a6f8b13e94c800b12fdc5f6c8b274be7b20cd820d43", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", - "similarity_id": "9dd31e0d0c17a9a1f42e674d7a6266d0f295a080ae9db3d008c7082a7373b7e1", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", - "similarity_id": "6b7e683a6c4ad57226d6cccc8a3a3567cda15bee638dfd9ec532f55416de9a32", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", - "similarity_id": "4fcfb8b719aa40a89a931533f00d6c1ea7e4c9b56eb2f4db31ccc1e25f68cf85", - "line": 19, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", - "similarity_id": "7d1fc5e13ce4debd7e306fd9fd67af6f8f9f1b6d59141b6ac4bc8f2aa77a9c0a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", - "similarity_id": "e3c2491f7b9e0558bb0dfa1766243416afcab98ab4414eeba9294ac7dcbd5a5c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/negative2.tf", - "similarity_id": "37d1f089b978b8f000c435d2c195ec194ff7d1e9e7b9b918a2088dffc0684de3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", - "similarity_id": "ebe16727aad9266db3881f15d4683c3b9459db73ec614e6522c4a339c6fb092b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive3.tf", - "similarity_id": "00bafa01ec47e3a3437979f8b1ee6533d0b82b65bade3a2c5d08fea5954acbc3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative2.tf", - "similarity_id": "dce28f927cade1cd6db83ea98553e0cd9b206eaffd6dbe2691c32ed5b2f0e189", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive4.tf", - "similarity_id": "03c6bca4573b6e5586d17b38878736a0d6bf7dd4f7fe15f1e6636c2eb9b7f8a9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative2.tf", - "similarity_id": "4c100307872c0e696614334030b726cbcc9e07007b32adb684669ee2c8e6e4d0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive4.tf", - "similarity_id": "067cbba611660ee39e3093b4de55bb6630a896f84eaed9e1bbd39f08c1a15470", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "f56a895cb2703452e851707aa1ccbff17f64973332310afebeca0fa063435156", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[log_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", - "similarity_id": "56321e63cf9bf7e585aa5b32cf746a9a472182a42179f5b6b44a7168a572eff4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive2.tf", - "similarity_id": "1eef054ca8c0cf3fb61e3f544cf8969bac8ec118b1e1afc953ac295797341989", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative3.tf", - "similarity_id": "b2be7114050039888ec68b11df402591620cb364530d1469ab8ea385dfe3cd98", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive8.tf", - "similarity_id": "d0e495aa3e76a7f477c0a16fdbb23d9529908c14b369d9b4008be62691f0445f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/positive3.tf", - "similarity_id": "e46490a206cfeb7922bdcb6de0cefd97494201d0b0b7a502a610951ca64b08d0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative2.tf", - "similarity_id": "acdf13f0aba1f64a6ec3cd2c5d0fccea45bf730ba0644c3791ac486144b5d9c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", - "similarity_id": "bb0a883ebd72676d1d7eeff73de387ebbd2ea56e41ec1e9e1dc8fad88fab7d34", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative2.tf", - "similarity_id": "96a715108c28aa063a3696d9d7187b18203b780a99306c68943a67e88000dcd7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/negative2.tf", - "similarity_id": "17ab3cebb90e1ac64eea3309d43af7759795bdb7060e7d923bdf714b12d8a1d8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", - "similarity_id": "61150f3e4862e130dc7225977347f17fafbc02f909c47585010fd36073e56f4a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative2.tf", - "similarity_id": "4d142c7a002de3bccdbd4da870de9247d5b64df77923b7c77e3fcd22dbf2e164", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", - "similarity_id": "330d36cefe4844ed71344daabb7dcc6706ba82c35eb00fea6455445352609767", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative2.tf", - "similarity_id": "51f3df7d783896f1cf3b10f737d51a336a0ff74579aacceaf3556661e1168620", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive3.tf", - "similarity_id": "0adb6b9837255be0951c00d3718d8d7846144ff58a9467ff49600f8b01ee4711", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", - "similarity_id": "0bf0e1e971097873aae8479f04d743c4ba60023a97252e07a71d4012c187bec6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive7.tf", - "similarity_id": "1449495796406077b9f7f690f44a390a6e6a2d6bca2fb0d53761d4b0d58830c8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive2.tf", - "similarity_id": "e094d4e7d171f8a25830bbf4f7b3a95b6e337408d8ce41eb39ac9393d28769ec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", - "similarity_id": "966c610ebfd12af0d920d1b8b166631b63efd91220d0d3fb96823f87f01c1b2a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/positive3.tf", - "similarity_id": "b04a5521901963ceeb3e93a2ffad00547327f2a0e1b822b7414263f7e30a31c6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", - "similarity_id": "e272197b04b7353b2be59f77993911d206294ffbc1420751b9bed03c130e53d2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", - "similarity_id": "06c253e54a7686d7d133993da0083c138e9278b226dde197bade410a3f53c0eb", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive5.tf", - "similarity_id": "742b12b99176590a7589937d6ef5c5472e1aec9e5ec957a85b3de0bd12b72fc8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", - "similarity_id": "3c4fa30a384038c4cad1c1b9376fa405b809672d9197a5b5ccb25f8e847990a2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive3.tf", - "similarity_id": "743b530244ca7c8a84ac4edf504ac3ddbb12ab46ad4c8ac07538a22960b80da8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/negative2.tf", - "similarity_id": "3cf673c5a977f281054d6d4156be0e7596da5f884d4f0e395276c8e7b90d9ab2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", - "similarity_id": "b5e83aa4afb5444142b4f791cdc2bf09d76595e2731815e1b6aef6519fa4b7b5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive3.tf", - "similarity_id": "ed137e59345e2b22f2e276ce551e52704fc4bd48cd3659533ebfe9d869054941", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", - "similarity_id": "50c0f28599265a6084545cf5ecdb8a168a759c9bc1d1416a171767eeb0fd8de2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative2.tf", - "similarity_id": "fe6705cd4526a5ef249287c724128ba030604f3e06dc2a98fb29e2830ddb97e4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", - "similarity_id": "aea43cd2159af3ccc0a42473849b9253a35889663cd42c48ed64ba235e9e457a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive4.tf", - "similarity_id": "7ce19aff3cccb4db66e6bf98e01f3907da2ea7cdee5a39fd031a9e91aab33ca6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/positive2.tf", - "similarity_id": "6542f539810975fd03fce457f6c126b121bc275fe28708e6015436cecf39d9d9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative2.tf", - "similarity_id": "c217babd1d0774280821f86c9a119648c254964ebd695e122c9d24193ab93348", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/positive3.tf", - "similarity_id": "18f347bba0943b04a2e48e68db2da150081d0ccc8416735f3887f1ae976b48e6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", - "similarity_id": "7092ea9109a6c514ed12b6a4dcd850fb2fc453a495e7f36f7a2b3a1e78af98b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative2.tf", - "similarity_id": "e6121dd5493655a20f002518e02c3e55f3eb943250e7245b0e252a9a77a508d0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", - "similarity_id": "941c933f29b056495bb058522503c56a5632faab1df651c74ce5cdd153808087", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", - "similarity_id": "42beaffbf742cd3f21e9efa2585aa345621a52a8a25b4b190e2b6f2a4875d8c5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[hoge]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "be9044d72e3bdf08621a66a937a4986f6c27abbc00f0f153241cd00731a2fd49", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive2.tf", - "similarity_id": "e41aa28a2426f4eafb157734d27c9df647e58fc424bab89506e77e9be3cbcc93", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", - "similarity_id": "d6894906f876bc3344b4f5a3dff58286f2532322be0234814ed4124f556a2a0d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive2.tf", - "similarity_id": "15108fc8dd8d99782c479ec16bac84ccc0297ed32cd61e66891151cb974a9092", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive6.tf", - "similarity_id": "ef3e4154565720db79a1b6164fea48d1de681f7078cd5da14e617d4be2b2ba38", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative2.tf", - "similarity_id": "26278fba0f567aa336d0ef2bfee84346f1e43b5b037575d888829a85cf62ea88", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'logging' is defined and not null", - "actual_value": "'logging' is undefined or null" - } - ] - }, - { - "query_name": "S3 Bucket Public ACL Overridden By Public Access Block", - "query_id": "bf878b1a-7418-4de3-b13c-3a86cf894920", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block#bucket", - "severity": "LOW", - "platform": "Terraform", - "category": "Access Control", - "description": "S3 bucket public access is overridden by S3 bucket Public Access Block when the following attributes are set to true - 'block_public_acls', 'block_public_policy', 'ignore_public_acls', and 'restrict_public_buckets'", - "description_id": "aa9967ef", - "files": [ - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive2.tf", - "similarity_id": "70c4308ef7d7d89ef019a60b350e28a0cf7c43e4faf5a891bfa62c5dee98f721", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "module[s3_bucket].acl", - "search_line": 0, - "search_value": "", - "expected_value": "S3 Bucket public ACL is not overridden by public access block", - "actual_value": "S3 Bucket public ACL is overridden by public access block" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", - "similarity_id": "63e90b0b56709120009dab93e51095797b39bce1092455cd41fcf56e10db417e", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket[public-bucket].acl", - "search_line": 0, - "search_value": "", - "expected_value": "S3 Bucket public ACL is not overridden by S3 bucket Public Access Block", - "actual_value": "S3 Bucket public ACL is overridden by S3 bucket Public Access Block" - } - ] - }, - { - "query_name": "S3 Bucket Without Ignore Public ACL", - "query_id": "4fa66806-0dd9-4f8d-9480-3174d39c7c91", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block", - "severity": "LOW", - "platform": "Terraform", - "category": "Insecure Configurations", - "description": "S3 bucket without ignore public ACL", - "description_id": "28aa7150", - "files": [ - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive3.tf", - "similarity_id": "46421a142917c62555a69bd425075d2431dc40f63b57eaed61de4282be4e9758", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", - "similarity_id": "9b3730e745dc2f4baedc0855136a9ac80ad27367d6982c79646e1360bd3ef900", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive4.tf", - "similarity_id": "ab2e0b6739193c438e2bec7cfb8295e3ddc27e60ddca4e60dbbf9ac10a375837", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", - "similarity_id": "bbb6913a9203d9970df63e616286f66d320ef7b21afd69dbf55c54cb058c4df3", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[negative2].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive6.tf", - "similarity_id": "09d8ef7cbf80f91167e216be04a4354c46d652cc67b81ace9bc2869a692242c0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative2.tf", - "similarity_id": "3824f67d6190058404e60d9067d8524a7095f909383225db6476cba83d06f12a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive6.tf", - "similarity_id": "9174f3924a58fb4a5e0e51cf61a8a7e1accd1ead1097aa46f22b8d1b2bf72684", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative2.tf", - "similarity_id": "13c92f771db0b436736f34566562ab99b565d1e3fb37c16828c2355c1664a845", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative2.tf", - "similarity_id": "d1be204edb752c652abada7bb3bf5a891cd2f73d46bdf04b7514a466bef544ca", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive2.tf", - "similarity_id": "82166a5963fef238452e22e78ccbecf9f44dcfc8cb365d168c9a386c673df9ee", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive2.tf", - "similarity_id": "794e073f1b34dc13bfcff4a33fbc7ddbde933949bde0a8d263c07ad605742c3f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", - "similarity_id": "4062d0be8cd3e56430b79319928ee478dff050ece61e0917128e0786e578a842", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", - "similarity_id": "7106bfbd12b4ac15bbab4f3e09a6bbeb47f9c24c80f8c091c5acd822f35c1e74", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative2.tf", - "similarity_id": "c7a17f5acc8732f5d2692e3976d9bbec22c92166499b29fb4f1427b1c9c3fc6c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive3.tf", - "similarity_id": "60feebd225a2e753aedf60fa974036449c7c82a1ed00d670e5a6762b2a555358", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative2.tf", - "similarity_id": "ad20c8b8f6408498969d99b0901c9163cf047cf5c9fe8519a6dd87aa9401ed57", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative2.tf", - "similarity_id": "8310782747aa887c900fed4e72b880cd75596ff225156d2cacc2d237ec50f386", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative2.tf", - "similarity_id": "58eb8cc22bc7220f84cb1c98bc138f2f15a8756753b41591f37bda9c9e9b0b6b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/negative2.tf", - "similarity_id": "95e3596c6feb4929ca5c1e770bc352cb378a6b4ef8f8b970f1c9c7baa6da4960", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive6.tf", - "similarity_id": "ee4c600881beb53931b0bcc4dc9081b082c25db3c913c9d8f02f17c2d35403b1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative2.tf", - "similarity_id": "868ca309ac1af951565c615b30f5cac4ce0590914362962e9296c8456cd00197", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/positive3.tf", - "similarity_id": "55584d5e8a2c97650335e12d11ebf447fd1be8adc3131c376c0332f9f6dd0264", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative2.tf", - "similarity_id": "f2c4d02711c31d8064e8541b8d3c0cb497028ed9350d68ce9c5f4571ca9889ea", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/negative2.tf", - "similarity_id": "7e379ce70be7be1e2cbd2535423f228298d35d5bd4af08895ac1407ead5ee67f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative2.tf", - "similarity_id": "da28b27e0b7d31f2cb89e87424f70bf3ca3400a98eebe923ab5218f16d4f62ae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive2.tf", - "similarity_id": "969d115e069f3f3d8145b70c18b6aff6cc3106df6d0b54f1fbeee95fa9a73b26", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative2.tf", - "similarity_id": "5f0d481638563d43ec8e0c780389a129fff129f5e26da6cc5db65822ca32f4e2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive2.tf", - "similarity_id": "3219ae66520350c5f684706fcee073780c38002c544c741cd7fc2649f4623546", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "module[s3_bucket].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", - "similarity_id": "7915d61527e35dc8c02b27663bf0c4fabbbf951e906c955538a1b0c5145f21c3", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[positive3].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive2.tf", - "similarity_id": "5ff8e3d899ad48e8d9b12f045e457008c6a09c77d588d771483bf9a72a1fb3ae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", - "similarity_id": "a6a39dffa872be079622c039e04e4399055074f295f5115d6131860aabcf210d", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive7.tf", - "similarity_id": "67a9b1e5e52cd2bdd4ad70c8e4add2038d9b687e32b874fb2b71fe5e919ca4c8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", - "similarity_id": "b0be2bb527fa9103cf66ef9e13af23feb65108f02ca4c3e382f54e36278fe67e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive3.tf", - "similarity_id": "dca212d4ca54b5f4e97e4596c5f1757644c374a302427e599af8d8a4d4b0f62a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive4.tf", - "similarity_id": "24bed4e79074a0732a976b6867b5a40c6546724e2c8ab94d030e14f905610389", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/positive2.tf", - "similarity_id": "93c1e82d98d27ee2b2a3f31855d00d9a2e6a6e581306e8ef0780d8d4649bcbce", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive2.tf", - "similarity_id": "a986fdaeb3dcfa6846a75b3c23c7e67f33af01504ea398ffbd9a7ff0937f0228", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative3.tf", - "similarity_id": "af2a1e63a149db3a47500c6fc17e68bf8177fc49650e64ae55b9f01c7abf88da", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", - "similarity_id": "44e9de13fc33ead4f07ec60f220945bf3bcd413fd02bfd6888cec57abe58f37a", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[negative2].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/negative2.tf", - "similarity_id": "2d0e65ee6668f306d2b249ac87480b41e7053e68ef8c8030bb4ef629819ba5bd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative2.tf", - "similarity_id": "f471149c7d3ba246caf92f1d9195ebbedf8c6cba384331a458bc76b95c0fa3aa", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module[s3_bucket].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/negative2.tf", - "similarity_id": "cb92fd01a9cd35a3b9871353a86e970ce81c493ca870e685ec73ecd2faa21833", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", - "similarity_id": "e1aac6701373e656b46089f104a5419d540040231f98ab0d750b6c9f072c9325", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive3.tf", - "similarity_id": "4a3841fa0661203dfcb2d1cd254a9aea76f714695c44906f6907452f4f45c471", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive2.tf", - "similarity_id": "d458ca77a0c782aa5495c09c6dcffbe5a51522dc6e8ec1d9425077025d4fbc7d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive4.tf", - "similarity_id": "4491a578e416b4b72ce8d82ce8baa604d2633066aa2bcbe4067f72cb8115ca46", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative2.tf", - "similarity_id": "e5186d764509a91f4ccfb9b0913f0fc03345eae7bb18e8b9a45ebe36011c0da1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive5.tf", - "similarity_id": "954025b9ea01b3d8ad931ff920a1f73f15ad3991aa150eb8f226709e4d96e0ef", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive2.tf", - "similarity_id": "04d55ee345e43ceab854131a8805981009efa627ccb4192b0e0160a68b4c3d95", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", - "similarity_id": "deeff4aa803636a318fda9ade59e079b385cd016936fbb3a84a7238c7df82fdc", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[positive3].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive2.tf", - "similarity_id": "d86c04f2694d542fcced31feeb3dd8b71adf2af7af7bf9fd1187c7d4114f7909", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive5.tf", - "similarity_id": "fd19f0ed6d25e208608a32ec7b9f1d6cbe755a79dd68a69402b3139436833e6b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", - "similarity_id": "0d4d10d2c9b1631c2ca6ae5b7ab45b7bd93d55d640cc9d2fe881831e3f4ac704", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative2.tf", - "similarity_id": "00ca0ad0f80858a9ce1ab151d3017bbb96bde0b23398af857cab5ea4619314c1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative2.tf", - "similarity_id": "a143e24e718793a6d30b701ee30d0565e121b76ec6b809ce2b583b274747984b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative2.tf", - "similarity_id": "02257d32562ca2c3cd49816be4ea43e120b3e8c0e7cf49ed49830e622581efff", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/positive3.tf", - "similarity_id": "872ea1aecbf4506f275290b372bf0766832dfb09cfac56fa92ab7a62ad58253a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive3.tf", - "similarity_id": "606055c45c823870617251e820a02bff2fb6ba107fec0fc102a01d18cd8b782d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive3.tf", - "similarity_id": "d1cd614971c2b066cd8459ee0fcaf457ec703e1102301743a0e67045e9a35e84", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", - "similarity_id": "b033cb9f3871079f45dad2fa67a95c1b430a81c31954e934685a5c62ef616c82", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[block_public_bucket_32].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive8.tf", - "similarity_id": "2f92339539f4383b59efb26b0987b4d8a98d67e6876bacd5ea73f95a0a625bc8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/positive3.tf", - "similarity_id": "9b9f3ac357876ef050cd9fb45dd51de920f907417871ac7ddd0f811acfe7fdea", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative2.tf", - "similarity_id": "9603310a73bc8985fc6ed42b81aea4af36b5e5754731d2b8ea7d62d660df2104", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive3.tf", - "similarity_id": "8453bb65582e3eff5468433f889fae03e0e6f864321f5c31dc2a134975cb7aa8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative2.tf", - "similarity_id": "23022d71ac08b9b9136a5fc1934be199ca47267ea5cf57f7765568d83bd0c239", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative2.tf", - "similarity_id": "fbda4c542c849c120c0509bf0b1a2ded8b21314642c6ffc12e706a208c1ad7c9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive2.tf", - "similarity_id": "8538a926a7315f20bd3564b8f86bbb46c1dd3373ded43aeb6ab7c6dd62b06b74", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", - "similarity_id": "c53add7236bc0318b9e19672762b2b207608ff85a6c0b190a5759770ba4cb617", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is equal 'false'" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "aba30c7598affff9a1359c4f720505eab9a84724f9ca16126b72c5db08df3e9f", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive2.tf", - "similarity_id": "552013651b2f48918d034ead4caebb9360d5563a002861d8bc1390c19753c692", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive4.tf", - "similarity_id": "9cb27d9f6150cceb8b56eaeefaa9688cd2dfeb4adc9f6572b691b5ee726128c4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive5.tf", - "similarity_id": "7681d963b30a63959ab466ddae0ad90fc4b1340b5d1ae8f24a801fff9321eea8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/positive3.tf", - "similarity_id": "9a0b8e18b53794db1e2ce776a22ed89904f84b1daa080e83c9fb93059e6329b8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive2.tf", - "similarity_id": "75e30c83f46a2ac3a6830125984deb7ce8608dee361a6ebc8d078ba95d5c5608", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_public_access_block[s3_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "'ignore_public_acls' is equal 'true'", - "actual_value": "'ignore_public_acls' is missing" - } - ] - }, - { - "query_name": "DynamoDB Table Point In Time Recovery Disabled", - "query_id": "741f1291-47ac-4a85-a07b-3d32a9d6bd3e", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/dynamodb_table#point_in_time_recovery", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "It's considered a best practice to have point in time recovery enabled for DynamoDB Table", - "description_id": "205ac3d1", - "files": [ - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", - "similarity_id": "f03c038717719d4e52fd0afe624a281d49dfa0075398a0587e3cb73c1006b47c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", - "similarity_id": "74c6bd6c5318eaef60b3105fe86a3d0d2d9aacc51dec5e05b090058ba4634947", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}].point_in_time_recovery.enabled", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is set to true", - "actual_value": "aws_dynamodb_table.point_in_time_recovery.enabled is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/negative1.tf", - "similarity_id": "4d97910308cd6eea33fff5ebacfb96f384f273fdfaff8b3e520515e8e9883dec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", - "similarity_id": "e3ab84533625c6e58bcb96022c917347f39b52c0f0fe9fa1fe99e2fdf060f6e1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "845e0a2e82bc081983abd1ba64f65189f082447269a33753e9124a4359bba0c2", - "line": 95, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "9d2737d2fb94bd186b96d28ebbe31e1eaadada3416977f7a4619401f44d4aeeb", - "line": 90, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", - "similarity_id": "2a606270f6c7bb7bf9298977e2f8c7f0f98d60cf7d258bff85b7512b5d49681e", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled", - "actual_value": "aws_dynamodb_table.point_in_time_recovery is missing" - } - ] - }, - { - "query_name": "EC2 Instance Monitoring Disabled", - "query_id": "23b70e32-032e-4fa6-ba5c-82f56b9980e6", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#monitoring", - "severity": "INFO", - "platform": "Terraform", - "category": "Observability", - "description": "EC2 Instance should have detailed monitoring enabled. With detailed monitoring enabled data is available in 1-minute periods", - "description_id": "0d5413e6", - "files": [ - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", - "similarity_id": "fb5e9e5c2d43d59b4d37d1c7f3f3f4a803d3bda9788dfdf522779036b06b30fb", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", - "similarity_id": "01cb77186b543a354c34c5be8478f882788a57bb95516cebf48843815ac63920", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive6}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive6)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive6)" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "4e462c3427439c8cb969d1c0a4d05d37a8f77b22786044f14a3422dc5495c2eb", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{test-ec2-instance}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test-ec2-instance)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test-ec2-instance)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "616bc60d4322649c538dedd947befa0c9a64a29c15dc042d668c7ca738a258fd", - "line": 109, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst32}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst32)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst32)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", - "similarity_id": "9645f50b3de117e8a021b8709a8b8bb5f7a9cd2d8c41fc606e852fd79c0e5a4c", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive4}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive4)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive4)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", - "similarity_id": "85fcaacd9ef9041b5c6fb1f673033173a758ca10d4b9193897cf41cf75d4155b", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive5}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive5)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive5)" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "a2c506b7b224cce01b5d2281aaaffaedc631bd21a722c4727f46de453670002f", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{priv_ins2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=priv_ins2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=priv_ins2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "e4cbafb8a7d4d5062d2665acff7c953c35b9820b9e9bc08684f70b3751aae297", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive7}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive7)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive7)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "e9b1164c5be2c1bf401b14051485e55e49b181416e8ac0d493eb3e19ce56d420", - "line": 57, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{negative1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "8e00104660bd173409b4276a534d79ef5defa26b8b193ba68d97a7c078ddf365", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive9}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive9)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive9)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", - "similarity_id": "ff5d6b09922dfb8272d0ba8070a81a64a4775b6b1b8ff8515d58a29f0556508a", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive8}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive8)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive8)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "371b01927a7c7096c6fec4d1e4ca5580773680aec38310a45655f107088c22da", - "line": 96, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst22}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst22)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst22)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "bfb398b836f9c8600b4aba985efb752c9a8cfaa3f3a74f0e7f7cf6652ea6d433", - "line": 82, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", - "similarity_id": "363534b3aca3623853f868a73d58fab0a88d49cfcaad45ae34a4988799fa918a", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", - "similarity_id": "2cb5de106e6e7d8de2d0bbcf3b610c6ffb449ab807bfccf776089e4aa70f67cf", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{monitoring_positive1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=monitoring_positive1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=monitoring_positive1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "69aa775d5948502a6e89d2e7c9ecb1e08c0fd427cbebfb9bc34f2a83075ad179", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", - "similarity_id": "6efb19f6ecf1966b5372ba125a5dd2536888e227c78503e5a06392132e0e4b63", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "62c7ec970e2906db2b7e4848c712f7b2153b68aa6835490eaa43e2e8084efb24", - "line": 88, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{test2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", - "similarity_id": "65d2089f6e5028e4590a61cb2829b75bd4f007475504600dcf33f48fab2e6f24", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "75893af01a4db33ecd80f9136e8e5664b24f93abe3500d0575bf1935bb104283", - "line": 108, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst3}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst3)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst3)" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", - "similarity_id": "be5ffc7f628fbea762728309f0046f2603fe71649c76ca81adb0e0891fd0cfdd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{negative1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "de72601496ae4e0a186d3d900b993fe11bea39d55051c5de3106ca74d100edac", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{pub_ins}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=pub_ins)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=pub_ins)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", - "similarity_id": "f4efba1f428b8ff2789680233bc04f2b9238332c3ecff635db7b45039e9f29f0", - "line": 20, - "issue_type": "IncorrectValue", - "search_key": "aws_instance.{{monitoring_positive2}}.monitoring", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is set to true%!(EXTRA string=monitoring_positive2)", - "actual_value": "'monitoring' is set to false%!(EXTRA string=monitoring_positive2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "a4641650983d227d10d35a52e68db1e4d38aeda4f55420c3922c2474c6d81c88", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web3}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web3)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web3)" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "8689c4dfb4cd75e31855e08033351624d05028a3409207b746b852ff99c9a1d8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", - "similarity_id": "278d8af92a08362a9091a6dd4006e2b4c5776c879f2e0d79c7e0ee108a653a90", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "afc6976b05a7555c8f78892fa6264cd47b011e4790050a785180923e887180dd", - "line": 95, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst2)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", - "similarity_id": "e604a1bb76c27d5c6b344de7d63eb8efca137069f5b01cf0ee9b751ad6a6cf07", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive3}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive3)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive3)" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", - "similarity_id": "0c99cc2bfb0a7247589473e66b04eb2b339484b698f3b4fc52ea3bf6c6653c25", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{positive1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", - "similarity_id": "06ef5f50950fa554ab73735387a4725286824175219e4ff2c9246fcb9d0565ce", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "module[ec2_instance].monitoring", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is set to true%!(EXTRA string=ec2_instance)", - "actual_value": "'monitoring' is set to false%!(EXTRA string=ec2_instance)" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", - "similarity_id": "c6109be8837868af7f05ddeabae7803c95e36ee62c26f58c305358924b3717a0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{negative1}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "4e17df5fd2e1d30e13a180e8e6b81406c0a77337e80e6114e14ef941d9e4ae72", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{pub_ins2}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=pub_ins2)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=pub_ins2)" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "6073e20678715b407134307b01ffee4b23e76a7face8e0b438ec12f5863bc0cc", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{priv_ins}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=priv_ins)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=priv_ins)" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "52badb86aae36a8c0263149507e1c0d32e8aa6d9f02992368feadabaa4b38c60", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{inst12}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst12)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst12)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", - "similarity_id": "2514498a7e100d6f2aabacaa8cc4e1f0a7f2d59474e9cef8fb7d6affa5db3ccb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=ec2_instance)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=ec2_instance)" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "ede19bc1eb6ce8d021480f5880a66abb6bebceecf8503d927fd447d80b088c9c", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{test}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=test)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=test)" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", - "similarity_id": "72f91854c0268009c83b8c6af178e60a53876d296d3934e218cbfd20d2cd9020", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance.{{web}}", - "search_line": 0, - "search_value": "", - "expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)", - "actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)" - } - ] - }, - { - "query_name": "EC2 Not EBS Optimized", - "query_id": "60224630-175a-472a-9e23-133827040766", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#ebs_optimized", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "It's considered a best practice for an EC2 instance to use an EBS optimized instance. This provides the best performance for your EBS volumes by minimizing contention between Amazon EBS I/O and other traffic from your instance", - "description_id": "ddce4bd9", - "files": [ - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "c4a06491dcea6102f5b74457b7bfb9b08a4d990808e9d3f8f85e35f51d959034", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_private_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "011dc8503dd732837ed7d4ee7617776ebbd3ed9cd7a4961a9b6837dcc91ed32d", - "line": 88, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "fbfb5c9607a895486d7c821ea64facc86d336e6f945f2bb0eb4082125b2cfe0f", - "line": 108, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", - "similarity_id": "bc2f8f6fd18b3a94d87dca6b5435da921868a70fcd114cf5714b9fc040f60ca0", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", - "similarity_id": "e52fc171c7e5ecb99bfa9c987476c634721c0c718ce5baa8fb0efc14a24c9ca1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", - "similarity_id": "66354a1ecf30be3623f54604f8262119588fc6c2d0e91cd305b25f5e12b9e0fe", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", - "similarity_id": "f8e171f90476547c9b64dfd758378f6ea6616d3dd39e015894d953388fab5ac8", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module[ec2_instance].ebs_optimized", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "16d171e432e242727969a74f50061fe611a3b00051e34a59685f73375ebc3f7f", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{pub_ins}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", - "similarity_id": "ff87c287f6db10b6bd2f71b217955419f52b8a20e0417219261a4437c409179a", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", - "similarity_id": "f7ccbb59bf0f8058b705b7c57d75ec788c42e9b9b30f63ecacfaa040490f67cc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "e9f59f9b1a23cbeb6c3a9b7238ff643c0ac4a328a92c2a842b6ea86a804f6ae2", - "line": 82, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", - "similarity_id": "c220efbf0e25f49130e1d9fce452ae28a1ad5ce3c057b49b1547cd744ef8e566", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", - "similarity_id": "a3ee63f10b14882d13199e67e085c72e201a3741499093466d299350e34b83c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "23aea01abc940cecc8ce168c79eed044822f080a60dcd3aac076a7803a9e4cf3", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", - "similarity_id": "af14fc5e97bd84336c325b1bbd3a5509d822f055e6a3566823f95b0af959fbae", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "f82a92f2fb8c79b56afe9e01c57ce2a7bea1d2572a8687d81f4040c53263d346", - "line": 109, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst32}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "3e5e65f8454f0431e7a877de325048184b8d6862c580f04bdf18163d797c2c18", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{priv_ins}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", - "similarity_id": "b3eaddee1331cd85e414f05354bf6e94a8df2b615af11495a180cae282158d1e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", - "similarity_id": "8344b4229d994394d98de0a6cc664f50ba2b524395f29216245e88f1cc2f2abe", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "789764d470c6b4357f6a5f2ec52a2019060e8c08112c198e47ba46ca6f3c8c20", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive7}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", - "similarity_id": "8a6b04dfd2de8f1cc74c02fd4c8503c8b901118f4703b78a11a6270aa29c86c7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", - "similarity_id": "98d959307541f8d003537375269d0e23a97520f7c2f3613dfb999aed3d26ddfa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "ffa0acbfe39ec7c5c7d37d2c21442e7ac8721cafcdd13687a919926978f8df9d", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "7445785a11415e487ac2e63d28ad27f04713d50bf9db8fb4fc0dc7d20978fd38", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst12}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "8acfb066efe90d2d3280c25ac5b00f8471f492930b54426362e5d290add9f32f", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive9}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "68aa819938a47ae9d655e54c504dbce54600ed5abfa51912d143fbe41348f238", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_public_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "4036bb57a8562699f2bc3e95855700f58ea64527e4d082e53e0ccef0b8f6092b", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_public_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "35a685e9c6c76e75f7617205e6f27563a882e47484c97f65d3e1731097802f84", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{pub_ins2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", - "similarity_id": "b4c6c88e31b4ce9ab062a79bebac8f35502ee7578c9ed8db5bf52e99b946a242", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "beb9d2f657e725c12fb24c822d85dd0e215a83050e104683ac4709a2318531ef", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "c161e1efdd486d50ba5b75cf87d60d91e112c5f17c7c7f956567b70cfe4119bb", - "line": 57, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", - "similarity_id": "985f79588fec3d23db5a958f5002f29d86bfc1d8983b5749504578e9197516ec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", - "similarity_id": "67e5ddad789bd369b3dc34e97a0372e9665d4392f17bd9ea7f9cd5dd0e35ca26", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", - "similarity_id": "a81e2e8fe09364e404326b15c57a8f9b5a11bd3ca5dd416fa39525ee1bc219b6", - "line": 20, - "issue_type": "IncorrectValue", - "search_key": "aws_instance[{{web}}].ebs_optimized", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is set to false" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", - "similarity_id": "d35cf5365ac696e1262568fb49a93ccae647e2b34abfc9f578b624abe9cfa7e7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", - "similarity_id": "b087cb883ee2e13b010a776ee3f3f5a06ad211d7f468ad010bd7882957fd8d3f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", - "similarity_id": "90b3da8eeaec7e202feea0b5f07ae04b35ee077f247d838fdd09e0ca7959092d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", - "similarity_id": "b6325c56b8eef5cfb7790051ff9325e986238222df9016138531c485941a811a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", - "similarity_id": "2b38d84be01cb50de9f772e44c02fac3946ff43a0e6ce3c4254f443af8c8e256", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", - "similarity_id": "bbed9a3bac228c8202504c9ffd9c33d80fec44bd5cbd3d63e643bc32263fd357", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "ed81e1904a44154caffa2c6e722db22f6b49de57b6f8405d58c814b55c8ad89f", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test-ec2-instance}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", - "similarity_id": "71ec4e8d73b9aae2218f697811c5f8a3769fb7d8e5b754932208924fd68cb10f", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", - "similarity_id": "65de401a1a6d072ca37f926153076b6abbf568088794547b7bb5478f08c642a0", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "6503dc96aee5641ef965f5c227ba579ba20c8b359ab9bfd7c9d17e34eae4981f", - "line": 95, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "f158f107b10e43fafafc2ee787fe00da46ab7a00ed3d1df3ee61d7c1e1f35ee5", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_private_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", - "similarity_id": "f5eaefa76d668c0d8d023406adcba65eab713450bfe0f79c38d02c5591d54991", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "125405ecf869511331479d90e20fab98229b5af88f2f6467b6a22b5e2d62d3c6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "489f8de872ec8586a445b73413d1acc5b2887f01ca8705bb09fe24719fe1441e", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{priv_ins2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "7d04cba353979c81931ec8dc8453c7f89eda7f3a73bf340e271770d28ec25969", - "line": 96, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst22}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", - "similarity_id": "54186cb138fd3b96778399f98a0d4ed49c5f66101ff1df1364da43b8e3e0e746", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive8}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", - "similarity_id": "b06d4225f22edd2f8f5d0a2b5a1aa1c150f9dbecd30180726ad59d7d4ab3d43a", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", - "similarity_id": "508e9eddb720ba7c083332676eaccc4971acbff151b929496d013e0abfcc277a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", - "similarity_id": "451cd05bbda645079f06ec60029c8010c63ba9364e0a4ebcb3b102c7be2686b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", - "similarity_id": "a55c7aeb90b6ef5522bf23ed2037a5faacfceaad20f9155d8b5f9a1df27042bf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[ec2_instance]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", - "similarity_id": "49fbefb0e0256a4d5d318dc6ea11da3b8d9767643546ee9f250e0d36f9e814a8", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'ebs_optimized' is set to true", - "actual_value": "'ebs_optimized' is undefined or null" - } - ] - }, - { - "query_name": "ELB Access Logging Disabled", - "query_id": "20018359-6fd7-4d05-ab26-d4dffccbdf79", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/elb#enabled", - "severity": "INFO", - "platform": "Terraform", - "category": "Observability", - "description": "ELB should have logging enabled to help on error investigation", - "description_id": "c745bca6", - "files": [ - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", - "similarity_id": "c01f299eb65b7e9b982121c67b2dbd5ad10537efb17267f6997749d971edd96c", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{positive1}}].access_logs' is defined and not null", - "actual_value": "'aws_elb[{{positive1}}].access_logs' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", - "similarity_id": "72f3042909fd9f50409024615bec4e3b911cddbc7029f5e7ed812cb79d05af51", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[elb_http]", - "search_line": 0, - "search_value": "", - "expected_value": "'access_logs' is defined and not null", - "actual_value": "'access_logs' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", - "similarity_id": "9f708aee741b03d2e3f52ad84e249c96d5fddbf697ca39d688fa594967812500", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{negative1}}].access_logs' is defined and not null", - "actual_value": "'aws_elb[{{negative1}}].access_logs' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", - "similarity_id": "812afc05a6aaddb845238634c5159e5a1f74c5d4508f53cfa4bb3f75ad36955e", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{positive1}}].access_logs' is defined and not null", - "actual_value": "'aws_elb[{{positive1}}].access_logs' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", - "similarity_id": "19ab34360976fe242bf917a105df0fd039d5098eec1f3a4a8e871a291ef2f33b", - "line": 39, - "issue_type": "IncorrectValue", - "search_key": "module[elb_http].access_logs.enabled", - "search_line": 0, - "search_value": "", - "expected_value": "'access_logs.enabled' is true", - "actual_value": "'access_logs.enabled' is false" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", - "similarity_id": "65510862ff2d16a1abb66d23df746369608870a38a654f51656ecd0a540d3e0b", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_elb[{{postive1}}].access_logs.enabled", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{postive1}}].access_logs.enabled' is true", - "actual_value": "'aws_elb[{{postive1}}].access_logs.enabled' is false" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", - "similarity_id": "5ad36bb73257067a7ec5b52d24a46923f9fe3adbd1b36830ba95bf1c1c5a233a", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{negative1}}].access_logs' is defined and not null", - "actual_value": "'aws_elb[{{negative1}}].access_logs' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", - "similarity_id": "8a57be56d39922588a43948806ad136fa13900329610adb4f3d048843a0275c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{postive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_elb[{{postive2}}].access_logs' is defined and not null", - "actual_value": "'aws_elb[{{postive2}}].access_logs' is undefined or null" - } - ] - }, - { - "query_name": "Name Is Not Snake Case", - "query_id": "1e434b25-8763-4b00-a5ca-ca03b7abbb66", - "query_url": "https://www.terraform.io/docs/extend/best-practices/naming.html#naming", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "All names should follow snake case pattern.", - "description_id": "ac707cad", - "files": [ - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "e285c46817744c1280bfb64d65fe9149837d658cf26c162e38eed311c7d83153", - "line": 58, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow-public-outbound-sg2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'allow-public-outbound-sg2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "bb089a95dd02b703cb65d6805c7079b1d1d19621385c8ae2fe173c1b9a0d22ec", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "25b808efb5305a4719c04521b0c05972677d37526c195361ea82d434d3fc8ece", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", - "similarity_id": "249367a7a16809302a505348cacca833bb8059d56f79fc38b9d3159deda6feb2", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "fb7f720e3e0c14747c960d76d42d7bc7932df44e3dd9a2694eb1c059bbe80b1a", - "line": 45, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.subnet22.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "fdc03ac8871e30598503b374f8f2f5f83f1a1f2b13bb70b5c30d70c58bb82bd4", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", - "similarity_id": "7b3b68a918dd88d73ff549d411352e52b6d3aac64779e266d55ecfb9fb50005e", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "23ea1887853b7f6e594a25ebe1036bd8f183ab430fd7db729616ae6ed1683f82", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", - "similarity_id": "1970a581a36226cb3e93ebb04ce33da66a9742209a17595912324918bc3ad332", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive2_1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "17f3644fa599067d8f76fecaa0717289aaab97ed1e6a45827911e007079d2ed9", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "82272bc3b87f1a706567aa6b639d890bef56e27e120db57f8941901d044e8bac", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_public_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", - "similarity_id": "f1b4d960f8ef04edf1b475c21de284bdfebf05c5d6555f481f2a698975426224", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", - "similarity_id": "1a617967c789366f442dc5955cfb0ff806fb07b31fdec254094ef9d812c1a9cb", - "line": 29, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_codebuild_project.project-cloudrail-test", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'project-cloudrail-test' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", - "similarity_id": "288f49cb7fdadf5884cdd0ed9d74ab1e309e072729ac652684e20fdd144b7f0c", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", - "similarity_id": "f21800af4a95b25a989a85b4f4c68211509c0459fc43f64565422de2d7d88af5", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "e7afb4d47d8e8fa79af27c06e63c87971572c0e595b47c41960c2902f19e1454", - "line": 29, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_codebuild_project.project-cloudrail-test2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'project-cloudrail-test2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "0ebb40d910829f1b4ef3d61d275c7d7db992c2f1973644867455d7ba49a163ce", - "line": 83, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", - "similarity_id": "5f74924975a4e69a7dae209cb8c429771cab9899afa60a24254ca1f25f50f21c", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", - "similarity_id": "d8fff975a526e3c952d7c6b2ecd755705c2addc22335dbaa28c14976e6fcc6a1", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_kinesis_stream.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", - "similarity_id": "d1e479d20e2cd542009cc3c6aada03eefae26300dc160c89347a0aebdac769e4", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", - "similarity_id": "978614fb65b98517014164e54540fcbe864913d6f4cc1f9d5aa68f582b306e2d", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", - "similarity_id": "9cac07f936c7f13e03ccf37276b76bc4742173102f001e87d7cf516a41cbe221", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/negative.tf", - "similarity_id": "5f3eaf2862b13851be3341103d5d8cd265ac3968aabfa0ea2ad1840a774e57a1", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.userExample.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "f5ce1190f8358062caaac0020e1aa210ec67c07ab9084e13a40cb47a590d3d6b", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", - "similarity_id": "15ff27f01b200ecedd0a83e4e1efd6d93cf033c5c61f143b5fd8de26b4c4083b", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_snapshot.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative1.tf", - "similarity_id": "8bafdf47d66f2c7a9423bbe8242a57dd35843e3e9932bf4b34c91ae6f9d7a570", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "0c771373aa6633cf96a57199d738f9f407b141f753503dca438e839cdd678e1f", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public-subnet", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-subnet' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "8a0343d2f0b970dbd4144cbe4eca4a3388db8db7b369083e22b46584ac99ed13", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_public_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/negative1.tf", - "similarity_id": "9a40e1c74b2fe8c575b889930c74e3345026bdf2f5ff04ded847ecf4ab3e9373", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elasticsearch_domain.negative1.tags.Domain", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Domain' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", - "similarity_id": "56eaf383e2b555fb35ab347b75a23dd4eab76f2b659d1511d67eb6b59d770113", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive6.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", - "similarity_id": "0f5f90d5bbcad7a2d297741bd8de2ffd89a47f75f93ab65d554ae79300cf9b9e", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", - "similarity_id": "483c2ee5e7c33df609593b73aa41ddf87a5b88233dcd4bd1505a1bd946fc4b70", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", - "similarity_id": "cf4cb2606670e5f17c971f13a61dddf77da416578b9569852c7db5bdee1950f3", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", - "similarity_id": "d2f1064ecb15fa4f93c25a072d0ada3c9753f2fc8ae2913bd4f877a4932e802f", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/negative.tf", - "similarity_id": "964fad8476d3a107a59f3992c753034699785ec5c1d116eea05329ac178814a7", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_api_gateway_method.negative1.request_parameters.method.request.path.proxy", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'method.request.path.proxy' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "7cd01288566af4bf2b73a6f7beebe13dd6db4d4c5b1fb83ba7c987c66e47471c", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private-rtb", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'private-rtb' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", - "similarity_id": "f20dcbf0b8553c5b80a8f07498b2366f84fc8cf227e5a58036af46a58741321f", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "21afbfad8aa9bd96ccab656a78fedb404b872402df16b2077d1ca92fc3faa808", - "line": 47, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", - "similarity_id": "dc5125fb387c566468c7b2de011e9319bdeeb7ea0c8b64f885f80c2c6daaded9", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", - "similarity_id": "86929a4af02c4693e76fb46f89142a06d29584ca7150d3016fdb71a578df7f50", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", - "similarity_id": "23dc445910499a3ae192cc9eae493d42c161fc88cd589e023b16da6092461b0b", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/positive.tf", - "similarity_id": "4764f67ca493c73cee064ad03fe492090f4521dd42b93c618a53e1509222acd3", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "f0bc49a64609c51dab8b4e2e947cb2e6cb5841677a65b2bc38cd6f6ef98cad68", - "line": 62, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_private_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "6b9aaf6736b1ced69f0742d42b60bae52efd4eb2445342855d9982a9b0013db4", - "line": 109, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "10c4c0f6483b14a555518066c38d3b0bc22c0eb86d97a78caf238f27cfdac012", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "59afaadfea06d7788c1ff8df5bc1528b6468c3346002a4f184f4973c13b8e1c8", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "af062b913319f77ce1e0b7d7d5b8a52f75b4a1e0cd6db0125ccb16ae5b0d3ab7", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "062ce6b24d4c2a30afed15c170708b1e18fb288da53fa75ee1781feca8c51a4a", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", - "similarity_id": "803c1d13da5e73e923414a54d4e9212322c9dde9064be6e78ff64d405f22a916", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", - "similarity_id": "5db62a45bb3a74774fededc0852114b05114a2c6cd92460f0f8504afe7a9c20e", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive2.tf", - "similarity_id": "3fe57aa9ca515ee74fa96a39512853ff4bd06de289e03d4dda430ab89ba22cdf", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/negative.tf", - "similarity_id": "1c45be234ffb38de00f40157d89e4e6bf5ab3652430faeb0fbe7cabf41d98bd0", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Application' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf", - "similarity_id": "0ac4ee7ce2e003690d7ef27eb55aebfbb2ec45fa55cd552e935e69542ae89be3", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "d3dfa853b33aa00fa95ccd1e7c1847a763f28470638727e02b5ae8606853e7c7", - "line": 27, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public-rtb", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-rtb' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", - "similarity_id": "9c2962f6d20b3b5623611395337d08e841cac569cedc80200fc7a0ded350ea82", - "line": 30, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive1.tf", - "similarity_id": "ab3c4c6df7b2fb13dce1fd66660eda1837da6f9b49e48d7dcda94c0b06b34f1c", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "0342ffba90a7404e647fa73d5847228d5684b32b9a8288ed9c77e3cfe9b62c13", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_private_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive3.tf", - "similarity_id": "9e1758fac03504ee175af4231201b9bd84577b5005c0750d6f53394db7c8c4a8", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_workspaces_workspace.example_3.tags.Department", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Department' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive6.tf", - "similarity_id": "fac5a2ae883f9a5c7ee3dc3a9fa5fc69cf9ae4abb71ef3237bddec87302a8e16", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", - "similarity_id": "3fe0876526bf85bf5e2f00a0d9d522d8eb01745e486404f98a7fdbbb3f49a3c5", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "2e13b0e7032957cc6e1397681b8d03076a3b00b81168bf98909a3596ad795810", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive3.tf", - "similarity_id": "6271733d11dd17a39ef84a9095012d31f0b218e357306dcdc056bdd00655363e", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", - "similarity_id": "09d88e5fea5fa6afecbaf7b295db58fda792c1d7417f1c5d06bc55417f086026", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/positive.tf", - "similarity_id": "b6b2eb0e2dd361bbdbf853c36bffe16141ece247f8fbe9be9fa1643fc546beca", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive1.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", - "similarity_id": "f96178d77d96eb582284c126a1fde37e0c8223d6d63e3a580c9f0e81fba7eab2", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative5.tf", - "similarity_id": "bab6ba5d2e5821f229958633010fc8afea81ebd28e6507b101ca6b2fe0c68711", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "e03c7b9834666a08e592f7804026b01a9a09438a4e4433678bb7b64e982865e8", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private-rtb2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'private-rtb2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", - "similarity_id": "bfc35e787442999874e915c313166a6205b26f4c5ea1f3e0cc9e4b9cb8b392be", - "line": 26, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user_policy_attachment.test-attach", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'test-attach' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive1.tf", - "similarity_id": "0aad00304ed7f1ab3e6814d9ac57b271e065c77dfa52d0338ab616b8c8b4dd40", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/positive.tf", - "similarity_id": "f81753071fa2fa5a6e0eb4107b9b2a9d65cec53d2a0fdc23a1e8a029c2d0de77", - "line": 47, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_role.positive2.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", - "similarity_id": "44ad5328cbb17b4693f641c4fae447d3dcdcbc36ece7436d7238626704359f8a", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.public-bucket", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-bucket' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", - "similarity_id": "7464e24b389e0b20dff3e2e55c2c890c4189871e3eedf6c945570bfab96f4b59", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "d0e19663ca3507af85dc5854d92d44886b56a7ef9567774ac473d346c1986b51", - "line": 139, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_without_kms/test/negative.tf", - "similarity_id": "f9d404ccd44d8186d4ff1e40fdb7bfbb963d282b313befe49855724c12701eb9", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", - "similarity_id": "460de1e86a1e473da52f468c49d9852e1eab2f87ac75c4d432cb8a8a1d562604", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive1_1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "ff874131a1a85afc40f3d67dd2fb8c0013ccc9a260fec89b934accae44a8ffb8", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/positive.tf", - "similarity_id": "2739d53a9b5d288508d4108d8f436a71d02de5f8410fcd886717dee408915ad2", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_role.positive1.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative5.tf", - "similarity_id": "ececfd2c61ac7da7d39e533fc11b0d6bd58fca58fcfe52c1e728a49d575f08d0", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive3.tf", - "similarity_id": "5ae2f209d0ae608b893133bb7cc1bf544372ef6d3a06563a7193764858663f4a", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", - "similarity_id": "e05ba10606cfa215c5341021f319d454c7b5c602be6da75484e606a15d81a4d1", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lambda_function.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive3.tf", - "similarity_id": "a1fa6ded2e6186d02516f69cc904b5d18404474c08a41f8fbed4bbb7db1154f8", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", - "similarity_id": "b009ed5cec288813d215190dbb81b68fbed8aaf487cca891ac7c0f82018afcce", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/positive.tf", - "similarity_id": "adcbcf40ca30b9377c0d7ca9fa0cfec9bf12ba46ef26c96eb89cbd40abacf63c", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", - "similarity_id": "cad72a84374ca243aa1fc49f55ff07cf2fefe9e30942204191a4f8bbe6bbeca9", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", - "similarity_id": "534530bbaf08c1eb88cd0a31e19d768c5d5845af0606a6ab2cc6ed1a75f49940", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative2.tf", - "similarity_id": "7d1d0d72c4e437a486d8e53d198c42b07086f3a236d2069534b4f4b6e433e9d3", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "b97f935be5ab2b2049fe438a622f062c5d7e466ed269f20b24b7bb2d7725bfc1", - "line": 109, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "c1d527f6ba832ca4340eee6001d0d5e3843b2bfea626cc87b863f9c2a2db7115", - "line": 30, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table_association.private-rtb-assoc2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'private-rtb-assoc2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative4.tf", - "similarity_id": "b7b63adb265c9b4f6b3a9e08227630a85811f19fe9c4a50c524f3d0db0894bb9", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "8d24d238306dd69b2aa2af36356f85ade71fdafb7093a171ce58449719480b9f", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudfront_distribution.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", - "similarity_id": "e07ff69df6e2228fc5228e598ea4e148032ba3df7aa33109f7eb8f2a7c831efb", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_snapshot.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/negative.tf", - "similarity_id": "51a02386182e012254aa94155f280208bc1955291995ce8d05f1e6efeb82c98b", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_sagemaker_endpoint_configuration.negative.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "bb5573b8a5cd318882862f7a7546ec80bd9bd6eadb186c65dc0bdae50af42ff0", - "line": 30, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_endpoint.dynamodb-vpce-gw", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'dynamodb-vpce-gw' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative1.tf", - "similarity_id": "13a6e7ab250d5a93866caf906483a6a0cbcc86aa9e5306fab7a50c7e769d595e", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive4.tf", - "similarity_id": "90bd1241349c29013df87f86543d4c5338a9de2d2a089c202194529d9ac81b63", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", - "similarity_id": "a26113c4ca1c3180f2e8ffbe6ac65e358359c93856f02bec7388e48a2517fa3e", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "dd30a1007289f96867258b291021c33db43ad8bba51d196a35c8e344df8123a0", - "line": 26, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private-rtb.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", - "similarity_id": "f402c4feca474ab16da283c95b55d68f807647a97711424b00d48b367b1e2d5a", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", - "similarity_id": "59d8999c5b1c0b73d6287ac9db34a2c284426f63ba16487cc3ea66f48456a4fb", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", - "similarity_id": "9b4603fea9b0efded51619af883fadeb4ca8e2796c3cbc317fe015169899f64a", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'basic-dynamodb-table' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", - "similarity_id": "8bc01381c550271a155106eff2a3eeb4755544bd7dedcbaf8ca5bc3961676ed2", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "0b7d3bb60db93ad3ce03d3ce5faae191a9b8917e6062e6b556b94d9a5ac2aecb", - "line": 95, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'basic-dynamodb-table2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive2.tf", - "similarity_id": "02c2d91e73e579f962a03a512d2f698f7519c0016142135cf144dec1641e729f", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "6e59023006b47af8abb7e3a03e9e0bc42a3459c8094dc3016839b285a7a7ffbe", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", - "similarity_id": "90d5f9615458a7d30e2749da2b8aed865dd9b83cd172729788cc64fc92d134ac", - "line": 45, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive2.tf", - "similarity_id": "f1f08f7e1d3d2646727c0cd3a4db61e62a8df136d79ba27ec120b12f56ebdc78", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative4.tf", - "similarity_id": "39e843162e5ff9727d5d6514a55d842054f346ca1d4fe5fd057a3e7fd6e3b4ac", - "line": 55, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", - "similarity_id": "2fced3e4a432916241a8f576221a145f064e8f96afbe135e02e3c13db87f17b2", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "92fecf6fefb57bb1c1623b3f669404338bae42b864c0ff70abd51677d7340f38", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "f4d5662d26f3a08cf7ae53d520c7396f8e54b31e46789fc097737cb17897c987", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "115a6fa919db0caf4ba7e70576afc19be9bdf34d0616d9a5c8dbc03a17d807ac", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "3fbe4caa45c9ec45226431bd7079a423f495ae80914e00cd892e8a53f53398c4", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private-subnet2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'private-subnet2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "1a0a6cac6a33aa36edb8f6436c3ca1fdab04d59b15060e005906f55d46cc2711", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "output.kubeconfig-certificate-authority-data", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive4.tf", - "similarity_id": "16df3a8d925cc01b09f526b22a4966c2728398050fea4b15a7c056b679cfcaf0", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/positive2.tf", - "similarity_id": "e6f48355ee608a1a8fcdddd53787750b458f0d086ae34bfe2fcaea197476dfaa", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elasticsearch_domain.positive1.tags.Domain", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Domain' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", - "similarity_id": "63865bc2a7d9cca07948892098d7b8ff70d03aace87f2f54ffe90d2d36f09897", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative3.tf", - "similarity_id": "997d79f4d6d6478069252d14b449b1d5087f94ad574f471d04ac57217222708c", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive4.tf", - "similarity_id": "1c3bbabc1e9bb856f41a354cf9e04ca2b0d2bd3e4e5264f10caa6ae175cd45ca", - "line": 55, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", - "similarity_id": "c7ed64fbe5dc2463d7795b3170b98eceddf9e1724547e00346122d6581ea4d2f", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "2016ac07936cc7221690bcb2385bae2dee2d5a7b3b6f3c07c20d6baf248ee889", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "5b3f5a784fc0aa797a0c3260f6a8868e6406c3ee4fc72095c7c2bb9cfae4dc47", - "line": 120, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table9.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/negative.tf", - "similarity_id": "83ab6aee6cb6bb1dc6fcc0feb95e35a92e1de5723a7b9341e22d75597bda895e", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", - "similarity_id": "0fc372e916ff9c31d99aa7daa6bed16fea8cb781b93d135097bd8fd3b0c2ac45", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", - "similarity_id": "c723df32e44bc43710c9a900c165eb0fd6f6cd674f9841f3330724d87736b18d", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "578f053b1fe8d03db644bf8c4545334caa6e110372d800b7dd5f1046aa7eb9c5", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "9ef5b6e97b2fe73c97bd611b3670477e3fcc02087f95eef61e65c9bf9ce4c761", - "line": 43, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "1e264248f099dd9f2f1adc0d9fb46c9a6ff62217f3450f95788a52ce778d080c", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/glue_with_vulnerable_policy/test/negative.tf", - "similarity_id": "30b7a404e2378ef01afdec0521858bc08bece75f5f4b4947a1b56412f9262e38", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "data.aws_iam_policy_document.glue-example-policy2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'glue-example-policy2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive3.tf", - "similarity_id": "335517550c254c8f28ef87f90ff36d72acd5fc7584765cd49d19b91a27825df9", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lb.positive3.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/glue_with_vulnerable_policy/test/positive.tf", - "similarity_id": "6fb51acd7dae65fe0f10b45ff3c6a1598d3b1c6e12fbfd1567bdbe47191545c7", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "data.aws_iam_policy_document.glue-example-policy", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'glue-example-policy' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/negative.tf", - "similarity_id": "5435f54c7d2ab5431451961eeb20b9a840f0759e3a9eb993d6fe6e831c68357f", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Application' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", - "similarity_id": "6c5e12fc6e4b1ef1e35b5aa7d7743c375eb00458ccab3581c2179e877ca69006", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_snapshot.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", - "similarity_id": "4b40e2d979b4c375704860f0b6f2a242a16d68e79503b968eff4df35b035b77f", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "543566c34459dc9baed23a1e92c7a91601b3a52b4e1edc2ca2b7167cb4f0508c", - "line": 81, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "9f1561e249110a2eb98d6e0633e8014a3f466b581006039d366375a0edb2b00f", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative4.tf", - "similarity_id": "2a3b69cf0d0b38bf2e9fc9b91d3d73f7b560c2a2403b2a0a371a06b59a44fc5c", - "line": 47, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "0a4680c4155bf4f195e1de37443114af0af3035b8d1ee80e3359aa5c3782b413", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf", - "similarity_id": "a8bbd3aa541be1122e042e27e8a41648c0217b81a6fdcad7e4d53ededce4d28a", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.negative1.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "df324863f861fdc996801fb27c2ac160ee953487f9dd1a3dd2c3185f9449fa47", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", - "similarity_id": "9b80b92756cb3929f9377c92e4a78c31ffda04f50fff6677a2a67960ad261fd8", - "line": 44, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "4db5a0d916116da3db0c2f8b7c3d4f888da53a7118cde204a09835ba874410d4", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", - "similarity_id": "bc08272e483de6133c3972d89d5f5cc697b73f0b174bf95d23ba83db06575d3d", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "6701c8c45247b00ccc38b21f4e7d58e030da5fb7a082edfac3aadbf639106830", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.b.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", - "similarity_id": "315d35b405e64d2f728346b454b8ad3513313f1d965d40572585c59684d99a74", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative2.tf", - "similarity_id": "7e6e469548ab15c9b630d93702c192cf750af1824286216858cac6864756f8cc", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "e5591f70cb580b0636318377db81aa893414926a4536d1c2e2b05c83bac37453", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.b2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "52387728fb1b426381d4b03ec2945cdf30f79fa0a25586c5296d025bfb0b66ed", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "ae99cbe52e6ae4dfe3a752ff5f97c6cb479becd538a14016c156150441161af3", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", - "similarity_id": "c7f18bd787ef199d572dc295afc618c81ded903e1547f15021ce435375ccb179", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "8692f7785f63f1b48e79c635a2bf5f18ec124633ebb8e6063b373ab9ef820edd", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.allow-public-outbound-nacl2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'allow-public-outbound-nacl2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/negative.tf", - "similarity_id": "dcc696a805aeffc368c853524bf2c3afe99c55bab284badd1d62710d2378de7b", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.userExample", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'userExample' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", - "similarity_id": "2305867ad6af7819e9178eac0212185894988341e60c0f274505347e0177cc93", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative2.tf", - "similarity_id": "3be9857b94358e25ec990e4471a1758d97a8ce78a36b3345fdcdd22998960c17", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", - "similarity_id": "17c64cf7029f4297d715def886fe9e7d6fc33407a97919a71837b0ffab378712", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", - "similarity_id": "8cd17122f46c7255a99d96b62bfcb258d0d6bc37a5104ec54ce074d37853d80e", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.postive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "4c3abb074b26e247e977d1b6e1f22e799ea6b0ecde5ebec8928f195120cb676b", - "line": 44, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lambda_alias.my-lambda-alias", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'my-lambda-alias' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive2.tf", - "similarity_id": "6940f3331000184314ecd23763aa2569eec18bff94aeda9f55c8b199997b249f", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", - "similarity_id": "d3569df7c7089bf700ace4ca9be7b1b47bdeecadc6fc087c91818bd5dc3f7853", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative2.tf", - "similarity_id": "8a8aa0027c7f559bf41b69886f952c4b6f545057a731a4d481e8d9aa3a5a6142", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "8727cb1342900da9828e9e40ee067baad48f80c95f12015f797cb5e7dfad9865", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "307133df1a9eaaf2a9a894192979d5c2cce95b469c9a2843208c67ed4a4a866b", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "1c11a4e31aa27b613bdd81512eb81677a12a1bc68a12e21b4bbf1efabcd7828f", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive7.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "3c9eee6c40066f4208558c6dd062ef75c0527be3da1bb5dc64a943491e111810", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lambda_function.my-lambda", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'my-lambda' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", - "similarity_id": "4965ca7963e398ce980f95421aa1691ed34de219ebbd5aef6133eef7ef18c681", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "7b37e20d023bc73ebae63d9d915549f6a81995002e1da35b71e3f7a0761365a2", - "line": 109, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "b378c350f5429c1d55e9a741c825bc33f6d72821b22673cbfbd35b9765b7d1fb", - "line": 72, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative2.tf", - "similarity_id": "e9bfdae6edeefe5124f657ec2595fe2231da1c22544702e2dd7bbf3066fbd991", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.negative2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "5f1e8a7f4cf4f400779ceb78c56d1a026046038cd9216eceef633dd78a6b9d20", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "50eb74bee9847068263b1fbaa5ec8a15be50e00083fa6c360b4c5e9a25a4f8d1", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", - "similarity_id": "6700c65754d43b1b7c5af030cad1eda541df170f09a1148217c23c4bcb498b88", - "line": 29, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "35bc24c27cbf6028087431b2d0547aa530801c1950c5826053dc803b6aa219c7", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", - "similarity_id": "7df1c0e324a23ee700498c6437bb4681c4269bf2549fc84f9439d760497e541d", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.positive1.tags.Application", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Application' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", - "similarity_id": "79e320d298f675caef40d6834b51859ff7d7e5c98da3d2e5c8a7d53065371a74", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", - "similarity_id": "5bcb4cee3c5dcd2276015396ce014c7f85cdff59e25ac4d965538a23b4ab254d", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", - "similarity_id": "90fc9819639a5011cc4680666a0181719b8e362abf1f8d5b795f871ced034d97", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "79af0142188320b4d4fa10a9c5066d0d39139c8a9cc66e21ceb5920bbcb9dec2", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", - "similarity_id": "6313a2e3c0b81012471fed174fc95dec308473439ef257af0d6fef9453f03417", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive4.tf", - "similarity_id": "f94f311183fc69f4c6f7d065c72954e45caa8ba74be0c7ecd68009a0aac56cd2", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "module.vote_service_sg.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "5ecda317c8ca9e9703591647b06101cab2a9f099b118df11348d8295232a111e", - "line": 128, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "44fd738ac7f4d209dfd9974e416cf57f056c17267944ccd901e8d0ee47224e58", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative3.tf", - "similarity_id": "26d9a4487f88cb6e51d4e86b1759678630375dcb110e734d4caa85a0febc0874", - "line": 56, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf", - "similarity_id": "a7318b1050592de8fc3fb2cc16ab17ab036a1f67aa8ed94c4e7029a7c77c44a8", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "d7878d9eb2f59d9967676fa7f9c8a3dec90fabf418eb71a937ffccc733821448", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.b.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "b5beb5a66ad803dca65033e776c9ad4cb4ed31b71dea84a540cbefd7edd70100", - "line": 74, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", - "similarity_id": "59c0dff398763a7cb48d138a04cf530c5fa794272e51deb6fb7c314c157d7563", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", - "similarity_id": "c54d5238ea84469e82c1e2b2c31929dd0dd58f1e8a13ade04fe91b20e910afd9", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive6.tf", - "similarity_id": "0c34495723c23ef97668ade169f1ab09afc6672bd3dbbc8703a3d7f7a86c8b6f", - "line": 52, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", - "similarity_id": "f7d216c761e69bf844f8c6aa738ec9a97aadcc0e3ff00bbcdf9d2336614b2ccc", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "2a2a12e5942358a8e43406a8dd050a6cd12d81483179a5ff99e8d1cfa375043b", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "6c7ee2583e3eb7c4fce379906053297bc8079049b8d94b4c4c83155178eb4bc2", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "3a1bc2ab7f01307adba959d593a03ffbb4aed82e558b8fc3c70d859c3658a5b5", - "line": 81, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "7e39d4a96d279e81daabdc90185fe295db8c3bdfea22f920a6de323b8b1cbfc0", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", - "similarity_id": "9fd3ee735208610f9635877a32761b4896e3a1a2dd3d501e8c0cf604f0e6ddf2", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "d2f36bdad7284e64fbeab52855ccf892db7869fa1487e48fa875327db858b8ef", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "50d6ce1290c3bdab1141c9e5f09dc16ad731c4911e52c9ea8adb8e72e47d271d", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", - "similarity_id": "98e90a87c202ec9c754db27c109172c9cfdb9f7074d0613948a7668e65854076", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive1_1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", - "similarity_id": "665065c79aae79dd43577837c58312c593ff5850e98d1073c79c48a24bb8ab7c", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.public-bucket2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-bucket2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "e9e1672b6892444cd56bc6806c3388762a75bcf84edd0101249dcaf2a57a7f89", - "line": 87, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.test-ec2-instance", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'test-ec2-instance' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "f0aaadf8963c5f5d97718a01354553608ee32d1420a797222c59f7d974bb1fcd", - "line": 83, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", - "similarity_id": "2cf5c44aea2385f7cb78aece4a2df75499316cdf84446a72820f3ba2a7e6de93", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.negative2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "c71dcc8fa61cfc0acc63db2702b0a31b33bb2302c4aca82012f142677a0de253", - "line": 120, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf", - "similarity_id": "b388eeab9faa9631be82b30b45841d72c751699cb6ebb8415e6f512c4378ba60", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/negative.tf", - "similarity_id": "475dbdc0756796195e226f50f66f73246fc28d0671e0a2958dd7ed5a1a8116aa", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_kinesis_stream.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive4.tf", - "similarity_id": "c23a7f01ef82b43a0217acbe265b42e2acf278fa30f99c4bdf8ea04e6701743a", - "line": 27, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "ccfc5daf780a3789815c06fceaadf346a147dd09bb489bfeb106edb9407b3d6c", - "line": 154, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative2.tf", - "similarity_id": "38ed35d4d3a02f36700f20092c885c16472af6bc036d8a2c83d6939f4bfc3e5c", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lb.negative2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive4.tf", - "similarity_id": "a3fcf3d04197008fb3e7f4f813613df56470885b3e251f4374834cff846fa617", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_lb.positive4.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", - "similarity_id": "1500659d619492c204a4a0f7b322096af37cb86bf969fede192390ffc99cd619", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "19d10d7985021871f6033297df82ca5d22b1582839b12f5f83024c731c5cbd00", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "0dbafb3a8863ff274ce05aeec673b3c1854f5616c493be6c97474f5d80d43762", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", - "similarity_id": "ae713279a1e484fbea5893a4654f8c5c8512f1309cf6c11b73c358391423fd43", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf", - "similarity_id": "fdfa2c9bbdc0bcdd6295aecb3e26bbdc0d6e54cf3e1b7bad7336c3ed4034e671", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", - "similarity_id": "1751a09807576026912e4b78b26b8396e31e4e8734bae6b3e8b889cb5f272525", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", - "similarity_id": "4031d9e9744797bc74017041774553f93773c80cca47b6b044fa27085038dff9", - "line": 47, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "47f3e04d8a0ec915b1f2e3bb3e765afbec536f003daed8102eb3dba2472d0f33", - "line": 94, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_endpoint.sqs-vpc-endpoint", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'sqs-vpc-endpoint' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "0713351a31886f46d6e90b8d94acb01ca5989eebcc800b9bed88bb5137a6b88b", - "line": 74, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", - "similarity_id": "73edc2121b46fdc84b7d7604b925dd7cfb2256664251f054904d2d9cb707c000", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "086b60bb4f6c14c070bef48f0ccd9ee2b66850e8945a46e3e8ca597fce3cb7d2", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "2eeeaaccfbd6f5f73fbe310b3afd9a62e2608da129055470cef48297c4d3fb10", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive2.tf", - "similarity_id": "3356ec5b8eb065f1eec6765e2209ac7d1c49d6d7110ae1f4aa92ee653301de42", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_workspaces_workspace.example_2.tags.Department", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Department' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "24e97704b1962ed61091f0925cbcd5bc4a5b1125e1ae2bad3a2d6fd2599d240e", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", - "similarity_id": "ebcc61a27164a010d47be050245a8ff191b806f8fd44351885652cab1a89a9b5", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative3.tf", - "similarity_id": "32b5026c966424dbfc66fc2e49a99d954c5fc590b696474084111f9f72f19edf", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive4.tf", - "similarity_id": "61513477be63d8ba943737da51d33aa2938db14dc24c3d02a7eabfafa162fafa", - "line": 28, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "2a58b5863b6307644c7b340a03f9c9e14f231db63449673d459ad63b1da34894", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "6fee34612052885b14eebda817edf162609452fa61ed1e8be30eb36fbd6d77bb", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive7.provisioner.remote-exec", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'remote-exec' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "e78c7b2c62dc82ca09bd6e0016271759404f4724d991198aae0de5aad8c42e06", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive2.tf", - "similarity_id": "a9ba0ddf8330288eb9998fb5f5a4f5a97322dd69d16f7e17223f37ba9bbc4cd1", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf", - "similarity_id": "26783256bab02b2d28c47d25e504869d83efce0f7204fb461df426456d5bc975", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "9ce5ca32d2be8cb4b5f4314a216e0e70861a8c6f1d9c2fc212d1bb78e79a6528", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "786e8be1c2459e36c29182055a1667bc7341067eec4f57087c31691dc40819fa", - "line": 138, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "6a4fa4e9f565d7a4d2dc935e6d126cddf951fe3784f66a5bf0b13e0763baabcb", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", - "similarity_id": "a0553459cd189a443d1cd7551efdf928db7fdc2a22bebfd9c0cd06973d2c64ff", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "ab78a10ac9b26928b3121277a3b56019d3dd5b47dee3631356c65cf3bd057d66", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", - "similarity_id": "9b1feb92247beb372cd45bff6bd53826f5e18a2072d08ec23a5d462d07f804e1", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", - "similarity_id": "17e519c8770e12effc16888f36d1cc90b28163a4be772cda3adbed539da421b4", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", - "similarity_id": "d865634b9d7fec4f1350d46129fa0a29400c4b8eb8a60870847b87d4573ab04d", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_acm_certificate.cert_2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive5.tf", - "similarity_id": "7ba8578d93dad4cd4aca7634b4d4f7369a9ef4ac9a3c7f7a6d8fec849c813fe2", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative2.tf", - "similarity_id": "865681b89ae6bdd0b67a48a3f86045dab83880633331946003888b1ba91bccdf", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative3.tf", - "similarity_id": "a46cc9f8fd0900ff2ee0d26369a66590ba7680006f1fbbc8d7745aff62d97575", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "0145f3e78f8ba61031ac13495d6b874847d3b943ad067f8198f6a2bddd0f5574", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive3.tf", - "similarity_id": "5d09e2551e958c561c91bd38bffd0db21e18af2266dc24a40b46ba5b2b7280c8", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "9dbba7097368f4a80174261a25961e02061607a7d703a1f977f367c6fec3caa5", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.allow-public-outbound-nacl2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "bb1ad36bea3ece3f9f013a8aa9d661f3c9407ffa0f7ea46affb166fdc818fd5b", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "60d6d83b0af93cefe084157529684dd4318170927e7fa8d72a2ef5fd0afd1932", - "line": 124, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "2af5a4fe03d492ddb6482cdb9ba9e466228470110b1c709a9df627577b9ae88f", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", - "similarity_id": "0bc12158e9d52c8b79fcdfbd4a9f69491133d3c89f4047a3be5c0f1e2e797bff", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/negative.tf", - "similarity_id": "ebe2775b4765d5fcb5c839e3b2f166403e2e86b9db7aaf036bfdec4e15c5e572", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudfront_distribution.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "10c0ba75af25933a1c4becb17dfeca02ebc42834bddee2853eb47b6221821480", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.subnet1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", - "similarity_id": "951db50c6b1762169a16b25d2c63e2903d9c2290b300d3d9a4d558b667f5e213", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", - "similarity_id": "a8b7997808a56c7980cf6dc7418f3b256eadfd181d7d3a6b0b42fd8533eac280", - "line": 21, - "issue_type": "IncorrectValue", - "search_key": "output.kubeconfig-certificate-authority-data", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/positive1.tf", - "similarity_id": "535f8bcbf9da96199cad5cc9e489e6fac5655bf595e2df3a34d99dc6d270d494", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_sagemaker_notebook_instance.ni.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "dd38ca482ff1c6c20841317f063d6d47fdc625a0853fc6413afb8e27588d1211", - "line": 140, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive5.tf", - "similarity_id": "e6e587afaae6f76ca2f61e611d1df4a9147e7305f4060e939c936569f2bc5420", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", - "similarity_id": "3d94bca96c25d76ea9f1a5ceda19ef7731508bb0146d367d7d6880216d7bafbc", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf", - "similarity_id": "cde9a2ba0cd2d31f64b3a2e5eb3d523c9994c07d3ca85444fe485462963a71f8", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", - "similarity_id": "93fc580f957201d5f6ff91befbffa2f245cc8a50abb18e342ccf65abc72e3131", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", - "similarity_id": "3687bfc3f57e70c120f1f281830ea8ec2236d419e8e70ae424950647bc530872", - "line": 21, - "issue_type": "IncorrectValue", - "search_key": "output.kubeconfig-certificate-authority-data", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "8b191b4c530e73f78276ac957131c580821afeaf906b0f0a34b1264b7c37fb66", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_api_gateway_integration.api_gw_int.request_templates.application/xml", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'application/xml' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "8eafcfef5ce81e94bc058735983a7b3867152a8d62c93875545957ee980284fc", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "e0cb274fe578ccba2ef9e68c45c5c8d23ae1ec259da75fca5f6a882bf1e834c2", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "d2b6898c08fd6e18d56623025f8860f938a0ff4e1b468c80b49a15a69b5390bf", - "line": 141, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "796361a3c2e697f13d5850a58bc6fe8834dc8e8d8da8d3a7bf9cd0a8dbe0c7ad", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", - "similarity_id": "0539d229456ae9a9283e17c97a519794c9c175182fe32f47820f98da7179dc0e", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.negative2.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "8f6ca9855836897a2d8dd2742032303594a2382820111e672053ad25cb2cd4ad", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "1fa8f748088eb81af5ef4cfc38dac2cbfacefdd3c89f0c24378719088bb2ce84", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", - "similarity_id": "59df7a4bfb60c69399d31853f248c62c7e65c4af3ffd6ff5bd069ec7b7866b58", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "6e6970ba502f16fdb7c075665b14de7d352a766d2c46c263dd53c2935a722b7b", - "line": 109, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "a39ce5076b8c868b51c3a365f1b1200996f846b329171ea312fbd488db067a1b", - "line": 141, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "e4e52aac31400727fa2359dacc89a8f020640e8b89a5170c6fb0bf7af65c29a5", - "line": 83, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "5bccec8da5485b97289e45302101de755e8ba4e509bc839213a2dd395db0b331", - "line": 119, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table9.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive3.tf", - "similarity_id": "96048361e52f0229a1a0f007f7f87b13589536671b340eaeeadaba680b91ca7b", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "module.vote_service_sg.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive3.tf", - "similarity_id": "b01a895d3c2f78e13a0b076a3b1096b2a65cb25d98a83c6c83b1acf7f74eabf8", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "7a96583ac13c4c601573f52c5b8c4783fe96e8040e3b100963894a2678c5c3f3", - "line": 155, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "d34a1237e85bd0b8da1b0f159af81e6580e77bd1e4a96267fc73517404c96021", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", - "similarity_id": "290c24060b9368587858021c60820235b0ffb21194d5c9f9e27ffb7326b07ade", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive2_1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "534d52020b8b62d50f31264d52899df584867067cc5947ed2688ebe7a2d47cf9", - "line": 45, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.subnet2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "6d8e7f4e7e86c7fa5553db570235f9b572d7f8df708bd276058f8d0b66c3c136", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "1619c77ad66fc3283a13cd8215d4a0392d36fbc5f5121b22e466febfa1f11141", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative5.tf", - "similarity_id": "814bb0d304839447b58a2d7421c574c026e58c6750ec8a53d4d8bce60fdad133", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", - "similarity_id": "51e4701d93a00f6c769b722fb3f730f102f08e19ff8aaf572aef0479b37cae41", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative3.tf", - "similarity_id": "7ba565ca3aeb22afb29ccf57192052943c34243394659afe2a7bf93031eaea3b", - "line": 46, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "de74887682ba82a259d48ae5b4988dfbfbae18c6fadb4deb5d63bbd8c40cb7d8", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "05401ddc1a4c38edc2470027615a889a75c5e47b5e1b9eab15db14d8c2dfe701", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_public_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/negative.tf", - "similarity_id": "6059faf1f4de7fe0636491dee6dbbcd8083404accd85c0c04f49ea96743c47f1", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", - "similarity_id": "4c4f88f44420d277b2a6f58b9ee814c57989b1d300cf1663f89e6020cc1aad43", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.monitoring_negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", - "similarity_id": "b09ee313bb93c1cb09fa18a46aeb6878c3951fe7f72c96cb63ac497acb83a7c8", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "69910aa882a1c6bf4131a1f472a875059ca02027f1daafafd086c92691bb08ef", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", - "similarity_id": "d8fda90918cabf8cd22240df33aa517aa2288f4772b41f5bb1481546c1d43851", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf", - "similarity_id": "7e41185d1103bf9b5c208e36afd3cd3df4db9d46b5af13dae2113bfbe3ca0647", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", - "similarity_id": "247a223eb12a95581c4abca3a3404706aa8ecd13b7d0dd9c5a2799ac77157834", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive4.tf", - "similarity_id": "f1255825ef16b08d3252268918ba10d3a9a74bb214d709cfd703fc4393bd3bd9", - "line": 28, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", - "similarity_id": "7768b79599ca82df2204d6d3e92a19b84b6938a99ed28d4ca223069edaf211f6", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "d5cc18c31b11f5629c2664d404e2dfd30081a2a7f3b085a34b74809fb394687e", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", - "similarity_id": "c18d34ca26d5a4ecb9e0c3196a7b0ddb5db68d8211d5a3d0aad033e2747559d2", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative2.tf", - "similarity_id": "661a5184a7bd067625cda25044441d4455b9871ae06b8fefb5fedef16d68652e", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", - "similarity_id": "ccf18e0c8d730fb13c9e865646e25a4d74b1a4df4363f83f23ccd3ce4ab1c9b6", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.monitoring_positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", - "similarity_id": "fe4d74cbe2c2b8069e87929266fec56bf8c0906b0c742064297203925b54a71d", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/negative.tf", - "similarity_id": "4a9240a1c9d160524ef27c114179c4e6e70b1c62d7e3eafd3003e0c0287ec51b", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "90fccc757a5a158b6e222b2d98ab2cb59523cfab8a273060faca15520cb63957", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "f4a1af720b89ebe65f1d39757dadb99840aaed7b158e2b8463c146f7ae216bd8", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive1.tf", - "similarity_id": "6d9456a2b03df937a09ffdcd98a93ebb6a32fef931911ae34a0fd19882cc6524", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_workspaces_workspace.example.tags.Department", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Department' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf", - "similarity_id": "fda413158e2f207b723acdfc8d5d360ba77cbfe2f70a512f9e9aa78a3a366568", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'basic-dynamodb-table' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", - "similarity_id": "280a685aad832b1588fb92d139adc43ecbfc827714c5eeb7e050e51da0f6b6d4", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive6.tf", - "similarity_id": "2226b388b5ed87e1f649c05fa9efcb602c73e47ca32dfa9479b4a9d757333494", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "966e241f56dc379851821623812c4d65ff9dacafb489ce07d629a17c2b72c7f7", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", - "similarity_id": "c52f47808ac3afbce72efcf7fb9997732bd3a32888de579ea68234dcf2b5a88d", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", - "similarity_id": "1ebe83b7020d30e1160c5b96b4cab37d9ca97a8f2881472fe36d6c4ca5f7f892", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative4.tf", - "similarity_id": "cb7d75e0c0647a3abde82049494fd1f360c5513d80554e3b77112a6f9530faee", - "line": 48, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf", - "similarity_id": "1e95d4994b101b5e32dc18dd60e6273947f7126b85690055781a008e9caec078", - "line": 48, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative2.tf", - "similarity_id": "897a1f5a3cddbcc644f9672c3015c60515a2177a95611ee43cc17a49aa68e383", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "0a3f149ebfa1742f94ddd4da62fd1a0252ae3b8a2ffe13823ac752bc2003d6fa", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "5e5c011c45bf992ca1c0e946ef4b4bad41051ed3f73c4209c80e0edae6ffc948", - "line": 140, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/positive.tf", - "similarity_id": "ac217e2028c7c5a0ed93bf521584f165f86644f83e4272e3146b449881048783", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elasticsearch_domain.es-not-secure-policy", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'es-not-secure-policy' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", - "similarity_id": "6845fda5f141490c132da03805391b295803f49ebe2044d974371bee395a3785", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "3c17c0b7663cf62b436e93cc64cb01465c1d907b7d2201e2e3d30b49c6d107bc", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive1.tf", - "similarity_id": "22c53730bd093a452802b3c2a60e284a719960a57af699c6ef5641a9e2e54e47", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_alb.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf", - "similarity_id": "d3c5e661aaf939bab5ebb33c2cdaea62439f28215261f4e8d951764eb0898913", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative2.tf", - "similarity_id": "c9e42c3dcdb8d4229fbfc51add88d064126d202a1f3adb480ca981e49bf21abb", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", - "similarity_id": "3ab313038e15de5a7e6362ac4a2cd78a7e933c2fed23e85d31584572bdf9a4a6", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative4.tf", - "similarity_id": "ecc815f005003a2f9bddba2729d7baf07a5b6b9eb0d8725b76911c95c077815e", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", - "similarity_id": "8d137c6a9b7d4287a2d55213b065d8cd48058a0b2795c3d817a1518103ad197e", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "a5594e333c1abded154035adcaea38a80433cc5662ffc6cce3979f2a286418e6", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.subnet12.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "413bd74b0ff0fcf83a19cec882d1728b4f0a7869f22ca74946edbef5858f1c3c", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/negative1.tf", - "similarity_id": "28b1ed5a657f2dc08e11d3227e8e64abecb41c026e44d12da0c8434841c0c10e", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_acm_certificate.cert.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", - "similarity_id": "4ea82e2739203c6d392fadb0512dc76afce1468d9e8cd218673d32434c719485", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", - "similarity_id": "996de3745e0aef295c015a3e1f387e1501402eb88d82194c741d0222f1a7c0b0", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "7b5a2b08e20b0176ac4532dc17a6651e22a0a3da4841b8aa5238cb2ad8197702", - "line": 62, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_private_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", - "similarity_id": "5557f670f3bd973320cb018ab3ec77586d6407db810e337db7d5f669ca2adf3d", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "ce9b4e603f587319f6f15b26fb9e52934fd0710171487325649cbe66a8e5aaa7", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative2.tf", - "similarity_id": "54712e918be38f49acb889405d78e2fee1ea5634fe73bca90446b1b52dc9f881", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "a5ae0df3456797bb05983d9e53288ea82f2a989b5e5e828ea5c302459b50cc53", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_private_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", - "similarity_id": "1fa7108e9c0d97851e5894c16f036d6f16c0173bbc8f362c9565b03c4f78ec72", - "line": 30, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_kinesis_stream.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "7a1d8eb9a680a4691cf0ea4015b191113d937e42be8db6bb19f29d31a7844082", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf", - "similarity_id": "0f007a9455e1729085dde42e8be9a029be2af3d3db7d8fd9888c1143b22a5fe6", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative3.tf", - "similarity_id": "8e906c3c4433cff6db1ab0df4ccea9290ff8cfc5648c1aabbb2105579b7be46f", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "d13e2f8f59828e5b06b6c001dd8c13b229d8c246e982737eb35e4322d3cce292", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", - "similarity_id": "78aa2b2c7a7ed650b37a9f3ae619936f8108c472e6979ddc79ef4dc53b812bc9", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", - "similarity_id": "59474ac310ff3e312c3c5e83755ea79b0491ef1cb94a7e62601cab6ccb2b2bee", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "7af1a7a8f16d9ef6fa0ccb24e87415319c739625476a7333728ba8b970a4391f", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "f1987bd2b09c6fec35cf39af0390e550b503b69cb9bb23d31285c65e40b8c6d6", - "line": 125, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/positive1.tf", - "similarity_id": "fc353689dbd5c0155f6ea75bf400d851a19605ffb291640d5256ac277626a71f", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elasticsearch_domain.positive1.tags.Domain", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Domain' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative2.tf", - "similarity_id": "1438039068adec548cb6f8d75064e329e1d47879952102b960f42318f90f1e26", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive4.tf", - "similarity_id": "14f33de475da81042f047062655adc3c7716ad3103129905df6dcd071072347d", - "line": 27, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", - "similarity_id": "9aacb8137eb39cc4d1814e42b95d3f420f04d5e3e24ebb43ddd9d737190e6f79", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "1d350da01814403119fe99a5b56fc712d8d0a5a24e4a2c284a00e25bdccfc55c", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative5.tf", - "similarity_id": "516a01ad96287f750e48673142d11ecea1506b3158644e602b06015946792121", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive4.tf", - "similarity_id": "5c93c1c5f8470842e195e36035d647281036d20e37d7064e06d7335567875011", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", - "similarity_id": "237c385deb9a955f374d9f5cbeb1d983b299ec72916c0aae254a2ac6df91791f", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive5.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "6c85770e140c37d85b6cd1026f56a222e92c974e8b4436967e8586e1a6b056d4", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive9.provisioner.remote-exec", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'remote-exec' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", - "similarity_id": "23488356cc9a8a8e583bcb9a38da6d475687fed5de19c230e88607d27d00e997", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf", - "similarity_id": "9b9bc7ef9bf98c5f140fa355a82d07fa71e0e7f57ed25854cbeaf772f9d14a18", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", - "similarity_id": "5cd6e6ee41d5ca6b5375e464175cb57df467ba338a385134d28573bc16c58475", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "088680432b2b90e671b309f40ee800fe0f3f6c4f748dbf88daa1d8c6cacf61bc", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", - "similarity_id": "2257c7935ebeeeed7e3dca56da7ceb31b239af28dcd861f14fc904f822f8307c", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", - "similarity_id": "4f8b88a0b5b2f97119d4110f1c7720d8498d6d649301e8d4b77b3e3165844c92", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "01ab6682483e44c8da35b270ba78316099089e1fbc636f292117f28332e423fd", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", - "similarity_id": "f9074b75bdb9a8b2c59bc02c1d69ee52d8aea5b682b12ca8864f4dfd1d780641", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "a9e9c79f0352a77dce970ff96b136fe437cf4361e5478cfc688e8c3533cdf24d", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "b8ed73f39cf91709def8340811684935697a0c336a51d0a5e5129673cd811711", - "line": 50, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.public-internet-sg", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-internet-sg' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", - "similarity_id": "881383a3d302e15cfae862e935a261a814e35391573778a44ef9428b76614cd5", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", - "similarity_id": "abf47f74f66d46c4593f2bd59d7a28dd7a6613e857438c8e7e4f8b1565d18da9", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "0299bce254290d328037094c61ead9d91f750e65784cfa320b877eeaa9a9e3f6", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf", - "similarity_id": "6091f7175c621413c58fc9aded221821ac189094270ab30b1695af6c93fff319", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "b4cbddbc3f08e0e04af779e43310c204b7ee87bc81cc2bfd16b2213afca79290", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", - "similarity_id": "f86ecbd26c6d6f8df31e4a23bc1624a91a261ca53039ba52ef921cd9bc1cb82c", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "cc1f0fb5febd0006201a1445cf2e80ceca05ccff9d628615d2a63eac807cf5f9", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "8d84148dd5aa82e6da577edde1253d026295ce33298d7a758727c8d90f032986", - "line": 128, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", - "similarity_id": "b97b93d0e270367bd986746f55c29d644c4d1a6de1b6b974f64c591290feeadb", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive4.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", - "similarity_id": "e25ef56461f4cfc4a35f0bfb833300a6b67317f44ed74b36b597a0a069155801", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "3a1b1207c276b30a6b7dd204dd92d69b1a6b6dc360a2bc516b0fc2f96ce6603b", - "line": 124, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", - "similarity_id": "0e5f5dd251a8c4c3c1eed56f38e05c74fc467fdc5f3f6951c808d24816742558", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "8dec0ddfec290c778497e7abc4bdede17380ae014503cd7dcc68229324b5b892", - "line": 49, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.allow-public-outbound-nacl.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf", - "similarity_id": "a67ad7d78f629f07e1883705e58ae8599c0376aefd83a665523fff1b6bd93119", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", - "similarity_id": "3e3a29ad1782acf9bfd81cd185feb55c1c151144734532dc55c48cd7c25ba244", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.postive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/positive.tf", - "similarity_id": "5ac7bf30867e4d4a7abeb2e3c7ad1ff8d5f3f730455335907c3e6e80107f78b5", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", - "similarity_id": "0ea51b51a68437d9d04828db1aa144a786086a8fbe7dc7a0d274d4937d8c419b", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", - "similarity_id": "884fb8990831f55c09a918fdb3d80800b4920c806cc516368ee744f8ba111bc3", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "8aba5bc0efbd23ba8aea9c60850cdaeb3a835123c19afef0b92654d8ea5a7a75", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_role.lambda-role", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'lambda-role' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative2.tf", - "similarity_id": "35fa9c039f38a765fb4e599851cbe9a51b8a909e4c2181641354650b745196ce", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative4.tf", - "similarity_id": "7cd7b030b965ca46dfd68eed2aa656bf75941c7939c351d76727e4bf00d38b99", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "244c45d2cc5700749a37d9782668fbe9a1ea07ffcea1b8086f976ebe3a69c1db", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public-subnet.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "51e0b91b0ae5c7b2ba55f6e9126c084cd7c3324b703255d7f771e392ac97b868", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "b07ba524b51265ff7600fedc1edb1a62679b99a9dedcd14c024615068529ee0e", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", - "similarity_id": "971ba337f9f2288085c8606f33a7efa94188e3494d0228849fc1a539d16bbc09", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", - "similarity_id": "8385903249e281686df8366beb1be4071322a2fbfabcc8eceb8698d2ab49b5fa", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "fe5e3fffe0d67985688482b99a3a6a0b27920abfc40276a69a39bcd6244e7f5d", - "line": 125, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", - "similarity_id": "51fdfb929f1945c31ec986b2efe7899f71788fd143e1533186b2de6820fb090b", - "line": 45, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf", - "similarity_id": "b0f97b8b5bea6a929c0ca131bf038f85754c671a3b7ce546c0b8de26a1670350", - "line": 44, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative1.tf", - "similarity_id": "1429f2b9c1ae90284653f0fc6fd8a5f5be7c4ec53a93c0306411d9fd74ead226", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative2.tf", - "similarity_id": "f8b2a8c00f824b0ddeae1b8fc9e6f4de23c7bce93b7939810691f29318d97fe3", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "module.vote_service_sg.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", - "similarity_id": "16f99359b3c70bffb8ff5da882861157798754723126d753896f61f1e5b2e62b", - "line": 24, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "346acd27d0cbb20747438450da05d5534958b1f1a2e09e2f16b60eeaa2fc41be", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/negative.tf", - "similarity_id": "3bd234eb3fac4a5dc78db03314aff25acae0343da7ad35056d4990dac296f420", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", - "similarity_id": "929f970c8183dd2f80758778ce519f3f1fb1ffc2f7d5e76c801fc8c91902df4e", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", - "similarity_id": "69bca9cd4301fad25737f3fd31ec40cd41e067663f8ef19345c5cff39fcc9b63", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.negative2.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "755bdf17246e6570114eab6bf577ca6f70906cbb734bcf94b58c65de0a40abdc", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf", - "similarity_id": "348251ceddf3a5d54a2adcaba310895ff1bf9f065e6fbedc0197410524b59021", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", - "similarity_id": "f0ebd8c0a709baa5e15cdd44ac726a37c823c2d9b3c216590af17a92c8aa3bf9", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "a26bac5a4a656b1b93f8504926dca938589e6deaccf955c507fa328056f160db", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private-subnet", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'private-subnet' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "96f546c328b671362308c95eb60a5058f658aa783a826fa0886030f9cacd7853", - "line": 154, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", - "similarity_id": "85bd9583cd68b68ba4c4e1d02d691450fd67ff1205b28cf5fd0514599fcc3281", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", - "similarity_id": "17d941f780e9b573a11195a1486e4442632d4f6316f66bcfe4fa6cbeb6ee929a", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_ebs_volume.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "2aa7d3da65a556a6f83955b30c3dc39b8f4a19039f62ceace153891e326ca553", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative2.tf", - "similarity_id": "3e9790f01ef4a507bf67628892de9bbe569f54a13b61988d7698d684005ad4ac", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "dceab47076ce6cc729e99044b4f4058afbe381bd12903408f18b52d1e825708d", - "line": 40, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", - "similarity_id": "e8925e812be454f72e8414c984a7069d01708911ba789b1a397e2388f6513735", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "b839bf4dd2a0ba1972a53ac741044af0c29f0b2bb284e42140835f174c40672f", - "line": 103, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_sqs_queue.test-queue", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'test-queue' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", - "similarity_id": "c01cdfc16065f5afc95f76a609b5abb14234662b6c31f4bc4465f42d461c4ca8", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", - "similarity_id": "de4c6414194955b94a08151b094ba30deeeebb73f2baa4e43c0171ce0fce91c1", - "line": 34, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "4284323071233b6bc105046bd70d89a5366894f21eb165bccfa7ca671a2e3100", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "b342c95db84b35265b809be3ce99c8f2476be9cb1ba5e6a5feb378e06cc5cca5", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow_tls.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", - "similarity_id": "a9ae1578fdc440251309f785aa6d04323bde53c17eaf0aeb6e40c111abc2ed4c", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.monitoring_positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive6.tf", - "similarity_id": "6e85544bf3ca1733a04cd0193415955b56352017c4a6c546085ecfa324410395", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf", - "similarity_id": "49b711336aaef0a47a4f83e67b8a9ac43dd97a6b679b3ad5b2711edab751f593", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf", - "similarity_id": "36ec454eb71fbafe09b93c9182ac449fcbc4365146bacd601f5e3ab4660ccccd", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'basic-dynamodb-table' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf", - "similarity_id": "73f8331c923c1a1cdbe7ed7c487277eef1535331a3a0dbad669bbaecfa396d3d", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "42f20fa8af421ac9a575c2291a3f76e5dea2b8bc9d14521986495b31812ba6ed", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_endpoint.dynamodb-vpce-gw2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'dynamodb-vpce-gw2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "7412bc25b1411dc579ff7c4a7f1e1076e2968b2ca2e0db59d0d8c53ce732ded1", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive4.tf", - "similarity_id": "08f04d68018af2808b97ebddc74e895cb7e1658fac24d700ead7c92deb09f847", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_workspaces_workspace.example_4.tags.Department", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Department' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", - "similarity_id": "4a083d8a09cbca91dc31b3e1a878c008783b6ac4b5407f4bc74127e3728a0153", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", - "similarity_id": "1e5d2a7cc5e055cbc2c99fbff96c21c4057b0ffa2eda8b30b7b3ff27d351fdbc", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_without_kms/test/positive.tf", - "similarity_id": "77200d3ae45d1f5673f4dfd85e3e364b5e70bc755fff5ac7b649e5ba663ecbdc", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", - "similarity_id": "96cc8f06f61f64abcb6d7b2c350570ee1d2cba2e13ead36e95cfa65ee3c30239", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "a308857f8fd065d1aaf0db41d4fbbd787610cbdb4b96f0212f4a49b5a72fa91b", - "line": 54, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.public.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/positive.tf", - "similarity_id": "a4713dc5892d94918e91444a433f9f1faf7b88d8f2817a5965f99c28a828f7bc", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_sagemaker_endpoint_configuration.positive.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/positive.tf", - "similarity_id": "42c375462901ff2a45815aa7fafc5b05ee32f5742a4fb680736d7ab2fa849126", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_api_gateway_method.positive1.request_parameters.method.request.path.proxy", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'method.request.path.proxy' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", - "similarity_id": "453c396ff120e84c690b7be23e2cb7453adbe7f4c0c1c79a042a68e9b3f84033", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", - "similarity_id": "6bd0ee3ebd17cf08cd00ee69b6dbd56dd4fe3ca4ac5b410bd69ef827513c58db", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", - "similarity_id": "2fe696dd55f03e7f8eef154ec5dde099f469d4cef4d83aa0ba7ffb102957b930", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.positive.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "eb5533df2f2a12148cfcf4ad3f10fa62e9d7de62883c8c2e31803f998bff426a", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive2.tf", - "similarity_id": "db6e59040382216283edb5e53eee761aa2b841070ffbad1debfd107fef0d6f8e", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_alb.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", - "similarity_id": "27fed3a9156d4654e316ecd8873a367b7bd9cc1294d0bc3113efcdb7d0ccdbd6", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative2.tf", - "similarity_id": "ad96a9969928025164d56f62846468d03f99b04c1eb41b1626a05fc418cf26b8", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "59cec616e1a18b2395a5e78e82ac4fb26750e4dd9853b5e0b856dcf3c6770fd3", - "line": 74, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", - "similarity_id": "f1111e12ee7ed489204e3d10866de884356279e3073b3c9e6199babd2ac241b9", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive1.tf", - "similarity_id": "e78609b6fd0e71425961507ed22ed0cc850652d346edaba272be5d8b7b1cf572", - "line": 3, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_default_vpc.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "939c7406aa1510363b522b666a0099468cb172bf316427f5043ce26ef81ee1dd", - "line": 26, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private-rtb2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "0c4f3a5317ce6167a485c731606c043ee492c70861f8848d44e641fc0f84d2c2", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private-subnet.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "3bf42280dae049b4ae42514be9f750073894d04fa8692ce47acfe8dac8078ff7", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", - "similarity_id": "bd52d6975ec405299356bf36a5a8bdece691750c1d88623230ba3e3303055d64", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive8.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "63b0ef5062829e4b428e2a2b7da8179ae776e04cf6c4bf29a9a775fb039aead8", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.b2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/positive2.tf", - "similarity_id": "c06ba30eb2aacd28485fb9992d9ecb4f8961be2f0e96921cd6a460535c696c62", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elasticsearch_domain.positive2.tags.Domain", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Domain' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf", - "similarity_id": "98d6b534947abc0a21005acecda6c0cc7e92eb911eabd37c1dcb60d31ec942f8", - "line": 52, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_kinesis_stream.positive3.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "a38369fb3a5355b6d831c0729b74eeb92cbed9a8c4af110c072bf27da6bbc6d2", - "line": 43, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", - "similarity_id": "c39b340b17d328ab3523f92110d71395356a8b5a699bd72656748be0a5f988c5", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.positive2.tags.Application", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Application' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", - "similarity_id": "7d3196b48567e3cdf8b843b452ca3497ab68f4c79d7021d3b3f1691e1cd6bfef", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", - "similarity_id": "8ed2747a543bc26a6c11be518a9ae865f90f79105d163bcf811dee88ba878120", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_endpoint.sqs-vpc-endpoint2", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'sqs-vpc-endpoint2' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", - "similarity_id": "cedb60c696961f34adece5afa6d71abd2afa0efab87d411dcee08ed57f8191be", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/negative1.tf", - "similarity_id": "7471ac636235974240303c5f89cc2a22eda718f926e99987a631bcebd84b4361", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_workspaces_workspace.example.tags.Department", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Department' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", - "similarity_id": "ea50dd827806f9b9941dfe91709dac6daa64479f8590e3053d210762e1cbfb1d", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative5.tf", - "similarity_id": "2079cf232e99edca125015d3625bf4a553a4c6bfad58170aa11279a30e8710c0", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "3998381bbfece72857c646ffb615364f55ea6b5e628ffb41bea3ed4765f39693", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.positive9.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "3cbe90a5e5f9d7fca04c276c741668fab16371041e47ea0b6328b1600a92c7c8", - "line": 155, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "a552fa828e5b13220844efa1dc9af2bba6a16879202d7927040cb8b457132d12", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_security_group.allow-public-outbound-sg", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'allow-public-outbound-sg' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", - "similarity_id": "e24abf92d3904ea6f742530c02085c6ce6a0185c07848524da4bfbf02cb3566e", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", - "similarity_id": "77e497e76926f3c56e14c4d48ce0edb19a02c018899fb690f212dcb8e4b7a968", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative3.tf", - "similarity_id": "4e8832d61f3c8220a4678ad6a81cf6bb30d7c69aef032e3b5aca411659893858", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative4.tf", - "similarity_id": "c2b2a8ade073d489fc064d81d2a7f2b1a0a4e162514d402f06479ff95b7de8a4", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive4.tf", - "similarity_id": "59dd7e32da16aa09a18c6df71a4cf20b73699642f07f82c99aa263bde8bf7b68", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Service", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Service' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "031881bb4492874b6300913defab119f3370236355f55b243d89e154617d2efb", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "83432e2c53c8b9aeadd40dd82ed778d4f1daab01329bfae29d31d29a423f2e67", - "line": 90, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_dynamodb_table.basic-dynamodb-table", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'basic-dynamodb-table' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "33dbe35137e6431cd5f9fa9a0d11e8404bf7aae935c280620d090a71a1263cd1", - "line": 62, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "4f2d8819a20263f5792b87febff1219b6cf2c97ede516d69a4ebc52ae7b4d68c", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_public_instance.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "e174a63f98947437c39f4708be33e855c67f03ebde8ee5c3c0c935d5d7eb3b71", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", - "similarity_id": "4ebf726cf97dbfbbb362264bce2629bd8e7c003bc2deda0c6fc721c723b37755", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "output.kubeconfig-certificate-authority-data", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'kubeconfig-certificate-authority-data' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "85bca752ac9b3b8ccad0f9f993e91172a5f7a2d7763979244db0dc2634280a75", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", - "similarity_id": "cfdd3a66d4359735adbe4e444fbe5c4f4aa76540f26571192fe46b4f057fe0c0", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_user.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "819242a879b899ffa0cee9555afed26f2a0f1a183bd676b0351c05ae0d393569", - "line": 43, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "110dfbd065a4ea1384a903320ec95e2ed11393caa041b1c1363dde526c809856", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "09fc4b59a9f4ec84ddcffa8ef6d1fdf932733645427629ef3f0555a3252b1b04", - "line": 45, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table_association.public-rtb-assoc", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'public-rtb-assoc' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "4424916e57155cc434cbb9af97eaab909cae02db12a80a0d118450e056bd8998", - "line": 139, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive5.tf", - "similarity_id": "f9ab8774cbbd640225ff179f967078c17cb2ce068f2cacb9bbffe85fd7dbf6af", - "line": 56, - "issue_type": "IncorrectValue", - "search_key": "module.alb.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", - "similarity_id": "17ac669dc753a0e818e40cf12fd235f6b5ada51ddb280cfe6d1c47ba6fd0b568", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "5f660ebe2a3f7af747379cb7eb4d15532dfddc9bf6b2a0046c379642e96f448f", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive5.tf", - "similarity_id": "e74af1af9a679cdab3fa52406dcc1eccd79ca59fd5237bcb3097bb1915ea8d45", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", - "similarity_id": "fb284e794fe6cff0fb65c8e5b25d8f724bc6ace9184fa1dc21219893f8ca2a99", - "line": 33, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", - "similarity_id": "83da13b1e64eeb5cfde9ee9183bd9bf573e3fc42ac4a4e716378dc54de63dffc", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.negative1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive2.tf", - "similarity_id": "c869335e626d8f4a83f67d88fad992441847984c9bffaaac14b15e5cb6bfda51", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "module.user_queue.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", - "similarity_id": "e5dfa07a43773831c06c73bd233327d02f2d8500d00f3cba3d10e124c8af1967", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "435517ebf7098a7a6591e655cdd0edaf087dce1b88ae05bc096135c53f918dc7", - "line": 43, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "c5e3ae193b2c7d65ef6f79dd8b7133c77552dedf207b57b2ac2bd3452378abe7", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "4b24f1a5117b3c47e61bfe514fcc00fdeb17f2a2031530a147562f2d9604e3aa", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", - "similarity_id": "c471f89017099d6958b0b2a006546532a831e5916271d4a3317303d089411d29", - "line": 34, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/negative1.tf", - "similarity_id": "82b9d5d6f8774514a9bc79232b257f0e1def4fe06ad5c4a28a876d8e4c260cf3", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_sagemaker_notebook_instance.ni.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "f9de5332b5607f47780cd9e30670a59f641cf80272781596dabb777799f8bf07", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "b5a7fd1c89f081acfe52b3c65c39e44cdfef3be4b49dde0b4f0140c057f12cd5", - "line": 64, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative1.tf", - "similarity_id": "f69206dc3763f31f1af04ea36ad378b0b825fff61897dabe0bbbcf7558009942", - "line": 10, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_alb.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "9c09b17284594759e4e1cbeadb205ea4d49c35d4a9a9b2dfa0291c7fc3e81778", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "943e0501da7e97693706e63f68cb49a37623da64e1997f9987f8b13be49635f3", - "line": 42, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc1.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "a887f56cab3b06540997b3f969cca6a3cf3653b17589e58eae01e37a9423b51f", - "line": 138, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.private_route_table.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "575699d258d9c5b53d96bdc04f862d87d90ecabb8be3b2a95a68ea9175c8f16d", - "line": 83, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "f21ca8b17304dd763898d05c3c3d8b841ccb4e03ea45cf667bf8dc8fe2c86917", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "b2aed6f29d22ec9c89b7d0987ebe324bf8a5c1663a315abb9f970197e871ff60", - "line": 72, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive3.tf", - "similarity_id": "09b99e9bd1aa7f95998ecdd1816d5594381f2e741258e1ca25b0d4621dabb40a", - "line": 36, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive3.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/positive.tf", - "similarity_id": "c48d35cce6fc791666e9872dbed0e75b16496f13b13c8e1fe1ef67594a08e548", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_efs_file_system.not_secure.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative3.tf", - "similarity_id": "7c06cce6aa5bf47817df325e8d30c5a41bb563743a46fe3f93a5ebcaad42ddca", - "line": 47, - "issue_type": "IncorrectValue", - "search_key": "module.elb_http.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive2.tf", - "similarity_id": "1d76d23dcd7f40f017b220838a13877514708e1cae2cd0aaa1a96495d45444dc", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.positive2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive2.tf", - "similarity_id": "f1e2d7018aa155626aee03ff60b590ddc43a0c8c01f0cdf50415fc46d3e844d2", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", - "similarity_id": "6308f1c09f4f1a2c49080694884616307445d0c83e8fb726e7ad68d3daac635f", - "line": 23, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_instance.web.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive2.tf", - "similarity_id": "b2e93d03d485c97fe0358d969b678a10d865edb9d0e9770d6d4c06aaee099251", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "e3a8d019d0604242fee6fddcc6f020a29d14a5c0e1b4b3e06af77b0283ffa291", - "line": 73, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative2.tf", - "similarity_id": "8c0d2e89ea9a32d6b2bd9779aa116fa16ba3fa41b128c9870ad2f1f437e5513b", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "dce0c3ce51368c2d8224c0e3015d11bf6475f10393805d6f8c5e609062b8364d", - "line": 65, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", - "similarity_id": "1c9145864f61e02bf7358770b06b5656caa7f32c7e60c300c5204116777c44e1", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_elb.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "7978545e23d34636cf7fd8cb04ac08190761afc582619c16eff2517c8ba78e73", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_nat_gateway.nat.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "c4906d9d9e48b34bdcb435bb4998a0e5bf4d701a76299abb96ed1861ee3d0eee", - "line": 13, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Root_Account_Use_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_Root_Account_Use_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "f1da668d4d068beec42ab936262ed8c20a7f05969713cba47459e79a1dc26579", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative4.tf", - "similarity_id": "8f1347c3e9ee906de14af43028242063eff022d83ec30116354cf5053b855287", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "9ed4a0099ae03998c9c9f68a17f062556c958831102604f9bc571d0cd77e5e33", - "line": 111, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "b0fce6713d19a762fc0dbb3c8d60b93061877a82004e9ef673abc190b4296e8f", - "line": 82, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_internet_gateway.igw.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf", - "similarity_id": "fdfbe5f1dc4c40874ed0afb62780c9c24aba28c4ab26e963d8fdae62c3d0b5e7", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf", - "similarity_id": "9614f8f17fcffbd9f4fe2c135b70ed432f0989336d222fe098d9a38d9c07954b", - "line": 19, - "issue_type": "IncorrectValue", - "search_key": "module.ec2_instance.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "caa26eadde0c2a8a18c028b530c37f8ba29d24236f55fcb5189e1f4fd161502a", - "line": 110, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/positive.tf", - "similarity_id": "69a8129bf9c3027161520db6e269babe57bcacc1b326c22f11519cbf7b679536", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", - "similarity_id": "63f9dd457a62cccc5575b12755a0bb040dea11999f0e2e591218bde4c5331a74", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_s3_bucket.positive1.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "ba94335c337eadb74fd88c73d332b0697d4f468cdfa5782c0adb4079ddd18545", - "line": 5, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf", - "similarity_id": "a08c0d8514692799d1ca77e755dc9cc5d9b3a9ce3cbcc47a5ce7c5b00ff3464f", - "line": 104, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudfront_distribution.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", - "similarity_id": "d78ead0ef2f3187e592e934a20987acbfd502d94c3870fef6048c950cc5358cf", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative3.tf", - "similarity_id": "57539d55fd7928bc7812965c11a25666dc1ecf67ab045e79593eadc684dca803", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "d6be5cf2a7b8e7af547d08fe450f13d708341d129a49541f4162793402152fb7", - "line": 74, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_vpc.vpc2.tags.Project", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Project' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/negative.tf", - "similarity_id": "ef717a745662f6b7af47dada20523a417c9bdc77e39001cfa4e4432d27bad4e7", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'VPCCidr' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/negative.tf", - "similarity_id": "17c379f004bf49cdc2b697667e079fdcd71502410b5406fef85530c5ca66ec99", - "line": 22, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_role.negative1.tags.tag-key", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'tag-key' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", - "similarity_id": "e21402fe5c2421b651e2e42826eb7e5e3e2c5277a6bd3d3580eda1e73f8f9773", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "9d5ccf4a45e6116f4848841015e4685aa7c099132d5917874f6a4d7650a69274", - "line": 119, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public_route_table2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive2.tf", - "similarity_id": "d1e86ab3ab02b04d771934fabb03d968c9a0b2288858a4df7b2c026dd6a81d91", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "411772c66dbcf4b8153d6328b2933bcd5bc69a06576c5d14a805ad94bce7265b", - "line": 35, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_network_acl.allow-public-outbound-nacl", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'allow-public-outbound-nacl' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "4aaf805eec7747d7105dc9f24d56696159d71046f8e42aa093995eb99ba37458", - "line": 41, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_route_table.public-rtb.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "2daa3b1ad23ebbd0374fe99a1dc7b9e0253f02af5669ba87db6645da74122030", - "line": 12, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", - "similarity_id": "58ac15137abcfd8fd8c93877632f209ee2f1083c18cd921d40b1f47086674a51", - "line": 49, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_iam_policy_attachment.test-attach", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'test-attach' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "5c245006fec121466fa24e2c8f0af2eed5c6f741a9f7539f9706c861506d7f4d", - "line": 18, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_subnet.private-subnet2.tags.Name", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Name' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative4.tf", - "similarity_id": "48f8684c9a856db56f1e2bc7be347dee89fdde3bb0db344c633f296632d5fe29", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "module.vpc.tags.Terraform", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Terraform' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/positive.tf", - "similarity_id": "063674bbee29646ef1b3796731800f024b3ded6e818a327f51392845cd048a21", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Application' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", - "similarity_id": "7278ea934f5b3a38ecef69a14e586ac1fc23033f8172ccf1c4de807c42dae6a1", - "line": 32, - "issue_type": "IncorrectValue", - "search_key": "module.db.tags.Owner", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Owner' is not in snake case" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf", - "similarity_id": "dd216d3f43ee7645670a1a2a52d26ab2d820575712efbbf08e43917b8f8dc4b3", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "resource.aws_cloudwatch_log_group.positive2.tags.Environment", - "search_line": 0, - "search_value": "", - "expected_value": "All names should be on snake case pattern", - "actual_value": "'Environment' is not in snake case" - } - ] - }, - { - "query_name": "Neptune Logging Is Disabled", - "query_id": "45cff7b6-3b80-40c1-ba7b-2cf480678bb8", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/neptune_cluster#enable_cloudwatch_logs_exports", - "severity": "INFO", - "platform": "Terraform", - "category": "Observability", - "description": "Neptune logging should be enabled", - "description_id": "eb6f1a3b", - "files": [ - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive2.tf", - "similarity_id": "1c0405bb165c729dbcf6a049168924129e957282b780ae14cec0a77c49e669e9", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_neptune_cluster[{{postive2}}].enable_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports should have all following values: audit", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is empty" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "74b61a0248f5b1c22247d01095ef54452124c2d50ad0fc31c2509e2ed56006d8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "f2e76817dd9d5dd5f97d09929c81be2730475ce362b5a3414ec2121f7d9193bb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive3.tf", - "similarity_id": "b0a23be2719bf75e259cec51212498cc32119c416b87a38465fdf426432db289", - "line": 9, - "issue_type": "IncorrectValue", - "search_key": "aws_neptune_cluster[{{postive3}}].enable_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports should have all following values: audit", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports has the following missing values: audit" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", - "similarity_id": "2ffbb813e704578d0874665cd6275152316b23245a361dc53f27963f8d612472", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive1.tf", - "similarity_id": "3e21e261fb043b2d6fff900f0d25312e83e37cace0f03ff7a2eb19dfc496e771", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{postive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", - "similarity_id": "a82929c622f9b84eed8cad39c223778026781554a4db8262faae485aebf9a049", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/negative.tf", - "similarity_id": "3baf10ca64b00814879bfd985fd3f54c7bd7b55d8e0d3a631281caf2ba9d3065", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "7ef86c307b58cb6cd56444c65571ce0c96cbe0d814bc0c1566a734cf37e20c76", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined", - "actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined" - } - ] - }, - { - "query_name": "Output Without Description", - "query_id": "59312e8a-a64e-41e7-a252-618533dd1ea8", - "query_url": "https://www.terraform.io/docs/language/values/outputs.html#description-output-value-documentation", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "All outputs should contain a valid description.", - "description_id": "81535d16", - "files": [ - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", - "similarity_id": "4fc7c041f58201f74de9e2bea1d2b12a94fa574fdf1c7f8979dea8fd9ec2fd5d", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "output.{{kubeconfig-certificate-authority-data}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", - "similarity_id": "af33bc55f0f3d18bbb1363e1e83c3c8c34f4ef4ed4523c388a7951c8db38ba03", - "line": 32, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", - "similarity_id": "db8ed9060a44bd2205a3542a0804a07248115b98f18cbf7467679b91fb78ec82", - "line": 43, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", - "similarity_id": "06956b3babe23ecc1f80146332881287afee675a20d22a3b382f5c6fd70986e7", - "line": 43, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", - "similarity_id": "cb2f8c556cbd43cd976b190bd8ae3e09d4142a923ef7cc73d4ac94cd19d6f2d4", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "output.{{endpoint}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", - "similarity_id": "80a8e4f10d12f6b39d600bcd8c9adc0ccbd8285c063c57729c0ab20608801e7f", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "output.{{username}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf", - "similarity_id": "30428d93436ac9002bddddd66aebd9318bd538b5b7f4b233db0259ffba51d3f9", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "output.{{username}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", - "similarity_id": "92a9771d91987231734d620433931239d578250ccac0b96ebf0e838e08be04ef", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "output.{{kubeconfig-certificate-authority-data}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", - "similarity_id": "95be5a87221ee7f9b4a91b2f615e53de707298ea43d5e6a4504c4f8a40cca308", - "line": 32, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", - "similarity_id": "e2aff156d721fd96ccea417a09049f1682e09dfe17034402412ddc62b5e33edc", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "output.{{endpoint}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", - "similarity_id": "8b9276533071393939dd994292c0c5946e4d0223df6a424b2fd4b44aeeeefd8b", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "output.{{username}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", - "similarity_id": "d8b9aae21ce6e4a1861e29548946e0d9772b2d374b643867ba1b7b9f6c4eaf81", - "line": 38, - "issue_type": "MissingAttribute", - "search_key": "output.{{username}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf", - "similarity_id": "7b8df4fc3d84b48b856c6fa43b6b73d0e784f325e598cfc925da2fa72c731a62", - "line": 43, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "f7a65411846649dd32cbe30226bf159b8d741db535ac4860f1fae09e79a42f55", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "output.{{endpoint}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", - "similarity_id": "e178d35cc297562df7f46110548b666df08d7dcfc246246cf8497c0355be3432", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "output.{{endpoint}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf", - "similarity_id": "a653c6311fd684bd2461ef1338637585d123094578fb3547c906d991348f367a", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "output.{{username}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf", - "similarity_id": "9ad5ea584de1abb57833710cdd574a16b7c71e326c60bee3c068ade6c68cf2cc", - "line": 42, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", - "similarity_id": "d3954dc0a3f748ade565c4dd77e0bd4b68d2b5784dcad49202c866a8fbad528f", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "output.{{kubeconfig-certificate-authority-data}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", - "similarity_id": "3216bfe89f9bf5ab2a4351a59e1addeee0bdc97d7a5d87ca6f239e23644c4b71", - "line": 32, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf", - "similarity_id": "ce94234d145740edc20e7e0889b5cdd28fa626f979d909b416f8a76fd8323377", - "line": 43, - "issue_type": "MissingAttribute", - "search_key": "output.{{secret}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "85b64fffeb3d57265b2304fa679c516310979eca96aaa8a60978af8a7c388040", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "output.{{kubeconfig-certificate-authority-data}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - } - ] - }, - { - "query_name": "RDS Without Logging", - "query_id": "8d7f7b8c-6c7c-40f8-baa6-62006c6c7b56", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/db_instance#enabled_cloudwatch_logs_exports", - "severity": "INFO", - "platform": "Terraform", - "category": "Observability", - "description": "RDS does not have any kind of logger", - "description_id": "c499a58c", - "files": [ - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf", - "similarity_id": "fae9533d0141a1f5f27c25c3d989d3cc13e9247278f763de1847ed01a13b4eaf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf", - "similarity_id": "9b2222c63cbd7b17ca8bf7a2b6f258a250066e38065e9ea6c5b905cc705088f8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf", - "similarity_id": "d27a4c30e24efdc30d70bc68deff163ec44739d827e984586b7e88d3f6d3fdda", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive2.tf", - "similarity_id": "6008d8166b4e4cd74c3985797ce6373bc8d1471693d45c32a65d64bdb9a9595e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf", - "similarity_id": "b0bb0c256dad02137198610fc00c38c264ec1fbd9cc9fb815818d7a72fe88a3a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative1.tf", - "similarity_id": "c345799c7b93cdd832f5c493ba89d1b6d318753a382d479d36cf6f373637723e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", - "similarity_id": "c7f051a2a11d5293c0458b5bc4b93b7cca93f05fe75ed270dd3ae9e88190b74b", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative1.tf", - "similarity_id": "0560239b87e7432a7473e4a7a6434692e6438112029299dfcce2477dc1300db3", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf", - "similarity_id": "450de690194a193ff6ec9bd92a5cd9d638c16d9a2ee73d4ddb5172cce2be38cc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative1.tf", - "similarity_id": "ae161e836a9425e161ed99953924cef014718b78c5fcca63106c89e8610075bf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", - "similarity_id": "ea9ab37a6e126a1cc7c1e64c3e7d1dcdadb31910f0fadace6521e763d11d1fe5", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive1.tf", - "similarity_id": "2099960e139454a018ec5237b0837cf7de6431757cd0bdfce4f841d99f6a90b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive1.tf", - "similarity_id": "44a5d3a6e9aa75c08d153dd96bde323c36e157fdc833ea6cc29a028edafe1f13", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf", - "similarity_id": "b17f557d3a41f534d9d9693c5678a67c049d0a75cd9dc4f3f14996a123792d8a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf", - "similarity_id": "32e011d1ce59c6be9a1ff8cbef5aa13189167cf640c8df575c8f07a90bf3dea3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive1.tf", - "similarity_id": "0d27962ca3ad069e9a43cc4a8d226f224af24b06fe21b731a71cd0cd61a88461", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", - "similarity_id": "76f3ae2fbb71026388ae30f9c3ff5b059e91ae1eb7895bc0ee2973345043343f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", - "similarity_id": "6b236bb26377e8d80d11b922261bdcdc88b145f556179ade9581a091bf9bb298", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf", - "similarity_id": "4b341d00fef50044bc30e53de85bdb9f8f224d6600486b02b2801cc1c9c88d79", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive1.tf", - "similarity_id": "ab4ea2b0f47883fcc21ca20ce3eae27404ee77d8bf651d6638179fb647cbe139", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf", - "similarity_id": "d7edee056023452965f5799cebf6b8f1b354a2040c1c0689acda84728ade7a14", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive1.tf", - "similarity_id": "ecdcdf6a885aca6c1a6955efad12c83ee0d5eb4b3474ceb4480f1b344086cc07", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative1.tf", - "similarity_id": "da2f5c78ef84808e50853093225d89b765ed3b2c37321ed8bd063393ec2bb9eb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf", - "similarity_id": "389fff0ebe63dcb2fc3d4cef5dfd627cb8b3dc521adbe40488b3a4b1d8985661", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", - "similarity_id": "7841895e49f3865411fe6cb8d454f699e8abf396abc62301ba78c340a7de9752", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf", - "similarity_id": "5751bb7505921720f1e5b0603c610469123896384d83ebead2158ddc6cbc822b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf", - "similarity_id": "3883937a795b21efeb982e2777e42c758a93e962f5ce6f1317a6c4e2fc5a37f0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf", - "similarity_id": "08d252bfb9ef37dc1b10148b413edef594a396479ea5384e38cb6d7b6d2a76ad", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive2.tf", - "similarity_id": "f3db60a0220d043c2456a96839f74e3937429194b44d3cbee25a8117f133c9bd", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_db_instance[positive2].enabled_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' has one or more values", - "actual_value": "'enabled_cloudwatch_logs_exports' is empty" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative1.tf", - "similarity_id": "03b5c7234d8c9806924fd3f2e6d3258543178da27008ab0258246f78a335b56b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", - "similarity_id": "b12ed983003cbe29dd0ab54b1726cc1ee8db5c05244a78206d8ce47232fc7e7e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf", - "similarity_id": "0131772231b2e7354f3328fd1a1b466964e8182f548dc68b6ce6ec311f868258", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf", - "similarity_id": "d641947cb6edd7684192a90891b098ff9d283f0213909a6bea1c040f540c8233", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf", - "similarity_id": "2f600b61cc9f99c4fcbb6eaaf4262a918103754a4858836398f18184eb4e150d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "module[db]", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' is defined", - "actual_value": "'enabled_cloudwatch_logs_exports' is undefined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf", - "similarity_id": "70f32821ed3dc3b831fe2dab5b4c818df3392c3f08d1d36c13e21f85e3d9ab28", - "line": 11, - "issue_type": "IncorrectValue", - "search_key": "module[db].enabled_cloudwatch_logs_exports", - "search_line": 0, - "search_value": "", - "expected_value": "'enabled_cloudwatch_logs_exports' has one or more values", - "actual_value": "'enabled_cloudwatch_logs_exports' is empty" - } - ] - }, - { - "query_name": "Resource Not Using Tags", - "query_id": "e38a8e0a-b88b-4902-b3fe-b0fcb17d5c10", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/guides/resource-tagging", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "AWS services resource tags are an essential part of managing components", - "description_id": "09db2d52", - "files": [ - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", - "similarity_id": "7e02e8b9c0dad3c4fcbab64886412a41ec2069f79f82b3174a452d175f999008", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf", - "similarity_id": "83b2ee7077c3c1c5eedecf44c2289d7872710dc6b780112f7c1eb7a5e692d21b", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_cluster_with_backup_disabled/test/negative1.tf", - "similarity_id": "8ca9b71db695394745d2d2b7d8a79ceb249996d8756bd7449e3c41d7896d0fe6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{postgresql}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{postgresql}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{postgresql}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/negative2.tf", - "similarity_id": "ca9ef761f3ec26ccb07d14bd4237e954ad0a4009667ebf0c94ab2f18931057a1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{negative2}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/positive2.tf", - "similarity_id": "2ead60d89418bd040d676dd9b82c091ebf187d0e3b57abcf94d97e1dce441e69", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/negative.tf", - "similarity_id": "e07d18b15798e084cae85eb808b161b015d33d364a3c2267eb2a4cc92a5e862c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/negative.tf", - "similarity_id": "e2530a639493c42cd482b59c112fafdc91e90c62f1dbe0784db6afb4c56f19c8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "ba0f53d25ae87f5895a00fa8254dd9778783a90c0bd1f68e47b62b4bd7097eae", - "line": 93, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive4}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", - "similarity_id": "e26bae590f859e175790269f07fc770a22df0007302d44e14bee7e00883b8819", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/positive.tf", - "similarity_id": "2a3ab4cecdcbd321696eaf03a9057c2625a1f6df278105667157ae7b31ff8721", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_without_kms/test/positive.tf", - "similarity_id": "4c900b48aab13fd27a83389d1c28863c1db6541fcd3eea23b085545e762ec7b7", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive2.tf", - "similarity_id": "a8a666752449204c1d7a68b54ad35ddee8c557877f99db7f692c57f469a71455", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/positive2.tf", - "similarity_id": "506fab471e61b74698da6047c53258782ecc95522b8814d115abb4de9c092735", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{test}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "ea20b106920a54c26d8511e0d6c14280d34dea902914b3ca9ab661c25c9276c1", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_route_table[{{private-rtb2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route_table[{{private-rtb2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_route_table[{{private-rtb2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "846840191ca1916ab5a63b75f11a0dc52ebe4722aab0b2a11ff4697240bfcc1a", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{test_role}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{test_role}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{test_role}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/negative1.tf", - "similarity_id": "1b3324f7c94b6dede2dcbbac6b3e1c9b082bb215f099825d697b3a460c189d47", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive2.tf", - "similarity_id": "b3862e7d41f123f8eaedb4e8043366cf026b859163fdf23752a2b9ee65337849", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf", - "similarity_id": "1b69624c85d46670f4e61905714b5965759435d27ffe23b82287950fa86e5dcb", - "line": 34, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{postive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{postive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{postive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "5a1da4e5ebd82f085d5063a928de0bc78c30cf758b48ccc633187fb8615eaa87", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{vpc1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{vpc1}}].tags is defined and not null", - "actual_value": "aws_vpc[{{vpc1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/negative1.tf", - "similarity_id": "45c14ed492322458ff3e44a37a19979c70049fc035e8023faaa4c613f4e07525", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dax_cluster[{{bar}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dax_cluster[{{bar}}].tags is defined and not null", - "actual_value": "aws_dax_cluster[{{bar}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/negative.tf", - "similarity_id": "7165497ae13105fd68db3206c5be60e34c0818b7dc65ce7e34827c7a1b9c89bd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example3}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", - "similarity_id": "00c83f43543c3c7a77d330dc5c9f986a2b9dfdd513ea21785539da20a02411a6", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/positive.tf", - "similarity_id": "a68e17569ce907a9f53029de09e80e04d7576907afab4e1012b6c749605e4131", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "1a053758462b24cffe82cf6b2d79df4806f7bfe255a1a445edcf635dd28b291e", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_usage_plan[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is defined and not null", - "actual_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/negative1.tf", - "similarity_id": "4f79e64c87465132270cea917f66a41d224491c3c0569f455312dde04c85e0d9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "288628148c1dd8a1ba828981f1ec7e85e8d4a1351d55515a5f860d2f58499274", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf", - "similarity_id": "e18137ffdb26d7ead65d13b9248fb09e2b0b6c7e25b4b8647d9ffdc18f5507c9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/positive.tf", - "similarity_id": "47ab5a5a4c2c84ca1706eea63347914963e30d926b97dc98c4c7d77d3f19d605", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/positive.tf", - "similarity_id": "2c9d8ab0af1a1109813eabceefc41829b6044967357f654709650c51995c47fb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive1.tf", - "similarity_id": "52ec09e42c16a3fb9cf0e75889765c16df350632a2f0383fa1ad09b94e762a52", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "412c119c5698f2fb69bb4dc1628d124c788d0d56bbcec2bc94ea0ff1688dd0ba", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf", - "similarity_id": "47923349ae643b9f667e24b018908eaa66751e657c646db0d98bb7b72b0999cb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", - "similarity_id": "fb0a937ddde6135ea46b356b1e9a1104eda37601027dbbb488fa80b174c5745d", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive3}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", - "similarity_id": "0c27c87a464242ba6ae0ada50437f591c69d99bfedfa8e54883ad8a867f7d540", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf", - "similarity_id": "c7aa5bbd271945c843a80f889225b0c52a537143d7d8f61b8a4061b231a670fc", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf", - "similarity_id": "0e6741250342a3e4853e5bb37010d5dcd3549e26acbde99a3c758b83637be06e", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/negative.tf", - "similarity_id": "69088c805e052e8828b9f8a7c5da05cdefba03279e82e831bc6dcab5d70f89b4", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{negative1}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", - "similarity_id": "707ab051388c646536fcfae6489c6d71ac44d197f4dd52245c1df977d66979cf", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{positive3}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "27e45e9167f5af6eae42515c25a31c4dc8656fff744ccdb0ff081b8240b84726", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test}}].tags is defined and not null", - "actual_value": "aws_lb[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", - "similarity_id": "f1d23607f865826e68c1891350de06f695e09df1dc6723d7b4161fb7a64b08b1", - "line": 33, - "issue_type": "MissingAttribute", - "search_key": "aws_organizations_policy[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_organizations_policy[{{positive3}}].tags is defined and not null", - "actual_value": "aws_organizations_policy[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive2.tf", - "similarity_id": "b201960db9397f12bafc7d0e0cfa575ef954cee092768f2675de7cb1b8d4b42a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive2}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "ef4bfdeaf2c14b75184e4f5f0fd9d6606770016aed273b1e58d343750ebd3025", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", - "similarity_id": "261b3a6793d3a0d3357750aecf6f6db454a0e6c2e288d1a01568127a580bc3b1", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/negative1.tf", - "similarity_id": "c71b9036b628c802f4a033cbb3966fea4ae019a4ebc1af45513cc9f6c3f1f92b", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_sagemaker_notebook_instance[{{ni}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has tags defined other than 'Name'", - "actual_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", - "similarity_id": "62212ce9e813a833d31ab11a2af38ce7f2967bed290134bd303d0033f3225d5e", - "line": 23, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "393ba58777cd068ff77d916d1e4ae16a325a482688d20c0ac922ab7e71b07a50", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_usage_plan[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is defined and not null", - "actual_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf", - "similarity_id": "fe79e338d31195c85c51109d8fdc53894bb1b123d08323c4b9dded4692a4de2f", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "e531765773e296c5618ee9e4b10761c9ee2c7bcf6ddc7247fd6169089cd6bc00", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "2e26557e78f3f7955a5a031b7453454c52c59b0051c3f58b0fb80ca9dfd0fc4e", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "4af43f1b8061d91a858ed8034d17cd8a4d6a9d64ce50ac0eaeb2636b62529c55", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/negative.tf", - "similarity_id": "5afed49fc6a2915a402cc1fdb1b8379cb9f7cbec121e1469fa90c9be54981d5a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf", - "similarity_id": "fc5ed0e912505526f8a98a4a4e68c43c2b240982efbc64321f52bec10677cf7a", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", - "similarity_id": "7655a9b5b1a4bbdd4cec9c8ae584d8da55eeda37bf8af9d088051f87f575dbf3", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_ami[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ami[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ami[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/negative1.tf", - "similarity_id": "5e40ab8211a035efe849559bfaae1ee931356659f8325c61b22d53b9899dad16", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example4}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/negative.tf", - "similarity_id": "a421b7589e0da6b62b605a35efef550989462f21c6a304f198ef7c672b7a084a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf", - "similarity_id": "f1cdbe8ea87c5bb5c00fbcd517b60c0d1509e0cff29131b8c5d6476de491cdf2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "eebda7e6c5c73313f77a57d81f80784ba28cdc5357c4e935444c1fdf52a861e3", - "line": 94, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}].tags is defined and not null", - "actual_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "8ef2d5c588f29eec85b7d577c725a35871e2a0fbcfc0db33ba8941a748140e92", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{foobar2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{foobar2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{foobar2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_service_admin_role_is_present/test/positive.tf", - "similarity_id": "955e41d5d1d04786e98be69491b267366a92c7b8faa2c94e654f6f9c6e2623fd", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_service[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_service[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecs_service[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/negative1.tf", - "similarity_id": "d8a576c8572a4c4064a620647e262bd1ecfa49a1c5f76e4df785b2538013a662", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{negative1}}].tags is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "43c204b5408fd3fd9c95009d665de20a7acabcacaed371c1b3b10e1c379b8470", - "line": 58, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow-public-outbound-sg2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow-public-outbound-sg2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{allow-public-outbound-sg2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_is_publicly_accessible/test/positive.tf", - "similarity_id": "f75f94d286cb29ce4f0d1683c20de3a202303b44d10a087c1915c7c18780cccc", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf", - "similarity_id": "db1121dfe91d7df84a97592162b8a1b346a1c99233038f07dd188e94ff94720f", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", - "similarity_id": "cfca747d5adea55d9b316fa3e9005f25c6b6615183aa964378ee99fc39080d6f", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "d9cc822320dc4d9cd025a48c3823e953f0bf29a2a784c54140bd2805104204af", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{private-subnet2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{private-subnet2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{private-subnet2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "a44b1e99b912fa54138525e2863cb045b554de9bb5fbf4308756215d8fc1e9eb", - "line": 40, - "issue_type": "MissingAttribute", - "search_key": "aws_route_table[{{public-rtb}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route_table[{{public-rtb}}].tags has tags defined other than 'Name'", - "actual_value": "aws_route_table[{{public-rtb}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", - "similarity_id": "0e474fccfb992b7ae8f733abeb47ba2fccb83efe04464b77f33aff2ed270d53d", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_athena_workgroup[{{example_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_athena_workgroup[{{example_2}}].tags is defined and not null", - "actual_value": "aws_athena_workgroup[{{example_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf", - "similarity_id": "2f055d8c48923799a78012718c1fb4b21d7a0198e2f748e2b9369dca7c21ea4c", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/positive1.tf", - "similarity_id": "fcd76071826d157edb744c53ef16f40ff397cea5b9e283bbb2f86ad2de56b13d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive3.tf", - "similarity_id": "491572e75aec5c4e850d6616b246a029bff75d543dd8a81702c4535d02b94570", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{positive3}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/negative1.tf", - "similarity_id": "5beb0a48d845e3d7c6aa0246ea1d1db1bb2183556200c445ef71fc80f66ac600", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{negative2}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative1.tf", - "similarity_id": "2ae7c0015e1872e779e77bfc6edb482cebdde59b619b226f7e4868c90c559ca1", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive1.tf", - "similarity_id": "90b653eca86352c80beb63c96a9b2c2815b17de563861e7b4dbdb292fcd30103", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_autoscaling_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_autoscaling_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "2018e63aa198b6b898b9703f6045024f897e119dc76773e679a86c05671a9220", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive1.tf", - "similarity_id": "507ac4927b22bab5cdbba3395b8d8b107704c83bcab157f8c4ff308f9903e666", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/negative1.tf", - "similarity_id": "cc755e3a6cb0faf3fc6959c7d075ee518ea28ec200bbd7dc78109380336e83df", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example3}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/guardduty_detector_disabled/test/positive.tf", - "similarity_id": "f3954aa3293229e6fcf1407295f8a41a2d56fed3893f7363b27c974a11c95cdf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_guardduty_detector[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_guardduty_detector[{{positive1}}].tags is defined and not null", - "actual_value": "aws_guardduty_detector[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", - "similarity_id": "07fc33d5175008f9223e68b689af7a106718429a840f17a62bf4640057a13fa4", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{positive2}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", - "similarity_id": "b4e386561ea6c671889c98f64a8af5fd76420e78d7c80f4d6eee70e437b45907", - "line": 28, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive4}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "73ecb72ab2643b1a920380ff3d9323fe577f9fdf2974681b79dd3a92696d44f7", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "1c75034b7ec8992d154727cfcedadf30efc13ad205721cb03e07928272f5c788", - "line": 95, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table[{{basic-dynamodb-table2}}].tags is defined and not null", - "actual_value": "aws_dynamodb_table[{{basic-dynamodb-table2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf", - "similarity_id": "ee0fd33604f16f32ac1a4f7b6facc70bffa69fb0efd010590c501334b14182bf", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "27a1ee8de2c849bda4a90fa7c02856b078131b29b083c04516a95c7e3dc66b29", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{pub_ins}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{pub_ins}}].tags is defined and not null", - "actual_value": "aws_instance[{{pub_ins}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf", - "similarity_id": "17ad9b83d7b4a3d06b5bb92405ece1ddbc134f5c7e1c1dd7e664391015d09e1e", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "a02625f1cedab8735b617b4585e26dc48465ee5de5ef1a69247de4a67f51206f", - "line": 44, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{subnet22}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{subnet22}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{subnet22}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "d26cf45284e13beba9999c830d57149c916133c65d0aa4ce69af33f933a66828", - "line": 48, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{allow-public-outbound-nacl}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{allow-public-outbound-nacl}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{allow-public-outbound-nacl}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/negative.tf", - "similarity_id": "dca446c913eeb019748add566e8ddd8b512e99f4cdd83bcf9dd35f7705db22e2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", - "similarity_id": "d14870efa711607f8ac398d279fd5fdc0f489c66711d94e86ae1e246d2a8af7d", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{positive2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/negative.tf", - "similarity_id": "637cf29e514551b89e42850770fdd6bcd4c8aaeb631c04b9623007335030d4a8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", - "similarity_id": "c52dfb2db823b18e0ddd8aa79bffbdd4c0fa693ea9d318a3696fd2f47f0f482b", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/negative.tf", - "similarity_id": "06c17deb1f5198a68483522d37394e87a461143609fb912e160ba1cc8752d3ee", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_usage_plan[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "d0e0872e1a1f2e2e0cd971571a48297fdeff432a05d917236f5c53aa8bf105c5", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "5475def60eec77d37dcdb225e91c03a15467fe43c1de8f432b51fd2c0edda71c", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative2.tf", - "similarity_id": "5a54c4d0a1878c45af83a386c2da665d19976bf6d26c2b930b90851c6b483669", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "f518a7a3f94000a826ca0682ebe7ac227f0acdd2fafc5d935324d9fa2513d327", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", - "similarity_id": "76bbd2060aedeb8a192d188b52d0bb29feac2b2f335ecb56c1d8d14a3493913d", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{positive2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative3.tf", - "similarity_id": "c7ce2c14447de28f6411bede0bb33bcb570d23ac01ef3469b0b7219eeb221791", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf", - "similarity_id": "94e9567976835acc7a19a63bb0a59609ffd3378cc77a3e813ffc55954f8ec4d5", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{monitoring_positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{monitoring_positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "5077a9e4fe0c1d954d1a0de6ed48fb4a69b72dd55ed24248f69f085db72fbdc1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "99d8946712aaba18a750aa58b88e1c290fa5b96892a9345fab6756a177db4575", - "line": 40, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", - "similarity_id": "309e42594c2490c0f2e677e4186913877ec0cb62ab083e1bcbda253f15d791fc", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{codebuild}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{codebuild}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{codebuild}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive5.tf", - "similarity_id": "b74abeb63a77ea3dbbb4b49c05d8d406107ae158830d2b3c0d033737f6bb5d7c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "4e2993ad7cc3e86d8b694bb06b77a6e8d365652665ba4534dfdaad2665f83dd4", - "line": 108, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive5}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/positive.tf", - "similarity_id": "dcca84e6f93c0b993b368dbfb5c6d89563079d538453bb10fd961fd82a342065", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/negative.tf", - "similarity_id": "23a79dd593bc28c07e6b13e8ee9d14d60066009a448ac0d2fdd66a51247c25b8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", - "similarity_id": "59ddb8e8b17db58e3a4c0392cd11393683079052c07f47fc84f01afbf76006c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{examplebucket}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{examplebucket}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{examplebucket}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "d383b5d816b06598541ba870ba46c25fd1b915bc81733a276080f3a2b21e5f2a", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "538330f0d7f2664e1c474b8be8f371e56a7a0abe66ad7e4a8b91f052990f7082", - "line": 29, - "issue_type": "MissingAttribute", - "search_key": "aws_codebuild_project[{{project-cloudrail-test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_codebuild_project[{{project-cloudrail-test2}}].tags is defined and not null", - "actual_value": "aws_codebuild_project[{{project-cloudrail-test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/negative.tf", - "similarity_id": "7866e25259f9f2d87c3c82d898d68de16c9f7e5aee5a2439fa61308c9ea424a4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{example2}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative2.tf", - "similarity_id": "e86228dd472c4210069763481a493272dd4f326567b2f7e0310dd02e3212040b", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf", - "similarity_id": "9438b526285b5e564be319fca4c8dfafd2bc13d2a2cf6833fb5be9b036603fe2", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive8}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive8}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive8}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", - "similarity_id": "372baf8662a547260c4b851dfe37f8f5916748a9fa6940912f9e1eb789821406", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cognito_user_pool[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cognito_user_pool[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cognito_user_pool[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/positive.tf", - "similarity_id": "2b678d04a71c26b117b451a681b05327b9602bc49d84d2c2d82af4512ca73711", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "69114e3ba4c6b49283e1c3d252c56ae7761392eec19671ccf3b6577bb83b7064", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", - "similarity_id": "b7abc5ccfc2a43db34510753654b9df1304500ddf1a11cb9e9202eb0099177f0", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_snapshot[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_snapshot[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_snapshot[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf", - "similarity_id": "6134d78f266152ea1eb86efb67dc94da71621e290aff38f58712df8204dd7da6", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_lambda_function[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "c9c2a06bb033614c985547e6879e943fce89fa51eb9c0523621b1125da797668", - "line": 72, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{api_gw_stage}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{api_gw_stage}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{api_gw_stage}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "68bb4bb573fc3de211bb14131b734538d1e125eba670872f966d371381867f2b", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "0612a31a2e360dfb191d936f809d4eb04f86e85f50b26a995b9858f210074c76", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf", - "similarity_id": "3c5dee2890876ac461868702fcb14d5f5b0d6213b068e3936c74b4954e17762d", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/negative1.tf", - "similarity_id": "9b01035e70fcc57a6133dae0e9499e96e9a9b1ec33b240a5477bdd3f24f3da04", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[{{bar3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_autoscaling_group[{{bar3}}].tags is defined and not null", - "actual_value": "aws_autoscaling_group[{{bar3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "0892eccf773c3acc5a32709b9db5d98d9c93c4360d32d9dd61c1bdcd05a3b746", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/positive.tf", - "similarity_id": "a60f6d0c12cee891cbae8682f124f21f1b5a1de700ca63b26b254ceddfe9c9a3", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", - "similarity_id": "c7c7520fe0078890e9e5e11c5288a889850e75e567d60854cb18bea64aacfb42", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{iam_for_lambda}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{iam_for_lambda}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{iam_for_lambda}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/negative.tf", - "similarity_id": "442b2ab40fb3d888f16940b05684a88397eca0354b7f7d38dccf2cbff1534740", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{default2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{default2}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{default2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", - "similarity_id": "5b8e8815977316ce2976ef335bb0a9025c1f88a0f28384727aee92dcd090fbf6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "e441857edcb5152531498652a102190fc5f772a5fadcf4dc5ab75108814c7ac5", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/negative.tf", - "similarity_id": "89957dd65a545357d6db77fabbde367580e4faa18ebcd71d7194f1dbbc2686b9", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "64264ccc566144634569809fca8a21adef929e85fbf3586e6ee601d5727ed298", - "line": 95, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst2}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "843c4fedd84f384401a5a7ea3cd9cdf9b3b70b30c6d2ce702884519ed722648a", - "line": 52, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_with_plaintext_password/test/negative.tf", - "similarity_id": "39e23c50089bd41f8ffa563cc85f9c56a1f76e5e01d87d7772181bace60c2f03", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "516773d5d8b5859d991eac0080c80d9b28cdcf5adb681f271586b16c81263ee1", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf", - "similarity_id": "3d1da7cd15a6d7b02324af4b7e5bacd00a121a147d5f92e83d6547b8cb29709f", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "17cf49b17a1709e5c93a8aec46cd423a7ed21d61d43544514951c46e553fc797", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{priv_ins}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{priv_ins}}].tags is defined and not null", - "actual_value": "aws_instance[{{priv_ins}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf", - "similarity_id": "f8237960acefac3f8be0b1d4b940cc3af4efbcf75bc7d9dd9b437446c481b9fa", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/negative.tf", - "similarity_id": "c66ea2898679be6a8f49c46dbc29b7e758b9dcfbfc3237fb2f0cbf47e64ef2b3", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{test_lambda}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{test_lambda}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{test_lambda}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf", - "similarity_id": "710b07691e7bde9b1b26e01bbef2664a7e9b4fe7aed2d53bfd39348a17cd33fc", - "line": 38, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/positive1.tf", - "similarity_id": "2bf2b16d318d6e771c4a3b91800534d22a9d43f1fd59afcd17a01c9550003c8c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{user_updates}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{user_updates}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{user_updates}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/negative.tf", - "similarity_id": "84ecb2f55ee0ea1f0cc8a53c34da669032d3bb8a297efd6484d64420d080b854", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/positive.tf", - "similarity_id": "7225318b3652ec2522c66ba50759ca7e57a654f7deba0a46e5bef83c8ee10745", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{example}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "d13f310a8f971dcaa803346fc79f9c4ee3d27eaa11a545b9c578f9ebe3db5fef", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{test22}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{test22}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{test22}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", - "similarity_id": "9abd138bb7055e8c908da4c5d1ff1d4a21327b94d04f703bb31e8e4eacb1dcd9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/negative.tf", - "similarity_id": "f93bcf6774c81663b96a5e6a1dc6caa36ccb51599e3349793ade316d6aecdc32", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_ami[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ami[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ami[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_is_publicly_accessible_for_subscription/test/positive.tf", - "similarity_id": "76da5875b2bdb16178726827eff6205fb2d05cdf4f40db8912c2997652388393", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/negative.tf", - "similarity_id": "a17307324bf9ac6aa530e4121b4c7bb44d4fccf10d74e360686e9f4d70f3f73d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/positive.tf", - "similarity_id": "3557b9ae2cc97dbf7ad7e542f6b8c901e001dad42923045b520b05ed6b186925", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "95c0025b8f189cd6480b4a252329e796b2af7d4f8237a63245d805c425f965a5", - "line": 19, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive3}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", - "similarity_id": "1d4ba686e2deab685c57ec959739832cf756fc472732de29f0be924f140ffd21", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example2}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "f954d004ed4b77e24cc14306499e91c48f7258cf7afced3448ed6242f11f1869", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive1.tf", - "similarity_id": "a46e1d381344a768ea08e407395ca3d15c2d4ba8d90332925693a9fda6579bc8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", - "similarity_id": "0e32c21f3db3c8f6a9c32c3b2cf50587d2f1b4f01af841967d7bcec08e27e81a", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", - "similarity_id": "a0a359e3db745d85069cdd5127bbd40db1a312f1989180a1ddb5321bf90b999e", - "line": 20, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user_two2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user_two2}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user_two2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", - "similarity_id": "43462b733c1e294edfa2b23677ed0c17762a35471b4b5e226f8123a668999e4f", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_object[{{examplebucket_object}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is defined and not null", - "actual_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/positive.tf", - "similarity_id": "b5bb99fb037fbbbf3371564928e76aad57c8d2626a2eea94f484e96a1c30bf51", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{positive2}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive1.tf", - "similarity_id": "19bb6d932ff30ced592cb6f06697c37682a279b58e2409b59072a8cebd4cb079", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test3}}].tags is defined and not null", - "actual_value": "aws_lb[{{test3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/negative.tf", - "similarity_id": "b94ee7878149d2266eec9affb8a88c4251bc5e26450df4465f576d8062edd957", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{negative1}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/memcached_disabled/test/positive.tf", - "similarity_id": "e256e337c953cfac68de9599eb93d8de58945c0a0f7faaf1fc5285c47a689535", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive1.tf", - "similarity_id": "e4386e5b567c7a3fa89c7ed629d9658b5f0a4ae68a907c46ab3a8f147244378d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[{{bar}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_autoscaling_group[{{bar}}].tags is defined and not null", - "actual_value": "aws_autoscaling_group[{{bar}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "e4428bf562f1cce5dc4e01e1e282564c7b07b36e78cba70eea41dab5698e9b13", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "d673d91073a57aac2beb5318bf56f380631c10ff3c930f679417911aef459c43", - "line": 53, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow-public-outbound-sg}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow-public-outbound-sg}}].tags is defined and not null", - "actual_value": "aws_security_group[{{allow-public-outbound-sg}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", - "similarity_id": "26241351b2fe0221db62a3ebfae01860d644375def6892313a17c1b03fb374b2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/negative.tf", - "similarity_id": "520685b25a49d58b2fb6405ba121ea90c9194ccfb3c9cabdba5d23cfc9805a98", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_cluster[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_cluster[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecs_cluster[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "6defdd3e776af665deba3b46a33a2bc36385c691733b07991712de30b93503f0", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{docdb_2}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{docdb_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "6727e76468a4c0dbf981ccd97a118f6139cdb31a806880d82106b52316a5495c", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test-ec2-instance}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{test-ec2-instance}}].tags is defined and not null", - "actual_value": "aws_instance[{{test-ec2-instance}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative1.tf", - "similarity_id": "3e50a4fe72a239298854ddad5333e4ff841dced5e8e623b57076ca6a5d82ca19", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive2.tf", - "similarity_id": "6b66b89fa0a866d81ac52c6ccdd86215dd497e316812e039a415e553ba7993c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{postive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{postive2}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{postive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/negative1.tf", - "similarity_id": "c0ee11714d4663de2877de6f3550c45ff097be53bcc54c636653276b5e3a374e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "1a7ac61dbf2e3f3b73e67b797789a23ba1b3104288c2ccaab217f4f99e03e4af", - "line": 99, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{pub_ins2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{pub_ins2}}].tags is defined and not null", - "actual_value": "aws_instance[{{pub_ins2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf", - "similarity_id": "30b0cd90d8314294ece920e151fc44baea81d0e4360ef3c7ac1dfa63a9394694", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{positive2}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", - "similarity_id": "1b5f4c5e90ba877785dd878c3271237bc10260a2cadb5e0fcc8920caf186a6bd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", - "similarity_id": "4ab3beea6772677122a2dc6c098dd4da96a7f3e0a10c5a42d2c6201c1949e7ea", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{positive2}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_service_without_running_tasks/test/positive.tf", - "similarity_id": "3a23587ce8b3355c1b75300712e31ef250ff8ef9fa5c62a77a5bc6aa4d429db7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_service[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_service[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecs_service[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_node_group_remote_access_disabled/test/positive.tf", - "similarity_id": "a2495c663f8d2f895484a0d09e450972cf56e636ca4e77683913c0df8d8c4261", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_node_group[{{positive}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_node_group[{{positive}}].tags is defined and not null", - "actual_value": "aws_eks_node_group[{{positive}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive1.tf", - "similarity_id": "bb260f0b6c15e5d4776cf607e75105e0fd7b43bfe410cc6eb644d23d360316cb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/negative.tf", - "similarity_id": "51e2c7ba8238d45ab5f2b4c3516efd33be100d08dadcf4d55dc1b54f48998248", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "28c4400dc5de01434bce2c767b7ca41e50ecf3dee35407c887185daa5794a9ca", - "line": 60, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf", - "similarity_id": "11a865b89014aac57427a30218b60da173f9e366819e0e861da91eebae74ef02", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "aa49041cf372a5c4664e67afc090a3146b802941d3ef6d49a641ef42350a5fb8", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "41f16462e622323f76759f988bc2eabacf171e244c0ab683cd1ff2e69ea90700", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", - "similarity_id": "d025d3a978ed9b644c36a889d84315d34d55a641bc17d8b186c6b6a12a64b269", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "41b2a94b87fa2d87b0818351cf71ffdce6b90c043bc2bfd556fe6d6cd49fb25d", - "line": 27, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{positive3}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", - "similarity_id": "ebbb5a684f35de823edb9a0924b75a7bcde81f46c5c026ae88d87a4c7fe25938", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", - "similarity_id": "af2ae2af5eba88d65904d4dd84875de900e6fff29ff549810479c9faf91bebaf", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive4}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/negative.tf", - "similarity_id": "81f6379f028e75e24409530fcb8f85dcfbc61eb3a83cbd5ca85292ec75ff0087", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_config_config_rule[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_config_rule[{{negative2}}].tags is defined and not null", - "actual_value": "aws_config_config_rule[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/negative.tf", - "similarity_id": "e9191821fa3672508186a9b2724c4f2479e3db388e50b880f8567c5f2fb2f648", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{iam_for_lambda}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{iam_for_lambda}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{iam_for_lambda}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", - "similarity_id": "0fed6d6b7242e47145d9d4e63d3d6705eab40ff144e458a276e7b566bb0a3edf", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive1.tf", - "similarity_id": "dc0cf59eb88b8d06885b3911334937bea36e37ae3cf5bd18b26e69fe1ed20a41", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "15bbf4504be572a31d0531d3de384c5a6a4f4e352347323838d18ad7552cfe9e", - "line": 44, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{subnet2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{subnet2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{subnet2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "a8f6b5184f718342a60cbb89593f2cb633f4ca178e84a33ecf3105cd4185386a", - "line": 49, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test2}}].tags is defined and not null", - "actual_value": "aws_lb[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/positive.tf", - "similarity_id": "b9ffab0e6250113b3c983e2d48110f5e8868d1e1340c9d1e343b915ff6668dfe", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/negative.tf", - "similarity_id": "6ac7704ec9dc2e567ea8eb24c92fb328e58b7cba5f85d703792f709c77662911", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_route53_zone[{{example_com}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route53_zone[{{example_com}}].tags is defined and not null", - "actual_value": "aws_route53_zone[{{example_com}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "191c8c5756444c07dac4872af0c55ea10045ed3ef5afda326a5b8a0827ab1463", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{test}}].tags is defined and not null", - "actual_value": "aws_instance[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", - "similarity_id": "7b07904eafe81902e46a81274b15a93fde5e06d4539a7aaa9754838e8aacabc8", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{example}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/negative.tf", - "similarity_id": "9eb97b557154f9117f1a9458fc0808ce877be637f3794dc3f32a537bc73ea0a7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative6.tf", - "similarity_id": "1608cc1980b8f6746dde207b10d79389d26200eea50c2b0151792314f0e92bac", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "b448f7be1851859652f26e7c494ccd5495e7f0e75ec0d306e91d3b0c3bf3f419", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf", - "similarity_id": "c5fca03dd66b80605ca1913831f98800d229b5680e34168bf072de14cd9443f2", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf", - "similarity_id": "23b677233201e3be436893d2e3788d703bb622cccf9e2c4a752b544927e35079", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{positive2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "1fe5af4d7384bbb99f39916bdc159b5e765dd94bf59054c2258c815ac5145a13", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive2.tf", - "similarity_id": "1ecfa92af60fdd0a6f4bbe4c3b6e85254df9b79406100422745fc375ad2730c7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_cluster_snapshot[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_cluster_snapshot[{{positive2}}].tags is defined and not null", - "actual_value": "aws_db_cluster_snapshot[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf", - "similarity_id": "f1fcb93e53cae99aec8e2de3f715f280a71a3c7bff8de38124eb59199f69a6c7", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{monitoring_negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{monitoring_negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "cd7415f25e912e728eeda59d54e9a6bffbedae63188e111d80819f36ccab5ba1", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf", - "similarity_id": "7be94ba0431f0f6aab830e7785d9a8b6a5e4200f5b9aa24501a769d7748330b6", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user_one2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user_one2}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user_one2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/positive.tf", - "similarity_id": "18b470e6db26f7cf8a0dbf73cea3eb19d1111914ac6190341cd3546296aec031", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_config_config_rule[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_config_rule[{{positive1}}].tags is defined and not null", - "actual_value": "aws_config_config_rule[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf", - "similarity_id": "9401ecc37787bb6dfae15c111e059cdfe165f5fc58d3e7d6e8d08c521b2745fa", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative2}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "9d3f19e95afa6ab7e3f58c71e5e88cb53c1c08bc499482d6d435638b7450fd63", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", - "similarity_id": "2549281003f8119ca6b95cc225206b1a798640a044ac51a59161f29716eb22c0", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{negative2}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "e146ebefb44f84dbf3d3e4d8bb06397f0f7a05c8c964206e64a7ad3c6e81954e", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", - "similarity_id": "35115a0fb703be0bfc5ec70b5a9b10c18e9a88a33e78067b3fb8b2ace61a6070", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_snapshot[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_snapshot[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_snapshot[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", - "similarity_id": "bd69fe7069541454d1721579dc422f53dfa161224caba76a2adf721d9b4e059f", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "ce159dc07ff57b6a33db159c5a8daa0513cb9f3db390fc7774e63b78ecfd4b20", - "line": 20, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{foo3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{foo3}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{foo3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", - "similarity_id": "1ca32488ad5b7f94154241dc6cfc3d12119f62b73452427aa30f679edf9062d3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main3}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "f6087a04b217a7028237b8ba68b4c8434e1fa2bbe4a96c7ab4356026e3d8ba5e", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{foo2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{foo2}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{foo2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/positive1.tf", - "similarity_id": "929a5b0931f65c6bcc9947dc5c56b3ae6ed78be2136b941b563bb423a08f15e5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{user_updates}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{user_updates}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{user_updates}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/negative.tf", - "similarity_id": "6fb58f137ac1812edfa1233a8be4b168b1606f4a6f6f0516ac8ffa9729c38c8f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/negative.tf", - "similarity_id": "ad1c51ea993097ab6ccd28884eb7aaf71d62b6e7281d17a7bae2af117092bd2e", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{negative2}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "f7370db98303a3141ff18f9c6d511e3064089e89208584f0b98f4ec1c688464f", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative1.tf", - "similarity_id": "6782bb830f9e9a243f7213948c57b8f560ad75badc3ee82d64ee75f0af2392b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "256a52f1799995882084d24f4339d3e925572e6ea5b25a47e74221eff9a258e7", - "line": 62, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{positive5}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative1.tf", - "similarity_id": "a801217030d3b0e8e1d56a68e537ab4d3624801e109b07b7481202613e4e339a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "f01dd34ee0ebdb8e46ad77bf6f934da1381e2264ead0b5e0979e48e2a6a757fd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dax_cluster[{{bar_1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dax_cluster[{{bar_1}}].tags is defined and not null", - "actual_value": "aws_dax_cluster[{{bar_1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "4f57ffef3e1c7732aa69af74d1886098764365d22c270e651652c13de4f8ff18", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{negative2}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/negative.tf", - "similarity_id": "f5a9b32284ce1a13571f82a88ee53934cd1ee53ea4703973725cdcdfc67340f9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf", - "similarity_id": "dfdb0c92947bbf5dbad1c647de329556bad685ab30452df4fc6e220bed6077c5", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", - "similarity_id": "3f443c494f9e99835030d4dcb9a7c0f7c33be8251b8bf7a8a2fa6ac891b0313c", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", - "similarity_id": "52ae3f8e3c3451225e115fcd134e9f83385a3670e2a15b43332737193e90584c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/positive.tf", - "similarity_id": "d5b2b99ce705bd8dcfa7dc7a6d12d75f460a552e1a2249de14597ec8f0ad8951", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/negative.tf", - "similarity_id": "f3fceac98bb569fa5857a123dbaf945d7f03bb0ee9587f5e8bec5ea9137e43b3", - "line": 41, - "issue_type": "MissingAttribute", - "search_key": "aws_batch_job_definition[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_batch_job_definition[{{negative2}}].tags is defined and not null", - "actual_value": "aws_batch_job_definition[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative1.tf", - "similarity_id": "d8a0693cfd4cf7e844b6ba3ad94122c93ee5a7bb122facb4b67210ef47f99ef3", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "074491364f9ad692e9ffb7a0bbb3cd753236fb964ef7a848a120fd8529f31ea5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{test222}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{test222}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{test222}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "7e3a40cb27977449a7ef70d4fc5586a8829c3e57af1f2da1ad44a82805098c7c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive1.tf", - "similarity_id": "089fedfc5231f261a14c640a619a2dc70faadba71fc7e862feedac01f4837409", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "db141d0358b8679375cddf94f05ccb8bc0144a995bcc4b7e09ff8e51ac58be82", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/positive2.tf", - "similarity_id": "8e556c15562a49823de6a25f3eec6d22fb8b68338b52e15b3218c0624791c732", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{test}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative2.tf", - "similarity_id": "f5c9e50ebb49a1ffd397ce6c22a6e150390a73204c52399ed624b57e7aa34ec2", - "line": 41, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{negative2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{negative2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/positive.tf", - "similarity_id": "bfffdb27fa9f3e45e177bf16c82a3e88e244f15087f216b61499d8f0e3149fec", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{secure_policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{secure_policy}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{secure_policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive2.tf", - "similarity_id": "ab8eab0cb98609ef178f433a70dc3b485c0cab66c7aff3b5593136712797cc5a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf", - "similarity_id": "a896de7a4488ecf4ed2bf7e17c50dbc5cbe80d6cf0ec7e7cceb8baf4e82d225c", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cmk_is_unusable/test/negative.tf", - "similarity_id": "fe8bbf056f8e1eaeb140ee0a975f35d08de2c5f5d6ea7e8d4065fd6a8a0d0e9f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{a3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{a3}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{a3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/positive.tf", - "similarity_id": "94dc443d27fbc47d48d7d0f50817d22dd65d178d0b8946fb1a97a274e971ce0e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "9be047f91eece591d1cd2d86edde0f580f939f598cd60078bfcfc0822aedae83", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "53d8c436c5b634d5cb3630cdc4048c9794fa7100230f8e44d70f3ff017774d27", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "2ff28c577eff196a80ab496316ed36febbc4702c0c92c217d914660582f9f12e", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "a0ef527b8f5a4c9da41f6df6680b8a157b2091de30f9a420eafff52c43249ea4", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf", - "similarity_id": "1fd37b8860d1f339cb5d0d820ec3260b8c4639fa05b1770300b0ae516a648cf6", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf", - "similarity_id": "550dcab908a48e620a069757ad535ddfa85cae49e434b6701b71701618daba62", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cmk_is_unusable/test/positive.tf", - "similarity_id": "7a54f0b140c53b9242768caeacc140e9b9bd756da99bb1bd236fb73c2cf18837", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{a}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{a}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{a}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", - "similarity_id": "f12c48458e5bc5cb2eecd9ec943e9d8d53dfd65e348e7791677e7566749821c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive1.tf", - "similarity_id": "14c46b7016c799a7a79d6b9fd0c32401ee2a4e8f56e52c3ea8fe10e6a5dec483", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{postive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{postive1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{postive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "78dec2f0e074b6cec468b0ff31be7171fcf42fa167f12b6c8fa1a113f8218105", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{negative4}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf", - "similarity_id": "64f9436143b49a3cf72a64a21beca85fb87ee7ac556b100632cccaa9eb50c3d4", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{foobar}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "cc27a71dba8d3b20087863d9f76e10b9581a6f053045764787c56ea8bcb88918", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "70be704f4d515b1af9b96aa53f4b8fe78bd517f408650bc4696e5354843af829", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf", - "similarity_id": "a74a6b1dea11536b8957c3d826d47ec0d7893e6abfed5b40199993fb901d025f", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive3.tf", - "similarity_id": "f3dfdcfe5c459cbc66bc44e4c52ed68ca4c1d8e010aa1b6c05c441db362d0a1f", - "line": 35, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "edf1c643f1e8f2a3e75e53c218e04edd1058309964c1b37046571705c61cd3ea", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf", - "similarity_id": "b84eadb69e074ef9f6552414382df8510eccd16a7ca46d078cc86a10894b071c", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf", - "similarity_id": "851997d62c5d82575badd2bab62ee9cb016e425de931885c861b1c6a38d6cef7", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive3.tf", - "similarity_id": "1a646a74d98d1c6836ff2378ae3835e681cb56f8e396b56ff36cb93a5f0c0779", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative1.tf", - "similarity_id": "f3d4e6294e9c2c7a0ad0fdf7038a7762db61afb3b3024e79b872941da5d83976", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test33}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test33}}].tags is defined and not null", - "actual_value": "aws_lb[{{test33}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", - "similarity_id": "ce74423a5ebdb6b7fada8003325efb68fa78a83a3d8ef519ad493e4c95fd579e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{examplebucket}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{examplebucket}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{examplebucket}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", - "similarity_id": "51066425f3c3795ca8f7efdb30faf8626bcf26a0265fbf4565df041d85ba94ec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{postive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{postive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{postive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", - "similarity_id": "3c55eb5b2a80ba26ca8af0a47c1b6f9d4e15ea53a58a245bb1b519f3dbf97bda", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf", - "similarity_id": "f32295d4e6444ca1ee2172e3411c8e4e5921b2bdc74204e8b04f92d41b5e24b0", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", - "similarity_id": "327e15f99b01b0ae66997060af16201647261f4a32185c6ac602f9edacd86f15", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive1.tf", - "similarity_id": "e823d8a156d0f07f9b6dcd1e7a73cd2a074a80f86f249e8eaf8af68b2d43485e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "13e7a8f2e43cea0687127698852b3b21d39fa1fcb53e20f59a1e0f9934d56c6f", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "4aed886ca8ba5f772742ec213f79274b108c258cea7b8bd769e2fc8c82fb805c", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{test2}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/negative.tf", - "similarity_id": "37ea5262ecc508ffbe423bfcf90f00f3aadf676432f1370f499c0fba936ed05b", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_sagemaker_endpoint_configuration[{{negative}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sagemaker_endpoint_configuration[{{negative}}].tags has tags defined other than 'Name'", - "actual_value": "aws_sagemaker_endpoint_configuration[{{negative}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive1.tf", - "similarity_id": "76b5c89a698a4c22bd328d64028cdc5ed46602ae94ac6f0e7ab2e6e3600264f1", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/eks_node_group_remote_access_disabled/test/negative.tf", - "similarity_id": "7e30d1c222fc45220644d624bcd0567c473f44512ef1c4074b946b80304cc291", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_node_group[{{negative}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_node_group[{{negative}}].tags is defined and not null", - "actual_value": "aws_eks_node_group[{{negative}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/positive2.tf", - "similarity_id": "fd5d638af2b36f88ab03e0f50160b7d6e7186cc2238ede0eead63c9d9b0f3e13", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ssm_document[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ssm_document[{{positive2}}].tags is defined and not null", - "actual_value": "aws_ssm_document[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf", - "similarity_id": "02aa15a78e3a1fce9d1bbe9514ff43f4629962a53e8bdb4caf1a719de3339781", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf", - "similarity_id": "2d2272715a1892aa4140c5c56a4e67189e557c5d4a4f18904e9e67e70c01bd7e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_has_public_ip/test/negative.tf", - "similarity_id": "450ad3925bf7c7c081215d0b88df9d5f962abebf0206d854197fd7ccc953344e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secrets_manager_with_vulnerable_policy/test/negative.tf", - "similarity_id": "947a65993ec3259f766561b26e41910d543a4adf8de4beeb07e974fdac4643d0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{example2}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf", - "similarity_id": "190c94b0b2b24113def0cf693efef28e6860874ea48660fee11e5f47c3bb316c", - "line": 86, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "e8f71c54fa498ad3a80065100e1ee29c295967824429b5e38b6d3817d2718234", - "line": 34, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{subnet1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{subnet1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{subnet1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative3.tf", - "similarity_id": "6fb74ea6de2af993798d4f278ca4adfde850464f08e95a13833e4b5b7c2f9773", - "line": 35, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "d9d6421ac4b66f63d0eb549514f4d5f02e2b704cbaa39ad5ae8e11b96a55a11b", - "line": 88, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{test2}}].tags is defined and not null", - "actual_value": "aws_instance[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf", - "similarity_id": "940f7acd0bd8010cd1c9fa38593d16ff539c7cfd2b30c61b4e29afd7a49220eb", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/positive1.tf", - "similarity_id": "a2ff8df06c57aa62a69b0448eb1570586231ff4b1980f4b85f4c0b4307eb2f37", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/positive1.tf", - "similarity_id": "1e645af2229e581d6ccbfc984e69ec8f13ed33dc79daf3c64493c0a2395d4feb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ssm_document[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ssm_document[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ssm_document[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf", - "similarity_id": "44cf75869f027a88fc9cd12be7cb3ec7a053ed68145258479930d13fbc572c53", - "line": 29, - "issue_type": "MissingAttribute", - "search_key": "aws_codebuild_project[{{project-cloudrail-test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_codebuild_project[{{project-cloudrail-test}}].tags is defined and not null", - "actual_value": "aws_codebuild_project[{{project-cloudrail-test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive2.tf", - "similarity_id": "48ad1912be1a7c206f989c2f90f8c4ad7b04223a6e0f487a15251cf8766e76fa", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{example2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "319c999a711e159ac5e65b7dfa8afa97b7171d0efd4c99b236da88b619dea086", - "line": 106, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive8}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "09ee867262e7e6a5e89c8e705d943586b75f790070f527998e0bf83a38c95b7b", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "369c6be4d1c1c8b9029abbb49f2359ecc35f2f6e88010f835c1b8df39c479f64", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/negative.tf", - "similarity_id": "66b36a3a331b1b1cfea85d6a49b153ead150a9edf8953b149e185bf230d4d1ba", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{negative1}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", - "similarity_id": "75e60bb9574ef6ffd13b5eac22690ce7ba9b0cbf089313475b222389b3ccb701", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/negative1.tf", - "similarity_id": "e7fcfb974dfdeca3762cf255c92bfe7f4216089777c75d4d6b303b72282f0abb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{a3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{a3}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{a3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/positive2.tf", - "similarity_id": "218c99b72697b5d8dc69c6307d7ab67eaf598f132e22e7ae8e7be97d64836f58", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{a2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{a2}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{a2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf", - "similarity_id": "14fb818504232a1707691f2ccf1cafecf6bf1cebaa3ba6bdd68323c0130dd368", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example00}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example00}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example00}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive3.tf", - "similarity_id": "ba82a8835b3b1c6ad004f427b8aacc71734a973cfca0d88565cec63c07a45a45", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{postive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{postive3}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{postive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", - "similarity_id": "5e3276a3079883cd1967ac89c3c3fabcf55cf944e266ad28221be632d235aa2b", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{public-bucket}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{public-bucket}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{public-bucket}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/negative.tf", - "similarity_id": "40882ba50ebe6cef99ee6c065d29d681dee772dc45d8ac93be459702a05d4eb5", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "68cef50e605408b2f4b5ac9bb96a66ffd1db36034b30474b0f3e150d9cd0cc6e", - "line": 83, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst12}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst12}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst12}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive2.tf", - "similarity_id": "767cce0dd632a163730026194e22ac1640b7f94285a6e393dd4815d6c321af00", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{positive1}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative1.tf", - "similarity_id": "85160dc0f396d7491a76ab02c6bced4417775566c67433ec09193dede51b3822", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative2}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", - "similarity_id": "2e3eeab7274491a175c816650f5252e268d39b2cd2ae04b8bc4e2933c5764ec7", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive4.tf", - "similarity_id": "32312921137a69ceb0994208f54402fd6b6ebdb7774e15c69bfe0720cb0ffd1f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", - "similarity_id": "bb8ea811a4ab7206c36dbeb4b06203af39515761bdd977cf62a9c112d4a4ba37", - "line": 64, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{positive4}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf", - "similarity_id": "9a9768e64ec9c88afee2f1ec2a9c8c180387d9ea9ae62a77fe334dfe93440e7e", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{monitoring_positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{monitoring_positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{monitoring_positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", - "similarity_id": "1eefda542a82f205c5c82860f872d0546b31eea1839edec0ed8b56c8b3769c94", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}].tags is defined and not null", - "actual_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "0bbfc88181ca484edfd2fd2261fa85b4bb1993de0175f265013c85b09732cdad", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", - "similarity_id": "073933d364e8ad6d7bacef5928a61cbe821b5fc435493f294ec3ac91456dbca2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf", - "similarity_id": "c89503ebe0fe9c3d97ba1f81eb8610cbc91eb22a66054e45f842780bfbd57cef", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_has_public_ip/test/positive.tf", - "similarity_id": "60b6c30bad6a7da721e12e6e14d84d17677d21f41106a15356129723e1643d42", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/negative.tf", - "similarity_id": "288e1a9fdbac6555856810a39d0bf1fb46e546bfb848b4e4811feb5c38f97fd4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/positive.tf", - "similarity_id": "b77f53563a6a880962bfd89299dbc95349eac972f050899cb917e0951668f192", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_sagemaker_endpoint_configuration[{{positive}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sagemaker_endpoint_configuration[{{positive}}].tags has tags defined other than 'Name'", - "actual_value": "aws_sagemaker_endpoint_configuration[{{positive}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "941026080b380417420912d77b129f561181d9b2e3ee91d569e431cac0d67a66", - "line": 30, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", - "similarity_id": "e47696e665355800fe8b40f351cd52389c910778a15cdcba3c473e090975fe49", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{q}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{q}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{q}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf", - "similarity_id": "484bd967d7f62f8d2066b302f7aab555b2cd361a9a518439ac4e2defff74641a", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/negative1.tf", - "similarity_id": "500b7547ffb7778f44855cb5cf190e7e38866113ed35943a4123b4da6c269a42", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", - "similarity_id": "829e673f5c8332d89c31c1978e66b2d942636a906f1e5cac455803807577adcf", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{test_lambda2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{test_lambda2}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{test_lambda2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/positive.tf", - "similarity_id": "687905ea8280a48775153b37d3be9033740f7b3e3c5cc7152c56a6b05b33b40f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/negative.tf", - "similarity_id": "df97fdb5bc3354afea3801215dad5085d9eb4cb30814860d9a8e17dfd3516bf2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{test}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", - "similarity_id": "64d5c93496ff0fc2b53d638f479cc0a6c7928e8d21afdeda76ad3e520e0b79ef", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table[{{example}}].tags is defined and not null", - "actual_value": "aws_dynamodb_table[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_network_mode_not_recommended/test/negative.tf", - "similarity_id": "b9940003156e61ad5af63d9f063bb4ebcba6b3d2db8ae8946a84b8cd1807f092", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/positive.tf", - "similarity_id": "0954f8c38e1399b5164268b9378ead9df9efb931a38966685b3ceb453ceb8cb0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "58006aa5953a62be80285d965954cc1ddc588d9db124fe35d0255929101dbab2", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_service_without_running_tasks/test/negative.tf", - "similarity_id": "eb93bbb35d65945543c9ddf7517140502fa2273da99719e4e3c99e42deb9b7bd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_service[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_service[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecs_service[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_endpoint_config_is_not_private/test/positive.tf", - "similarity_id": "1552e46b1c05e6c811a3b182b1e7e3c57940af23bd9e4aae7829c1b467ed5c70", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_without_slow_logs/test/positive1.tf", - "similarity_id": "eac23ef05dc1b31c79e841fd89771455c6e9ca54d78f76ad4e5cdf7701ca25b4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive8.tf", - "similarity_id": "76abc79cf8a5c8b582da62599653ceb331395c7c901a503698db1801ae4c3344", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive8}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", - "similarity_id": "3b19eeb18c5870604f4a1c5877bed3d2875fa8d36c291da1edd6d66c3dffafef", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{foo}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/negative.tf", - "similarity_id": "e7d25e8eeb6d8ec494e7b4ac1c04c0f0669db04237eaefbd800eb957df74b539", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "6da67a3b662c358b5e57f30b725257ef9d3d4138c8bb2cb39bd90c67b7dba7d1", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", - "similarity_id": "24ff225d1c5b993e14cbb4596d8fd51f91d0b8f6032a9ce5be778cb884990ff6", - "line": 42, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{positive3}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/positive1.tf", - "similarity_id": "426e3a813d3ffcd446db3239b2d3038a4f2c6f461d4bb26bddb8223da7b48b48", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf", - "similarity_id": "df39e50db13cba60d95fe31f5eab483202659abd08461215f8c74bedbab1c13f", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{negative2}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", - "similarity_id": "20b95cb272833a8a109c5bb61bb9615185b925cecea16b8af4088353029925be", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative1.tf", - "similarity_id": "2fe8152d51efcca906e01bfaae31e6ec135c595ed8e683a493d9c984b526bbc6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "2da471f3f0000cf5f7e0f835c30d186ccced1c2abc67f0172005011b911c202c", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{cloud_watch_logs_role}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{cloud_watch_logs_role}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{cloud_watch_logs_role}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf", - "similarity_id": "794209cbf85465e34efcfbccca6713bd3186deb2e920ae6eb7978a7eb63e5e3b", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo3}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf", - "similarity_id": "6beb1129fcf99437ee86c63bc30cc6e165bd4caa5519a5b84d2c3506591b4231", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/negative1.tf", - "similarity_id": "1ffb0212fafe640ee6fe652f72ba6a0db50d92b743b6fc3a41db0bf907f1c218", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_athena_workgroup[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_athena_workgroup[{{example}}].tags is defined and not null", - "actual_value": "aws_athena_workgroup[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", - "similarity_id": "024b277b161a021d1ab8f88a3a357598489e37b1a6f2d41310ee737894d0bd7d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive1}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative3.tf", - "similarity_id": "360b22fab444d5ce9f344a0c2307a7ee7b1e64e5eb98137fb12e661ea4037684", - "line": 35, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_has_expired/test/positive.tf", - "similarity_id": "dfb387d971fc64e3777466c11ecbd69f79ab5bfafd360e31184d35a99a13a823", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "0de03be8af24c0dcfede23eb7e42765a8063bc04acdfc29aadd8c2ea070fd0d1", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_dax_cluster[{{bar_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dax_cluster[{{bar_2}}].tags is defined and not null", - "actual_value": "aws_dax_cluster[{{bar_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/negative.tf", - "similarity_id": "f5aaad4dd6c2ca25d65175f8a3efc6b4ed225fdb1d8d507ad27c01b5ef2ae708", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_organizations_policy[{{all_features_allowed}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_organizations_policy[{{all_features_allowed}}].tags is defined and not null", - "actual_value": "aws_organizations_policy[{{all_features_allowed}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/positive.tf", - "similarity_id": "b1cac7f2deae0e332762d6bfa090ff8439dfb132113cd5ccb48e67eaa0674f2d", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{es-not-secure-policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{es-not-secure-policy}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{es-not-secure-policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", - "similarity_id": "edaf2a8443111522214d44e2aab150717a989f64c0f3af02bd3e0b2d5d89c274", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", - "similarity_id": "8da9369ce85355a8b706969db784e00e8518b6b0279c80e4dcfd5cf89a5abd97", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/negative.tf", - "similarity_id": "ff2e59a4f5847a96e125ccb9dd7e695cf0aa1ed9668e7922edf320efb9c18b53", - "line": 29, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{negative2}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "1d07c4736e5ffe5e83f6cc8c8d9b96b3cadf2b88524d6fcef720e6736b4f1ae0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive7.tf", - "similarity_id": "8b598fca21f90eab1c38ea28e78402bd29c1d77d60ce990152fb163fc5dfca5b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive7}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/negative.tf", - "similarity_id": "34b5b7eea0d1690bd684b0140bd95f02a6bed19b62d55d81c164724579734239", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_batch_job_definition[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_batch_job_definition[{{negative1}}].tags is defined and not null", - "actual_value": "aws_batch_job_definition[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf", - "similarity_id": "4ad915e306da616399af5c92a17a38d7ad7009704f672e619000aa24abb00cce", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive9}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive9}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive9}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "d961bd5b5e4844adf4488400a9dfa78200d42a324d5d415a30e3f6cacf696521", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "1c81e014d1dba3dbe8f95cc647a6abddd3205d7892fea3e05258283f2354ae57", - "line": 72, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile2}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_with_plaintext_password/test/positive.tf", - "similarity_id": "0af559c0122892553f90855f00c2dc2669f195fd97f9b573f4f703f5afe65452", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_is_publicly_accessible/test/negative.tf", - "similarity_id": "38e3965e93bc0ebb8ab6db47d0c59b857458c46eb00a8989411bdd95512ca7a8", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/negative.tf", - "similarity_id": "bc197c47743fa87497d3de82891388000a4fb5968946bd9f553aab9abcd4ddce", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{q}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{q}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{q}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive6.tf", - "similarity_id": "d497fe33ae44fb7021c9c883a0aaf0613e3411afa4fa3433e10a1ff2a4081147", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", - "similarity_id": "8e7be03f53c62ffaae7813f12a0c06ccb29755838f44d36f8585269d40a6f369", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative2.tf", - "similarity_id": "f711138300784437dc5f7c823ceba28c141779c8c58fe3a201099e6b11b895ab", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{negative2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{negative2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{negative2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/negative.tf", - "similarity_id": "5167dc07bf8f7fb6e49408cc60a1b16119c4125be4afc310802e4dc72b635730", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secretsmanager_secret_without_kms/test/positive1.tf", - "similarity_id": "830435bb3a6cec187deb229545c04668edc00b7b52a4501d979bed68411f9fcb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{example}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/positive2.tf", - "similarity_id": "08ecd82604c837198214db3d23dd03776424433f730b26c8531abe08e083d36d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_server_certificate[{{test_cert2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_server_certificate[{{test_cert2}}].tags is defined and not null", - "actual_value": "aws_iam_server_certificate[{{test_cert2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "29a669983f734fac7e9fb8630bd673060936c2421a1925ba61d202c1848f762c", - "line": 76, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf", - "similarity_id": "d2e5c09aa3f99b431a4394cc403c12465d9d6a8f1e4a28a226977ed84a3b48f3", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "e9b3bb858a83b6d24edc03184e003f9e44d0890f86e14bbc2c80d11129382560", - "line": 69, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative2}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", - "similarity_id": "e9ce565c69fbda08c58433b8f7c1e2f9b7aae9ade07bd0ab3df1caeb2ac2d590", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/positive.tf", - "similarity_id": "5d44077d925c17af7698395a5cffd4beb5e710963ac785dba18f0c29eba1ed9b", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{lb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{lb}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{lb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive1.tf", - "similarity_id": "65d0652aeba60add05c49c1836f10460412d48fb0fbbd8f48669015935dde10a", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{default}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{default}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{default}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf", - "similarity_id": "04312fe7b2d21d6262efea71e6fecf482e5e95d1af61f5adb6cb92e87bcfc48f", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", - "similarity_id": "f54d8a536aa7ccf58605e825a61eb744b74e53b1fb90689570299f803a85b4e4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/negative.tf", - "similarity_id": "911d257c2a1854408c40ab0a879d522b5ba258faffe9a92caa95f5e02794b307", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive3.tf", - "similarity_id": "6f75dad11972a091197752a1614c603d3b9a25a0447ecafcf3ffe32e2ecc45d6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive3}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf", - "similarity_id": "131afae0005f9daec5d98c96ab5b741ef6cad8da9fdc8ac80c6b46b07536b778", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf", - "similarity_id": "efd58a6c5ba604f8a387bf22bb7efffc84ff34ef00393e62d8156048fdada7b6", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "badf30c5be23c8df8bb35d193a1b8ff8ededa67916b2f5ff808be09eae34a459", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "737bf3609d45ae5511492b7ce02f35b9036696032a452266d0f111967613ad95", - "line": 24, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/negative.tf", - "similarity_id": "c7978d6fedf8fa7d86f5162e4d2ea81b653fe62542b97ba75160afd5a1a4d49e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_organizations_policy[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_organizations_policy[{{negative1}}].tags is defined and not null", - "actual_value": "aws_organizations_policy[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", - "similarity_id": "d311972bbcc9a536b29f16ef805c908cc3e391652f3ef1a68cde012db2e2475c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_cluster_with_backup_disabled/test/positive1.tf", - "similarity_id": "3eaec0622f056cce42179f558af3e321578d403acf3a413db1f8e7102daf412d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{postgresql}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{postgresql}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{postgresql}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/positive.tf", - "similarity_id": "e1d94934cc89878e082e1ecfecbbad0151f98890374adc2efba1ccdbc49ca4a6", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "4f591321f29717ab20238b97e1f78e4e469f9cd0eead4e86e0a75c61dacad232", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf", - "similarity_id": "fe0f89f652c7cbd6ddef463af3a44fa497771f7d997334eae281e0fffe5498d6", - "line": 38, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/positive.tf", - "similarity_id": "1dc960204a220423bb6e50a55d56d308c6ef87099f4742719851509ff87704c4", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/negative.tf", - "similarity_id": "1f986e6289426c21229cef00384479093e6af8c3e70497f1692d6eed4d4cf9d3", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user_one}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user_one}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user_one}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "938febd5c740791bec6131780a344b1963a0202f8896f43edf896cc6084892ee", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "da3ea37f2c4b6ad1490d9391fb9bb72660f55fc54fdd19ea994769f868fe6aad", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{test_policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{test_policy}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{test_policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "6b87bd5cc26e20ba7e65658041ab8520d47c6e28e7b027c9ac75831a252ca41d", - "line": 76, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "7cc7e5f4ee9f8797a0fa83c818a3bd9561b54ceaf9abba2aef810e21cdfae483", - "line": 56, - "issue_type": "MissingAttribute", - "search_key": "aws_lb_target_group[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb_target_group[{{test}}].tags is defined and not null", - "actual_value": "aws_lb_target_group[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "10b45e9e1c8e13ea719d055373f17142b5647e5dbc133a53f1d6342a4ee665e8", - "line": 30, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}].tags is defined and not null", - "actual_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "49e946826e6f62abd4671001251649aea7582e47fd5e8e89fea93b51f0214344", - "line": 34, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{subnet12}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{subnet12}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{subnet12}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive1.tf", - "similarity_id": "30ebc9cfe821c29299307b1681442b594380f300b92499b61d1efb5e7cc57c22", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/negative1.tf", - "similarity_id": "55232098e347cf4d09ff1265ad24d2ec357926285bdf8108950604309233afcb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/positive1.tf", - "similarity_id": "37eda2d6d82cd29db279b251e529171cef14adfe8cfc0a157feb970983524a62", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", - "similarity_id": "315a543709fcd468a6166d109fc8bde2aba48a1fa0624b7c69e3654bebe3c649", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/positive1.tf", - "similarity_id": "b73954a6100888886150b6cc3c2590d2f1f002528c6215212046131683bd4196", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", - "similarity_id": "946fea4bd27d1d8f3cc8bd68a34c71edbb9eb1525730e64c67bde19b9171ce53", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive1.tf", - "similarity_id": "7363b637ffd75998a8dcec86cbda05f30e0d78f9d19603c42d3de1d194249e36", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "d328425ea162f5ba17d8409d650a3e3f4e120963272b8f28af36b1b8d031b6b9", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive3.tf", - "similarity_id": "f200d7876928cae8f5e4eab919d77a928cf3b076dd855ebdd59bc6d327927d98", - "line": 35, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{positive3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{positive3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{positive3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "d30db3e7e5157e5e1ec674073be6de016b8cf56f835c471aa1b54692060f66d5", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_internet_gateway[{{igw}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_internet_gateway[{{igw}}].tags is defined and not null", - "actual_value": "aws_internet_gateway[{{igw}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf", - "similarity_id": "af477de158b795b7f2fb383111d041022c195420495399385dd5232dcf838f1d", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table[{{example_2}}].tags is defined and not null", - "actual_value": "aws_dynamodb_table[{{example_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative1.tf", - "similarity_id": "b42965f41e8276ea50c3f9e8cb3113ec705c0160cc9e611f5851df98806fddcb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "8514bc27efb710c8f777d267aeeac35a2b850b65dfd4f27fd54cc295dc547eac", - "line": 56, - "issue_type": "MissingAttribute", - "search_key": "aws_lb_target_group[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb_target_group[{{test2}}].tags is defined and not null", - "actual_value": "aws_lb_target_group[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf", - "similarity_id": "44cafc7a4ce5812940902c3bb801c30b4bfb86bb6c83648f8580e4ac1d5a9d06", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive4.tf", - "similarity_id": "861259c88ab87d1e97be8d6609e6de302001940618e4f2c266a939b648099141", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{positive4}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf", - "similarity_id": "4c5f220b8db7539f7fca93f337eeb51b9b1b1f8157952bb5b130a87a6de1be42", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive3.tf", - "similarity_id": "fed199249c11dfa3c87814b8ea3731d122ca9a93eef49e8a3615f7d8f6c21303", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive3}}].tags is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", - "similarity_id": "575a877c3c41a2b890775d30bc509c1d00278ab3509ba7b210ec5b0e77286cb7", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive3.tf", - "similarity_id": "7075baa6293ecaa00e4d8e9ee94c0120058c6fe8b83859929be25f8396634528", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive3}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", - "similarity_id": "b01484f07af857ead34f6373d174104e0082153644164e858b2f58784af8a9b7", - "line": 24, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{positive3}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", - "similarity_id": "d3805150a049b0d187cf192a75f80aa7b6a1ccb154c616194c9365a53bb52feb", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive2}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/positive.tf", - "similarity_id": "62ee282556d5792c87b241ded26ef2ce69f553bd45b9753464f33e46df623f5b", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{positive2}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf", - "similarity_id": "4949e7cfcad54198417fd3981a16044b7d399ed25884d49569ed9a1c4394cb29", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", - "similarity_id": "23167c354cf704c54617b66a313bc67f36962177e03e24ac31fe7fd05482e071", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf", - "similarity_id": "e4e767b2000c6183ccb9a036048e783fd71f48ea094c18c5886808cbce865db4", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive6}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive6}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive6}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "b57e9977e1745174e6249dde1c5311f1adb4912a469ba63aa25828ea343cf74a", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/positive.tf", - "similarity_id": "911aa7f5bcac0ed1c8c5e258939f04c784054cc5b0a70bb68494ce46dd794e43", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_route53_zone[{{log_group_mismatch}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route53_zone[{{log_group_mismatch}}].tags is defined and not null", - "actual_value": "aws_route53_zone[{{log_group_mismatch}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/negative1.tf", - "similarity_id": "64f804060c4cddfcf454cb25522fd8fb7ac19723211ceea061711ae2df4f99a7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", - "similarity_id": "c42891cee565577e3c5bb338c11d652914894a039b9b4f7308a2b159a3d1595b", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{negative2}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", - "similarity_id": "f402c940fcb657fe183e95aff4936e6798329dfab1133fda5d3a36ec449dc32b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "d35f2ba315f1450faf1f860e38d516d87753f8e0b76e99562275ebe54a598cb1", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/negative.tf", - "similarity_id": "e8542ce93bd9d316e2f1f375d89b4b898c180a87abc2e61934a64271cccb51b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_with_public_scope/test/negative.tf", - "similarity_id": "c745a2628de1bd44e2d2d2fc5dc41369683b81c64dc172878cb421b63c14205f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf", - "similarity_id": "31d155f2c7aa1f689187f8440758f2bb216d72da71f70b923e790a14bc8dd5f6", - "line": 41, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{postive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{postive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{postive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "a0b383612bdc292ed1d31680c997a3529f07a63adb4985178ddc02fe5a01e732", - "line": 76, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/negative.tf", - "similarity_id": "d9df150b24779b16c197ce62e3007c939b807130482708c83dc6d2e49ded5db6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "f4beb44c2ac02e1800e292c8be6a03a42576cc66ac6085230afc63353ec5a1fa", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", - "similarity_id": "9a29a7695a6996ae6869c34f556bce5896f74ef65d4471ba1c53471b8765786a", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secrets_manager_with_vulnerable_policy/test/positive.tf", - "similarity_id": "44f6bccaaea1d6642e9e34e7d2c599fbac824e768d6acfa1e3f9ce1f2e14ca13", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{not_secure_policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{not_secure_policy}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{not_secure_policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "ef721ba48c4988277b4b6ed7d2fffb7b06ec5994f5722d027322611b9616774a", - "line": 91, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive7}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", - "similarity_id": "aece977fc4e0c4f038b764fcab94b8dc5c16bca7e961062c2d33b64ea9ba1ca5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive2.tf", - "similarity_id": "04cf4e8ce615ab352bb9ea9eeafca8eb1691184cb91fb2bf478f2a76e0379d38", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", - "similarity_id": "12d8964e2f6c3e65150439272cacfebd9ff18f1181da7a52a1ac25a05aa33bbb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/negative1.tf", - "similarity_id": "355289dbb5db97f13bc02e2d4627c4eacbb66d53ba3d6c5cba8bbffdfcb194b0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative1.tf", - "similarity_id": "db3812848ec337cf9f78b3b60ead7016b2110cd982168b98a3ddec8faa14ea55", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "b0546040c33ab273676aacd6500cd5253a60495deaddf9aff15af3b3d6c56b10", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "e9646fa15d593eed7a0d0a393b74ba6921c33ee1b7c86eef61b3912d15c1a53a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "27ca396eaeabee9269bdeb7e2c05b67c981457d615374899d56fe5ff6e23b61c", - "line": 51, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{test_role}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{test_role}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{test_role}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive2.tf", - "similarity_id": "54674de9e98cafbba34b292128a2d78f070c2d1e96e1ba945f16d3d441599732", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{example3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{example3}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{example3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", - "similarity_id": "11e938d695ed577f9229ef5a765698fb14ec5b0d76584b31f9d0b6f51627d916", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", - "similarity_id": "ee11fab17604538603125981a3fcd874e325047fd6f0f0b1fdb6353f6992efe5", - "line": 28, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{q_aws_array}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{q_aws_array}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{q_aws_array}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "68dd1ffa0d5c13b75e0a4a715b10c78e3c41bc5433d854bdcb88e93a94002425", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "f6a012672b69527fd3b269c7e06a32e5ca47655f9de04a4ab673ad51226769d5", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{lambda-role}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{lambda-role}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{lambda-role}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf", - "similarity_id": "bf54447c7468376cfa4514ac82e9d83285981508caa3efc07700c2d75ccfda7c", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "00b1abf495c2f3751082be775eb791baa7ca79eda7477f82fd829d10b106da9f", - "line": 106, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive8}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive8}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive8}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", - "similarity_id": "de8063d843362cb4cb736ef0ea226e5ffc232369629c20127fa50dbe04e5e73e", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", - "similarity_id": "49a6a35d70985a8fe28c25517a29523eb8142480dc9ee6fcd660f8f63bc71375", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{role}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{role}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{role}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_instance_is_publicly_accessible/test/positive.tf", - "similarity_id": "87f7326890fef77ad4fc5dc79c0843de9dbc2866986c4c3ded61d7a8a6e98a97", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster_instance[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster_instance[{{example}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster_instance[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "a481971bf91659a20d2dc88a962b66e19c9588274096253db0bb9f61ada5d937", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_encryption_with_kms_is_disabled/test/negative.tf", - "similarity_id": "362d22d6bcf8d2eda166d145891819ecd8226dd01aff79db2a95fb1ca7b62031", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf", - "similarity_id": "a72dbd082eb5ff41a6e267233afaabe531dc75157251c049919cb2fbdf8d0cf9", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive2.tf", - "similarity_id": "1a51b789e457a906da665bd95de7ac24e48da9dc440ee393e2431a5feb797dd3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive2}}].tags is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/positive.tf", - "similarity_id": "f0c9a0ebd2a39e2db1eefa68ca65b2a147d95a29970e0df7c902fa4be2aeea22", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/positive.tf", - "similarity_id": "60993c1b4eadb9f38ebcb44ae858212de2ed4141c972f5406dbc5319ae954941", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/negative.tf", - "similarity_id": "8436377b3c283b1ff432dd0c4b9304a040ffca7df54123d7eb7672cc3c69d563", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{example}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", - "similarity_id": "9df8edee04574e02cad57184eca2bc66c168cee6c636db4af33607f406f297c2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_organizations_policy[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_organizations_policy[{{positive1}}].tags is defined and not null", - "actual_value": "aws_organizations_policy[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/negative.tf", - "similarity_id": "add4bcc38064f706367376cad320dcc1d2e045aac18b8cbbefa2217fe254e00a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", - "similarity_id": "0ee636437b6c7a52bb125dc9a212535084efd14c21858d807a7b6bb552175b4b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/negative.tf", - "similarity_id": "1480987850b106de2e3229287bab921c86cc9807c7e4337d6b4095af70195edd", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{negative1}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "d842c78be33ffec57a9d1d44740c2213e27fa4ea1db4af9d93432d67884fc06b", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf", - "similarity_id": "c0954749a3431925300c4fb106d2529af49c9551e66aba172fd53c4027827b2c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf", - "similarity_id": "0d40f0a1db07d4055d196c96760cc845945c884404dd86172ac69398b3dccf46", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/positive.tf", - "similarity_id": "058ee0fc9ebc6f3ca04f5b76328f4dca47a2cf69f74b08089b27623bb56e29eb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_cluster[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_cluster[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecs_cluster[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/negative1.tf", - "similarity_id": "23e6292ef9b1a36f93e2098ca9914c07bb43a7f7abe913163a0e0d35e40e8efd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{service}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{service}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{service}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", - "similarity_id": "c5b0d4f93b74205883e45966ec9af2e820711ab2510ee5ff7d15a9d547262c5b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main2}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", - "similarity_id": "bf6dd48cf6d1203cb7c72d21eccdc499882264dab222b8d73bf210f935f645e2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_acm_certificate[{{cert}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_acm_certificate[{{cert}}].tags is defined and not null", - "actual_value": "aws_acm_certificate[{{cert}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf", - "similarity_id": "38cb6982d7461cd71fafc837785e37cbbbaa74698a67bcfc28cb6a2729a809ca", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "9d0414dcc59e22da3ead9aded256183b52397a20ac2ac572de66a334d3884940", - "line": 108, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst3}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf", - "similarity_id": "dd0bebc9a146da82a4bb62e589ad4c6c43dd3da8362a2456ddcde3867f928b91", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "2f82b0cd9f8770c98ce312929455de6f2265c3edf8c7674741f1794f13cfc68f", - "line": 71, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile5}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative1.tf", - "similarity_id": "9de1651fa54629a08b3048245e5c99a2f01c87d15b203e09f28e61e60efcfcfd", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf", - "similarity_id": "1d28706ea412ac062081e2eb4f9237e6febd748f8ac0a5305ca4bc23520ad075", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf", - "similarity_id": "2d88d97c2ba586f2c7f9bac47cefbcc4eac8e7f8c861d5c2721c925ee4d73b3a", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive2.tf", - "similarity_id": "6a98d6eb981ad760fc362d285322b751d3795e56f3431d5bb7d07b88690ca782", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative1.tf", - "similarity_id": "2f8f4e55043aeaf8060cde74f24b07e07ab27b147d56f943e87f228bfcf3f6a2", - "line": 40, - "issue_type": "MissingAttribute", - "search_key": "aws_elb[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_elb[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "f4ff64572cf8624c6a73e062d084aaf7063ff966a47acf2f2b6d04c70a879520", - "line": 90, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table[{{basic-dynamodb-table}}].tags is defined and not null", - "actual_value": "aws_dynamodb_table[{{basic-dynamodb-table}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/positive1.tf", - "similarity_id": "380f8a5a1bd203426cfd58e775b01fa99714e9641bb19406c683cd1f2651f499", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{test2}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "b61f222dd03a344da25ac882c4f8d6275425b042a0e8b25a4270c89b3c059291", - "line": 63, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{dsg}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{dsg}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{dsg}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_network_mode_not_recommended/test/positive.tf", - "similarity_id": "6492e3bb40272db9ca02a049c91aa7c38784d0c9715890780d433eb4891ae742", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf", - "similarity_id": "d194cf00dc68d1ad5b3ab4a338276adbff98456c011d8ec51e1b5c8818888994", - "line": 66, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile1}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/negative1.tf", - "similarity_id": "7a5d0d4a8aa566b266147380f833bb6538e6e758807642419c9fb0b588d0677e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "da98fa80bfdbbbd1439b4f1890d90eaa34f0b83426380542afa2450bea4d04be", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "aws_dax_cluster[{{bar_3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dax_cluster[{{bar_3}}].tags is defined and not null", - "actual_value": "aws_dax_cluster[{{bar_3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", - "similarity_id": "59800085fef26e10d75221d6441c4b5dc695c15981aadc63a69c3bf558ec9764", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{iam_for_lambda2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{iam_for_lambda2}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{iam_for_lambda2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf", - "similarity_id": "64f3ae5cb1ae3833c96ea65e885e8275d09759239b25929cef39e04851bb1e31", - "line": 45, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{test_lambda3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{test_lambda3}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{test_lambda3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative1.tf", - "similarity_id": "77ddb67294ee6322fd636ef53f280e7b499721455a3376bd47ac7d337d03a1db", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_vpc[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf", - "similarity_id": "3cc0b7ea613935c4f4d7bdc54430e220928a285a7e077282f73322135a710761", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{codebuild2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{codebuild2}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{codebuild2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/positive2.tf", - "similarity_id": "23f06ba7f2632a0e968726458bec36539432a3def4ad540f876613001d339117", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{positive3}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "67af587d429a510c8bbb24eea60c161a77fe115288afd2d57e759bf676736e68", - "line": 35, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}].tags is defined and not null", - "actual_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", - "similarity_id": "42ecc118e2a125e40ff4e8e994daabaff1fba3d096dfb85dd1ad74fec3bfe567", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example1}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "e6cb93ea861b3f03f0ce6dcde8739a86a5174cebdc713e3b0a658b66bbad9a3a", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", - "similarity_id": "7894314f1bb6c353c55e9df5b1a482fc4cd1d033a9b09227aff2f3536a08afab", - "line": 29, - "issue_type": "MissingAttribute", - "search_key": "aws_ami[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ami[{{positive3}}].tags is defined and not null", - "actual_value": "aws_ami[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive1.tf", - "similarity_id": "33e2a1632801f87e790fdc9bfa89ccca2900eac657449781e906de237ab6f3b9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_globalaccelerator_accelerator[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_globalaccelerator_accelerator[{{positive1}}].tags is defined and not null", - "actual_value": "aws_globalaccelerator_accelerator[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/negative1.tf", - "similarity_id": "c0f28dfdee8b6f17b11c0f1c23f56965ec53701851c9d9332dc6513d959826a9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_dynamodb_table[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_dynamodb_table[{{example}}].tags is defined and not null", - "actual_value": "aws_dynamodb_table[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", - "similarity_id": "f658bc37686769dab71201ca47ae2e4e8ae221c6bcf7b9abfe5a6e0fb9b15dd5", - "line": 64, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{negative4}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", - "similarity_id": "5585cab123f52514fa535f5ff99a46b0dc91d09244ba0e4c18e00fbcb8e154af", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_without_slow_logs/test/negative1.tf", - "similarity_id": "fa9118747c5aad19e45ef1bd8a9304d6a27bf6657f6bf64a7fa9ef7068aec348", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", - "similarity_id": "00f9de83cedf8974239af44f1cb7d314ac6fc2a828fb08766db0cd2f8868091a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{b}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{b}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{b}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/negative.tf", - "similarity_id": "ef59ce8cc6ee3d93e05acfef697f5e9b58bd268956fd9b896c18d9929219469a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ssm_document[{{negative}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ssm_document[{{negative}}].tags is defined and not null", - "actual_value": "aws_ssm_document[{{negative}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", - "similarity_id": "ac4f9cbe5003cebb1c4d0f8dfc1ac309628bd3a4ae8ba3dd6df32aff24101e68", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_athena_workgroup[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_athena_workgroup[{{example}}].tags is defined and not null", - "actual_value": "aws_athena_workgroup[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/negative.tf", - "similarity_id": "9cbb69e3c91b531151b51aafa32f4e6d1a38281fd118942b15e5de232f8721b5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_config_config_rule[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_config_rule[{{negative1}}].tags is defined and not null", - "actual_value": "aws_config_config_rule[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", - "similarity_id": "33e698690ec58b289134ba3553d2ac94fb844ee0b6afe9bf71432c7decdf8387", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_instance_is_publicly_accessible/test/negative.tf", - "similarity_id": "43d347b5382dcf0d85e858455aa63fe4424e7f4841836f902d4046c7cab98c26", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster_instance[{{negative}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster_instance[{{negative}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster_instance[{{negative}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "b67fa0956e0a1b91b3556b92447b6827b0416845ecbc0986dc4aa8db61a994f4", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf", - "similarity_id": "255e174a91bb6ca25dd86895b44ed007d99beb1dd54e6bc05ba27a551d79c518", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{test_lambda}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{test_lambda}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{test_lambda}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", - "similarity_id": "691377719393a88c71a5b95170e86d3506e97e1c55df278b27ec7c86009a970d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf", - "similarity_id": "17d4cd0e8489ef9b016415046fb0ec40cfc95bf0475ad8f375471d708876eb26", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf", - "similarity_id": "3c3ad490b88fae3262e297e43719cbd06120af70d8f10b9cee814460ad19ca31", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_ami[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ami[{{positive2}}].tags is defined and not null", - "actual_value": "aws_ami[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf", - "similarity_id": "371b69531b7eb0c269275c8e8b3d328819f4b29c500218b5e364c5d666a371f7", - "line": 32, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{q_aws}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{q_aws}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{q_aws}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "4d38df0194d335ff891c61f9d82c4f162bc3d082b4a6fd8d186dced344319d3a", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive1.tf", - "similarity_id": "4ba7fe12c1407e79b10aa5914db2179c929a550ad20a53318619087248f65b0d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf", - "similarity_id": "cad43037f560ca1924a9c90fa5d19f096c7b2240f384f2f300c1e331bea48856", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", - "similarity_id": "4fe751a15cd90a307f4f6b54c54356c079c470ef834d00624aa785c077e10207", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket_object[{{examplebucket_object}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is defined and not null", - "actual_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf", - "similarity_id": "1460d114b75bd15da8a53d2d505b3f03457384f0e9c708e245cfd901b6c924fc", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf", - "similarity_id": "369d9fcf12363afcc763cb869aef150ea81305afacba1bf0d57ebe6d579266d0", - "line": 72, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "762152dbf211afdd3def573e8bba9100d4e3fc85da1c215b4d82b3b5d1c52da7", - "line": 47, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive3}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/positive.tf", - "similarity_id": "1694af784b2890619c1a2eba5372620db623c4cbe48009e387a2213ac917b079", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", - "similarity_id": "03df93e9bf127e7171c34ea92c3c888b9d94556338dacda1c70d7f972c3119e0", - "line": 23, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", - "similarity_id": "1ee0cd3359c1b7fa224c745b9b5c1b6d8fd25d59063856454507d1811e5e8c3c", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf", - "similarity_id": "6062554f7080cbfcb7e82cef9c8642ef5104d47741b4408fb95e956b8eacd469", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf", - "similarity_id": "38b0b47595475cf25ca2db234daad913a20519ca1c635b0f745ab2fa5fd40aec", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "499e429ee05b925d74808ddd398ca9bc7e6a06c24a5a90647d070109b6a5afd4", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/positive.tf", - "similarity_id": "075d2bb6cc4d08eef2a2f4b7097ff4a10cafd07668d7f13148db28d5091e9ae4", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "163971bbbf493fb1a8331582d92b6ff7df7ca1ca5327beadca306896f13456c5", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf", - "similarity_id": "717cf4963f674d5c5918c44a95ef3c795185fdb51be4b3451896771466139b7d", - "line": 38, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "99b8718f26ec19b0ce1fc68ffd16ce990012a310d605be88c8c1051955c44b99", - "line": 53, - "issue_type": "MissingAttribute", - "search_key": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_with_access_to_console/test/positive1.tf", - "similarity_id": "08bd08456d7924d025233ee6186fb710c1b76e7388a50cfe956c6e3bca439209", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{example}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", - "similarity_id": "2ededcdd11b3dd8ec11aebdc31663326426fc56c18c38553f05501bb17ad3b06", - "line": 19, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{foo}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf", - "similarity_id": "dc709bf7a1d3eedc7802ff6b49d5b31f4848bbd9f2ed58dd35a9754558d39d0b", - "line": 67, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{positive2}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive2.tf", - "similarity_id": "186ddbbfae216891ef19ec19b9ecefc39476131d70773ed307d2bae0d0b2d24e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_autoscaling_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_autoscaling_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", - "similarity_id": "3ab2487e28261dab79c7df0c5c958fda5a5ee28b2c2b3b14a5689b84aa3fec0b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "e8ec4e91b1a690bb82c7954c5db336f9ca782d5975333aef74aa1aea32ad01e1", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "df7be6940efbd99be9e931c7e6f362224ad4224e7b92a2f30fbc02fbfb1f96e3", - "line": 80, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive4}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf", - "similarity_id": "a10c0c7ad96cbff1a8bee0d121de0f3f1af4652fc4a89713bd25e43809c22e1e", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf", - "similarity_id": "1dee35cdb166279d17470fe403e40b307d91b327bbab9115310519e2ccdd70d4", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{disabled_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{disabled_2}}].tags is defined and not null", - "actual_value": "aws_lb[{{disabled_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_with_public_scope/test/positive.tf", - "similarity_id": "9c41bc969168420830ea834f42edd8fb090cdb6051a1a5422afdaa6b1d8ad31b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf", - "similarity_id": "ddc6e3c020474937782826aa002f6abb1c6c9a66d53f2da52984fe7de23e7fff", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf", - "similarity_id": "7bfe3fdde1154909c1f033c9fddbfb9c9d0a05c757bd4cd96e71d2597427a3cf", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{positive3}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/aws_passord_policy_with_unchangeable_passwords/test/negative.tf", - "similarity_id": "f9acbe3d5ff37a69e3591d00b1b982e0bad2d0de4879b5446b9c814f45056c9d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative1.tf", - "similarity_id": "eb7a8280f79beefa08c97eb27424284ab2f0c061fcdd80c0aaa46f043b767afa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_user_with_access_to_console/test/negative1.tf", - "similarity_id": "18f5fc4617f9f02db4aafc68209bcc43ca273c2bfc420c06390d2466da153a93", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{example}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "c5796037a6c6dd9ec62bcdd14fba70fc86d894e93e629744946ec98670b794fc", - "line": 51, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{test_role2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{test_role2}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{test_role2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive1.tf", - "similarity_id": "b76bb63d0fe87769f0f5760dbc963d9973c0eff03cb994d0bac2a1c85acf24cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/positive.tf", - "similarity_id": "d861b8319f64b5b27a0b5ef8e6b6425fb817e2fa24de1966a9b6e98d84fbb346", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive1.tf", - "similarity_id": "4d4f54f186e3f133bbfc776833587aa21ad50621e7eae5c21306706590f42c7f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "702f509ae841055208e001af8fa7ca8b3016725173987c0a0d9ef07d1967f655", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf", - "similarity_id": "a244d588c8457e9d17aff7ab0881e78cd7e7ee24b86303fefc3b275289c7ca73", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web3}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web3}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web3}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf", - "similarity_id": "5039c269aed724abfad32d1c29291cfef836fcd835dca2a8f2f21253d428d26d", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", - "similarity_id": "0f320bbb08a464ad3bb201576c6ab8fe0ab7515b5538f0365d3d47d19b4a4f5a", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf", - "similarity_id": "53ba19713edd180b6038950f1ff1fc1afbaab73ea4189808d3d9ae3388fad567", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf", - "similarity_id": "f049e2f4b1410080c08b7fdd77e814e5032943642bfaa92e8d9293126a3dd0a6", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{policy}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/negative.tf", - "similarity_id": "4e5f465f56142a344ce9f324875fc4684f341c8f90ff397b5ecedf5a4c8a8d22", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{negative2}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf", - "similarity_id": "d85c3901d6445c824c3205812d9e0b4ce0285ee1055db4434284d399fc1521a5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_open_to_large_scope/test/negative.tf", - "similarity_id": "fbec022839c6cac31f117cceb5a9883392700eaa7c34d6c9899534dee636e5b6", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "e5d0ff714dc834507f94824c26905ee1102f6d95c36d0970ecba2b12552a1619", - "line": 52, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive3}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", - "similarity_id": "2fe5ca60f925f1faa050b6a00f1e4ab559ece56062407fb40789cd0c6bf6f14b", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf", - "similarity_id": "4efefabf083ba0758f994f07e6c0c6e2d03c049a9f9a811123260110236cf0ca", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{negative2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{negative2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{negative2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/negative.tf", - "similarity_id": "acf8cb689ff30f9cb83a11625b86ebf6c3cc257db0561240c03607c1ba695af9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{mainvpc2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{mainvpc2}}].tags is defined and not null", - "actual_value": "aws_vpc[{{mainvpc2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/positive.tf", - "similarity_id": "e2d8037886c3bdf488e71230a00947af99426033c301655a49e5cd1e82b2682c", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{not_secure}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{not_secure}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{not_secure}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf", - "similarity_id": "0e1caf5ee91f0953bd914f1e3b0cf3a467c663135c80cdcbf83213f12cd61a29", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "92035e70ffe2241953d3e583cc1aee9d83c867f810614838cd3b96f6f81f8f32", - "line": 63, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{dsg2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{dsg2}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{dsg2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_endpoint_config_is_not_private/test/negative.tf", - "similarity_id": "24bb2934969beeb06f1b9bf414e98f9559e37d338267ed4dc409cc62756c3ff5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", - "similarity_id": "9e06c6e1603dd8174b1244ffe631c81c2a6c0615b012755155b90da9be3d0cde", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive2.tf", - "similarity_id": "1a38a4f86212d5c9cff8034f5cac14b43dedcc8e75cb3de8ed1501548d8490bc", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_default_security_group[{{default3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_default_security_group[{{default3}}].tags is defined and not null", - "actual_value": "aws_default_security_group[{{default3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf", - "similarity_id": "ae01458619d3cb08379e2a0f5c2a124ee3a1b661b6cf51b45d3aed0182a2c74c", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/negative.tf", - "similarity_id": "fb60c9676378238bf5f34f5aa7f841dd619dc872a212cf9d3f4c2a21eef4e4ab", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/positive1.tf", - "similarity_id": "9ff674fd4c1d89108215f2de81501dde202d0bbd812b61ca2d3f6c249a308171", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{a}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{a}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{a}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf", - "similarity_id": "a2c0962dfe1ddb30bc455409d74cdec0bb5f6270dc34db13e1c35eef91ae90a0", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", - "similarity_id": "aa45110b8bbecfe4f26b3922eef575cf7b6cbe6cab7af1384c21615be13e1333", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "b5d8b948ae86e6c19f4d2cf517109c7544309b145da1060bea87ab910c8ac59e", - "line": 76, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative6}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative6}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative6}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "b9fcf85b215a6791f0022f2556eb62519ce78880e64f65531fed2c0b328617cd", - "line": 82, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst1}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "e55687ee31d44735838f27f843bf4fd3227a35648000cb4bfef50155133a56db", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{vpc1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{vpc1}}].tags is defined and not null", - "actual_value": "aws_vpc[{{vpc1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf", - "similarity_id": "2cf8aaadc1efca770f97b345001c6f0190fa95e7ce02cc1588a2106866c5d18e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", - "similarity_id": "b7b19e20c75b99ab49ba05a22f01bf622c53d8e34d9ea9d6994f8bb470d6cb63", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf", - "similarity_id": "c9fd34d9d27088cbbb41db3200be1cde9add3b06fcfb2a9a3fe3ffbcac9bb3cd", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive4}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive4}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive4}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/positive.tf", - "similarity_id": "984377e8134080395f285efdba53d519e77ff043282a27d57bf82b4acc881425", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf", - "similarity_id": "982e1352848af2d100c1cf88786ce9227a40224239fb39791db67a6402cc4291", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/negative.tf", - "similarity_id": "b44214e547049ef913befd33828546a087f82e1da2f82d404e27a6ee486868cb", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cognito_user_pool[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cognito_user_pool[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cognito_user_pool[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf", - "similarity_id": "afa43d50a177f29a4a706003eca3c7aab0d1f20685f5ba6e899343e73396fe50", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf", - "similarity_id": "4a537f92c39af2b24f69c5d2d2c49ddd7f11d372bf0e254953a3b5ba4919cb34", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{enabled}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{enabled}}].tags is defined and not null", - "actual_value": "aws_lb[{{enabled}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "75f9777570c99ab5547d4497da40f432fafb4bd0c0da16ae3c970cd905682369", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "7c6dda3a73888b08142eece5daef8aed2e391630964731f9ede3c7432a41884e", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{private-subnet}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{private-subnet}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{private-subnet}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/positive.tf", - "similarity_id": "9dcb841c390a8929c7cb81d0032414355ff366409eb63d444493b2974a3c5d37", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_config_configuration_aggregator[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_configuration_aggregator[{{positive1}}].tags is defined and not null", - "actual_value": "aws_config_configuration_aggregator[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf", - "similarity_id": "234f8e60da0d499c4c98e4362d24170bea533db1983a7f655643d14ec800bc98", - "line": 29, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_policy[{{policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_policy[{{policy}}].tags is defined and not null", - "actual_value": "aws_iam_policy[{{policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf", - "similarity_id": "30941eb9e12e564ea70620a40fc2fffdfdbf412c2b1f67cbc12205a472650840", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_snapshot[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_snapshot[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_snapshot[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/aws_passord_policy_with_unchangeable_passwords/test/positive.tf", - "similarity_id": "6da9cf1307246f14181930af7528366c659d7045350cc83a5bd5f65fc9726f10", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/negative2.tf", - "similarity_id": "1f8423f3889aad9b2069339841db249da47be9cb7de5f39e048a28becd8cf9b7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_server_certificate[{{test_cert22}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_server_certificate[{{test_cert22}}].tags is defined and not null", - "actual_value": "aws_iam_server_certificate[{{test_cert22}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", - "similarity_id": "aae8be024ae2dc00ffeac6cb9018f52f300eb454c897055b7cf7f732fa2c01e5", - "line": 32, - "issue_type": "MissingAttribute", - "search_key": "aws_cognito_user_pool[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cognito_user_pool[{{positive3}}].tags is defined and not null", - "actual_value": "aws_cognito_user_pool[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", - "similarity_id": "20c8f6c27ec76ef7aba62b59bfb7478e00320f3687506b8b1b9c2960b2aee752", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example2}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/positive1.tf", - "similarity_id": "bae526766626119cb4241a4ab7dafcd9ea56d606c8a0077a8a4be8190f1ff7bf", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/positive2.tf", - "similarity_id": "018c21605d11540dd3a13a83992d6301d871c23f33dc9afbc8f697730c7dade3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/positive.tf", - "similarity_id": "0016630a8c34f4eff3a0aaca9e7749a87395959b46f803c0feebcc13093edb6e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf", - "similarity_id": "06dafba0889f7a0dfbe15d7eeaa7b8399136eafd147c9dac89065126211ea45b", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "513e22c2f03628d40876f6fe55a78e2d6076e249adf1364ef3434ea1a22aee52", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf", - "similarity_id": "1b3654352954d3259c45f249b3a6a32751caa5850cf4cbffb6cfc59d9ff0afb1", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{web}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{web}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/negative.tf", - "similarity_id": "488b6284ac054f8288f53f91a33b5b9b66d46152a341cb85c6d946cb28f27a29", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cognito_user_pool[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cognito_user_pool[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cognito_user_pool[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf", - "similarity_id": "7fa574ff6e00a8c3e7b9d1d8fe7fb6405cb5994dcaf4c2d7fcc7efcf9afdf0bb", - "line": 21, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{negative2}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", - "similarity_id": "1ae11b5c34bc8dfb1b6d7d138c7277a4324168128e335b627272496bdcf725aa", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/negative2.tf", - "similarity_id": "b8729e07b6b29248dde8401df8f2da902196ecba2e6b26ceab0471ff4fb5aefb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_autoscaling_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_autoscaling_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_autoscaling_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/negative.tf", - "similarity_id": "48e394d2b464d1f2da97d1361bdeeb22bc1c5ef4ce4e429a8e490374c90da544", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticsearch_encryption_with_kms_is_disabled/test/positive.tf", - "similarity_id": "cf87a7640cd0e4bff87abe256c4a4238fe3c366ad643537058794d29a3938248", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticsearch_domain[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", - "similarity_id": "a5b97d1e1c1f33de962232b376287796fd3d5e0bbbce702e8aeac1a39f1e80cb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{disabled_1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{disabled_1}}].tags is defined and not null", - "actual_value": "aws_lb[{{disabled_1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "9be721d034a88551b79b7a398d01c81f3306365b98f2ff1ff5c4d9fd48098df5", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative_rdp_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative_rdp_2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative_rdp_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", - "similarity_id": "7fff89cfcd942ab435923c62da6cefde6ddd4fdaa81d1780e299cfd1a20646f5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{b2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{b2}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{b2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf", - "similarity_id": "72ec12b487c7e9d3dd1e68580dfc5c974a98665278f3b1164880ccf14f86c421", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf", - "similarity_id": "e6dd823caf7a585dd7b65f62855a57a20ff57c92aa0beb81a8bd8c648b47404e", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "281d707fc8f4759d51c817fc8ab0a0be8ff772c3ec5839abc94a063a5097d074", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "5ae8b018575d04dd20b6e8e9440e73da7cc148ff384e5eac3e9e8498e7827d55", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{public-subnet}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{public-subnet}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{public-subnet}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/positive.tf", - "similarity_id": "a0eee800f0535ef372677f08318e4864315e62f73d1436dbdcecf33d73c441e7", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_config_configuration_aggregator[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_configuration_aggregator[{{positive2}}].tags is defined and not null", - "actual_value": "aws_config_configuration_aggregator[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf", - "similarity_id": "833afd15f489ca94f8359c3ab68974879c9f6432206fa58e45403f38bf62cdb6", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", - "similarity_id": "384563f2000b97b49c76c0b744d6f87657c29650bc3aaacd7d698613b494940a", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf", - "similarity_id": "3c7f7e1bcd73f128dd48e5b415f62bd2ffc62aa6a173d36305e31ef0659a1ad3", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", - "similarity_id": "8df4ab9d742dfbd7d76985f1cbc05ff9304bd86987d259c892761b433889c44e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{hoge}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{hoge}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{hoge}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "22c49b122aef8aa6218731b03f2fd0d2c6bf84e0cf5b7404d13b3b97b1c2c935", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_neptune_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf", - "similarity_id": "a367c223bed4b262eb59cca637b5ac9ea9efa3179ff7aaaca4aef6889d717bf2", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{lb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{lb}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{lb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf", - "similarity_id": "2ee4037e0bfaaebca4de967bd0036ae1e23a1f4bf0fa8c1d70447102045ade7e", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{positive4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{positive4}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{positive4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative2.tf", - "similarity_id": "59fb9a79d5902a0a2f72436900db7bdd09cdb7b9d3631fcc7a1fccd62d7c1ae5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", - "similarity_id": "3834c9adf8937618934f261798ed8c0fc29537a0d215d89901e8e677d46d17ce", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/guardduty_detector_disabled/test/negative.tf", - "similarity_id": "0cf1391ca55a0848e6dcd111bf16c344c999b5c98f1b27866b6206d67bd5756b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_guardduty_detector[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_guardduty_detector[{{negative1}}].tags is defined and not null", - "actual_value": "aws_guardduty_detector[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf", - "similarity_id": "833c6c3f7c9ed303a2e1612a4e6e7cc9ed2f10abeddf41b6b10c2ef375645f88", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/positive1.tf", - "similarity_id": "30572ab291cdf06c53feef4a67c31936710a3d67070170d90e109ea362a34204", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf", - "similarity_id": "2dd4f8f95eca6d6c33c448f433f98deeebf493bbb936113e3e3f35cf51d0498a", - "line": 86, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "3b52be7ccd4384373ae53b5a5c8ec90d022e3dea5d32aa74da9fda48131d0d84", - "line": 96, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst22}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst22}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst22}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "c114ffd1fe9e71076ebb5603a4029e258720b56be6654d604182b38455ec95aa", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "f8c357fd2709f9cac5ce2242168c25cda405d166748fdd439ff2874beebaf447", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/positive.tf", - "similarity_id": "693c6b1b83cb84dcfc101c911b27826411c5715bf85cbc09ce92708485b839cb", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf", - "similarity_id": "1eef4bcea4ae9f3a6acb090ab4a90f351e0e6ad94369b99eadf218205f82b508", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "cda229e77ffdbcbed15a49f4a9f3658b751bae35e0c6922c00a12679fc7ee9c4", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive1.tf", - "similarity_id": "6affd9e757245633559f25f56d3fc5bdc492c91380dd1face201c5fd701a2f11", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{positive1}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative1.tf", - "similarity_id": "13c886cd1452109a92b483cbb46860b8f77d2240f01348a8fdd10291b93b2af3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/positive2.tf", - "similarity_id": "3d08ddfd925693ab1c9c32485d35808588ac6d9abc1ea02ccdd49bac13fe10ab", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{service_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{service_2}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{service_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_group_without_users/test/negative.tf", - "similarity_id": "fcd4fa42ff7d45e41e3f1b91adc6626b4eacc885aade0306a59e86c19834a7ca", - "line": 20, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_user[{{user_two}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_user[{{user_two}}].tags is defined and not null", - "actual_value": "aws_iam_user[{{user_two}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", - "similarity_id": "f22789d04b8b1403818e4a411620937640f2b021874e9a62798db357ba773dd6", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{public-bucket2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{public-bucket2}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{public-bucket2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "4332ace44f5e064a340c8373ae6d0243898f1e4770e5f060a6d4de9c9ebff5b4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", - "similarity_id": "14927b7e021766d6a67464303fee04e8ab8360e7114086f20899791b2da23c32", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", - "similarity_id": "a7d173569d7a016917bd5939a7bf51fef6a84ae3c328f47dfcbd38fb5d8e0fc1", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf", - "similarity_id": "a6f97695d5a67f026b54b6737b70b7f02010bbd87714c915119fa0fa44aae6de", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{negative4}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/positive1.tf", - "similarity_id": "9f1e1a96a296750c993eb4423f1963e5ba213e06d7f8a30adf9a8af7809773b5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", - "similarity_id": "ce2fc142c4e77729ebfeeea61696cba28fd40b476415f9dbd02e9686ae8d71da", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf", - "similarity_id": "4f44335b78daf819489d6f3631705ee15f67ae857c23ef9e59643fd4bfb16977", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_subnet[{{positive}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_subnet[{{positive}}].tags has tags defined other than 'Name'", - "actual_value": "aws_subnet[{{positive}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", - "similarity_id": "d804240d04d6e1dc57142654b2d1e8345d1d9addf7be6d8d47fba607c0d20879", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf", - "similarity_id": "7b30d19f6b76b71271db841a6c68752d006de9f41d3800af8bc570a7cbd38039", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/positive.tf", - "similarity_id": "c662a1c3aff2e5d8a1a08ecf9c8ed67f9f62b0455136fdd9846ea635d653f11d", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{test2}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", - "similarity_id": "587d003f018d259d59ec27cb0871858678c6118fcf41b4b36e6dcfd1aae1f40f", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/positive1.tf", - "similarity_id": "d7b8a6817257fe11d9e53c30fdbeca3deea30081a7e5d8006fe1b6a257244c7d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_task_definition[{{service}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_task_definition[{{service}}].tags is defined and not null", - "actual_value": "aws_ecs_task_definition[{{service}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf", - "similarity_id": "cc04f65894ecccf45706ad5f1bca8f368a9b7c97c13299574cc96166565e5d32", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/negative.tf", - "similarity_id": "d97372acc69a3fc7cb235309877d6da7eaec1b19d082109142aa662089cca0ca", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_usage_plan[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is defined and not null", - "actual_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf", - "similarity_id": "b5053dcb7b2ad6839a5b2f498153f3ab11a56394110970dcf6b3fed99100cc46", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_athena_workgroup[{{example_3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_athena_workgroup[{{example_3}}].tags is defined and not null", - "actual_value": "aws_athena_workgroup[{{example_3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", - "similarity_id": "b07f5d0e0400b24fd67fd6b7f400b254ffc99cb9cb52cb16ff7d0b70a979a1a4", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "bec8b88dcdd7274c0913ae55ffbb97e39181735b7beb02cede22aac4a6afe55b", - "line": 50, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{public-internet-sg}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{public-internet-sg}}].tags is defined and not null", - "actual_value": "aws_security_group[{{public-internet-sg}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/negative.tf", - "similarity_id": "88d3c42ad9afaf18587c30b64e87e361b6e663520c45d5dc53f6e31d0196aa44", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", - "similarity_id": "e4570226e23eff95f0e8092718eff2b6b165ccb72af1615709e124d653ee273b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf", - "similarity_id": "1ba0e13f7133e120992d54567c8a436cf1c709b653a3c8a04a2c34b03f52704d", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_apigatewayv2_stage[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_apigatewayv2_stage[{{negative2}}].tags is defined and not null", - "actual_value": "aws_apigatewayv2_stage[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "54431b4ba109f780027bb657a4b01e3bf5fac5618443d38e7f226c1e9549955c", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{foobar}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "79edd38fe37cad070083c72c6c661c1bf760dcdae8c41cedc880daa41a7a1abd", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudfront_distribution[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "620489c70fa3399b9a537d08cfa8225cfb43d3aaa5629d47b3bf29088c98e56c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/negative.tf", - "similarity_id": "80ee37016638db5b66f2bbd4535df12b9fb7b014bba793b2407c86a45d16497e", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/positive.tf", - "similarity_id": "2664f51812f69054da3e0d27289877929dce48dc24ebc3ff1facbac211825607", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "601f093f973a6a58c312a2ca5d41f76b6fcb08f132d9a1de86abb7625e5c03a8", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf", - "similarity_id": "6e69cf0147859cdf85c98abe63c36358c5dd505b88b657041bf6495aab32a05f", - "line": 107, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{priv_ins2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{priv_ins2}}].tags is defined and not null", - "actual_value": "aws_instance[{{priv_ins2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "c5876b169aed55a45a3d6baaa838ae7089f6e3b7732ade59f743367130d863ef", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/negative1.tf", - "similarity_id": "de004ddfe8d1692f19f09107d29c4dbdbccb706646afec6a76f16698e59b1ebd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example3}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf", - "similarity_id": "32209efdc9044e088525b422321326c3a6d649450837968a06984eb958841ef2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", - "similarity_id": "77fa4e7bf0c2ecf023209be8b937aeef6d09c078ec2804c53fc9806a904d7426", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf", - "similarity_id": "74ff7ba80ed7de629006cf6ae6088231c0c5bea9d025730d558eea523af280cf", - "line": 109, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{inst32}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{inst32}}].tags is defined and not null", - "actual_value": "aws_instance[{{inst32}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf", - "similarity_id": "e1e98cefb5daa25c81cb08c90b4a4255937ebe2f08666808886d2d727ef3dfc7", - "line": 38, - "issue_type": "MissingAttribute", - "search_key": "aws_kinesis_firehose_delivery_stream[{{positive5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kinesis_firehose_delivery_stream[{{positive5}}].tags is defined and not null", - "actual_value": "aws_kinesis_firehose_delivery_stream[{{positive5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "5a925546150e29169991bebbb29441a61d21bf295d40b4c9634c0666c9a8c694", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive1.tf", - "similarity_id": "37c91425efaf2005266249ec1202652e66a5f58a1fcaf6a3af63353b938fabc5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{mainvpc}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{mainvpc}}].tags is defined and not null", - "actual_value": "aws_vpc[{{mainvpc}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", - "similarity_id": "b688aba31df36fda9b0c1d60e06992e6dfba6669e3660b7e766cfc13e29dc07f", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/positive.tf", - "similarity_id": "cb38517d1e890b302216b8969a79d6ea9d572fa992fdfe20672e03c9c4730c8a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_route53_zone[{{no_query_log}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route53_zone[{{no_query_log}}].tags is defined and not null", - "actual_value": "aws_route53_zone[{{no_query_log}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive1.tf", - "similarity_id": "532e0628749b35e62484dc3c545e44837379ced4f5bf21b6981cec7544c1c255", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{foo}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf", - "similarity_id": "83a3b5f34b9eb8e11879eaf2a664596d1d42178e34b09295dace03de04d7f347", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive7}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive7}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive7}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf", - "similarity_id": "d33885b4752c1cd6deba1a99a227057e340558dcd42e82e1bf886d1e8cb7562c", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf", - "similarity_id": "6c7395a794baba6c9988754065c2b636ae9956b4145496903e4ed1bfe4aa4bee", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf", - "similarity_id": "41f4819cf71faa08ab8c1e7224157b0b08896bf5b42a8cbb3dfb4f8ca4315655", - "line": 49, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test}}].tags is defined and not null", - "actual_value": "aws_lb[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf", - "similarity_id": "09552c9d72f4901a6c27d4166d11507eaf9c7e09f17e0c57a9af37c28b5d2b22", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf", - "similarity_id": "ce678c19eac6251be9ac636c6c7e7f31f80268976461050404fa6beb49e28ba0", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf", - "similarity_id": "aa1d0d9fd6d2fa93fa7ac9435af5359b3fa52539a4d4ce0751205d5399bc04ca", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative4.tf", - "similarity_id": "7942fe4ffb05fe2182a7065baba61b75c5fef5ffdb8af42eaf47dfe0e6161ffb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf", - "similarity_id": "7e2cd7fa837fd18506c14769af66dfe98805792005b0b4e118ddcb7b468f64af", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive2.tf", - "similarity_id": "2de1f3d740a1dcbbbe19277e30c68fb82317786adc25dfd67dd872c3a969d180", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf", - "similarity_id": "1fc945ab6ee52928421a34739f7a32babc4350d8243f5f44ab4b31aa4b3561c1", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_role[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null", - "actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "d326a8dbb9f5951b20c168526f136dbf556f66c563152e3597797b44b66c111f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_cluster_snapshot[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_cluster_snapshot[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_cluster_snapshot[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "521c81505724383bfb5396504d5ebd1d46fd841fccfb65efbede5b7d4406b780", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf", - "similarity_id": "a8e36842361b20aa35e38ce880f19d44fdf6bce0b8e25777ed5007cddbfa9e31", - "line": 87, - "issue_type": "MissingAttribute", - "search_key": "aws_eip[{{nat}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eip[{{nat}}].tags is defined and not null", - "actual_value": "aws_eip[{{nat}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", - "similarity_id": "b9874e27be7e0647d7af01881182ce65386a74f7271f4e1a9a2762197b761c75", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/negative.tf", - "similarity_id": "081766e2a442d300fc35d57461730db9b2e845d070016bfcc7a1e9a50154f590", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_cluster_snapshot[{{negative}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_cluster_snapshot[{{negative}}].tags is defined and not null", - "actual_value": "aws_db_cluster_snapshot[{{negative}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/positive.tf", - "similarity_id": "d785261b8dce77ade8a40b5986bf94213399251f92b9052f778a2ff484ff75d2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{positive1}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "0dd80711add1ce6378403c30483e7369758f34744d776c49f353283172c8c356", - "line": 91, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive7}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive7}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive7}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive1.tf", - "similarity_id": "cb9462d2498c9b18719f6b211dad05fb729f09d97cec3c112e371e97b622f414", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf", - "similarity_id": "bc329eca221daf5e6014092ca2157b910aaca4e2b0b3882e8e610899ea8af0e7", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", - "similarity_id": "3195f78cd8a542e0cc2b69e0c612503af894d467018cae708dcdd45190156146", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative2.tf", - "similarity_id": "bf6d88f277325c7349fd318c6e8c81adc9eff5752f89325c79dc030d45f227c7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{enabled}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{enabled}}].tags is defined and not null", - "actual_value": "aws_lb[{{enabled}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", - "similarity_id": "a16d5ea1a614053a724e936eeeb384ec38d66281c71fd63bfbd170dada7a3ed3", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/negative.tf", - "similarity_id": "a175058a62776680ba122746d3246d3a6eec4e31f308a6b6a0f96c0d6638340d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{fs}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{fs}}].tags is defined and not null", - "actual_value": "aws_efs_file_system[{{fs}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/efs_without_kms/test/negative.tf", - "similarity_id": "53ed9ee035d0162c10c3e8c08c3b725ce8a5762f69b9b37d099eac76e6246a5e", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_efs_file_system[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_efs_file_system[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_efs_file_system[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf", - "similarity_id": "2f1f1c31fcfec200e1fc9859daa6f8af2b03b7a0ad0acb538165c7b95965594e", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative1.tf", - "similarity_id": "5e09ee363daca360c6150982522064e3604df8aa293909a7a8ecd3592bfd96be", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "d1bc013d22bd9b431fd0591e9dff453dc4d7a9d2c4d72327a991f24b3c155fed", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf", - "similarity_id": "160cb5262627941db1594fb9e6950b0d97f90fdbf924898b6f63720cad1401ce", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/positive.tf", - "similarity_id": "3b40f0da0d97d24220cb0b37bbf35c02a473475326118f652f3cbbe22c88419f", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_ecr_repository[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecr_repository[{{positive1}}].tags is defined and not null", - "actual_value": "aws_ecr_repository[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redis_not_compliant/test/negative.tf", - "similarity_id": "35533628d428fcf760e95a652fa5ab00a44b8083567f688fa278b6e34614a825", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative5.tf", - "similarity_id": "1101d8de10e40f8bd4dbeca5395b916a9c7ce5bbd2cdc01acb40c9738416d215", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative5}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative5}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative5}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/certificate_has_expired/test/negative.tf", - "similarity_id": "0ed3a66686058d15e17422b4fbb0548bdc5b799b9ed5e9b87d6e3600c88b3244", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_domain_name[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null", - "actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf", - "similarity_id": "56bf6fcaa667c64d1719827f23d2c395b6878a2d868cd84156ddfa817a1f2797", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{disabled_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{disabled_2}}].tags is defined and not null", - "actual_value": "aws_lb[{{disabled_2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", - "similarity_id": "d4ec6345adeac1d529ac8db293520337be2d1318aa7e50352d3bd172e403f445", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{hoge}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{hoge}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{hoge}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redis_not_compliant/test/positive.tf", - "similarity_id": "20b4570b5e4a26efcf5f9bed289236093b7b46ae1c9f5d98b72ff93a0b2664e2", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", - "similarity_id": "e3b56bc8117c209f761a5bcee62f3c87318383c21502a59b597214ec673bff87", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{b2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{b2}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{b2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive2.tf", - "similarity_id": "949a306a3308f3a06467af8857db125a7306d4c40184feffdf0d3d4009e9d8fe", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{mainvpc3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{mainvpc3}}].tags is defined and not null", - "actual_value": "aws_vpc[{{mainvpc3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf", - "similarity_id": "33b3deef328bef37410c6c04a01b0fad8daeb0a0bf531a592e4ee1259a295e18", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_msk_cluster[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_msk_cluster[{{negative3}}].tags is defined and not null", - "actual_value": "aws_msk_cluster[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf", - "similarity_id": "e10ad2160d6ac745089e335b6cda69dd13c9a826d031035bb4aafdd5e8aae0cd", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secretsmanager_secret_without_kms/test/negative1.tf", - "similarity_id": "3c47dba1e9846e327a128b578dda73d118f61110f2d4df03bb7d450d10e349e5", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{example}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf", - "similarity_id": "a9c98a90172b03a72986a5a934fc73672f08fa82d9e1fcf2da300b463bd98773", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf", - "similarity_id": "8d89f8b1b51323d94d21e4fc36308492021da41cc8d95749bc80fc133bc1a8a3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_instance[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/positive2.tf", - "similarity_id": "5000c8b54e1f5c18de4cc7dc43cb5144d8000445b21f51260a0155a171b5fdd2", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example2}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "0485215ddd3b48d8026419cedc469648bd50e6c07a621a08c0b4e31f83f806a9", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{foobar2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{foobar2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{foobar2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf", - "similarity_id": "313358e70211b2aa3542a89e1dd0146dcd7d4db5a614befd496f95909166ddf3", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf", - "similarity_id": "e2389542084f3ba7348468fe067f1023a16a93289872cc859925bd75aae5f8d4", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_cognito_user_pool[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cognito_user_pool[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cognito_user_pool[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/negative.tf", - "similarity_id": "b5344e5f0dc48937a3c8af22cb5f15583372a82741e0efbc868c288725105f5a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf", - "similarity_id": "f7962d8c5aa507889fcd0615c483817c5724e8cef9287b202f0a4f4d86b7640c", - "line": 39, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/negative.tf", - "similarity_id": "880d9fc9b2f770a9be7c1038723c1956b4a6d38878bd1e6583d889dd4e4a9734", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_config_configuration_aggregator[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_configuration_aggregator[{{negative1}}].tags is defined and not null", - "actual_value": "aws_config_configuration_aggregator[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf", - "similarity_id": "50de1f16ce95091bc912f7ba8841317ee874a7c2e9e262054c31757297dd6685", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_lambda_function[{{my-lambda}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lambda_function[{{my-lambda}}].tags is defined and not null", - "actual_value": "aws_lambda_function[{{my-lambda}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "7c871a31272c4ae39136cc911630e06f635882cec88835b888bcbee00635f257", - "line": 103, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{test-queue}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{test-queue}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{test-queue}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "87883982047b5e857bc246bd8e71e8e11616b62c965b75047f9b8e4f8cce0394", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "57b4362f2c9b2c41b471e0e188c115a892736b484e94586a6ed9de446f41112f", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive2.tf", - "similarity_id": "87552b3ce68c7e991e907c7249c54ac17a4f495458af641b3aec9702d98cc05c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", - "similarity_id": "140a94d77dc6e84835f595a6fb50fc2c9d79bd3b1f90824063ce58295923e812", - "line": 28, - "issue_type": "MissingAttribute", - "search_key": "aws_lb[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_lb[{{test}}].tags is defined and not null", - "actual_value": "aws_lb[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/positive.tf", - "similarity_id": "50b0d6121f1baedf2144e03de9d1b6c9ed9076cc397ad685f0d4441af04d105a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_batch_job_definition[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_batch_job_definition[{{positive1}}].tags is defined and not null", - "actual_value": "aws_batch_job_definition[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf", - "similarity_id": "3a7740697e63500d62666816c41095685563f0030ade329bd195c161946c5f3f", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf", - "similarity_id": "6974389fb3d7caabbc30c6aa1659b4645da99d463151f04b894bcdfac89a0339", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "aws_organizations_policy[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_organizations_policy[{{positive2}}].tags is defined and not null", - "actual_value": "aws_organizations_policy[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "c0ddebf53afe007e0bfe45c1531d1a3f2e837471aa5b9aa28efe0900521837b0", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative4}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", - "similarity_id": "87671640449d67dc448eb5bef9fd3cbeadcbabf94706084cb37b1020a7d5f9c3", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf", - "similarity_id": "3cb28a46a92d9ec5e58b4c81cc1b7ddfc2f153703d6e387dc91b2f26b6ffa60c", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/stack_without_template/test/positive.tf", - "similarity_id": "94bd70f63e5b28d52ebe2a594a5a6c8e91f45a88603bd3bc7acb92f2de8908bb", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf", - "similarity_id": "6641f2907e698ff4339895c7a12ff6449aa58873d52b42cfd8d58ea58ecc10a9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_vpc[{{main}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_vpc[{{main}}].tags is defined and not null", - "actual_value": "aws_vpc[{{main}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf", - "similarity_id": "e64bbb0a3a0becc5cafd664fd8e62609e2d9546a8ec128b9c8cc28a3000fc2a4", - "line": 40, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative1.tf", - "similarity_id": "0bdc8f4e6320805d81e6e8e22e49b375132a2cf2ffd25570e78f08e8611ca657", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{secure_policy}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{secure_policy}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{secure_policy}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_cluster_without_vpc/test/positive.tf", - "similarity_id": "df900952faef7848302a280a53960a09dee624ac89d009415f5cd16faf0ba3a9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", - "similarity_id": "b57a9cadd8183f300a98687aba9372f8c58d400be75d5a297c46776148490535", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative1.tf", - "similarity_id": "550a00588b31e605da782c1aa8b6bf2bb9e2d902d523ec40f90189008403366d", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sqs_queue[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf", - "similarity_id": "8a622b3a313decf89e16ae1d5cdd5ccf83e7cc1bad2b672e82447520294cf99b", - "line": 61, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf", - "similarity_id": "a37f57eb3663501b2807b523a87af9bceefaeac497d97ac445563e88d485c902", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", - "similarity_id": "f7a4bdb1d71f1d9fdd75a26b69ba5374136cfb14ea8b908d338e65540145582a", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{positive3}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{positive3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", - "similarity_id": "dd87fa508d2dc1164be7b6d4d6c0cfc328a931d8a13f472064d33d9cde4b4bfa", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", - "similarity_id": "fcafc04f0436f043a3e96f82e5781d5e6fd8503b19f3fe7ec8fb2cd281ab8990", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{foobar}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf", - "similarity_id": "21decdd58927b41d4a493e3983846b6452ade1efeb092a674a1cece45ed0148b", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "b30672d78bbb6838e056bd11b4314ba3e07bf02d1d973fb3841b5f2022697aa7", - "line": 16, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf", - "similarity_id": "4851daee2c0d1a898e82f67d87c9ddcd3727506838b9d21d49ac092fec7dd1af", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example0000}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example0000}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example0000}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf", - "similarity_id": "f2e8d2e11b10be3f7b6b6837fdf37435c09a90d2150ffbceff1359319fcdda20", - "line": 66, - "issue_type": "MissingAttribute", - "search_key": "aws_iam_instance_profile[{{test_profile4}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_iam_instance_profile[{{test_profile4}}].tags is defined and not null", - "actual_value": "aws_iam_instance_profile[{{test_profile4}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "87be0de6ab2fd60ca0d74fecbc385e00289636f864877ebe9c0ce63ecd82ef07", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_is_publicly_accessible_for_subscription/test/negative.tf", - "similarity_id": "0e4d096b9e40efa9af714d4561fcb748406d688259bb5b87beddf38374acd29a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{negative1}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "f03baaa27f8c837d97fdbd9d3e194b604a286b5bd4f8c643ea50ace15cbf622d", - "line": 46, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_security_group[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/positive2.tf", - "similarity_id": "87243a3303da420997d3d18fc2a6e27a0071b5931209e7c27cc5b095c99e8cbd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_replication_group[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null", - "actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf", - "similarity_id": "52d6ee7fb5aad8b7620ff3aa604aa51e073e1e2c2aa0f8521ade710451affe4b", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_flow_log[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_flow_log[{{example}}].tags is defined and not null", - "actual_value": "aws_flow_log[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf", - "similarity_id": "7bdb3b505e086a8a9ff635fac05bc14c989e8cc78caf5fb32f6da520598efe8b", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf", - "similarity_id": "80c078fed0ecee71812797bf777b736c7939b9c09aabf8e612bfe7dfdee0aa52", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_log_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_log_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_log_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf", - "similarity_id": "e54023286799116b5615729250c77cd94324b2838265d1170002b8f1b928006f", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ecs_service_admin_role_is_present/test/negative.tf", - "similarity_id": "b96228815033408893ce8fd1db2cab1aa22a98d6e7a15695a9ae1c6ac2dcc8f6", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_ecs_service[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ecs_service[{{negative1}}].tags is defined and not null", - "actual_value": "aws_ecs_service[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/positive1.tf", - "similarity_id": "7b71d1bbf0dfd7d94acc74db6a744ba4b63a5da80f047a0e0da35169e356068e", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_sagemaker_notebook_instance[{{ni}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has tags defined other than 'Name'", - "actual_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/positive.tf", - "similarity_id": "8781b118e92c6cb375673038a3b0c6fc45fe8ab85fc45eda36927bc77aaac83e", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_config_config_rule[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_config_rule[{{positive2}}].tags is defined and not null", - "actual_value": "aws_config_config_rule[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/negative.tf", - "similarity_id": "7009c367e82c41f46df83dc6debe9d3773acd115793e6be228caa5b25f9d0bac", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{negative1}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{negative1}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{negative1}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/negative.tf", - "similarity_id": "5bfe6770e71dc946ae0b8ee4820c83a84a1eb5f6fac48784fa1a7ec9f915c53e", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_config_configuration_aggregator[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_config_configuration_aggregator[{{negative2}}].tags is defined and not null", - "actual_value": "aws_config_configuration_aggregator[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf", - "similarity_id": "677c8278ad8600fc8674ba7c9f975f5579bca11214be0970253b6d544371a808", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_apigatewayv2_stage[{{postive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_apigatewayv2_stage[{{postive2}}].tags is defined and not null", - "actual_value": "aws_apigatewayv2_stage[{{postive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "302075dff2a31fc6bc75e9fde67f1a221088d5da68ac01b51013ebd96815eacc", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "ae93eaa8e8f54e1bfbf1a4c0ad5de0151e93aef56e732de444da3d9ef9172ca6", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/positive2.tf", - "similarity_id": "5a9008d0d0138a984503ca53e2f51e478fe6cfde4178142bbe30051dcab2d506", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_secretsmanager_secret[{{test}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_secretsmanager_secret[{{test}}].tags is defined and not null", - "actual_value": "aws_secretsmanager_secret[{{test}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf", - "similarity_id": "08a2d4c9429eec1283d35f14ed8e628c487a92fc2ad70fb90bb50a318e5f796c", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_acm_certificate[{{cert_2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_acm_certificate[{{cert_2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_acm_certificate[{{cert_2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/negative.tf", - "similarity_id": "7a132fee2deb850f513fec0e5a8c05b6ad272a836551874715c2206d142e846e", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{example}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{example}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{example}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive2.tf", - "similarity_id": "e99ae1aa232256214d6ac75f69c61d7ca59e958b16a587363f151cc8834862cf", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_ebs_volume[{{positive2}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_ebs_volume[{{positive2}}].tags has tags defined other than 'Name'", - "actual_value": "aws_ebs_volume[{{positive2}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf", - "similarity_id": "b89a5d79bd15d921bcf23099a523c1cdcd64077eb6bd136b2808adad61fbe66a", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_instance[{{positive5}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_instance[{{positive5}}].tags has tags defined other than 'Name'", - "actual_value": "aws_instance[{{positive5}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/positive.tf", - "similarity_id": "75d2b7920b52c18409959bacb4fc583cdce0017ea304566c0dbe5841ee4df2ef", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf", - "similarity_id": "6703a70ede7cd94c9d9b74bfbf4f6d63ead29d11a3ffe4489a08044cdd4a830a", - "line": 9, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example000}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example000}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example000}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "5169079fcfb849c9e81452116aff756bddde8694e23ee2c1c0402e8fe5849d98", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_docdb_cluster[{{docdb}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null", - "actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf", - "similarity_id": "692d8ca81cf118529c0c61d2cee69fd0b470b73ff90a4cd7c99c58374af3bed0", - "line": 11, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{example0}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{example0}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{example0}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/positive.tf", - "similarity_id": "d286ccfe47ef661cf5cd889c56839865a27f821ecc85d02b1ac5bdd55f095a9c", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_kms_key[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null", - "actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/negative.tf", - "similarity_id": "2e8928c15569c8f1ee1579fc9e6db4c07a800a0d85d16c3a194b1750ff68615b", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", - "similarity_id": "dd381de9d3f2bc4b9643ddec720880ab11f591e257e3ff28e7686820ed54614a", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].tags is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/redshift_cluster_without_vpc/test/negative.tf", - "similarity_id": "8a0f0afa6d548aa118b6a82ab18acf19588e25ed746aebe0759b260947d28235", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_redshift_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf", - "similarity_id": "1aa77ed9f6defc4e886074d8b19fb827a1f667b9397a84bd9a4110ead7dda527", - "line": 26, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive2}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/negative.tf", - "similarity_id": "c7dd38d64d677270b9d504e080b48d7b439df8baf778d722250919b2886bda46", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_sns_topic[{{test2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_sns_topic[{{test2}}].tags is defined and not null", - "actual_value": "aws_sns_topic[{{test2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive1.tf", - "similarity_id": "a79f146a43d4456332e8f82ec105c95ec0a6ce49a09c108290c01c94be1f03e1", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_rds_cluster[{{example2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_rds_cluster[{{example2}}].tags is defined and not null", - "actual_value": "aws_rds_cluster[{{example2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/negative.tf", - "similarity_id": "72e78cbcd82758fb522c583f9f26d59435066cab71316569f7c421ea9647f438", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_stage[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null", - "actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", - "similarity_id": "27496f8453c01af6020c31c0f8bb66adf340d2d9831d5292e1c2974d17d95dc7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{b}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{b}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{b}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf", - "similarity_id": "32c367d0c6d39633be995a1b5fd139e2837c1a0e6e8056ed97e3b1619067256d", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_api_gateway_rest_api[{{api_gw}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_api_gateway_rest_api[{{api_gw}}].tags is defined and not null", - "actual_value": "aws_api_gateway_rest_api[{{api_gw}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "19aabad4f15ebeef176560b97edaf0d8ab5f14a0c3857189c9df8857c2d2bf63", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf", - "similarity_id": "3e306bf41f303bc2fb3a70159ebf6ffae3037a5590853e4aacb7e92d40f6ea85", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf", - "similarity_id": "414459e9120d1c2db94e518f0f39d10e05573c63fc3c543dc47823402d7f6527", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "aws_mq_broker[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_mq_broker[{{positive2}}].tags is defined and not null", - "actual_value": "aws_mq_broker[{{positive2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", - "similarity_id": "7ebc38adfd68ba928e8b5f1a4559b703313c81ae00733ad8fc526b63633ec478", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", - "similarity_id": "3574319f06ac50530ea75de41741e64a27356835774538b286dae3568a0925e9", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf", - "similarity_id": "06f473420868c8e813244902937352a115c34e523bc9aabcf2c7ef88d59c6ba4", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudformation_stack[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudformation_stack[{{negative2}}].tags is defined and not null", - "actual_value": "aws_cloudformation_stack[{{negative2}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "44fedd3d0e9852f493cd03729c9b667c94955bba75eb872f309f8b9e527fbe3c", - "line": 10, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{log_bucket}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{log_bucket}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{log_bucket}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/db_security_group_open_to_large_scope/test/positive.tf", - "similarity_id": "04c54fa534401d08b72cc021c163b00d3f7200f7f03b3daed1e830447ba22291", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_db_security_group[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null", - "actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf", - "similarity_id": "224ef00b57315cbee0d10def11356aff91941d6bbbf433be7ee821649d472659", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf", - "similarity_id": "88dd6632bec2e94a42a6ecc01280c615ef11760dce5e111be53f09f00eb4385b", - "line": 12, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "9f5724024ac91244a6b54b8d3725fa967f989df14d26c1cf055d8b3768623a1c", - "line": 25, - "issue_type": "MissingAttribute", - "search_key": "aws_route_table[{{private-rtb}}].tags", - "search_line": 0, - "search_value": "", - "expected_value": "aws_route_table[{{private-rtb}}].tags has tags defined other than 'Name'", - "actual_value": "aws_route_table[{{private-rtb}}].tags has no tags defined" - }, - { - "file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf", - "similarity_id": "0062acffb52169c9082bcd1a98ff5f7a87cae846e534a050c1c6458931330c47", - "line": 13, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null", - "actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf", - "similarity_id": "9d05f0f68a5dad58d0e792151ea1214aeba6e193f2030f558479f0b73c06a5be", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_eks_cluster[{{positive1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null", - "actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", - "similarity_id": "f14eb8ec31b04320c7e7b05ba8c4988cbaa28665dff7fb317d8c855b6eb02f05", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_s3_bucket[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null", - "actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "76047c4a4e7cba58c78b4c22801cd82cc7135c2cbe7e0a55a346b24091400479", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "aws_cloudtrail[{{example3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_cloudtrail[{{example3}}].tags is defined and not null", - "actual_value": "aws_cloudtrail[{{example3}}].tags is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/memcached_disabled/test/negative.tf", - "similarity_id": "49100f90b87e61710dc47a0165e8d552e911bb53a394c9a9021dfee6d579b201", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_elasticache_cluster[{{negative1}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null", - "actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null" - } - ] - }, - { - "query_name": "Security Group Not Used", - "query_id": "4849211b-ac39-479e-ae78-5694d506cb24", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group", - "severity": "INFO", - "platform": "Terraform", - "category": "Access Control", - "description": "Security group must be used or not declared", - "description_id": "eff2383a", - "files": [ - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "b34de59e36b34a4c19518a6e1ec353aacc1f0e996ad2f68c77b4c94aee19ef66", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "dc28977b6fe46ebd23c1da788a21849794afec7ff88a83ae7e4b568f0cab2b44", - "line": 8, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow_tls]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow_tls]' is used", - "actual_value": "'aws_security_group[allow_tls]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "47c5bc4571b7341d7d35f2f25d310a7770c8247d2c18651b2ef273702d73da69", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "cc14c34ecf0b1d52eb75640a2c6575a5270c8111a859a95b4f1c90219a98e1aa", - "line": 17, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative_rdp_2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative_rdp_2]' is used", - "actual_value": "'aws_security_group[negative_rdp_2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf", - "similarity_id": "e849a2f5e998cba335bcfcc448d76a78a6d9374280b64e281181b389edb05877", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow_tls]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow_tls]' is used", - "actual_value": "'aws_security_group[allow_tls]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "1079df6156741ed31a5989b95d98656352ab73401116dc8c24e58e470479fec0", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative3]' is used", - "actual_value": "'aws_security_group[negative3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", - "similarity_id": "0f0900a6fc4525d5f829110cd31568675297cd052d7d5614190d743124d025be", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "216dd7f494b888a497c227775ce036f483511eb7dad48e8cc2965dec635fe372", - "line": 58, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow-public-outbound-sg2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow-public-outbound-sg2]' is used", - "actual_value": "'aws_security_group[allow-public-outbound-sg2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive2.tf", - "similarity_id": "e55e34b27f1663115f9727fd9882dfbf8aaad2ff02b8acf0253027acb9acf16f", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", - "similarity_id": "fe7d2e8a70f2026b00b3fad43a6422b112ab7784f7e176de463dc85a211e2887", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "a91e0c532a2e0506b42ebad34088f61e924948d45f684f5af3f3af1a44d98191", - "line": 76, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive6]' is used", - "actual_value": "'aws_security_group[positive6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "9549b66a01e7d1b081807d3e10352c06582891c740a675e25ed1beffb58193d5", - "line": 53, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow-public-outbound-sg]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow-public-outbound-sg]' is used", - "actual_value": "'aws_security_group[allow-public-outbound-sg]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", - "similarity_id": "0c4b0988118981b6dafb6daad599122a0d8326bf0c7b44f8bc97c8260b97acf5", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow_tls]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow_tls]' is used", - "actual_value": "'aws_security_group[allow_tls]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "8b4e32fbf123be0405ac7075ed7c1edb6764a03a6c0f600e0bbd043fe7fd5f30", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "e9246e7ecd3569fae5a0663289fa276575bb8d768221093447162ab7ec4cc18a", - "line": 46, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive4]' is used", - "actual_value": "'aws_security_group[positive4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "651ab242e3ed0e3232e9ecc1338bb81c13a04cb6d5395c6dcfaae561e6ec3747", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "9119d6bf141f7ae79f599c17792116ce832a1e31c79903f3470a4121148e65e8", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "b09959d54b5ac1e3d7dbb0cbe0f86f688ca480ade3bc4f57222b8710cdaab200", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive8.tf", - "similarity_id": "b0fb6463e23378a02e2e53c337e1b1c2d991cf371bdeb9f3e6480f437c6fa250", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive8]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive8]' is used", - "actual_value": "'aws_security_group[positive8]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "a0a3139505f7bbcd611f4565b35010aed1622a591f24f4f840f290702f2f7c3b", - "line": 50, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[public-internet-sg]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[public-internet-sg]' is used", - "actual_value": "'aws_security_group[public-internet-sg]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "0b14bf9f8abfe6aa8342f5061208b923a5fbaac7f4690a4f648e02bddfe75d25", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", - "similarity_id": "a09497235def90f1eab9bde9aaa2515b8445b2e6f1400dd4b7cdcd19e93b8762", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "c635380bac05c17e10f99691ed4255aec4ca1abfa4be40e2f68c08faaf40e0f8", - "line": 7, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", - "similarity_id": "cd1febaf834c4d8ec3af6c2564a91cccc9efa56a0758769565d01189a25116f3", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive3]' is used", - "actual_value": "'aws_security_group[positive3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive5.tf", - "similarity_id": "92b08ca77f922f792758fd694e9fc60488e6f22ee54ac6271e9a4a666a588095", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive5]' is used", - "actual_value": "'aws_security_group[positive5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", - "similarity_id": "ecda9b69ab0e79a39243a5e0501cf01d3f5ccf44d92d4b78c743f5e4df5e05f0", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow_tls]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow_tls]' is used", - "actual_value": "'aws_security_group[allow_tls]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "910c495a10ef47ae63670f61e44a2e7b241014d2c94ee66aca6b0bcc4091fbc9", - "line": 76, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive6]' is used", - "actual_value": "'aws_security_group[positive6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/negative.tf", - "similarity_id": "8822ed74f1b9d332752c9ef43df283f1d70a4f7e813b566daf7e7724ace7fe8a", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "a2bd20a1fcc7064cdc9668ce502200a7232c2e493cddc69a428d69886c4afa2c", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive5]' is used", - "actual_value": "'aws_security_group[positive5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "29b69e4c381ab151863df423323d370f2dde43322ec602c61a0cda9bfb6e4acc", - "line": 26, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", - "similarity_id": "e84114fdc3e07676e30a9a18529cf260ab319e3f09c638e28e108ae7460de17a", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "0844f97e566c95a7a7a29e760a31e011fa8ea2393d2463649543b83e12dcdf7e", - "line": 2, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive4.tf", - "similarity_id": "33dc6947723d8c375d323a85c0fb359e8bdef2064fb8c55bf58473b2457f6c21", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive4]' is used", - "actual_value": "'aws_security_group[positive4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative5.tf", - "similarity_id": "ffa16e12728f9e0505e07000dd4fe2222ca948da262ba455b40a96eacecfe67c", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative5]' is used", - "actual_value": "'aws_security_group[negative5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "b5d2974424ee695207aea177f2cb0564e43e9557aff46635ee90b1b20631d2c4", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "d322571bdc80e01ba976aae4f31d4f0cb4077aa7037caacb0f3e6a9e9d2360cd", - "line": 106, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive8]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive8]' is used", - "actual_value": "'aws_security_group[positive8]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "ba7b211e54bbd61536a9e92c90493294de1b3e795db86cd6eadb70496eb37172", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative3]' is used", - "actual_value": "'aws_security_group[negative3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative4.tf", - "similarity_id": "85550e4d81596ef63fac7f8b73c8be29469e750bb4f79eb25d46cba32ef8075f", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative4]' is used", - "actual_value": "'aws_security_group[negative4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "4b474e5eab73dd28051e418f6d88d3ba6603074cb502dd30553a2e497cd4a875", - "line": 76, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative6]' is used", - "actual_value": "'aws_security_group[negative6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "970b6ae9b54bc9656952dbd86602f6872f9ca2fda1e337238b0ab239c696cd09", - "line": 91, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive7]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive7]' is used", - "actual_value": "'aws_security_group[positive7]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive6.tf", - "similarity_id": "9e503201ba640d6a6a0036ccf71576206d33dc737878f95dfb9dfa5669172a2b", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive6]' is used", - "actual_value": "'aws_security_group[positive6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", - "similarity_id": "44144dc84cc32ce00ef6081cac87492c058b862dfa05b5e0947a3866640200db", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", - "similarity_id": "6fb86ee07fa3ab4a26faf6ed504b5e31f5312329e7712be3a5aaba49baa5473b", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative1.tf", - "similarity_id": "1c6871ace99b13429234ecd360e86d39ce4b5560b94cca1bd33be9ef50c4acb1", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "8802e064969bc916d4ef02f06c9c47892d2f3bb4eea6c11aba564085d31d424b", - "line": 46, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative4]' is used", - "actual_value": "'aws_security_group[negative4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive7.tf", - "similarity_id": "bd267f1f2745ba7ad91ebff57611c6c9e54fd1321b8dea14d5acca714207b4b6", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive7]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive7]' is used", - "actual_value": "'aws_security_group[positive7]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "abd08f520c5633eed72885d441db5a5936387c4ae3d7db9c60e9872bd777f4d6", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive5]' is used", - "actual_value": "'aws_security_group[positive5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "c95c36535d0a7df2c176b0810f6e5d48a51f4f579f2a67e68cd3d2018699a00a", - "line": 46, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive4]' is used", - "actual_value": "'aws_security_group[positive4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", - "similarity_id": "ee144dbb3085387c863df92f0e41c0edd378c451341a233093f83b4be1ee2539", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf", - "similarity_id": "9d9754ff06cafa80f5475027c863e8913007c0d76626b1180a5cf2d638996b67", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[allow_tls]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[allow_tls]' is used", - "actual_value": "'aws_security_group[allow_tls]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf", - "similarity_id": "ae737bb212b1cfb8a2c806120abb34711cbc63025a8c15487961dd5801395414", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative5]' is used", - "actual_value": "'aws_security_group[negative5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf", - "similarity_id": "8ee3d3a402aa43b6e3f2cf54c44bd8fccc285e9a0d0bf7749fdf16cd6af15057", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive3]' is used", - "actual_value": "'aws_security_group[positive3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative6.tf", - "similarity_id": "1b16280ab89e00b2f2c57b95936f5a209c7d76840fc62ee9e39618c4b13adf1f", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative6]' is used", - "actual_value": "'aws_security_group[negative6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "474863073ae8b9ecc66d74c96204b36a3c0a32a18265bb861fc9691c62cb5ca4", - "line": 16, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative2.tf", - "similarity_id": "3d7d71e2acd96134a31a44c4888dd582061f87e9a4296654a353724b54e4149a", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "bc83bbaaef7e527400c6f92f17637ed599e8ac54e48d4fd51534190b381902e3", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "f4c4b1830fcf0beb1dc337de174fd08fa644a25dfa5f85412ebe61502dd8573a", - "line": 76, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative6]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative6]' is used", - "actual_value": "'aws_security_group[negative6]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "e93ee550ce0ee01418b4a1c02a5e048a807c14670570c7512f7ab5d50fd4a274", - "line": 15, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative3]' is used", - "actual_value": "'aws_security_group[negative3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "7e073fef54b77d57fa937bc30efb9239c7ca635f391827f864da47aca36ac61b", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "8f046721e55cb8c7c1d792300e6509f2765fb444819c40fae9c3cee98b3ea794", - "line": 6, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative2]' is used", - "actual_value": "'aws_security_group[negative2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "4d4a207a6527f23a4692690dbb93ce8956dd3262df1bf934e6924e0bc12cd1f9", - "line": 91, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive7]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive7]' is used", - "actual_value": "'aws_security_group[positive7]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "73f99f67ba58819a427b3ebc2195436342b23865ad1b69a96276d71f43801826", - "line": 106, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive8]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive8]' is used", - "actual_value": "'aws_security_group[positive8]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "36165878b6d660e01bb0e87cf7c9d160084eede23de3db5a5305ec2882bf6389", - "line": 61, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative5]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative5]' is used", - "actual_value": "'aws_security_group[negative5]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive1.tf", - "similarity_id": "59f6892722fb687fc6e9146824f4083677d37b4ce4ae2d1bf3001b1566659e08", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive1]' is used", - "actual_value": "'aws_security_group[positive1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", - "similarity_id": "b07dd9f1938ae90bc88bb632d5005d911ea42b641ade6af94d3bd966a9f9a678", - "line": 14, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf", - "similarity_id": "3b39fe2fbe598d59b160f091d9372563ffc7643f2f0031ae85669b3c83c7f651", - "line": 46, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative4]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative4]' is used", - "actual_value": "'aws_security_group[negative4]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "76b7c3aaf1da33fac752d44d1160f90bb008fec161489243005ee2beb7278e5a", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf", - "similarity_id": "11fa9ac15d69d8123ce1fb038f3086a7621d7c7fcc4fc40470372a5bef90a172", - "line": 31, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive3]' is used", - "actual_value": "'aws_security_group[positive3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "d9265eeefbc0892b393fd33b7d3188f7595eee896631bff626666ae606131752", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive2]' is used", - "actual_value": "'aws_security_group[positive2]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative3.tf", - "similarity_id": "79736e14b588a95ce6d2b547b4433187e32f6b99348adbe8b12f98af96dd9547", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative3]' is used", - "actual_value": "'aws_security_group[negative3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive3.tf", - "similarity_id": "a9edad357d7df714428d702fd554dcb88855d77ed56f94add9b002e863b3c896", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[positive3]' is used", - "actual_value": "'aws_security_group[positive3]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", - "similarity_id": "d4e7db0358e3d6347e46e46bbdd7e88f2a0820270b40061629d50a192091bded", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative1]' is used", - "actual_value": "'aws_security_group[negative1]' is not used" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", - "similarity_id": "36440f30c6b51ef6561c700d8c4a8502d89631075c7477858c39dc84bb228f10", - "line": 1, - "issue_type": "IncorrectValue", - "search_key": "aws_security_group[negative3]", - "search_line": 0, - "search_value": "", - "expected_value": "'aws_security_group[negative3]' is used", - "actual_value": "'aws_security_group[negative3]' is not used" - } - ] - }, - { - "query_name": "Security Group Rules Without Description", - "query_id": "68eb4bf3-f9bf-463d-b5cf-e029bb446d2e", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#description", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "It's considered a best practice for all rules in AWS Security Group to have a description", - "description_id": "cee242dd", - "files": [ - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf", - "similarity_id": "2dc0890b59a106e2cc426d77c23e9c522a9a7d035f1e09574ef6e25d8bc0424d", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf", - "similarity_id": "3daaac79ee6edcaf76dcc89b9d01d077cce8b198635e77101b7af5e926ed8641", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative1}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative1}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{negative1}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf", - "similarity_id": "4862ce071bb1d363b000bb53ee240dd6ce35c559be4b0e6d83e1fdc9b7e7314a", - "line": 58, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow-public-outbound-sg}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow-public-outbound-sg}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow-public-outbound-sg}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf", - "similarity_id": "100519cbdcf3df4d0211a20cb28c13adcd5d3a41b135d2503ebfcc726c54b90f", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "45afdd7085631fae75df9b1cc77c348dc1e8205c8d9ed4247dbf6451bd4dbad2", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "8b5418ea08b72998227db1ccdd96661374704e9dd758d77b927ebb078a84251c", - "line": 62, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{public-internet-sg}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{public-internet-sg}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{public-internet-sg}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf", - "similarity_id": "f363c10a06cbd3031d28c22bb804d8fe9ac6ea983fd34c5cecf6c09f9e3470ff", - "line": 31, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "411575ac5d72e413a809b85a05e761ba96e7633770e49f89b40c9e1df4e45bd5", - "line": 8, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf", - "similarity_id": "8db84596a4f3c9ed090cb85b1ba47ec6bff3e2bd46a4fa67eb6e30f1128c002a", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", - "similarity_id": "e6462b6dc7888e2303da32d39a6ca6492a7f970dd6ffbfb0661983a49eb49f15", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf", - "similarity_id": "cd5b8301be50491b2efdb0fc76328180ba90a0dfcc92d4f0cfa27574d1bc9035", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", - "similarity_id": "78e5e7cadcb973bb9b1edd29dc451d181fbc58bce43d62058e4271a87ce9a688", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf", - "similarity_id": "e364258f261f1f792e394a9fa474cc907c412e6b7b152056fa142293c8e3d81d", - "line": 19, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf", - "similarity_id": "66303822c8f1bb7301836bc3106b13500cb007ebda808c4055f6c6de042eaf03", - "line": 63, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow-public-outbound-sg2}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow-public-outbound-sg2}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow-public-outbound-sg2}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", - "similarity_id": "630f14396cdf3166c5ac459ba9b4e3011129ee94ea36e24575884f1b8641aae5", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{negative2}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", - "similarity_id": "22cb57ab0377190165707a44fecf388ba1c081fc3bad1e7f064c3b5be49902e0", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive3}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", - "similarity_id": "fccd7ce54c2f81017555931784cea70f2e01361f00e4ac8a03695c0040ad0964", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf", - "similarity_id": "22b988c42c73026fb8616bb9756b84ec39d8874a19554c42878fe3bb8c747ac5", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive1}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive1}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{positive1}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf", - "similarity_id": "3c150a59c35c8bd3e463e4f250c4ebbd6f99d2c9323f6a8bf33b682f92be0de2", - "line": 55, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{public-internet-sg}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{public-internet-sg}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{public-internet-sg}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf", - "similarity_id": "f0287963b35b539518c81d5e5705038c7a093b37ccd86e04984a5cc2ccfcf7c8", - "line": 22, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf", - "similarity_id": "18976e48fb2ec3241f93fb5eabce67d71feb122559e9703096eec271454f8caf", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "646e5183aad86fcdb33b2dbc958c0021df017a383467ea1a8e727247723f3412", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{negative3}}].ingress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf", - "similarity_id": "a823d1d90808d0393349ec071a2d231c19f39d83371b1dbe39c1061428f233ba", - "line": 14, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}].egress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf", - "similarity_id": "2bc8be5c1319dd1601fab22812dd209065f13deb48748dfd74c18d95f82d89f1", - "line": 18, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}].ingress", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null" - } - ] - }, - { - "query_name": "Security Group Without Description", - "query_id": "cb3f5ed6-0d18-40de-a93d-b3538db31e8c", - "query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#description", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "It's considered a best practice for AWS Security Group to have a description", - "description_id": "bc535d27", - "files": [ - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "97295dc3bd259c7e904b577e51bd58c118a70713285e524a540cb130ef33029a", - "line": 17, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative_rdp_2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative_rdp_2}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative_rdp_2}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf", - "similarity_id": "cc27ed549e2644065d4800aa7d84131465c07608116018b6ef0b57e894e04434", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive2}}] description is defined and not null", - "actual_value": "aws_security_group[{{positive2}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf", - "similarity_id": "6b9ceea4e2161112b8bceecf47b8345cec460bd8c845ce32de6676d69371e044", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative3}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf", - "similarity_id": "f25c2a2ae6ea0b4f2cb887b2f33f69ce1569f7b00a0522c8c8d667a4ded0cca8", - "line": 7, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "478294c875a639c111f30cc1a334adb94d041dd954eb079c60032546b49e6a82", - "line": 6, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf", - "similarity_id": "908a0c7610f98be7cbcb4b91fe44df06b11c2a83b199a56ba1399d8fbead49cd", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative2}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative2}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative2}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf", - "similarity_id": "2c0c6e0149f1762c8cf78222421d2f2b8326c3426b28db7f88d03032570e5735", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{allow_tls}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{allow_tls}}] description is defined and not null", - "actual_value": "aws_security_group[{{allow_tls}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf", - "similarity_id": "220fd79273145fe5498f8f7f17e043b9442d52572d2c254f4a210fb1bc6bd824", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{positive3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{positive3}}] description is defined and not null", - "actual_value": "aws_security_group[{{positive3}}] description is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf", - "similarity_id": "ba762cc45131836f9b5f790de302e30c86fae6eaecc9519ca2ee8eb58041bc68", - "line": 15, - "issue_type": "MissingAttribute", - "search_key": "aws_security_group[{{negative3}}]", - "search_line": 0, - "search_value": "", - "expected_value": "aws_security_group[{{negative3}}] description is defined and not null", - "actual_value": "aws_security_group[{{negative3}}] description is undefined or null" - } - ] - }, - { - "query_name": "Variable Without Description", - "query_id": "2a153952-2544-4687-bcc9-cc8fea814a9b", - "query_url": "https://www.terraform.io/docs/language/values/variables.html#input-variable-documentation", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "All variables should contain a valid description.", - "description_id": "b44986be", - "files": [ - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf", - "similarity_id": "62078456419f5622852ab8cf84462b2c74b43b06744b5a34c25e80b23ad3d702", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "41f26963a12df7c1151d97bf1b5d0709e431c561c906b7167901c764ae171689", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "variable.{{private_key_path}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "e381b53ef16b9c328c196929a5a26d4cdbd82d2977ea71dc4d596d2f74f98993", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "variable.{{region}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "0a7073b99329a57cb649f1c21da1367d170f02d41ac2e6e5f807d0109d2f6d6c", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "variable.{{aws_secret_key}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf", - "similarity_id": "fa3f91cba9cd74a984e00c25bc2ac49ea65a279447c29c89176fdc4a3a035b78", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf", - "similarity_id": "48d16e18162d19cf802b6e0c2aef11f2d50246dd9fdd7787b771ed385a8da0a9", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "c76818170cf4777255865bde01f29c4e33cd086469dbbd4d02b45e68afc24c09", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{aws_access_key}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "f6232ed43785f9d741f5a0671caef48ec4a173afe1c72e0ac5b581b8ed97343e", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "variable.{{key_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/negative1.tf", - "similarity_id": "1308d0e221e62b1e083f26fdfe97a407ee9dd096edc25877020b7cf9cdae2248", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf", - "similarity_id": "df50786a61ae71ad217393ae9d4606050a29c48a30c9eaf8e958a0ca8021c4c7", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf", - "similarity_id": "3ef461b9af906c94d782dfb45daf8edb1d5007e815eb6b42ab5a9190a5ec4b42", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf", - "similarity_id": "022f0f34de59966151af271df69219e424a7f374245ee40c7c75aa2f6e8a4384", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{cluster_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'description' is defined and not null", - "actual_value": "'description' is undefined or null" - } - ] - }, - { - "query_name": "Variable Without Type", - "query_id": "fc5109bf-01fd-49fb-8bde-4492b543c34a", - "query_url": "https://www.terraform.io/docs/language/values/variables.html#input-variable-documentation", - "severity": "INFO", - "platform": "Terraform", - "category": "Best Practices", - "description": "All variables should contain a valid type.", - "description_id": "bba696eb", - "files": [ - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "19c801966dd2da16397ad711be930605bd6b1a1be3b41f0993e8d883934ad502", - "line": 2, - "issue_type": "MissingAttribute", - "search_key": "variable.{{aws_secret_key}}", - "search_line": 0, - "search_value": "", - "expected_value": "'type' is defined and not null", - "actual_value": "'type' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "6684e95bc8f93fd55f4d3a5c4890655b3bb5591bc18227c940930beb7637d06e", - "line": 5, - "issue_type": "MissingAttribute", - "search_key": "variable.{{region}}", - "search_line": 0, - "search_value": "", - "expected_value": "'type' is defined and not null", - "actual_value": "'type' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "f08f903d32e8d577c959094b07d53f57730ad1af1a848156b65ac30025508d7f", - "line": 4, - "issue_type": "MissingAttribute", - "search_key": "variable.{{key_name}}", - "search_line": 0, - "search_value": "", - "expected_value": "'type' is defined and not null", - "actual_value": "'type' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "2a6e2d88043d99605c846cb8c13e1c90470d7b25e81fa49db30c7316cf3a47ed", - "line": 1, - "issue_type": "MissingAttribute", - "search_key": "variable.{{aws_access_key}}", - "search_line": 0, - "search_value": "", - "expected_value": "'type' is defined and not null", - "actual_value": "'type' is undefined or null" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf", - "similarity_id": "e340e3072f2ef20a185b495b9e412f688cd60f72a7b78867f42c2e525f335e23", - "line": 3, - "issue_type": "MissingAttribute", - "search_key": "variable.{{private_key_path}}", - "search_line": 0, - "search_value": "", - "expected_value": "'type' is defined and not null", - "actual_value": "'type' is undefined or null" - } - ] - } - ], - "bill_of_materials": [ - { - "query_name": "BOM - S3 Buckets", - "query_id": "2d16c3fb-35ba-4ec0-b4e4-06ee3cbd4045", - "query_url": "https://kics.io", - "severity": "TRACE", - "platform": "Terraform", - "category": "Bill Of Materials", - "description": "A list of S3 resources specified", - "description_id": "0bdf2341", - "files": [ - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf", - "similarity_id": "3cfe47bb5e3c6349b98542d91ee5274ed5996f4a13a9e471b073f5ce1582d99d", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my_tf_test_bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf", - "similarity_id": "20b34fd0c662cb32feced3769c55bd76e0525536aee17c586a2ff36859817714", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true,\"mfa_delete\":false}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf", - "similarity_id": "e84fdc991f347648effc622245b9ca4ef7a8db1d439f913cd3c2311ceadfa007", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf", - "similarity_id": "aaac2e1ac7eae46819429dfac5e755cf0ad4dac75d51e3b412df9cd3ecdd801f", - "line": 10, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf", - "similarity_id": "225b5a3547c7224092d4e7dccb8b044bb8349dd52359285a8b3743dc7d33957f", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my-tf-test-bucket\",\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": [\\n \\\"aws_s3_bucket.b.arn\\\"\\n ],\\n \\\"Condition\\\": {\\n \\\"Bool\\\": {\\n \\\"aws:SecureTransport\\\": \\\"false\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf", - "similarity_id": "ace6a40b375fbd216848326213cb26a261effae0af44a71a13a951710ff4abd5", - "line": 5, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[public-bucket2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read-write\",\"bucket\":\"bucket-with-public-acl-32\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf", - "similarity_id": "fa667690d97015898c61ace4b7f7384e1014c124b7a9f58898ec55244e0b2f6e", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read-write\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf", - "similarity_id": "e3fabada99372aa90bdbaa4ec222083b804ddfd18ac6bce27ce80dc566ca84c8", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my-tf-test-bucket\",\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": [\\n \\\"aws_s3_bucket.b.arn\\\"\\n ],\\n \\\"Condition\\\": {\\n \\\"IpAddress\\\": {\\n \\\"aws:SourceIp\\\": \\\"8.8.8.8/32\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf", - "similarity_id": "b208adf02709122124fcaf5c0a9531965c66fa008cdc2d83ba09af2b4dcec1d5", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf", - "similarity_id": "5613eecc821464ca8934d3c2c8fe0c84ef382bbbdc83ef78d96e853511b641dc", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf", - "similarity_id": "06d00bcf29f3f63e83fee5d9971e5d244306c97fbdbcf82b9cd43c13223e08a4", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my-tf-test-bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf", - "similarity_id": "bb28259b6d8d780647c6fe0d93b3682ab79c869e1ec23275c0564bf222e80f4d", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[hoge]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"hoge\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf", - "similarity_id": "a0269cda7a646c8aaba0dbb4b7f88e5347027d8a4c4deb514d83fa9b85e71774", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf", - "similarity_id": "e5a588d03ed11119b0afcb00362423fb68d1623a82723ee51747d426bbca6988", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf", - "similarity_id": "f466e21861d0d5f6bce99223e7d54d0e7a2ff556c78ce30b38abf5e598fc4419", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf", - "similarity_id": "5d021c75ef09a3e9e8103c6c6f98a9ac83ebf924e843ac79342e221540cce2fa", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my_tf_test_bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf", - "similarity_id": "91d6fe9be8dca86488c76245854106ce1f9124849e3ae8dc59b391bfadc3a582", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"S3B_181355\",\"policy\":\"\\t{\\n\\t \\\"Id\\\": \\\"id113\\\",\\n\\t \\\"Version\\\": \\\"2012-10-17\\\",\\n\\t \\\"Statement\\\": [\\n\\t\\t{\\n\\t\\t \\\"Action\\\": [\\n\\t\\t\\t\\\"s3:*\\\"\\n\\t\\t ],\\n\\t\\t \\\"Effect\\\": \\\"Allow\\\",\\n\\t\\t \\\"Resource\\\": \\\"arn:aws:s3:::S3B_181355/*\\\",\\n\\t\\t \\\"Principal\\\": \\\"*\\\"\\n\\t\\t}\\n\\t ]\\n\\t}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf", - "similarity_id": "705d28ba4cf90b667145415031ab834a69916db85ede5128933e11d6f7c599cf", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf", - "similarity_id": "ecbd8d8be3c3aa0925bb400f55a414ee85e50d8206125a585fb859b6b7399403", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf", - "similarity_id": "36a6df64dff9bdbe2b749f8ab445bc51774b63e36e47af8fc66fdf7e00c2f5d1", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf", - "similarity_id": "fd23b519d9de3c9e937d36c6c15ed6b2d30857d14504942ff8594acd02238a74", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\"}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf", - "similarity_id": "8aa92d328b0c2510f739b1ea6307d0f1e4cf7ac9260d8b5c2311b74fb824153f", - "line": 69, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf", - "similarity_id": "184e8a008eeceb0d552201392fec564a5f78683cc4baae6ad1b2c3a3b9b63cd9", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my_tf_test_bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf", - "similarity_id": "f4441d44c8dce3d033bc61abad849e84e0a20fff1a0200445cadc9a70d6ee1a2", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf", - "similarity_id": "671b661eec245970e807af4391c3ebbb8541d19388b8fb499ce71ff70c3df226", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive3]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf", - "similarity_id": "930988ac27e4f1682a2299c1e8675787b24e3572ce516a4e41ae65f647a8ea14", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf", - "similarity_id": "96b65d7ec60d5487931d8a786e663b5ebdfdf1b909a60dd9be4984892fae3a79", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[hoge]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"hoge\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf", - "similarity_id": "1a0ab5ee1405fb6fbf510f27412091d4abc0e7ef3f045c03e883a80ba69abe0a", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\",\"cors_rule\":{\"allowed_methods\":[\"PUT\",\"POST\"],\"allowed_origins\":[\"https://s3-website-test.hashicorp.com\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000}}" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf", - "similarity_id": "1bfbe33817f5456a6025a9d3b83fff5ad8001dece3b05b58f59d0d9f3209f064", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf", - "similarity_id": "d724252e60d639385ecaa09935add198de4965fd23e3ba8dc842bcde1bcf3af7", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "9ef1ca02e068fd6e648c12ff0ef580b3ffcfc6dd8029f4f3f90be64da3a8e855", - "line": 16, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[foo2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"logging\":{\"target_bucket\":\"${aws_s3_bucket.log_bucket.id}\",\"target_prefix\":\"log/\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf", - "similarity_id": "439cdfaeaedcf60ccb07cfc151f55de34864a6fd9017faac60039058b67210b5", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[examplebucket]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"examplebuckettftest\",\"object_lock_configuration\":{\"object_lock_enabled\":\"Enabled\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf", - "similarity_id": "c3ad79e29a0d7155321fc3d0f9047b7f34ad844eb26b14e62f07e75230d1ebd2", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"kms_master_key_id\":\"some-key\",\"sse_algorithm\":\"AES256\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf", - "similarity_id": "d9ded88fa570d9a95bb6addc41877ba64def60b05b7ed2782f03b96b5531b695", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf", - "similarity_id": "dccd9ebfcd719742700a961317fde677cebcc3a50c0b2f7bfbe5dbe24f05ed7f", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf", - "similarity_id": "1f6f4c688f980a8b94aa9ee3fcc1611c87d25a564fe9fbec7396f2fe9378d027", - "line": 5, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[public-bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read-write\",\"bucket\":\"bucket-with-public-acl-3\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf", - "similarity_id": "f4cb214e402e7f6a4f7ddfef2574ab338a3e9325928d82eb65b922101520fea3", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf", - "similarity_id": "8ca0b7b2a315fa9c1b6b28f38213fd72ec27c8c29e14ae2390f7be30bce0888c", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf", - "similarity_id": "feb3a1e708d932c7e9e508e91410f12018c53eba1a3d0a73bc7ff64f98a16603", - "line": 19, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf", - "similarity_id": "6da57ecf0ef32da4afbbe03be3c29560a7ab8d3201aaad13258ee1dcf3dc6fab", - "line": 10, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive4]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf", - "similarity_id": "70a2a1a20a3ef61e2c52d44a9f51f6852f0f97636e5b977342dac5af1af9c5c1", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my_tf_test_bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf", - "similarity_id": "7d38380efc922c9e2a2138848f3227358107e15b153acc4ae67f45b926ed1082", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf", - "similarity_id": "03ef4eeb44cc99c658039cd3a974e8ca5ef27302e7e9ab8f58f4a73ce8998a0d", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"cors_rule\":{\"allowed_headers\":[\"*\"],\"allowed_methods\":[\"GET\",\"PUT\",\"POST\",\"DELETE\",\"HEAD\"],\"allowed_origins\":[\"*\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf", - "similarity_id": "81ae4518a54b75efd3cb1199be55b7afa3201173f3ab119a53b8976e3af7c79a", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\",\"website\":{\"error_document\":\"error.html\",\"index_document\":\"index.html\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf", - "similarity_id": "67a97d3821c1fb10e749d6538a7eeb690825a3d79350caeddbe531e56416c0b9", - "line": 10, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[log_bucket]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"log-delivery-write\",\"bucket\":\"my-tf-log-bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf", - "similarity_id": "6604099d7d3c93c84624b67926d65094d828398b9d5e4327cfb842a50a411e49", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my-tf-test-bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf", - "similarity_id": "e511aa399e157dd721d42b9d3249def9a50cd140337857f25fbe0df00d64522b", - "line": 20, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[foo3]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current3.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf", - "similarity_id": "198cbc0ccc999475689626fcb64a6544d288966f5bcdfc7983ed4d41a1081138", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"authenticated-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf", - "similarity_id": "95bfc44a4337badf496c97f0bf8648e21203e4020878a018648ee2ee71ff9424", - "line": 10, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[b]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf", - "similarity_id": "ad415d657ef54484a27a9f197fed0dfe922f5d57dfa3347107c896ba28354b0b", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[examplebucket]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"examplebuckettftest\",\"object_lock_configuration\":{\"object_lock_enabled\":\"Enabled\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf", - "similarity_id": "4284ee3c815ea34a164c9d1d1bd41c23f86401c80c0dd3671a0dc5aece1ce4eb", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf", - "similarity_id": "ea34f358f6e9d96683cfd53c5785ca7c6b5c3cf85c75d3574788bafe0bed6abb", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"cors_rule\":{\"allowed_headers\":[\"*\"],\"allowed_methods\":[\"PUT\",\"POST\"],\"allowed_origins\":[\"https://s3-website-test.hashicorp.com\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf", - "similarity_id": "b49586a525c02b6b1e996a8dba4269c7eeadfb794ac7df7dd8e0bd10ae7456b8", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive2]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}" - }, - { - "file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf", - "similarity_id": "52a4ead57d40049da3b0f60cf9f8c992a47f0cadd75bf761005121133a01979a", - "line": 10, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[foo]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf", - "similarity_id": "c7953fb7aa44cc79fd055c52cc70ae98ed42c2a4f4bab036a614061ad00bbfc6", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"my_tf_test_bucket\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf", - "similarity_id": "dee2e88009ac8e34ef3d5f02bb802ecc43558d74ffdd71f83f41ab656a906301", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true,\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf", - "similarity_id": "f5aef5e494ab7efdbecb94e4c7e2dbe6ad95f06addd2ffffcc01a47e2e24c1c2", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf", - "similarity_id": "ae3ded1985cb283bf170c1553793a5815577ad55acd8be6768c9f1e406f3ac7d", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"sse_algorithm\":\"aws:kms\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf", - "similarity_id": "caff2c6eef0e43d2e2a2f609284d4a965372bfd162398996b3dfe3f1677229dc", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"S3B_181355\",\"policy\":\"\\t{\\n\\t \\\"Id\\\": \\\"id113\\\",\\n\\t \\\"Version\\\": \\\"2012-10-17\\\",\\n\\t \\\"Statement\\\": [\\n\\t\\t{\\n\\t\\t \\\"Action\\\": [\\n\\t\\t\\t\\\"s3:putObject\\\"\\n\\t\\t ],\\n\\t\\t \\\"Effect\\\": \\\"Allow\\\",\\n\\t\\t \\\"Resource\\\": \\\"arn:aws:s3:::S3B_181355/*\\\",\\n\\t\\t \\\"Principal\\\": \\\"*\\\"\\n\\t\\t}\\n\\t ]\\n\\t}\\n\"}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf", - "similarity_id": "9430b62718b0a7f9273c57285497bf4c6230b960dbcee3ee1735d54d5ff25140", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"kms_master_key_id\":\"${aws_kms_key.mykey.arn}\",\"sse_algorithm\":\"aws:kms\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf", - "similarity_id": "7c0a7ad742cf3016ba7ac1deace3421835f5a1d6230cbc5d4aae22702026985f", - "line": 2, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[negative1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"logging\":{\"target_bucket\":\"logs\"},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}" - }, - { - "file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf", - "similarity_id": "76144ef296c0cc5b8505090d561fff1e126e10d71f2c7a6b21932eddd70f5bb5", - "line": 1, - "issue_type": "BillOfMaterials", - "search_key": "aws_s3_bucket[positive1]", - "search_line": 0, - "search_value": "", - "expected_value": "", - "actual_value": "", - "value": "{\"bucket\":\"example\"}" - } - ] - } - ] -} \ No newline at end of file diff --git a/src/commenter.js b/src/commenter.js index bb1a433..df7f6bb 100644 --- a/src/commenter.js +++ b/src/commenter.js @@ -1,4 +1,3 @@ -const fs = require("fs"); const moment = require('moment') const kicsLogo = "https://user-images.githubusercontent.com/75368139/136991766-a4e5bc8b-63db-48f7-9384-740e9f15c9f6.png" @@ -11,13 +10,6 @@ const severityIcons = { "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png" } - -function readJSON(filename) { - const rawdata = fs.readFileSync(filename); - const parsedJSON = JSON.parse(rawdata.toString()); - return parsedJSON; -} - function createComment(results) { let message = "![kics-logo](" + kicsLogo + ")\n"; @@ -49,12 +41,8 @@ function createComment(results) { return message; } -async function postPRComment(repo, prNumber) { - const githubToken = core.getInput("token"); - const octokit = github.getOctokit(githubToken); - const results = readJSON("results.json"); +async function postPRComment(results, repo, prNumber, octokit) { const message = createComment(results); - console.log(message); const { data: comments } = await octokit.rest.issues.listComments({ ...repo, @@ -85,4 +73,4 @@ async function postPRComment(repo, prNumber) { module.exports = { postPRComment -}; \ No newline at end of file +}; diff --git a/src/install.js b/src/install.js index ff5b22a..dd49561 100644 --- a/src/install.js +++ b/src/install.js @@ -90,4 +90,4 @@ async function installKICS(kicsVersion) { module.exports = { installKICS -} \ No newline at end of file +} diff --git a/src/main.js b/src/main.js index d85b696..7a53166 100644 --- a/src/main.js +++ b/src/main.js @@ -1,31 +1,100 @@ const install = require("./install"); const commenter = require("./commenter"); const scanner = require("./scanner"); + const core = require("@actions/core"); const github = require("@actions/github"); +const fs = require("fs"); + const actionInputs = { kics_version: { value: core.getInput('kics_version') }, enable_comments: { value: core.getInput('enable_comments') }, } +const exitStatus = { + results: { + codes: { + HIGH: 50, + MEDIUM: 40, + LOW: 30, + INFO: 20, + }, + isResultExitStatus: function (exitCode) { + for (const key in this.codes) { + if (this.codes[key] === exitCode) { + return true; + } + } + return false; + } + } +} + +function setWorkflowStatus(statusCode) { + console.log(`KICS scan status code: ${statusCode}`); + + const ignoreOnExit = core.getInput('ignore_on_exit'); + + if (ignoreOnExit.toLowerCase() === 'all') { + console.log(`ignore_on_exit=all :: Ignoring exit code ${statusCode}`); + return; + } + + if (ignoreOnExit.toLowerCase() === 'results') { + if (exitStatus.results.isResultExitStatus(statusCode)) { + console.log(`ignore_on_exit=results :: Ignoring exit code ${statusCode}`); + return; + } + } + if (ignoreOnExit.toLowerCase() === 'errors') { + if (!exitStatus.results.isResultExitStatus(statusCode)) { + console.log(`ignore_on_exit=errors :: Ignoring exit code ${statusCode}`); + return; + } + } + + core.setFailed(`KICS scan failed with exit code ${statusCode}`); +} + +function readJSON(filename) { + const rawdata = fs.readFileSync(filename); + const parsedJSON = JSON.parse(rawdata.toString()); + return parsedJSON; +} + async function main() { console.log("Running KICS action..."); try { + const githubToken = core.getInput("token"); + const octokit = github.getOctokit(githubToken); let enableComments = actionInputs.enable_comments.value.toLocaleLowerCase() === "true"; - const context = github.context; - const repository = context.repo; - console.log(context); - const pullRequestNumber = context.payload.pull_request.number; - await install.installKICS(); - await scanner.scanWithKICS(enableComments); - if (enableComments) { - await commenter.commentOnPullRequest(repository, pullRequestNumber); + let context = {}; + let repo = ''; + let prNumber = ''; + + if (github.context) { + context = github.context; + if (context.repo) { + repo = context.repo; + } + if (context.payload && context.payload.pull_request) { + prNumber = context.payload.pull_request.number; + } } + + await install.installKICS(); + const scanResults = await scanner.scanWithKICS(enableComments); + if (enableComments) { + let parsedResults = readJSON(scanResults.resultsFile); + await commenter.postPRComment(parsedResults, repo, prNumber, octokit); + } + + setWorkflowStatus(scanResults.statusCode); } catch (e) { console.error(e); core.setFailed(e.message); } } -main(); \ No newline at end of file +main(); diff --git a/src/scanner.js b/src/scanner.js index 9cb2842..766ea69 100644 --- a/src/scanner.js +++ b/src/scanner.js @@ -1,11 +1,11 @@ const exec = require('@actions/exec'); - const core = require("@actions/core"); +const filepath = require('path'); const kicsBinary = 'kics'; const kicsInput = { - path: { value_type: "string", flag: '--path', value: core.getInput('path') }, + path: { value_type: "list", flag: '--path', value: core.getInput('path') }, ignore_on_exit: { value_type: "list", flag: '--ignore-on-exit', value: core.getInput('ignore_on_exit') }, fail_on: { value_type: "list", flag: '--fail-on', value: core.getInput('fail_on') }, timeout: { value_type: "int", flag: '--timeout', value: core.getInput('timeout') }, @@ -29,9 +29,11 @@ const kicsInput = { }; async function scanWithKICS(enableComments) { + let resultsFile; + if (!kicsInput.path.value) { core.error('Path to scan is not set'); - throw new Error('Path to scan is not set'); + core.setFailed('Path to scan is not set'); } let cmdArgs = []; for (let input in kicsInput) { @@ -42,25 +44,51 @@ async function scanWithKICS(enableComments) { } } else if (kicsInput[input].value_type === 'list') { if (kicsInput[input].value) { - cmdArgs.push(kicsInput[input].flag); - cmdArgs.push(kicsInput[input].value); + if (kicsInput[input].value.indexOf(',') > -1) { + kicsInput[input].value.split(',').forEach(value => { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(value); + }); + } else { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } } } else if (kicsInput[input].value_type === 'bool') { if (kicsInput[input].value) { cmdArgs.push(kicsInput[input].flag); } + } else if (kicsInput[input].value_type === 'int') { + if (kicsInput[input].value) { + cmdArgs.push(kicsInput[input].flag); + cmdArgs.push(kicsInput[input].value); + } } } + + // making sure results.json is always created when PR comments are enabled if (enableComments) { if (!cmdArgs.find(arg => arg == '--output-path')) { cmdArgs.push('--output-path'); cmdArgs.push('./'); + resultsFile = './results.json'; + } else { + const outputFormats = core.getInput('output_formats'); + if (!outputFormats.toLowerCase().indexOf('json')) { + cmdArgs.push('--output-formats'); + cmdArgs.push('json'); + } + let resultsDir = core.getInput('output_path'); + resultsFile = filepath.join(resultsDir, '/results.json'); } } - - return await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`) + exitCode = await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`, [], { ignoreReturnCode: true }); + return { + statusCode: exitCode, + resultsFile: resultsFile + }; } module.exports = { scanWithKICS -}; \ No newline at end of file +}; diff --git a/positive.tf b/test/samples/positive1.tf similarity index 100% rename from positive.tf rename to test/samples/positive1.tf diff --git a/test/samples/positive2.tf b/test/samples/positive2.tf new file mode 100644 index 0000000..c6f4d82 --- /dev/null +++ b/test/samples/positive2.tf @@ -0,0 +1,13 @@ +resource "azurerm_resource_group" "positive1" { + name = "resourceGroup1" + location = "West US" +} + +resource "azurerm_container_registry" "positive2" { + name = "containerRegistry1" + resource_group_name = azurerm_resource_group.rg.name + location = azurerm_resource_group.rg.location + sku = "Premium" + admin_enabled = true + georeplication_locations = ["East US", "West Europe"] +} From 9a0478db28853371dd9dd404e7d314541679c6a4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Sat, 16 Oct 2021 11:05:14 +0100 Subject: [PATCH 04/18] testing action MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Rogério Peixoto --- .github/workflows/test_action.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/.github/workflows/test_action.yaml b/.github/workflows/test_action.yaml index e94020c..4731984 100644 --- a/.github/workflows/test_action.yaml +++ b/.github/workflows/test_action.yaml @@ -3,13 +3,13 @@ name: Test KICS action on: workflow_dispatch: pull_request: - types: [opened] jobs: test: runs-on: ubuntu-latest steps: - uses: actions/checkout@v2 + - run: mkdir -p myoutput - name: Test KICS action uses: ./ with: @@ -17,4 +17,8 @@ jobs: token: ${{ secrets.GITHUB_TOKEN }} timeout: 60 verbose: true + output_path: myoutput/ + output_format: sarif enable_comments: true + - run: ls -la && ls -la myoutput + if: always() From 9e27afd3824286d361a30fdfd14641fa727cbc1f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Sat, 16 Oct 2021 11:08:19 +0100 Subject: [PATCH 05/18] testing action - ignore results --- .github/workflows/test_action.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/workflows/test_action.yaml b/.github/workflows/test_action.yaml index 4731984..8254610 100644 --- a/.github/workflows/test_action.yaml +++ b/.github/workflows/test_action.yaml @@ -19,6 +19,7 @@ jobs: verbose: true output_path: myoutput/ output_format: sarif + ignore_on_exit: results enable_comments: true - run: ls -la && ls -la myoutput if: always() From f35e1bf029beb73c33fda34c7c6fef6857b34b12 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Sat, 16 Oct 2021 11:10:32 +0100 Subject: [PATCH 06/18] testing action - output formats --- .github/workflows/test_action.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/test_action.yaml b/.github/workflows/test_action.yaml index 8254610..4c2bf07 100644 --- a/.github/workflows/test_action.yaml +++ b/.github/workflows/test_action.yaml @@ -18,7 +18,7 @@ jobs: timeout: 60 verbose: true output_path: myoutput/ - output_format: sarif + output_formats: sarif ignore_on_exit: results enable_comments: true - run: ls -la && ls -la myoutput From 740815773b3229d8c28c2196c52c85c9a8d7942a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Sat, 16 Oct 2021 11:11:44 +0100 Subject: [PATCH 07/18] fixing status code 0 handling MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Rogério Peixoto --- .github/workflows/test_action.yaml | 2 +- dist/index.js | 8 ++++++-- src/main.js | 4 ++++ src/scanner.js | 4 ++-- 4 files changed, 13 insertions(+), 5 deletions(-) diff --git a/.github/workflows/test_action.yaml b/.github/workflows/test_action.yaml index 4c2bf07..a6a76a5 100644 --- a/.github/workflows/test_action.yaml +++ b/.github/workflows/test_action.yaml @@ -19,7 +19,7 @@ jobs: verbose: true output_path: myoutput/ output_formats: sarif - ignore_on_exit: results + ignore_on_exit: errors enable_comments: true - run: ls -la && ls -la myoutput if: always() diff --git a/dist/index.js b/dist/index.js index fbfcb7f..1beb159 100644 --- a/dist/index.js +++ b/dist/index.js @@ -18063,8 +18063,8 @@ async function scanWithKICS(enableComments) { resultsFile = './results.json'; } else { const outputFormats = core.getInput('output_formats'); - if (!outputFormats.toLowerCase().indexOf('json')) { - cmdArgs.push('--output-formats'); + if (outputFormats.toLowerCase().indexOf('json') == -1) { + cmdArgs.push('--report-formats'); cmdArgs.push('json'); } let resultsDir = core.getInput('output_path'); @@ -18334,6 +18334,10 @@ const exitStatus = { function setWorkflowStatus(statusCode) { console.log(`KICS scan status code: ${statusCode}`); + if (statusCode === 0) { + return; + } + const ignoreOnExit = core.getInput('ignore_on_exit'); if (ignoreOnExit.toLowerCase() === 'all') { diff --git a/src/main.js b/src/main.js index 7a53166..3325aa3 100644 --- a/src/main.js +++ b/src/main.js @@ -34,6 +34,10 @@ const exitStatus = { function setWorkflowStatus(statusCode) { console.log(`KICS scan status code: ${statusCode}`); + if (statusCode === 0) { + return; + } + const ignoreOnExit = core.getInput('ignore_on_exit'); if (ignoreOnExit.toLowerCase() === 'all') { diff --git a/src/scanner.js b/src/scanner.js index 766ea69..1446cb3 100644 --- a/src/scanner.js +++ b/src/scanner.js @@ -74,8 +74,8 @@ async function scanWithKICS(enableComments) { resultsFile = './results.json'; } else { const outputFormats = core.getInput('output_formats'); - if (!outputFormats.toLowerCase().indexOf('json')) { - cmdArgs.push('--output-formats'); + if (outputFormats.toLowerCase().indexOf('json') == -1) { + cmdArgs.push('--report-formats'); cmdArgs.push('json'); } let resultsDir = core.getInput('output_path'); From 77c7ea32c6966c636eab119eacaef5ba74527f4c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Mon, 18 Oct 2021 09:53:18 +0100 Subject: [PATCH 08/18] progress on javascript action MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Rogério Peixoto --- .github/workflows/test_action.yaml | 5 ++- action.yml | 7 ++--- dist/index.js | 50 ++++++++++++++++++++---------- package-lock.json | 3 +- package.json | 3 +- src/main.js | 18 ++++++----- src/scanner.js | 40 ++++++++++++++---------- 7 files changed, 77 insertions(+), 49 deletions(-) diff --git a/.github/workflows/test_action.yaml b/.github/workflows/test_action.yaml index a6a76a5..db46112 100644 --- a/.github/workflows/test_action.yaml +++ b/.github/workflows/test_action.yaml @@ -16,10 +16,9 @@ jobs: path: test/samples/positive1.tf,test/samples/positive2.tf token: ${{ secrets.GITHUB_TOKEN }} timeout: 60 - verbose: true - output_path: myoutput/ + # output_path: myoutput/ output_formats: sarif - ignore_on_exit: errors + ignore_on_exit: results enable_comments: true - run: ls -la && ls -la myoutput if: always() diff --git a/action.yml b/action.yml index e406694..4cb1bb4 100644 --- a/action.yml +++ b/action.yml @@ -2,10 +2,9 @@ name: "KICS Github Action" description: "Run KICS scan against IaC projects" inputs: - kics_version: - required: false - default: "latest" - description: "KICS version to use (defaults to latest)" + token: + required: true + description: "Github token" enable_comments: required: false default: false diff --git a/dist/index.js b/dist/index.js index 1beb159..e882335 100644 --- a/dist/index.js +++ b/dist/index.js @@ -18017,14 +18017,15 @@ const kicsInput = { bom: { value_type: "bool", flag: '--bom', value: core.getInput('bom') }, }; -async function scanWithKICS(enableComments) { - let resultsFile; - - if (!kicsInput.path.value) { - core.error('Path to scan is not set'); - core.setFailed('Path to scan is not set'); +function addJSONReportFormat(cmdArgs) { + const outputFormats = core.getInput('output_formats'); + if (outputFormats.toLowerCase().indexOf('json') == -1) { + cmdArgs.push('--report-formats'); + cmdArgs.push('json'); } - let cmdArgs = []; +} + +function addKICSCmdArgs(cmdArgs) { for (let input in kicsInput) { if (kicsInput[input].value_type === 'string') { if (kicsInput[input].value) { @@ -18054,27 +18055,34 @@ async function scanWithKICS(enableComments) { } } } +} + +async function scanWithKICS(enableComments) { + let resultsJSONFile; + + if (!kicsInput.path.value) { + core.error('Path to scan is not set'); + core.setFailed('Path to scan is not set'); + } + let cmdArgs = []; + addKICSCmdArgs(cmdArgs); // making sure results.json is always created when PR comments are enabled if (enableComments) { if (!cmdArgs.find(arg => arg == '--output-path')) { cmdArgs.push('--output-path'); cmdArgs.push('./'); - resultsFile = './results.json'; + resultsJSONFile = './results.json'; } else { - const outputFormats = core.getInput('output_formats'); - if (outputFormats.toLowerCase().indexOf('json') == -1) { - cmdArgs.push('--report-formats'); - cmdArgs.push('json'); - } let resultsDir = core.getInput('output_path'); - resultsFile = filepath.join(resultsDir, '/results.json'); + resultsJSONFile = filepath.join(resultsDir, '/results.json'); } + addJSONReportFormat(cmdArgs); } exitCode = await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`, [], { ignoreReturnCode: true }); return { statusCode: exitCode, - resultsFile: resultsFile + resultsJSONFile: resultsJSONFile }; } @@ -18082,7 +18090,6 @@ module.exports = { scanWithKICS }; - /***/ }), /***/ 2877: @@ -18304,6 +18311,7 @@ const scanner = __nccwpck_require__(3157); const core = __nccwpck_require__(2186); const github = __nccwpck_require__(5438); +const io = __nccwpck_require__(7436); const fs = __nccwpck_require__(5747); @@ -18367,6 +18375,13 @@ function readJSON(filename) { return parsedJSON; } +function cleanupOutput(resultsJSONFile) { + const outputFormats = core.getInput('output_formats'); + if (!outputFormats.toLowerCase().includes('json') || core.getInput('output_path') === '') { + io.rmRF(resultsJSONFile); + } +} + async function main() { console.log("Running KICS action..."); try { @@ -18390,10 +18405,11 @@ async function main() { await install.installKICS(); const scanResults = await scanner.scanWithKICS(enableComments); if (enableComments) { - let parsedResults = readJSON(scanResults.resultsFile); + let parsedResults = readJSON(scanResults.resultsJSONFile); await commenter.postPRComment(parsedResults, repo, prNumber, octokit); } + cleanupOutput(scanResults.resultsJSONFile); setWorkflowStatus(scanResults.statusCode); } catch (e) { console.error(e); diff --git a/package-lock.json b/package-lock.json index cabb309..f26433e 100644 --- a/package-lock.json +++ b/package-lock.json @@ -12,6 +12,7 @@ "@actions/core": "^1.6.0", "@actions/exec": "^1.1.0", "@actions/github": "^5.0.0", + "@actions/io": "^1.1.1", "@actions/tool-cache": "^1.7.1", "moment": "^2.29.1" }, @@ -539,4 +540,4 @@ "integrity": "sha1-tSQ9jz7BqjXxNkYFvA0QNuMKtp8=" } } -} \ No newline at end of file +} diff --git a/package.json b/package.json index 7a3b060..3d7a4e1 100644 --- a/package.json +++ b/package.json @@ -22,6 +22,7 @@ "@actions/core": "^1.6.0", "@actions/exec": "^1.1.0", "@actions/github": "^5.0.0", + "@actions/io": "^1.1.1", "@actions/tool-cache": "^1.7.1", "moment": "^2.29.1" }, @@ -29,4 +30,4 @@ "@vercel/ncc": "^0.31.1", "prettier": "^2.4.1" } -} \ No newline at end of file +} diff --git a/src/main.js b/src/main.js index 3325aa3..df9d715 100644 --- a/src/main.js +++ b/src/main.js @@ -4,14 +4,10 @@ const scanner = require("./scanner"); const core = require("@actions/core"); const github = require("@actions/github"); +const io = require("@actions/io"); const fs = require("fs"); -const actionInputs = { - kics_version: { value: core.getInput('kics_version') }, - enable_comments: { value: core.getInput('enable_comments') }, -} - const exitStatus = { results: { codes: { @@ -67,12 +63,19 @@ function readJSON(filename) { return parsedJSON; } +function cleanupOutput(resultsJSONFile) { + const outputFormats = core.getInput('output_formats'); + if (!outputFormats.toLowerCase().includes('json') || core.getInput('output_path') === '') { + io.rmRF(resultsJSONFile); + } +} + async function main() { console.log("Running KICS action..."); try { const githubToken = core.getInput("token"); const octokit = github.getOctokit(githubToken); - let enableComments = actionInputs.enable_comments.value.toLocaleLowerCase() === "true"; + let enableComments = core.getInput('enable_comments').toLocaleLowerCase() === "true"; let context = {}; let repo = ''; let prNumber = ''; @@ -90,10 +93,11 @@ async function main() { await install.installKICS(); const scanResults = await scanner.scanWithKICS(enableComments); if (enableComments) { - let parsedResults = readJSON(scanResults.resultsFile); + let parsedResults = readJSON(scanResults.resultsJSONFile); await commenter.postPRComment(parsedResults, repo, prNumber, octokit); } + cleanupOutput(scanResults.resultsJSONFile); setWorkflowStatus(scanResults.statusCode); } catch (e) { console.error(e); diff --git a/src/scanner.js b/src/scanner.js index 1446cb3..c2293cd 100644 --- a/src/scanner.js +++ b/src/scanner.js @@ -28,14 +28,15 @@ const kicsInput = { bom: { value_type: "bool", flag: '--bom', value: core.getInput('bom') }, }; -async function scanWithKICS(enableComments) { - let resultsFile; - - if (!kicsInput.path.value) { - core.error('Path to scan is not set'); - core.setFailed('Path to scan is not set'); +function addJSONReportFormat(cmdArgs) { + const outputFormats = core.getInput('output_formats'); + if (outputFormats.toLowerCase().indexOf('json') == -1) { + cmdArgs.push('--report-formats'); + cmdArgs.push('json'); } - let cmdArgs = []; +} + +function addKICSCmdArgs(cmdArgs) { for (let input in kicsInput) { if (kicsInput[input].value_type === 'string') { if (kicsInput[input].value) { @@ -65,30 +66,37 @@ async function scanWithKICS(enableComments) { } } } +} + +async function scanWithKICS(enableComments) { + let resultsJSONFile; + + if (!kicsInput.path.value) { + core.error('Path to scan is not set'); + core.setFailed('Path to scan is not set'); + } + let cmdArgs = []; + addKICSCmdArgs(cmdArgs); // making sure results.json is always created when PR comments are enabled if (enableComments) { if (!cmdArgs.find(arg => arg == '--output-path')) { cmdArgs.push('--output-path'); cmdArgs.push('./'); - resultsFile = './results.json'; + resultsJSONFile = './results.json'; } else { - const outputFormats = core.getInput('output_formats'); - if (outputFormats.toLowerCase().indexOf('json') == -1) { - cmdArgs.push('--report-formats'); - cmdArgs.push('json'); - } let resultsDir = core.getInput('output_path'); - resultsFile = filepath.join(resultsDir, '/results.json'); + resultsJSONFile = filepath.join(resultsDir, '/results.json'); } + addJSONReportFormat(cmdArgs); } exitCode = await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`, [], { ignoreReturnCode: true }); return { statusCode: exitCode, - resultsFile: resultsFile + resultsJSONFile: resultsJSONFile }; } module.exports = { scanWithKICS -}; +}; \ No newline at end of file From 9b8f2723f8456ea7fd1a1db59c66d50fa5a47215 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Mon, 18 Oct 2021 10:05:26 +0100 Subject: [PATCH 09/18] testing action - output formats --- .github/workflows/test_action.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/test_action.yaml b/.github/workflows/test_action.yaml index db46112..02bb0cd 100644 --- a/.github/workflows/test_action.yaml +++ b/.github/workflows/test_action.yaml @@ -16,7 +16,7 @@ jobs: path: test/samples/positive1.tf,test/samples/positive2.tf token: ${{ secrets.GITHUB_TOKEN }} timeout: 60 - # output_path: myoutput/ + output_path: myoutput/ output_formats: sarif ignore_on_exit: results enable_comments: true From add321edd527c92b0a0834eb589da2318794d98f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Mon, 18 Oct 2021 12:34:52 +0100 Subject: [PATCH 10/18] panel with two tables side by side + docs --- README.md | 81 +++++++++++++++++++++++++++++++++++++++++++----- action.yml | 9 +++--- src/commenter.js | 15 ++++----- 3 files changed, 87 insertions(+), 18 deletions(-) diff --git a/README.md b/README.md index e4290eb..5e184b5 100644 --- a/README.md +++ b/README.md @@ -32,22 +32,31 @@ It is as simple as running a CLI tool, making it easy to integrate into any proj | Variable | Example Value   | Description   | Type | Required | Default | | ------------------ | --------------------------------------- | ---------------------------------------------------------------- | ------- | -------- | --------------------------------------------- | +| enable_comment | true | Enable pull request report comments | Boolean | No | false | | path | terraform/main.tf,Dockerfile | paths to a file or directories to scan, comma separated list | String | Yes | N/A | -| ignore_on_exit | results | defines which non-zero exit codes should be ignored (all, results, errors, none) | String | No | none | +| ignore_on_exit | results | defines which non-zero exit codes should be ignored (all, results, errors, none) | String | No | none | | fail_on | high,medium | comma separated list of which severities returns exit code !=0 | String | No | high,medium,low,info | | timeout | 75 | number of seconds the query has to execute before being canceled | String | No | 60 | -| profiling | CPU | turns on profiler that prints resource consumption in the logs during the execution (CPU, MEM) | String | No | N/A | +| profiling | CPU | turns on profiler that prints resource consumption in the logs during the execution (CPU, MEM) | String | No | N/A | | config_path | ./kics.config | path to configuration file | String | No | N/A | | platform_type | terraform,ansible | case insensitive list of platform types to scan | String | No | All platforms | | exclude_paths | ./shouldNotScan/*,somefile.txt | exclude paths from scan, supports glob, comma separated list | String | No | N/A | | exclude_queries | a227ec01-f97a-4084-91a4-47b350c1db54 | exclude queries by providing the query ID, comma separated list | String | No | N/A | | exclude_categories | 'Observability,Networking and Firewall' | exclude categories by providing its name, comma separated list | String | No | N/A | | exclude_results | 'd4a1fa80-d9d8-450f-87c2-e1f6669c41f8' | exclude results by providing the similarity ID of a result | String | No | N/A | +| include_queries | a227ec01-f97a-4084-91a4-47b350c1db54 | include only specified list of queries to the scan, cannot be provided with query exclusion flags | String | No | N/A | | output_formats | 'json,sarif' | formats in which the results report will be exported | String | No | json | | output_path | results.json | file path to store result in json format | String | No | N/A | | payload_path | /tmp/mypayload.json | file path to store source internal representation in JSON format | String | No | N/A | | queries | | path to directory with queries (default "./assets/queries") | String | No | ./assets/queries downloaded with the binaries | | verbose | true | verbose scan | Boolean | No | false | +| type | Ansible,Dockerfile | case insensitive comma-separated list of platform types to scan (Ansible, AzureResourceManager, CloudFormation, Dockerfile, Kubernetes, OpenAPI, Terraform) | String | No | all types | +| bom | true | include bill of materials (BoM) in results.json output | Boolean | No | false | +| disable_full_descriptions | false | disable request for full descriptions and use default vulnerability descriptions | Boolean | false | +| disable_secrets | false | disable secrets detection | Boolean | false | +| secrets_regexes_path| ./mydir/secrets-config.json | path to custom secrets regex rules configuration file | String | No | N/A | +| libraries_path | ./myLibsDir | path to directory with Rego libraries | String | No | N/A | + ## Simple usage example @@ -58,7 +67,7 @@ It is as simple as running a CLI tool, making it easy to integrate into any proj - uses: actions/checkout@v2 # Scan Iac with kics - name: run kics Scan - uses: checkmarx/kics-action@v1.2 + uses: checkmarx/kics-action@v1.3 with: # scanning two directories: ./terraform/ ./cfn-templates/ plus a single file path: 'terraform,cfn-templates,my-other-sub-folder/Dockerfile' @@ -81,7 +90,7 @@ If want your pipeline just to fail on HIGH and MEDIUM severity results and KICS steps: - uses: actions/checkout@v2 - name: run kics Scan - uses: checkmarx/kics-action@v1.2 + uses: checkmarx/kics-action@v1.3 with: path: 'terraform,my-other-sub-folder/Dockerfile' fail_on: high,medium @@ -99,7 +108,7 @@ If you want KICS to ignore the results and return exit status code 0 unless a KI steps: - uses: actions/checkout@v2 - name: run kics Scan - uses: checkmarx/kics-action@v1.2 + uses: checkmarx/kics-action@v1.3 with: path: 'terraform' ignore_on_exit: results @@ -120,7 +129,7 @@ You can only enable one profiler at a time, CPU or MEM. steps: - uses: actions/checkout@v2 - name: run kics Scan - uses: checkmarx/kics-action@v1.2 + uses: checkmarx/kics-action@v1.3 with: path: 'terraform' profiling: MEM @@ -151,7 +160,7 @@ jobs: # make sure results dir is created run: mkdir -p results-dir - name: Run KICS Scan with SARIF result - uses: checkmarx/kics-action@v1.2 + uses: checkmarx/kics-action@v1.3 with: path: 'terraform' # when provided with a directory on output_path @@ -226,6 +235,64 @@ jobs: sarif_file: results-dir/results.sarif ``` +## Enabling Pull Request Comment + +`GITHUB_TOKEN` enables this github action to access github API and post comments in a pull request: + +```yaml +name: Test KICS action PR comment + +on: + pull_request: + +jobs: + test: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v2 + - name: run kics Scan + uses: checkmarx/kics-action@v1.3 + with: + path: test/samples/positive1.tf,test/samples/positive2.tf + token: ${{ secrets.GITHUB_TOKEN }} + output_path: myResults/ + ignore_on_exit: results + enable_comments: true +``` + +### Example Pull Request Comment + + +KICS Logo + +**KICS version: 1.4.5** + + + +
+ +| | Category | Results | +| --- |--- | --- | +| ![HIGH](https://user-images.githubusercontent.com/23239410/92157087-97285600-ee32-11ea-988f-0aca12c4c126.png) |HIGH | 3 | +| ![MEDIUM](https://user-images.githubusercontent.com/23239410/92157093-98598300-ee32-11ea-83d7-af52251a011b.png) |MEDIUM | 2 | +| ![LOW](https://user-images.githubusercontent.com/23239410/92157091-98598300-ee32-11ea-8498-19bd7d62019b.png) |LOW | 0 | +| ![INFO](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) |INFO | 0 | +| ![TRACE](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) |TRACE | 0 | +| ![TOTAL](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TOTAL | 5 | + + + +| Metric | Values | +| --- | --- | +| Files scanned | 2 | +| Files parsed | 2 | +| Files failed to scan | 0 | +| Total queries | 821 | +| Queries failed to execute | 0 | +| Execution time | 13s | + +
+ ## How To Contribute We welcome [issues](https://github.com/checkmarx/kics-github-action/issues) to and [pull requests](https://github.com/checkmarx/kics-github-action/pulls) against this repository! diff --git a/action.yml b/action.yml index 4cb1bb4..1f1826d 100644 --- a/action.yml +++ b/action.yml @@ -3,12 +3,13 @@ name: "KICS Github Action" description: "Run KICS scan against IaC projects" inputs: token: - required: true - description: "Github token" + description: "The GITHUB_TOKEN for the current workflow run" + required: false + default: ${{github.token}} enable_comments: required: false default: false - description: "Enable pull request reprot comments" + description: "Enable pull request report comments" path: description: "paths to a file or directories to scan, accepts a comma separated list" required: true @@ -58,7 +59,7 @@ inputs: description: "path to secrets regex rules configuration file" required: false libraries_path: - description: "path to directory with libraries" + description: "path to directory with Rego libraries" required: false disable_full_descriptions: description: "disable request for full descriptions and use default vulnerability descriptions" diff --git a/src/commenter.js b/src/commenter.js index df7f6bb..94c1461 100644 --- a/src/commenter.js +++ b/src/commenter.js @@ -13,9 +13,11 @@ const severityIcons = { function createComment(results) { let message = "![kics-logo](" + kicsLogo + ")\n"; - message += "---"; + message += ""; + message += ""; + message += "
"; + message += `\n**KICS version: ${results['kics_version']}**\n` - message += "\n**Total Results: " + results['total_counter'] + "**\n\n"; message += "| | Category | Results |\n"; message += "| --- |--- | --- |\n"; let severityCounters = results['severity_counters'] @@ -24,8 +26,9 @@ function createComment(results) { message += "| ![" + severity + "](" + severityIcons[severity] + ") |" + severity.toUpperCase() + " | " + severityCounters[severity.toUpperCase()] + " |\n"; } } + message += `| ![TOTAL](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TOTAL | ${results['total_counter']} |`; + message += ""; - message += "\n**Scan Metrics**\n\n"; message += "| Metric | Values |\n"; message += "| --- | --- |\n"; message += "| Files scanned | " + results['files_scanned'] + "\n"; @@ -33,10 +36,8 @@ function createComment(results) { message += "| Files failed to scan | " + results['files_failed_to_scan'] + "\n"; message += "| Total queries | " + results['queries_total'] + "\n"; message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; - - let executionTime = moment(results['end']).diff(moment(results['start']), 'seconds'); - - message += "| Execution time | " + executionTime + "s\n"; + message += "| Execution time | " + moment(results['end']).diff(moment(results['start']), 'seconds') + "s\n"; + message += "
"; return message; } From a0faf8670d4f78ae46a0e2403a2813bc7b42401c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Mon, 18 Oct 2021 12:43:26 +0100 Subject: [PATCH 11/18] fixing panel tables --- dist/index.js | 16 +++++++++------- src/commenter.js | 16 +++++++++------- 2 files changed, 18 insertions(+), 14 deletions(-) diff --git a/dist/index.js b/dist/index.js index 4dc25be..e6e0656 100644 --- a/dist/index.js +++ b/dist/index.js @@ -17818,12 +17818,12 @@ const severityIcons = { function createComment(results) { let message = "![kics-logo](" + kicsLogo + ")\n"; - - message += ""; - message += ""; - message += "\n
"; - message += `\n**KICS version: ${results['kics_version']}**\n` + + message += "\n"; + message += "\n"; + message += "
\n"; + message += "| | Category | Results |\n"; message += "| --- |--- | --- |\n"; let severityCounters = results['severity_counters'] @@ -17833,7 +17833,8 @@ function createComment(results) { } } message += `| ![TOTAL](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TOTAL | ${results['total_counter']} |`; - message += ""; + + message += "\n\n"; message += "| Metric | Values |\n"; message += "| --- | --- |\n"; @@ -17843,7 +17844,8 @@ function createComment(results) { message += "| Total queries | " + results['queries_total'] + "\n"; message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; message += "| Execution time | " + moment(results['end']).diff(moment(results['start']), 'seconds') + "s\n"; - message += "
"; + + message += "\n
\n"; return message; } diff --git a/src/commenter.js b/src/commenter.js index 94c1461..76d8102 100644 --- a/src/commenter.js +++ b/src/commenter.js @@ -12,12 +12,12 @@ const severityIcons = { function createComment(results) { let message = "![kics-logo](" + kicsLogo + ")\n"; - - message += ""; - message += ""; - message += "\n
"; - message += `\n**KICS version: ${results['kics_version']}**\n` + + message += "\n"; + message += "\n"; + message += "
\n"; + message += "| | Category | Results |\n"; message += "| --- |--- | --- |\n"; let severityCounters = results['severity_counters'] @@ -27,7 +27,8 @@ function createComment(results) { } } message += `| ![TOTAL](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TOTAL | ${results['total_counter']} |`; - message += ""; + + message += "\n\n"; message += "| Metric | Values |\n"; message += "| --- | --- |\n"; @@ -37,7 +38,8 @@ function createComment(results) { message += "| Total queries | " + results['queries_total'] + "\n"; message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; message += "| Execution time | " + moment(results['end']).diff(moment(results['start']), 'seconds') + "s\n"; - message += "
"; + + message += "\n
\n"; return message; } From 5bfac87c6ac43942e90c44cae6d6254b60992fb3 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Mon, 18 Oct 2021 12:45:46 +0100 Subject: [PATCH 12/18] fixing panel tables MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Rogério Peixoto --- dist/index.js | 8 ++++---- src/commenter.js | 8 ++++---- 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/dist/index.js b/dist/index.js index e6e0656..b714852 100644 --- a/dist/index.js +++ b/dist/index.js @@ -17822,7 +17822,7 @@ function createComment(results) { message += "\n"; message += "\n"; - message += "\n
\n"; + message += "
\n\n"; message += "| | Category | Results |\n"; message += "| --- |--- | --- |\n"; @@ -17834,7 +17834,7 @@ function createComment(results) { } message += `| ![TOTAL](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TOTAL | ${results['total_counter']} |`; - message += "\n\n"; + message += "\n\n\n\n"; message += "| Metric | Values |\n"; message += "| --- | --- |\n"; @@ -17845,7 +17845,7 @@ function createComment(results) { message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; message += "| Execution time | " + moment(results['end']).diff(moment(results['start']), 'seconds') + "s\n"; - message += "\n
\n"; + message += "\n\n\n\n"; return message; } @@ -17861,7 +17861,7 @@ async function postPRComment(results, repo, prNumber, octokit) { const comment = comments.find((comment) => { return ( comment.user.login === "github-actions[bot]" && - comment.body.startsWith("![kics-logo](" + kicsLogo + ")\n") + comment.body.startsWith("![kics-logo](") ); }); diff --git a/src/commenter.js b/src/commenter.js index 76d8102..8c1c018 100644 --- a/src/commenter.js +++ b/src/commenter.js @@ -16,7 +16,7 @@ function createComment(results) { message += "\n"; message += "\n"; - message += "\n
\n"; + message += "
\n\n"; message += "| | Category | Results |\n"; message += "| --- |--- | --- |\n"; @@ -28,7 +28,7 @@ function createComment(results) { } message += `| ![TOTAL](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TOTAL | ${results['total_counter']} |`; - message += "\n\n"; + message += "\n\n\n\n"; message += "| Metric | Values |\n"; message += "| --- | --- |\n"; @@ -39,7 +39,7 @@ function createComment(results) { message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; message += "| Execution time | " + moment(results['end']).diff(moment(results['start']), 'seconds') + "s\n"; - message += "\n
\n"; + message += "\n\n\n\n"; return message; } @@ -55,7 +55,7 @@ async function postPRComment(results, repo, prNumber, octokit) { const comment = comments.find((comment) => { return ( comment.user.login === "github-actions[bot]" && - comment.body.startsWith("![kics-logo](" + kicsLogo + ")\n") + comment.body.startsWith("![kics-logo](") ); }); From d809a88b6094d40d055e1d3ccec66945e25bce32 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Mon, 18 Oct 2021 14:22:24 +0100 Subject: [PATCH 13/18] adding annotations feature MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Rogério Peixoto --- dist/index.js | 77 ++++++++++++++++++++++++++++++++++++++---------- src/annotator.js | 38 ++++++++++++++++++++++++ src/main.js | 10 ++++--- src/scanner.js | 23 +++++++-------- 4 files changed, 116 insertions(+), 32 deletions(-) create mode 100644 src/annotator.js diff --git a/dist/index.js b/dist/index.js index b714852..001b178 100644 --- a/dist/index.js +++ b/dist/index.js @@ -17799,6 +17799,50 @@ function wrappy (fn, cb) { } +/***/ }), + +/***/ 9362: +/***/ ((module, __unused_webpack_exports, __nccwpck_require__) => { + +const core = __nccwpck_require__(2186); + +function extractAnnotations(results) { + let annotations = []; + for (i in results.queries) { + let query = results.queries[i]; + for (j in query.files) { + let file = query.files[j]; + annotations.push({ + file: file['file_name'], + startLine: file['line'], + endLine: file['line'], + severity: query['severity'], + queryName: query['query_name'], + description: query['description'], + }); + } + } + + return annotations; +} + +function annotateChangesWithResults(results) { + const annotations = extractAnnotations(results); + annotations.forEach(annotation => { + core.warning(annotation.description, { + title: `[${annotation.severity}] ${annotation.queryName}`, + startLine: annotation.startLine, + endLine: annotation.endLine, + file: annotation.file, + }); + }); + +} + +module.exports = { + annotateChangesWithResults +} + /***/ }), /***/ 3571: @@ -18060,7 +18104,7 @@ function addKICSCmdArgs(cmdArgs) { } } -async function scanWithKICS(enableComments) { +async function scanWithKICS() { let resultsJSONFile; if (!kicsInput.path.value) { @@ -18070,18 +18114,17 @@ async function scanWithKICS(enableComments) { let cmdArgs = []; addKICSCmdArgs(cmdArgs); - // making sure results.json is always created when PR comments are enabled - if (enableComments) { - if (!cmdArgs.find(arg => arg == '--output-path')) { - cmdArgs.push('--output-path'); - cmdArgs.push('./'); - resultsJSONFile = './results.json'; - } else { - let resultsDir = core.getInput('output_path'); - resultsJSONFile = filepath.join(resultsDir, '/results.json'); - } - addJSONReportFormat(cmdArgs); + // making sure results.json is always created + if (!cmdArgs.find(arg => arg == '--output-path')) { + cmdArgs.push('--output-path'); + cmdArgs.push('./'); + resultsJSONFile = './results.json'; + } else { + let resultsDir = core.getInput('output_path'); + resultsJSONFile = filepath.join(resultsDir, '/results.json'); } + addJSONReportFormat(cmdArgs); + exitCode = await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`, [], { ignoreReturnCode: true }); return { statusCode: exitCode, @@ -18311,6 +18354,7 @@ var __webpack_exports__ = {}; const install = __nccwpck_require__(1430); const commenter = __nccwpck_require__(3571); const scanner = __nccwpck_require__(3157); +const annotator = __nccwpck_require__(9362); const core = __nccwpck_require__(2186); const github = __nccwpck_require__(5438); @@ -18385,7 +18429,6 @@ async function main() { try { const githubToken = core.getInput("token"); const octokit = github.getOctokit(githubToken); - let enableComments = core.getInput('enable_comments').toLocaleLowerCase() === "true"; let context = {}; let repo = ''; let prNumber = ''; @@ -18401,12 +18444,14 @@ async function main() { } await install.installKICS(); - const scanResults = await scanner.scanWithKICS(enableComments); - if (enableComments) { - let parsedResults = readJSON(scanResults.resultsJSONFile); + const scanResults = await scanner.scanWithKICS(); + const parsedResults = readJSON(scanResults.resultsJSONFile); + if (core.getInput('enable_comments').toLocaleLowerCase() === "true") { await commenter.postPRComment(parsedResults, repo, prNumber, octokit); } + annotator.annotateChangesWithResults(parsedResults); + cleanupOutput(scanResults.resultsJSONFile); setWorkflowStatus(scanResults.statusCode); } catch (e) { diff --git a/src/annotator.js b/src/annotator.js new file mode 100644 index 0000000..794afde --- /dev/null +++ b/src/annotator.js @@ -0,0 +1,38 @@ +const core = require("@actions/core"); + +function extractAnnotations(results) { + let annotations = []; + for (i in results.queries) { + let query = results.queries[i]; + for (j in query.files) { + let file = query.files[j]; + annotations.push({ + file: file['file_name'], + startLine: file['line'], + endLine: file['line'], + severity: query['severity'], + queryName: query['query_name'], + description: query['description'], + }); + } + } + + return annotations; +} + +function annotateChangesWithResults(results) { + const annotations = extractAnnotations(results); + annotations.forEach(annotation => { + core.warning(annotation.description, { + title: `[${annotation.severity}] ${annotation.queryName}`, + startLine: annotation.startLine, + endLine: annotation.endLine, + file: annotation.file, + }); + }); + +} + +module.exports = { + annotateChangesWithResults +} \ No newline at end of file diff --git a/src/main.js b/src/main.js index df9d715..16c260a 100644 --- a/src/main.js +++ b/src/main.js @@ -1,6 +1,7 @@ const install = require("./install"); const commenter = require("./commenter"); const scanner = require("./scanner"); +const annotator = require("./annotator"); const core = require("@actions/core"); const github = require("@actions/github"); @@ -75,7 +76,6 @@ async function main() { try { const githubToken = core.getInput("token"); const octokit = github.getOctokit(githubToken); - let enableComments = core.getInput('enable_comments').toLocaleLowerCase() === "true"; let context = {}; let repo = ''; let prNumber = ''; @@ -91,12 +91,14 @@ async function main() { } await install.installKICS(); - const scanResults = await scanner.scanWithKICS(enableComments); - if (enableComments) { - let parsedResults = readJSON(scanResults.resultsJSONFile); + const scanResults = await scanner.scanWithKICS(); + const parsedResults = readJSON(scanResults.resultsJSONFile); + if (core.getInput('enable_comments').toLocaleLowerCase() === "true") { await commenter.postPRComment(parsedResults, repo, prNumber, octokit); } + annotator.annotateChangesWithResults(parsedResults); + cleanupOutput(scanResults.resultsJSONFile); setWorkflowStatus(scanResults.statusCode); } catch (e) { diff --git a/src/scanner.js b/src/scanner.js index c2293cd..412c85c 100644 --- a/src/scanner.js +++ b/src/scanner.js @@ -68,7 +68,7 @@ function addKICSCmdArgs(cmdArgs) { } } -async function scanWithKICS(enableComments) { +async function scanWithKICS() { let resultsJSONFile; if (!kicsInput.path.value) { @@ -78,18 +78,17 @@ async function scanWithKICS(enableComments) { let cmdArgs = []; addKICSCmdArgs(cmdArgs); - // making sure results.json is always created when PR comments are enabled - if (enableComments) { - if (!cmdArgs.find(arg => arg == '--output-path')) { - cmdArgs.push('--output-path'); - cmdArgs.push('./'); - resultsJSONFile = './results.json'; - } else { - let resultsDir = core.getInput('output_path'); - resultsJSONFile = filepath.join(resultsDir, '/results.json'); - } - addJSONReportFormat(cmdArgs); + // making sure results.json is always created + if (!cmdArgs.find(arg => arg == '--output-path')) { + cmdArgs.push('--output-path'); + cmdArgs.push('./'); + resultsJSONFile = './results.json'; + } else { + let resultsDir = core.getInput('output_path'); + resultsJSONFile = filepath.join(resultsDir, '/results.json'); } + addJSONReportFormat(cmdArgs); + exitCode = await exec.exec(`${kicsBinary} scan --no-progress ${cmdArgs.join(" ")}`, [], { ignoreReturnCode: true }); return { statusCode: exitCode, From 596c0f2b1928570dca04ca62332e1d5aaaa57fc1 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Mon, 18 Oct 2021 15:31:48 +0100 Subject: [PATCH 14/18] adding placeholder icons for alignment --- dist/index.js | 20 ++++++++++---------- src/commenter.js | 20 ++++++++++---------- 2 files changed, 20 insertions(+), 20 deletions(-) diff --git a/dist/index.js b/dist/index.js index 001b178..bff5c48 100644 --- a/dist/index.js +++ b/dist/index.js @@ -17873,21 +17873,21 @@ function createComment(results) { let severityCounters = results['severity_counters'] for (let severity of severityOrder) { if (severity in severityCounters) { - message += "| ![" + severity + "](" + severityIcons[severity] + ") |" + severity.toUpperCase() + " | " + severityCounters[severity.toUpperCase()] + " |\n"; + message += `| ![${severity}](${severityIcons[severity]}) | ${severity.toUpperCase()} | ${severityCounters[severity.toUpperCase()]} |\n`; } } - message += `| ![TOTAL](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TOTAL | ${results['total_counter']} |`; + message += `| ![TOTAL](${severityIcons['TRACE']}) | TOTAL | ${results['total_counter']} |`; message += "\n\n\n\n"; - message += "| Metric | Values |\n"; - message += "| --- | --- |\n"; - message += "| Files scanned | " + results['files_scanned'] + "\n"; - message += "| Files parsed | " + results['files_parsed'] + "\n"; - message += "| Files failed to scan | " + results['files_failed_to_scan'] + "\n"; - message += "| Total queries | " + results['queries_total'] + "\n"; - message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; - message += "| Execution time | " + moment(results['end']).diff(moment(results['start']), 'seconds') + "s\n"; + message += "| | Metric | Values |\n"; + message += "| --- | --- | --- |\n"; + message += `| ![placeholder](${severityIcons['TRACE']}) | Files scanned | ${results['files_scanned']}\n`; + message += `| ![placeholder](${severityIcons['TRACE']}) | Files parsed | ${results['files_parsed']}\n`; + message += `| ![placeholder](${severityIcons['TRACE']}) | Files failed to scan | ${results['files_failed_to_scan']}\n`; + message += `| ![placeholder](${severityIcons['TRACE']}) | Total queries | ${results['queries_total']}\n`; + message += `| ![placeholder](${severityIcons['TRACE']}) | Queries failed to execute | ${results['queries_failed_to_execute']}\n`; + message += `| ![placeholder](${severityIcons['TRACE']}) | Execution time | ${moment(results['end']).diff(moment(results['start']), 'seconds')}\n`; message += "\n\n\n\n"; diff --git a/src/commenter.js b/src/commenter.js index 8c1c018..0a28582 100644 --- a/src/commenter.js +++ b/src/commenter.js @@ -23,21 +23,21 @@ function createComment(results) { let severityCounters = results['severity_counters'] for (let severity of severityOrder) { if (severity in severityCounters) { - message += "| ![" + severity + "](" + severityIcons[severity] + ") |" + severity.toUpperCase() + " | " + severityCounters[severity.toUpperCase()] + " |\n"; + message += `| ![${severity}](${severityIcons[severity]}) | ${severity.toUpperCase()} | ${severityCounters[severity.toUpperCase()]} |\n`; } } - message += `| ![TOTAL](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TOTAL | ${results['total_counter']} |`; + message += `| ![TOTAL](${severityIcons['TRACE']}) | TOTAL | ${results['total_counter']} |`; message += "\n\n\n\n"; - message += "| Metric | Values |\n"; - message += "| --- | --- |\n"; - message += "| Files scanned | " + results['files_scanned'] + "\n"; - message += "| Files parsed | " + results['files_parsed'] + "\n"; - message += "| Files failed to scan | " + results['files_failed_to_scan'] + "\n"; - message += "| Total queries | " + results['queries_total'] + "\n"; - message += "| Queries failed to execute | " + results['queries_failed_to_execute'] + "\n"; - message += "| Execution time | " + moment(results['end']).diff(moment(results['start']), 'seconds') + "s\n"; + message += "| | Metric | Values |\n"; + message += "| --- | --- | --- |\n"; + message += `| ![placeholder](${severityIcons['TRACE']}) | Files scanned | ${results['files_scanned']}\n`; + message += `| ![placeholder](${severityIcons['TRACE']}) | Files parsed | ${results['files_parsed']}\n`; + message += `| ![placeholder](${severityIcons['TRACE']}) | Files failed to scan | ${results['files_failed_to_scan']}\n`; + message += `| ![placeholder](${severityIcons['TRACE']}) | Total queries | ${results['queries_total']}\n`; + message += `| ![placeholder](${severityIcons['TRACE']}) | Queries failed to execute | ${results['queries_failed_to_execute']}\n`; + message += `| ![placeholder](${severityIcons['TRACE']}) | Execution time | ${moment(results['end']).diff(moment(results['start']), 'seconds')}\n`; message += "\n\n\n\n"; From 00ad4364d49541ebc3bb7fad03ef8730ddff936a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Mon, 18 Oct 2021 15:39:56 +0100 Subject: [PATCH 15/18] adding placeholder icons for alignment --- README.md | 16 ++++++++-------- dist/index.js | 2 ++ src/annotator.js | 2 +- src/scanner.js | 2 +- 4 files changed, 12 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index 5e184b5..c95c455 100644 --- a/README.md +++ b/README.md @@ -282,14 +282,14 @@ jobs: -| Metric | Values | -| --- | --- | -| Files scanned | 2 | -| Files parsed | 2 | -| Files failed to scan | 0 | -| Total queries | 821 | -| Queries failed to execute | 0 | -| Execution time | 13s | +| | Metric | Values | +| --- | --- | --- | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Files scanned | 2 | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Files parsed | 2 | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Files failed to scan | 0 | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Total queries | 821 | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Queries failed to execute | 0 | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Execution time | 13s | diff --git a/dist/index.js b/dist/index.js index bff5c48..a21e735 100644 --- a/dist/index.js +++ b/dist/index.js @@ -17843,6 +17843,7 @@ module.exports = { annotateChangesWithResults } + /***/ }), /***/ 3571: @@ -18136,6 +18137,7 @@ module.exports = { scanWithKICS }; + /***/ }), /***/ 2877: diff --git a/src/annotator.js b/src/annotator.js index 794afde..18351da 100644 --- a/src/annotator.js +++ b/src/annotator.js @@ -35,4 +35,4 @@ function annotateChangesWithResults(results) { module.exports = { annotateChangesWithResults -} \ No newline at end of file +} diff --git a/src/scanner.js b/src/scanner.js index 412c85c..ee76a20 100644 --- a/src/scanner.js +++ b/src/scanner.js @@ -98,4 +98,4 @@ async function scanWithKICS() { module.exports = { scanWithKICS -}; \ No newline at end of file +}; From b83a01cd04acba5ce41fe8b0597616390766c408 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Mon, 18 Oct 2021 18:07:08 +0100 Subject: [PATCH 16/18] readme + table of contents --- README.md | 236 ++++++++++++++++++--------------- images/annotations-preview.png | Bin 0 -> 136876 bytes 2 files changed, 131 insertions(+), 105 deletions(-) create mode 100644 images/annotations-preview.png diff --git a/README.md b/README.md index c95c455..e88aae9 100644 --- a/README.md +++ b/README.md @@ -1,10 +1,29 @@ -# KICS Github Action ![kics](images/icon-32x32.png) Github +# KICS Github Action [![License: GPL-3.0](https://img.shields.io/badge/License-GPL3.0-yellow.svg)](https://www.gnu.org/licenses) [![Latest Release](https://img.shields.io/github/v/release/checkmarx/kics-github-action)](https://github.com/checkmarx/kics-github-action/releases) [![Open Issues](https://img.shields.io/github/issues-raw/checkmarx/kics-github-action)](https://github.com/checkmarx/kics-github-action/issues) -## Integrate KICS into your GitHub workflows, using KICS Github Action to make your IaC more secure +- [KICS Github Action](#kics-github-action) + - [Integrate KICS into your GitHub workflows](#integrate-kics-into-your-github-workflows) + - [Supported Platforms](#supported-platforms) + - [Please find more info in the official website: kics.io](#please-find-more-info-in-the-official-website-kicsio) + - [Inputs](#inputs) + - [Simple usage example](#simple-usage-example) + - [Workflow failures](#workflow-failures) + - [Don't fail on results](#dont-fail-on-results) + - [Fail by severity usage example](#fail-by-severity-usage-example) + - [Enabling Pull Request Comment](#enabling-pull-request-comment) + - [PR Comment Example](#pr-comment-example) + - [Annotations](#annotations) + - [Profiling KICS](#profiling-kics) + - [Uploading SARIF report](#uploading-sarif-report) + - [Using configuration file](#using-configuration-file) + - [How To Contribute](#how-to-contribute) +- [License](#license) + +## Integrate KICS into your GitHub workflows + **KICS** (pronounced as 'kick-s') or **Kicscan** is an open source solution for static code analysis of Infrastructure as Code. @@ -28,34 +47,36 @@ It is as simple as running a CLI tool, making it easy to integrate into any proj ### Please find more info in the official website: kics.io +And official documentation page docs.kics.io + ## Inputs -| Variable | Example Value   | Description   | Type | Required | Default | -| ------------------ | --------------------------------------- | ---------------------------------------------------------------- | ------- | -------- | --------------------------------------------- | -| enable_comment | true | Enable pull request report comments | Boolean | No | false | -| path | terraform/main.tf,Dockerfile | paths to a file or directories to scan, comma separated list | String | Yes | N/A | -| ignore_on_exit | results | defines which non-zero exit codes should be ignored (all, results, errors, none) | String | No | none | -| fail_on | high,medium | comma separated list of which severities returns exit code !=0 | String | No | high,medium,low,info | -| timeout | 75 | number of seconds the query has to execute before being canceled | String | No | 60 | -| profiling | CPU | turns on profiler that prints resource consumption in the logs during the execution (CPU, MEM) | String | No | N/A | -| config_path | ./kics.config | path to configuration file | String | No | N/A | -| platform_type | terraform,ansible | case insensitive list of platform types to scan | String | No | All platforms | -| exclude_paths | ./shouldNotScan/*,somefile.txt | exclude paths from scan, supports glob, comma separated list | String | No | N/A | -| exclude_queries | a227ec01-f97a-4084-91a4-47b350c1db54 | exclude queries by providing the query ID, comma separated list | String | No | N/A | -| exclude_categories | 'Observability,Networking and Firewall' | exclude categories by providing its name, comma separated list | String | No | N/A | -| exclude_results | 'd4a1fa80-d9d8-450f-87c2-e1f6669c41f8' | exclude results by providing the similarity ID of a result | String | No | N/A | -| include_queries | a227ec01-f97a-4084-91a4-47b350c1db54 | include only specified list of queries to the scan, cannot be provided with query exclusion flags | String | No | N/A | -| output_formats | 'json,sarif' | formats in which the results report will be exported | String | No | json | -| output_path | results.json | file path to store result in json format | String | No | N/A | -| payload_path | /tmp/mypayload.json | file path to store source internal representation in JSON format | String | No | N/A | -| queries | | path to directory with queries (default "./assets/queries") | String | No | ./assets/queries downloaded with the binaries | -| verbose | true | verbose scan | Boolean | No | false | -| type | Ansible,Dockerfile | case insensitive comma-separated list of platform types to scan (Ansible, AzureResourceManager, CloudFormation, Dockerfile, Kubernetes, OpenAPI, Terraform) | String | No | all types | -| bom | true | include bill of materials (BoM) in results.json output | Boolean | No | false | -| disable_full_descriptions | false | disable request for full descriptions and use default vulnerability descriptions | Boolean | false | -| disable_secrets | false | disable secrets detection | Boolean | false | -| secrets_regexes_path| ./mydir/secrets-config.json | path to custom secrets regex rules configuration file | String | No | N/A | -| libraries_path | ./myLibsDir | path to directory with Rego libraries | String | No | N/A | +| Variable | Example Value   | Description   | Type | Required | Default | +| ------------------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------- | ------- | -------- | --------------------------------------------- | +| enable_comment | true | Enable pull request report comments | Boolean | No | false | +| path | terraform/main.tf,Dockerfile | paths to a file or directories to scan, comma separated list | String | Yes | N/A | +| ignore_on_exit | results | defines which non-zero exit codes should be ignored (all, results, errors, none) | String | No | none | +| fail_on | high,medium | comma separated list of which severities returns exit code !=0 | String | No | high,medium,low,info | +| timeout | 75 | number of seconds the query has to execute before being canceled | String | No | 60 | +| profiling | CPU | turns on profiler that prints resource consumption in the logs during the execution (CPU, MEM) | String | No | N/A | +| config_path | ./kics.config | path to configuration file | String | No | N/A | +| platform_type | terraform,ansible | case insensitive list of platform types to scan | String | No | All platforms | +| exclude_paths | ./shouldNotScan/*,somefile.txt | exclude paths from scan, supports glob, comma separated list | String | No | N/A | +| exclude_queries | a227ec01-f97a-4084-91a4-47b350c1db54 | exclude queries by providing the query ID, comma separated list | String | No | N/A | +| exclude_categories | 'Observability,Networking and Firewall' | exclude categories by providing its name, comma separated list | String | No | N/A | +| exclude_results | 'd4a1fa80-d9d8-450f-87c2-e1f6669c41f8' | exclude results by providing the similarity ID of a result | String | No | N/A | +| include_queries | a227ec01-f97a-4084-91a4-47b350c1db54 | include only specified list of queries to the scan, cannot be provided with query exclusion flags | String | No | N/A | +| output_formats | 'json,sarif' | formats in which the results report will be exported | String | No | json | +| output_path | results.json | file path to store result in json format | String | No | N/A | +| payload_path | /tmp/mypayload.json | file path to store source internal representation in JSON format | String | No | N/A | +| queries | | path to directory with queries (default "./assets/queries") | String | No | ./assets/queries downloaded with the binaries | +| verbose | true | verbose scan | Boolean | No | false | +| type | Ansible,Dockerfile | case insensitive comma-separated list of platform types to scan (Ansible, AzureResourceManager, CloudFormation, Dockerfile, Kubernetes, OpenAPI, Terraform) | String | No | all types | +| bom | true | include bill of materials (BoM) in results.json output | Boolean | No | false | +| disable_full_descriptions | false | disable request for full descriptions and use default vulnerability descriptions | Boolean | false | +| disable_secrets | false | disable secrets detection | Boolean | false | +| secrets_regexes_path | ./mydir/secrets-config.json | path to custom secrets regex rules configuration file | String | No | N/A | +| libraries_path | ./myLibsDir | path to directory with Rego libraries | String | No | N/A | ## Simple usage example @@ -82,24 +103,6 @@ It is as simple as running a CLI tool, making it easy to integrate into any proj By default KICS will fail your workflow on any results found. -### Fail by severity usage example - -If want your pipeline just to fail on HIGH and MEDIUM severity results and KICS engine execution errors: - -```yaml - steps: - - uses: actions/checkout@v2 - - name: run kics Scan - uses: checkmarx/kics-action@v1.3 - with: - path: 'terraform,my-other-sub-folder/Dockerfile' - fail_on: high,medium - output_path: 'results.json' - - name: display kics results - run: | - cat results.json -``` - ### Don't fail on results If you want KICS to ignore the results and return exit status code 0 unless a KICS engine error happens: @@ -118,6 +121,88 @@ If you want KICS to ignore the results and return exit status code 0 unless a KI cat results.json ``` +### Fail by severity usage example + +If want your pipeline just to fail on HIGH and MEDIUM severity results and KICS engine execution errors: + +```yaml + steps: + - uses: actions/checkout@v2 + - name: run kics Scan + uses: checkmarx/kics-action@v1.3 + with: + path: 'terraform,my-other-sub-folder/Dockerfile' + fail_on: high,medium + output_path: 'results.json' + - name: display kics results + run: | + cat results.json +``` + +## Enabling Pull Request Comment + +`GITHUB_TOKEN` enables this github action to access github API and post comments in a pull request: + +```yaml +name: Test KICS action PR comment + +on: + pull_request: + +jobs: + test: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v2 + - name: run kics Scan + uses: checkmarx/kics-action@v1.3 + with: + path: test/samples/positive1.tf,test/samples/positive2.tf + token: ${{ secrets.GITHUB_TOKEN }} + output_path: myResults/ + ignore_on_exit: results + enable_comments: true +``` + +### PR Comment Example + + +KICS Logo + +**KICS version: 1.4.5** + + + +
+ +| | Category | Results | +| --------------------------------------------------------------------------------------------------------------- | -------- | ------- | +| ![HIGH](https://user-images.githubusercontent.com/23239410/92157087-97285600-ee32-11ea-988f-0aca12c4c126.png) | HIGH | 3 | +| ![MEDIUM](https://user-images.githubusercontent.com/23239410/92157093-98598300-ee32-11ea-83d7-af52251a011b.png) | MEDIUM | 2 | +| ![LOW](https://user-images.githubusercontent.com/23239410/92157091-98598300-ee32-11ea-8498-19bd7d62019b.png) | LOW | 0 | +| ![INFO](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | INFO | 0 | +| ![TRACE](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TRACE | 0 | +| ![TOTAL](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TOTAL | 5 | + + + +| | Metric | Values | +| -------------------------------------------------------------------------------------------------------------------- | ------------------------- | ------ | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Files scanned | 2 | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Files parsed | 2 | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Files failed to scan | 0 | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Total queries | 821 | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Queries failed to execute | 0 | +| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Execution time | 13s | + +
+ + +## Annotations + +After scanning, [kics-github-action](https://github.com/Checkmarx/kics-github-action) will add the results as annotations in a pull request: + +annotations-preview ## Profiling KICS @@ -234,65 +319,6 @@ jobs: with: sarif_file: results-dir/results.sarif ``` - -## Enabling Pull Request Comment - -`GITHUB_TOKEN` enables this github action to access github API and post comments in a pull request: - -```yaml -name: Test KICS action PR comment - -on: - pull_request: - -jobs: - test: - runs-on: ubuntu-latest - steps: - - uses: actions/checkout@v2 - - name: run kics Scan - uses: checkmarx/kics-action@v1.3 - with: - path: test/samples/positive1.tf,test/samples/positive2.tf - token: ${{ secrets.GITHUB_TOKEN }} - output_path: myResults/ - ignore_on_exit: results - enable_comments: true -``` - -### Example Pull Request Comment - - -KICS Logo - -**KICS version: 1.4.5** - - - -
- -| | Category | Results | -| --- |--- | --- | -| ![HIGH](https://user-images.githubusercontent.com/23239410/92157087-97285600-ee32-11ea-988f-0aca12c4c126.png) |HIGH | 3 | -| ![MEDIUM](https://user-images.githubusercontent.com/23239410/92157093-98598300-ee32-11ea-83d7-af52251a011b.png) |MEDIUM | 2 | -| ![LOW](https://user-images.githubusercontent.com/23239410/92157091-98598300-ee32-11ea-8498-19bd7d62019b.png) |LOW | 0 | -| ![INFO](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) |INFO | 0 | -| ![TRACE](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) |TRACE | 0 | -| ![TOTAL](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | TOTAL | 5 | - - - -| | Metric | Values | -| --- | --- | --- | -| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Files scanned | 2 | -| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Files parsed | 2 | -| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Files failed to scan | 0 | -| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Total queries | 821 | -| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Queries failed to execute | 0 | -| ![placeholder](https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png) | Execution time | 13s | - -
- ## How To Contribute We welcome [issues](https://github.com/checkmarx/kics-github-action/issues) to and [pull requests](https://github.com/checkmarx/kics-github-action/pulls) against this repository! diff --git a/images/annotations-preview.png b/images/annotations-preview.png new file mode 100644 index 0000000000000000000000000000000000000000..e977cca184b6516bfeb8bf99c623ba22bada7107 GIT binary patch literal 136876 zcmdS>WmKF?w+4z50>Kgj1ozcGkUr z&tbehy1Kk($$aKh^Cd)9M)U(LCM*~j*avYjA$c$`h+Z(Tx9_0efnqM47_Y&=-td|U z3d)KL3gXM!+ZdZ!8i9e4#Te-7Zi-Wp4e06V>JE%jlEd1&$Oi|9%j^0Kb@t--bV4ET z%1F`B*uIDU`KAU#mxoFNM{Z*1;x4CVz4%V+{jB?LECy|Q$Df;7t*#MAC>g& z0WV*Aw5F_LS7#^sTSLmEB;+p(ANU%?5GUmLZjcc;ak{kM=#%m4fMNX7#%&? zhMo@l?j4wNg0{#0eajw5qRK|9;>Oa_U=*M*G}xOUGcX8H=nd$D3HpEp9~%e;1^Pw; zeT1^X|C@pP+T1JtzckpWMu7NYU3!pVBP_$YTisy)lpSiio?Lh zibl`SM&F3W)yno)5il-S4p7j_$Wag9)ymS^fy0%X;9og7K;d7}v;_G7%Hn9jO`s|* zi!W$nZ-mc6Lq|hLzyphqkI!XqXv`rmB=Vo)pkLesrjCxb9JI79E-o}Kj5Id(CbabI z?Ci93473ak)Sw*H4sOtVJfZ$g{ z|MU0nej2%&{clUw4*wYzXn?f8QfTRE=xG0^ZctIKU$GprX0Aq-YC>jKAn}0O;9+HD z;`&$q|C92+E&ipX>i?FcXJDZJYtg?X{a#eb!N^|F#tPJ?BhUX%&3_92HSs?MxoCe4 z{V$^Ux19eK3lcOBEEnznOd1btK2zc@7#JUzxDdah>zm^YNKZ|pn_IxjYJqraompx_ zNnwSeS;>#yRka1)X1HVUmVp~BRZCw;XJ6r=++K+fhnda!m@Y1jx9KJf)8Y(_b|+`Y zCdQ|2Q9frGRhLKXd-QOyVW#-#&|kp*{Adb6jL_!R>zCkzf&cl*hUP==_WP$)+eySP zWX_YT_EhK)d|-cka?vy2Ab|bx@ePXv6RHk7O*Hua=f=Un6AKa8I9g);@(9&5mQ#U& z4F6Eo8-)Eh2w*8?Nm*UIL>OG!$aprHv6-1L?i!Dxf|g*w{k@^c2Sa1{q8gHITkwAv z>qHR@)69GruvbP$W_t@y%xzIkQ9~nd*HZQXiNCBY-+xFlY;a}e{a4kj_O@i~Ka2Fs zm(Spv+r&$Wrkc4#!sm z5PA)B#DKif)~s{?Bno_pD`r~1Ty#3$f9UO(PCgP{_Gq-A`akF3^MFxRRgWtuU{6U= zt7|;?QocSRD_UQFt*D~Gtvd%TXW6+TK?U)r&So=0jEs!3t;c_0o?(@hmi{n1ujE|V z@@95!rRysdHPztMTq3Zv6glsuozEX|bITcg@As!(I>Nj`>^U?)ir-hzQJE+9f{&N+ z4+_@n5@q`U;YY@Ta7r-u$8|kH4vxe?j;mi^&zx~+lFf?B(Bj8(2ln2FN1UD~elQ3QsZLT|gaFY<5=sloJg*tW`H97a zy!eDf{W^Hq-?q&I?;CMo6t=!qOB9lXnX%P!!;sfERH14fPX{_?1Tf!IVmeD9WE3I-^u$WS0wWDN7iu`>Th**$@=hTMRiwoEVH5onZy&XZ~3lW7nc^}!qS4) zP_V!9NrK~Mt|23_D7KZUB4a@BcKalcjxN7CHPpJ`o1o2m`|<5!(UB!%<77OJrqj#) zeee4E3hH((gjk{W7|vcS3k%iVq&~g%hG?vi1$5(=l=&-Y*{BVVrE;-OXIX*Cj8sQlgKPo0wI)H-ap}q zN&8&xZ8u^F4-T=c3zWuRs+V185cST+pkAWZ+^%gDqqCL`smoX61{saxXyMFtJg>at zoN>7AoSpKT!f5hx5DEA9Y+gmH`=jcbO6M|%Q!Y^_!`Uy3>+=0?PFExzovke#){CKk zUq@Q}oh9dZ`&n)eE>?%90ch(CWVxg2zmBue{U4bp&E6vmlX@%`SQsUP6uG^;u5>%Q z#tIc7>kG|&TCNDl9PtvNVZ{vPt#BSEX<8r9XNH{sjXA~n+G8sjbhOn^H2 z@pMJMl|kaSEy0(K1%tf38{3lP5{LLMz@L1S;C#glSVmTq9?k@;thAAbBGr=A?F`n} zn19YDWHjDny0*QyPfiHd-vjhtoZ9u9cGWFP;7==AZt<64g;AA13IG2u7l1FB4i8=3$eX zU6bHaT7r^3-mdcv!ki;Bv4uxoc=|l=h%!f6*fhmm+(k+4PvlTdZBM)CcuL&6^~IG~ zkS@u+Te`U*cd&DE$pi4-32UK#zS(WT%?2J)T-;nM_{^|W>PS}i!=bPPD55o3+6Q|4-1J%CT?`*OAS1r zM4NXDm-m;)dF5`EY2d@Kg+CR_6pg<=R{$CHuh>#~JZRv?PvbkalX$(`)K|}dL$D8b ztE}V^kmE%($TuR`?8eyZN9Y{bwT;xPM~C~Qv$O_d zbbmiKK$@N!9A-}@hLrQl_2J=&>w8ai5wJ!cMj!r(({3}Iz0TzF9dLVHy;~%lgm;du zC#|d|_p83Mr5A95@#I(#)%!NN@eF_8}zPrYAv$Oj`$qlzmKh06M zccz;0I`U@XA)I?>u!ozVRrSLXb%ZAsj3+9nJEmAr#kXD2eR6tMR=5vpC@b{z4k5hm z#;_cpe!gKa(33vC8r%Y|A0A?I41?!iH68515flJ>Y!r;g3*B}qu}W?V00LiJ<-(mCU=m$>Dx8yc91%&DkUZ2}3B+9kEsq~x@uX{wc@ z%j=y1L#kZMLtW{Xd7zVDY+34g1G!pGNTz%=(}&zc4;82Y6Q=oHUwx&C@oJj2bTI8T zm{!xdfFjQ4I|6@MTcH%x1j0U1=JYa|3Dp!aKE29G#PLj#ld;d>>3@G!G` z`u!agkj3|V4sav}M_NKMRJ!3KG^W&Ax;$x?k49D)_ZU3xYFZI@@-(|v&9;3kz$*^h zSizW9wsQA=B)opoW_@xC7p*t9Xf#KUupcwSrl+`?$>7CEWLSeTna&AS&AvFFtfc&e zY+haGZFy@$Ltu@n0n2h-P69L16A9wFaEZwks`a%y%toIR#bI8;T)_wR?|Mtu_*)2{v*n2r$qT|8ug zg9zR)_4CUQ7|eR1uu)}t^-jDV+nq}?oqc^WN);Oj9We%drCU^}1?KFQa#BJS-B33U zcRRC(3CRee>)tnraC!;A*7`;mg~AdFQTSsE`Rf7SHmX>W5}|W>TiaLdrJq}k5^Qk# z#7})KrwSE0;^*hb?8g25ADVA+fx~U6p8-AC^bTv5{H<9%7Yj8JeAD{^^>9=vFq}9ks;z;ucM67)#yO_u*U2Vc&?e z9ugB0bGrn0Qn8QHs#zYKINVpZau*J^Fh7?y(G}7Ln;q4e$RT=86XUA1s@zyD8~)@s z2l%{gs(=<_VUdo@R#CC&Dc=%>pM-}OW-{z3yASO~?~r4!RbF#P69!}~=2u)<7#Ypx zmJCfZyC4R!Si# zV7P5atqp@qNJNd}E*;f(JKiW{PAPpFpL_XgqGp2et@ayI&)2h{v(^fn!oi}VMv!QK z%2HZL*5`?R4yq1q`qos^WG+ZSY^gYcjHi^7z-n;YqsVxU5N~+Dr8a<#${s7oV+ zIyg?!((3)XV^Y{mr%E#J>t7W5d^7x!A}YgMSa7_++sy?#i_89t!BO78>h!SbEkSSw zyW5B<`|lP9Up65GQA)c%@4HLuC?t*)+nc)Y)D@h&)S5bz@CmCX8+|jpA@* zCnrTxj?z}wm23%Ja*Z&ZSZ`vtX}v$rUKn4!KyTNl>6ARq-m4#lo1c?Tw$kqdGD}32~jBxQ0#(tRkS+b&=)F2&mMH+Meyyii4?F(ojt5z$Z+hj>1L4fR3}ttyvX5JiM@B2M_a{#0?e|KQ7Y-olv6@kpS+Ozuz7e^c zHj@-5J65Ztpfs9kiqUKZ@yqBR?a!foLe z|4+NG%{LyH!(G|Q%E*kpqKAu%>{Tu0rP%h#gdTR)MJfK(p`Ap=$C+X^!Z4%pqwj@G zk z=-t{G+#2IG*W&pzY3)`M5VWebS|5wbwASBqCq3+}+EKlJH+`u@Sfz)5fcTx05riNL zQpG>xAn(|S-5kdRc6DIXlKDH>LI%Fy7-)74O{GgA(peajP90q}>}H-6wr5+Cl$sI` zaZyv(Z{=W})y_@-su~}s!XgSC@niiAE$%v$jO0uGW|A^`T(tN}{mmMfMJXJxupqN2 zmhh~Kba%kof6jfVsAq0yxKH^L!@`p5LyHt<>GJ#`dRmcYl)?2qSIBwx@sC_L z@vyA%{>PgzWIj|xAJx3PGB_%C+(Jt%BKqxVPIDXAU#psFIE`2uozh!<=+FAx#?SCn z^wKsV=jGnjq-{+EZ(L#6!0L`*v$sDMa-J#l5+Ilh3l6$DcjMgt)by!rou7OC7AQ<4 zy#OTVAyDKQu&g6#5eXf{2Fbj{K=4)wR@pZ9_2&kmB95EKcFNvtADB(~LuoVW@Ym{K zec^Q7j%e=wI+EPv@RsOdRO%K1twb&UdXnc*S8|e;=%J%$R&BYB#_Ma$9GM|Z%*(#P z>bY?4q$T^Njt@@POVif(SKByze%(RS-!n9t3w#`5f44&)AU5xBn}YRsj(ha>U1Dbv z=pLAVXt=!<`=WVX9Od?w7m(d~g<_}&xglO%3hkX&-J=f=n_PEOdOJXG4m z7;>l!){z1kAgp;;Fa(FwGh{&HadH(8<4E6xSk=zY*R>+V#6+ZD(sM?&V9Fh%o>qPQ zzA3i1(Wmt%DXK3`5BX8!r*XQ2`3YBfzz`9JhlaGhUdTlK;UX`Pgn+KzseOrlX;}9& zoRDBQ;XzhqYxar2E%}khVL-=p|Eqgg+W?bZ%+e@?W5OL@YolSt=-v`0-ZPK;#lnK8 zhdulWhNLrFjH;txMe~xkp~|NaoAp-bh#MrH-xL@P5_khPzrrH=xuNACtF}iNh5PQo zI!5W#_5&Pkd%+m*<3)#bh0C^(H`dZ3r#+G4G+A-OjS;YIn=}rZc5rc3*#fSz;bwOF znyc-ZjQE`EI<+X-`8z^)9nr&B5j4y7HFaCFVc-d3QNH&R2oX2(@-7l2CC8gd3*j4l zO`b73OJ4HkoNj1)&+<|i$Rd9v5c-*3ic`nnz4}(3)%tW+-|q7CrRlh<7;qg|y%_HA zQ#p~&2eVi1Z0|@?zA)RmGU0|>M12Sww;qUt(qrhUaB_5Le&^z`oFUh&&+U~HrH$76 z01h#d^9VhVR8izY9Br0_>RrNnITZ*Sp_|3`-IUy)wnAo7^US&$CrcLVVk+w7Z3IsqaacTrKfd2M;I z<=9{X8#LWIHa>18ZxP}iNY z^U}eQm2fKRa*ow`zEi%tf75K zUO#`;0uSVji55Rc_{1;u|Bsq91OIUSK~YIf95r#y(5M$zZmuEY)FImupS_33u*Uie zw7$I#e&~nzqEAPEz>zQqBK51@$bhl;zPtO-ckzEk@$VRQq%UN1u`m_C^NRna zTHo7(BmBRhhQz?Ry@L~zeTIrZ6VagVc7DOvl|>$=gTq7!!y*ea9bjjdP5kQg=YjE6 zBK^E|l;0xstWmLf`wr@NE%~3tw*LV%dUrpLzW<{}|C>SSR|XW`|1Z?=0ERscVhgdc zk2&iYurxGks;Z7r^Z;LSDCn9765=kV zDS$nL^OLBPQ+>0Mnudl$3NO2ThW{M|1vTY#g3}c~fjxQv1XRiH_4T#m&mVF_!=qO9 zoFHx@mB)ZVO+&4u84^;s&gSezdAVMhU#NTlv3qcE(3gUe((EV^r<_@C$DlvrGaeqT z*6PIt>{7i$<)(?TwMci6s4RZ%r;3`s^kYk{)j4?ghs-(_y!b!d4RrR(bawTwUb1^Z z(^Q-)n(yZN!1T9CXLA*eGNO;^PZZ0=P`R^Lk!_0!1_jD_X>p^VqQ+)r(Mo3`Nmp3Y z{NnR+^geIz9!eY>U|5}YxCx(MU~-a#g1WQc6QZzvb~fA<%L->5GFsZe7L~~sd3(c9tSr8gqEakMm}^SPB6XkDq~2CQW;W@(nRjm}A@0 z><=b#2!SKr({UtH=z>TO3lp8N@=#P%mR06XR|E7rUdCer39Z;T*y`5;4$jVnxw-lj z`iLWmz0B31?Zy(O3V(CMxlP_>r5sc=I@@0D(`%t1 zPIU$P#|9MzH7CZVitKG|s+l^mnf%l_3nPTDo)b2}KOem=<6z8=223GGI4?g4Y zI7X95XJ&W7r_Imv&XdelmR1rXMlwv*4lMSDaQ9hWm11z=GMhuN+nW{#1dw37_=jw{ z!Cwy@QQd5l`&lhH$oY4L#F0dAi*nj;yLzNH6fbMt=J)b_`=fH5paEa-s?qxP;A{jZ z14f&v-=02QT3qZeFE4*^cOGXx6)PweI~L?0XuDRSF4O4~*-d4jc4x+IDQ_Rg&W`13 z7i?%HO)ZY}fPlI_mKC*SFiNPTreuVa$a4RRe}hzNQ(R=wA4wTg8hM#jZyY;49Lhb^ z^Hydgly^rnt*WE`raS?V$q?gEp*HRNRy5U8enOp7aA(yC@IE5I;*U$)id1(=xcKBb zxs07^B7iI1syM$jFp?CNspM$OTvG34jNh9ej*!eXO?)w7pZF@^<+=zu20I@?dqqaieB7i z0gK~;tdbIzH5qAa%ScAtKH4^#y!BXs^jo3mPm}u-pCeckM=D!eR~BTOkCxI+Yy5Vv zFceJ3Pran=Lk}o0*%54-_{3AkTOY>RES`lE=^ZfZE4kBN5nb`H>-_P@29iU*PS ziTrW29N^ppp>Av%4#qx`H``_h$-A4Tc|-5-Db;Fp2~T>C%c=FEKH-!fI{Va6B4U!y&Mpk4KSv3#$sh!UQ(-+0z!u@Rgjm;|n%6j%!fAKq|ch<_AnBW<4w#v4^hLC+PxuvD_H1@bEr5{`W21j?!Je`5Wq0z zm$uj_Q-NXHHof>-Z-g{$BBjL1URao~z!F3OV#2B$6>x&klqUyb2+3@td3UzAa2rc8XSYo>dTLK!dkVWq=blL4!ECM}*! z11)&+alYzMSF$Fr-6j!ARsTZt=Nzi&4=Ni0*T>`yF>ON}7MpTLVhC~35`$QY2?++W z2yu2{VWFIyo-Iq9YzrmPqnQXjhWc$zfF(%Cgx`#^Ujq99-ux3B z#Q25w0vSdAF@xZ*HgeK@Oa2Ty!Jx0+zX{go?#9Ub#|)oAZ9Ghjb}IgH&441^1HTmH z=pB#TU^RzZvNwM=`K?O%tPJQtF2(Gdk5dLdvL#hDK(qqlCGS zV+hH1d&5je6|Y6j$+okEjt2&K&V`(HkiImZCnon8>`$-jg0u7_EjVE@cy(|%T_2nV z)76i9<|Y$RpVl9@=}lF`fRpoF0^Z$u8k+Ok!Rnr*(oF||rD++TcM&Pll$o!Q*6yT% zLb@}lfCbau9+!PK`=39R`g11X>U*sousN+6)GpR<=5;(0WwJQt3R#LF{tlKVSfN#K zBFx^es3|HbO^~j)3S(dlUTvSftQo-78;%DxFR7cGn(kNA(nhz;zs%l6ahAW=O zGt*koh)FVwy1qWak0XBgZP&U7@y)+*>}N1v9ms){Qv&|nbe!k$Iod(k?3n`6tExrR zGZ#Uuy{Z&kZS`jW>YTZ%Vw%e)#16<;#zHTLX}vdqY9RdL$oyc;!OjubD&^$Un1#2x zu_Zl*{Z$e0;Y!IHmpd!DY$y{QS&Y@)Ee55Lvb-`+^wTFZ54{+QFbu}PwSj@`@tT^M z`wbQN1?QrtF*OX$FLk?6chc=3?r?mtZzLUvd3aDz z$MitKDH<_3$qKWV>O6e8eTdfg)d0mPb4`+y$1~ErlyZR4l})mFp4pW?1@3i1nB0SjMu!+3Q2Mk3zG3c zvflPo?5^+R&9pI}ANu?hwX~-UGe-d&j9JB!HhJGap~Z!r=~4_z7f_#Z2?SuAn+I2k zCru^q+&Z|X!l9gdx_DigPz*`Q8zpf+v-f&l!y099md&+p4+2c*eX?dJHKj2ePwLvdV<-WZKThx7l4GX6I++y4thM&d@Mzcsqh&kiAB?4l_|q zNT)N$Ux0n4?Yp~sNFuB!iF*TcgMRj#QNVHPS9gDj8U>9Ez}0L=(f2qSLPkc$As!dL z+wf#}_PI&UiHl=BR^5L;wgTq)T?YyZKCiqXdk~;xvbz6D7 zax&?C%Y(DD@mXfx-fi#Xl+51Xs9%y0<3348&~5~Ns&otg+NUWn=PVPS0)a6UQJD?o_Y4L1wX+^X4?8O%seS=z{ds2 zV78izGv?A}&dX$bbA(eT|FDL@snUq2ubmXbEm@@1+iN(cKbPnGrf#4&fdvg^QfEqj zFx2N~2Lqc>W7(sZ7kL3N)SAO3QCoammLL^5(%vzDxwW;aEVZ(TGUvzWcR!~SY^ssL z)eC`0LafvI-ovlT7M47bT;o0gfw9E%K5@eJMR9Q@6_b=SQ{R0vFFt0^9GbgR5T{J3 zPI!>e$+8xf_|-0V6f!QiD=H!B&rP2@y-q4MI@#xaovE$6ZWBHDnc7IEyG@m9_vip@ zr6Y`i_q+tU6Ze%F@Z(Fl6^P~d$GAa!Af?38P*Qm~hmIuLthX4=2&kG&S{>!RfHONg zOe(HvRYe)ywjHY?mpr)Ir6qIT@*$7!P5hanVwx7?*Mc{0z!6Y|;1miOL%yw!Xc zBrhz7TY$Tq3lY`xe57iNE}-{`cDA0`X(Hy{H6SwIPUR`H&F5ySko8OfJadjxR45F? zrBy1SK$vTMd~lNR%eaob0s`U~qal&_3nje+qhxRY+@Mm%a2hlfVv=U%oX3x46>`qg zV5Cn4>jmSU;xyiV2m63CxsjyOJ5|CyF>PQ#)RP8`w1-NE7&A&Q)2)lm!2^>M-Cnzo z>|3}cQ6KN9mHV|O2k7kbw%Ur2>U%Mz@!A3cTKiZH-C`scjHGDt47ni_g@c|t?)Bn5WN?Ck+Rd_!R=jIr&%`T*x5-f5 zeaz01y65_}ZBbzH^2DANFf}KK^1e00m|wsm1d2tDKoC@^~j9 zr$PnUNTDbFNX#cwzUrXf!%17oo(5N~M6^-vFa+mVydfCg>lNPZqVP?_7_R&ZiN%>G zRhgw?M*=Zqe3E0cxT)rkpX5D2xS;9h%-$ePZ2*UK#|h-lAjwy0jj~AYQ16E$i44}* zI+zr?EbatswPZwk8WAT4?{W2O44#Z$L0rb`9_t-`5`olU8G^F>{!;~~_iasg@8Tl- zC_S2<@r*LLg-`+(nYP9{>Wj@ydA=L$$qU=jSiRm(1KT6=(k`|+pSD`4m#~^`t@kiF zp1PM0*VdoL-eevjhc4er#yze+H8IUZ-Kg)T_z}_4pD%>oKR8*%oI0$d`4Ap3vXU!@ z1m9F>A1A2vg`9SqJwgHGpI)vVy>Fu&uYn)7hcjKe#?sH61O+oLXok65f~RCoC$CAN z*w0DhT^90>GR^JVh)5$ku*|4x5@fZzLQrq{+eHWa8>X|X9mM>#$_G~@7cXu1!zpK< z->0=EyMiN+TMD6D9o-5oXWi7c(iOpc67;NdO7mHBJn}V1$tzBDO>Zkuk1zx@V z1*pGEn;#)tm01nUo_yWk7+6EL*B;l_IjJVPIW)J9JRUXZLo;F1`k6SW3!tLCIh6Qe zI}EU|IUoVhE+JqHevZAq!uBvN9~~yuv7jU_48bR9s4rFx(HB&$vnVAqHs#4_Xqf5z zGzF^8@zi3lJ?U4N-dKePzNDI{H%8}vCpogq9yK^hgM7?oC1U0ym<98Q}re1 z1LMqDV?$vqw>`xyF=FQ7y|-GOL0-_!m}pN@k6_w@#`zw2??SFW_2>(Hd({wo zdM;uCC4lkoG1&SGGmQP|kjjFIcIE)kZNwp)hZz@`!zL3!g*T@Oo^(p%G5*rGFjLGh z|MHZ*A9BFZIk*xw(q7$9f|utwEHRM$(gRscu?8@tC>wjySe%|GZu-@!C8PtjCAqox@A>`q$>CLy<*2eC87&g0El1cJ z(QfG@yUBZ}?x8x8Eg^oap!2X#-hT})fW=yWKT4VbiOV?mklQ3JWjBqjb{}!6Fvb z1js+AsmaO24Wsl19CGapppK>00mV~Z#GMR^3tpJnPmf99a8kzST=1q{PpkT8!Z~$v z$;PmV9mWA1!p2l(5({bDZ{pGo^aIT7B*bED**Q&IoTS$U#k5R4KiQQxCG41#NLu^q z4RMNhv?>nWz1XCmjrOVVFsU+smRf z;TIRGXyAfUr$LgZ5Z{1{WoEyqdv@wCio3<97?C34gik=G6yqGvO(s#vrjs>_&`WP> z<)L?r?6m-Naf;ej&<=h??btJsV4rK=Cp+0$towmOzihDQ{F>k8kXQNCcA?MtG{y;Z z)94^Q!6>D6lDvCtGPy+!4aXKle7Z%=Rn;iYf&UvJdqoY77K?dZ?)IU0kxIjsd)0na z&|F$B=F`EP#l0v_5ZN{9vWB|AY5M+i4ww%L1^dWa<_i*1S>lhL&+!1r4+Na>5l`jW z(Xgt}rDj($8Yo;g`S|W1W7Nyof3~#Aa`y=_&`s%-qZyQ&o?y< zDI6DM>%wn2;;Y=KdXTtAn?Dc-$)(n!-i&|NGp_|>rSTvq^5?p%WmN9UWI_UxieHP; zw)^=cTL={81H|`n>$k1pHaR;+4M?UgQaXQ7m zTLGEP91{e2(QM$O2Xb;SHvp|ef%f0>wzosuFJf2#+$TgqBKEPDgRESFzJx{gr)V-wPb50G5NeGzr8&WTvna$&JAp-J=zBI{?KkHv@@Hmw+Z z_4HY?Yy{MD`og5Tit0($G*0<94ri!!i!XMO zasU=hF#Y6?n*yi^{fAs_`BE2A;u`m-3qJ$jFBy=>u@5>hc%DWmswnhsd|%$FLE_SQ z%oH22oY-Fkdh5nv;C(~BNY2~p0Z5e&x`}k=;U1Fj;?xeEY>*1Q$ z!}HLl<&iwHr-0?fq79vl1DQ6E) z617kEBpVTr-z+O?!`#IOwvN(+bz1v++DC`;TG+*3D+xvRA4*MVk-Qk0vJ}V6NS?Wl z_axWfPX{Yt97kM&7fiUXHQ6VIF;cs@6yfAC<=AfS+`J=wI13*<^@#oQTx0T5B(NM0 zC7VGaB!9HA#p;Pvem9KC9PU4Fb=TiE^y#qYAu2&sdVibvX^RKoM#r22SJ~uyS*!6Y+dM_;Z54@)3JIw#T3oBL2d@wR321H2_7Ks|=HRK1pAk3J6|O#@ zrS^2G3j6k9l`GR)&MtV$FDg(FIV|C`==#o2YF0$@7yi3QgI!i%Z+>A{V7^x$$98E5*W%lp8XqJNK*W zrJB0(B%51Pyk5jXLxpQk=?^P6FI({l-2%kRlUXmqlPbI-VYrVU*Z0&Pu3kb8AC5hA zKCkOd9;&WYc)GO>P2TL}In35iYqW1`Iuf!&Ed`R~q!zZ5A~gd)T*k}v(fIIrk@C3V zFS!QSVwPLk?CcZ_X^gC``3_;ZY*}eY&Vc`w4Fh?(TY($%>mf=b2lJ;Vw@qkX(!REF zvxirHmW|09gquZk71MtvlhMXgkrP+L?kZ-sW5*uD)tG(Sy4P$X(UjF7$=V!bo*9dT zuMJYYj21bkgEIuc37%X%(m8Xb3NjG4UP{&48JP@Kr%&hzux$-dhBMpTI$1&MdSC%t z<(;mjy+<1BKbl!sZDn7UnOkrQUax=$p*NRRpj4}*O=_CDmrIR`-p$xokRtk~rn$n2 zH_Zu_xit|7&4h@mi%M~I68U82+%On(^Fqm!IJlg{uy6?RAG#@t4(r_=TbP2wv1RdO zBU*>E%uq(tQ&F>J;X0UF%lEbDFl`WOT6>=%?CE+0%P&4kOL2N%-e@_UV(~u1BcBfgM26!C0ySh)W-f~s6_P*TqLODLnRNpX( z{vT!!|HmGp0C~tBOs0MtSO@P%wV|#qYnjCLm7cRBqO%**5u!gz{ry6QRKAA7XRM%S>ntb0G_b%nOI&V6!Z_zl0 zUdTn#p<~8V@Dx&|CkY;83xuE++`?)$7W*JT7$cE3)kDRQ3@C3#*ck(gKsq#wtF3ok5~~L z+`-xUeseI{XN0KB)CU3T5o&rK#9;lt#q2-6-UkM;B*;e@Do#Q6|Kq(>MG#xArPzoS z_BW3BFFOPQ1l@mP{}WZN>G-R>VNo*P)R4|R!u{2t$6J(?YP9m<-svC%}keE z_M1*OoR!q%mQ8!*`T6p9x-7VYNVwe4T+Itu9PxyL0L9o04m#8zr7I6`kPEJ%nUUn| z4zZUrwe^c$t5rA#N`59OX(d>V(@l2zHv=!{_T=BB$+wRGi@iSc3)b61(m&V_;Wo56 z6BQ#Z&(Tx*E|a^Bua)C6>(sW; z5y>u}PM+=-wKEJR7T6sJpDVG_yAMXQrq^g+vcA_eXunUZOFq`*+VANDI7x4NuYxSa zQ8&T2Mp>Lfc8}g5E~#UB7K03G?&;Qit^1YeY=Yigd?#SB?)0qjI#t(VZ(AfUX-!bD zup+z60m^h5>*Jy9__s?V1{0f=v#hqSB%0UIA3{@wvsPI7RU+U1ouhw)Kqmy2oBWwV z%axk`o@!9i0K<{VnO7Q@HEquN0na0n*>OWmx}|0t@64&bew9OH8qvMfgqT4Rm^TX~ltjCOzOI+G3!qUylr^8k<#_H+DZd!XJcDHvdD7_<0J`Ce$FPZXD zXZd=J71`vh+>-1tq-4CpkKAWh6JEJ~!NR!M3YivO;7BBIeq-q?K^G)P8_TS&6S702!^h6mht>T$`LxO%0P&E$7O#NF zNEye~>swg~b%F?V`b2w&+WjItWd(0-8gZI>6qOaRoSg1~(17OrZMFx!(LF_Vc`3m_ z_@W(3Ya&TWNs57SC8^`%--0ZA=dFgp%UU6A+kl|p0fk+bdz zy6!+cF)|2w+FwCuhi+D_nozatnyaISiE#UA@xbXgY8(w&qXbu1!4zQVtA~`ahNx zd^+OEUszX;t1su)df4taJlZVj(>Z@~ndv0x-N0MR*(THw=Nc$nz2Itk2&l%_5Kbw& zor?UJm8X6>+{>D5ynYEA)R;m18Z%wYM4NF_?j2&k3D}=wa392>YS5B_$Msf>#}(CB z_s|ST2z8m;PVmXjwsS~em7V%7UAH%lrpTsqc&-KX8n}bp{;}IHkg%({T%ywh5!$|M z$6T~|Y`Ao}sIxe{Uqx|aGD&$j#X0CPpbD=>oh`WDCbM^2Mr_7-zC=2($mu^qMQwUt zt5foTrPGmRj@g}AJC0Y-^EQp_dO@c7{G<(;=Tc(n@qQS%7JSbt3*v^7t63R&1(tbT zV<{wHr6S1#yojhi{`Y?Y5U|K}JXd1Bum%GSc`VlQd;B^|oE5A+LnR!h_wOEFftPBx zWuT*j-qC%T_3$t3{Ld#+1vUP6&reekp)n;UJ?MDrKkc?hZgqAuJzc{v4Tf8yfPj;< z68gN#7w!+4juB7Cd)9RU}$<-!+A!qNW_ry4h z0+&9wsJumYfFwHK-w18TNHB&Dmq?u!bwFgMBv1O;?&Eb zR_Yyr$0yjP2Ny>(b)#(KQEWY4&$B@i`3~FBWgcgbeiRON*Z7UEB*c`#=GY3`T1>6;cTQy z^6MTMr8AI_s;cT`=KH>{Ms40ccWuOftcI@56rpa91Kp;`?hv3-d+kcvpJPdh`nX5w zw`=zH3p!e%aXqmF2+`((SZ32@C_q(qPgBlafq!L@io>cbs`grTxPpf&o4Wvv%G83F zEJT=*!NJH}WeM2{wzTFwk@&tka~KWi5S17V@>Vhs(_ly25FJT83f`~(#hlZ@xx67X znG9dfQZPaa-9tr}@g^*sIM?C9$Kn)CbzH?$N@@Ld4-uhtjlFOqMc)5am;5gN$t74F7aczRgspen zu8uT5PMp`{k@3hUCV7gKQ_@}|C+rv%8>pEm|lFT3m#+>?riGm)fOeSKG0xYC5ED}A~9JQ5sL zzTkN@IdWmvO43$1T7!h9Y-)=O=41CMzb*{)CpAVEYDtY?=&=&ADf>rHj&CXtMjB{m zcl?vD9X(flQdPeHW}bmT*Wv3fZo<+y!ucY0_fMA%hV2(g>&R+*D>sI3>}(bJlOL=k z_7)y6?kR{3AOK4%^D>rMoraSiGQ6*Me8`xIW6aGh_JJ1GD#G5g1cUR_E!zztX_@RCk% z@FpXa8#wkjr13eZgeN22(w3toEcAo+e243g7FNe1QPq{H#ypExX#%qQKuHGgQS^#f z#dK=ZE6W;VJG0@I4ih~}5v@-EQqY?ytxXZo)=MwFX_8V%k6~yEBFEOik}}!c#BDR! zJ=spb_4bm(^yQ{N?#?w5D|qVH0rGUtBQ%MqRZ$jr8YauR`eU31>Dk%#LF^h;{7d)< zd0gWJVz+HfIw_4Zo?Fk0R&x~<1?jko4v;@xnin;kxrym8XH>Dfco0h|0E5?X#dBv+ zX$U+)Rama!qK9KNH-j85Ype^ygQ6gFp}ciphzzM3z}3T`R##(ZtGpR!X^($2l}Z$! zbSXPVKG%7x+#yA{iXh!~uXbbW9@x?-d&$%C2sO*4KPGXV;&zJfG07~;|G++G!<^P* zQQ4j|x1YQjK$@H5YTSFK1K4wU6;r8P;%h&yFXU}^jtt}pH~{!)4GQRFRInL#dFG7= zlk+$~c?O5vrmXl$;yv?akk%w+x+0s8P9%d!ZHmgilUHwbrCK{jgL7LRoR@PgE5^92 zzD#a~h^s8f^B`C+<~(F?|Be#(@qRgLbb4W8Vu~k?YKV87-udbS@D3Xg|HTuJ z3WDa+XwZ%OmF)~>cyLUy8yRJ{b}Og}sbS>qa*+2aLYNLN6u?&MyrGyd!o&y!mP`c* z&ebH75TqsqFoV`Qm$*3)NM?Q|q{QwA$y72uUzVx0Ax}a1L8i2|eeK6}gLb<6bk+jp zAqBF!xZB-{NuEj%O=|E5b6JoEF8nlP>X#1WLh^rySC6&~GGXF6l%Pm&m!}mZABa%OP_!VR$pk=j6kL$qc z@3A7F?dfQf3O7Q|-?O!S>XE@o?3ka@3O6?J1yt!8!;A04Ts1^d?@p1NSTNa{YbHL9 zm#pQl=aDm3t>F#+@OpCLjZu_B=(h=AM-0Njm&T-92VTyI6-8VqN~bx)-rehz+as9G zV`Cl`m#}8{jT=0eEhHr92Rje7p6=;ciDV!maB#+Ru(0edIfe(ucEC|Egxo~I=!5<1 zZsIQ$7Qp)Dh;jeBcs6&uCa3_mfnjoO74)5wbY6g{-24EqwCFe-gV-z@T^fhi7zb<_ zy2II&-~K?Oe>@w8t$5Z5j!jbBUg(Dn2JfJA1sPf!@*>*CAEifWPQ#Nv=~%H|g39W| zZftOX`x)AhcT;9?q0Am_YI(Yo`*uaAYbWywE`+LgCCMDfkp+rvPmwKs*_=ZcP|1Uh zWv!m(d;aD?nRhb#*8Sb2GQe|tG}-Zxw$dy+S^^~kH+xw+wcUvoZ27j9DyDZo*Ok~z zRzA~gN<(%}$kK60kdml4FtE(QDoXv3Tn3*R)G0)%zN|=b7nM3QGX=_eMaN12ugMbC zXXCc+wMz^D2HR(;o&gaPQ%-Am4kY^_$m)vn<>jFbSwViNpXL^&_&kPbH~v=j=A)nh zF2ZCm!`LJ`gpI7XvgI&;oK534ann_D;9i1-cf~tG)+uMAxG5#oi%3@%aOz>+Sfy<; zmxX*v0y*UT-H!=$eBRiAfJh<_59lc`aMlld-O0cwt|>Nj&%^H>GamTp-Gvvu`3a^bxbCw{mByrFe9$rh>R4N}Sx-sE=?h z_bAkC_i~HwEtK4Bt|Ybo^;Fq)lI!Q3Lmb@)3JcsuMU=&Z)|3@gd?QV-zpp)73b0lodRbn%L?PGGDma=5yCq&ewb z9fj@-wDQvAcMOq6;GF=NGIq~sqWs0o68vIjt!g$R>|v}}p(2udQ(p0WG7ewQb0+BJ zljbGOzcozd6CmfJrh#p}o~yRAXJeO&J&*|W+Av{{x(HgzK2|=xb&GRULmN>`jqm5qRfi+C^QUU9T-Y?~-$?UDpNW-l+giX$1);td1TdLuW=E!UE;N>1NrAo4!Zw;Cf&NP%S zFX~5&oB<-KOR1EHhY=@}*1-xBM9PML=Jile{1oeS7boeYcrUXX`)by>tp( z#U#AXi#ICguPT;{LO9y4J`8)FIxWwgGwy566Idl=d~zPJG{uu#C^)oiyt%-dJdW+y zVAHoWv!=nnU(;SboBY;kqFv^E9d}M;$@x6Utq7Ac_y;_2}X{ zS?rgzQGM!P`1azF!C`gl61$}4-Sb%CP-$3W~#pU++Hj-%heJ4WZ!` z$s{SLE(qAKx1*z@SFUyd5GRx&&`8|mwYa8fmr`WKRX^k~#o7YGXNPPaRo7ON zOAxIr=B9nGw}BmQzH0%PH-MC`h0$Uw8?L`w!hbd`t-mDRkn})tNKPs3n(yuStbWln zJeoJ^jv1YN!PHacMtH=Vn1<=^>lIXVIX?frcfP1T?X!ismcbW8sjJ7+^1OKy;qtm3 zsk&I^fv)_~eA@Ju`k{ADztdLjqojTcsH12+J*RY+Fc6*<3D<~J>84j$RYVj(4Ky;T z_|QUft|NGLizE0tvm*^LD5gDCVN}4k?=%~1O4GIIAdQsBI9#xDTs7qBDmsOg<IB)i++3{OxJgP55AO)%2~Hnl8ARjav>11fVRR_P>n*rWL?T5w*W(}Q96g>^?Zh?{dfV`bY4U(T^{u$ek+w-|ut1CS!xR#uU2 zmY(-#3uHR#NW7N?3|jts<#hDweo4&WYCB8DlW2$FoLPB0yXd`$ds8zrosV1|P;5zQ zFpBjN)=J5V0i7D|p@K?EElD;PEJO zuYdIr7w6i#&}VM-73^zi)b7%NE3ah_l`3gm3{xs;xD#7iFZ!9W8l78WP64S%>HWcB znTKK?N7Fa--`l?N9(*Y*to*94?>v^iq&aD;s_Vgh=lW2zp=s?FH8}Wb?{Y7v)}gOr zU*onin$>6?&k1O-@HQlpyCh<3cwoT4{KviV`Sp20Obm&}4T$5TjKdD2;ub@B`Q{FH zkn_=E?)_o7?O5j}Cmc?Wde`Pby4+d-IPG~^+QTky#7PnVw#|(aJYksnVr!+#E+6{4D`WQ@J-^@!O>UEi-72MDD{^g~_R3IeP zdJL}V&^dI!&uC8wGb)$mnLU_Rg#~B$1|fozj2my?OiXH~D{q~%Uz95=>FP?hwO+l# z*L{HSa8)m==DAi0ySrB&l;rIp4#NglOe(?YVbz8{;t}VrO5=GeGB(7mLpBhbZxh3E zwAmY3_<=Xwzu}8hDu#=28(hS1x#z#ulT5K+z9O{k%*@P0V986CbB0#a?%Srb^M^gc z6W*n*tZ;B4I51CHs}WsRhA*ALl_A6l;ic_~f3(C#mPl2Gc(ZfU7JiV)62^zE+wU`{NeU?VvdE9 zI%8B4w~J&nBQ&q`8;>?OS0NQ+LG8J4aUqqBy|&O3B&6?N+lyx?>a53McQD{GkiVRS zaOKtDkhrpwg9EeKg^k73S*_UxmF?K)!Qlb(pOMcJ|KgY|IZft{v-O{f-$o*Rxd}MF zkIq=0z{fJ~u2M4*%tFH|vRFshCge)Gu`ta%@5H-C)+{PFN#_>-b(TEJE8?xlFa`LS zLa|LDIWDwGaXFo$#N&j)&E9?d=CwV+AXg8L>+!u&(+6}Kt5f;*g&GZ zx?sY&7U-jk+AzoV!HiSOKH&kw`k%sT?oqFJdfbuggA7bIWT>+GmY0h_V)a$^#Ng5r zS1}{_Ztz@*_#Zq#ZvzpH7(TCq65fmSsFS<#ix;4tR>!)!hPKM`%bSh??RuTS4`lJS7#=elp#?1QoIJYdh_2Vu-WRx%-D@$o|T#voND{ ziHQ#{I~U+?U)F_)R@~iJ#@$VBvmt3)8^=!z$;Uszq5h`jU=ej-SvQ4Idy!+Z7wgeC z0X{;p-gL!!wf!#LVt8TgZ`)Wf9^GTX@@PtW9vc&{uCC9k4HLF^ILpPx6Qxeq#K6#Q z>nd>78j!T)^av}{eMw_bO=y}OwwcGLECYj5+NlnQo|itDj?+(pr`4QGX>52&QG3SS zS;D%C=-N2PINfr6oLt8+h23k^t;I`G$C*?te4|x^!n(my>T)?@3uAMq*t{GFGB=Z8 zQm=`kN=R_-m?$Yv<2G?u(;P1VbSd)>uPhG@Wx7moC!p)v`?8(ZtalGw_xKKV_C|c` z8_AnANCxT~-KiUPXmPZheZJ6}x*L$rm?&C#7Sqv_XWh8QGToQ<&bP_XaL-~m(EMql zS(d)@Q{c+5Bi&S^X49lOn@rcEm@iM~Jlbj#n>i*sVX=&7M)-s89~U8#e+4oF5JC|X zb?oZ~$*0@XS$0qj_L}Pm9m)$LJdm9(;wl?17?n{y#0wLaZ;nKy-@T}j$M0s^o1?PGbLH$j5{ z>3x|DKG_!MlQ}8enX)XKwg*4!t<8Ivl?Ok#0j=h1i((7(ihc7tg1vC!nT2&Om3fIX zNpI=YO)6k0H_DHU$Ap9BX1QVc z#Ut=($z+u4q>%&kb+3(uz?xb!A%*OD%egz0OaSutk8KF-8^_&LH3|ti4+J9+jN_K( z#~z1`Q}Q?VNIPtz4H#WRuC zrY2Ukw$ zout1u%TBY|MTq_3;;(Vr4#LWzb8ktu|K5-P^lXw1B1GRwI&~xZZ+-puJ*oDP=shxb zsJ8#m#J_rxt)`8(3YlU%bLY_!5cs+pDf;K`hNpdPsapB$+0-^}A`^}Bx^JL4qlM-n z#$~FYD5)`(O)ohNhfO{rzhI!G;!y++?)+d0kBb}J!1l)(mDRBXf+NhxrIY<6RE$OA=c}3j;TdFL4aWItuB=x+HBH#VMQZ}#_9$jxP9dV`2J-I;`0oeU?!$a2 zm@P8UJrQMKV8|y@IZ^RPBl#0r3K77)GWVr2!|I0C=PfX*G{Y*UxPz(`v@7;UEf zquT#l2p_eaQ-&FCbN-EnNdljCfoECGqj96rzer}x6-F+r$hXdNzP3?|Zv)dTf2A^G zhAs{&w6)kbnoC$2mepoKo$P}^1jR{If5H)2tywMJa$|Y%Qfk80QHOLc;Du>>`CWvG z#CZUDcnrWPBf344$Si(L74hij&cIrniuQx#eXEs%El;xyXWbE(6r!~*`ABCcO?cpn z4{vVpowQO>R>ojQmY%{U6^|Z+RTEOokgo?B2aB`@#bpB6VU6*mnv<0^3MC;S*-BU- zh&ru=xm$gjF}%pHGon2W`+XjHU`}6TZobOn20}nU*e@BqP`cgqZH3=Fn?E~~TNQ<8 z&6*$}zju1dFd9OTO-X;Nd+W`7cRXW}IWv(HN+F$-yVG4_IJ?!Bh@#5>)6}M^X;l1R zQd_i>;^*P?F(6bUldxoCf2=7qmHQ7 zmDs^$ZmXsXK2ajiO^ep^Pld+)tu5xWh&D+>snR{PY~tHXz6TlyKC|ru=FRLRWgMIK z_BDM~n?fwl2h>- zzl0v-y%e*T8Rd^qlM%_Cho+rxK0lqWWpybF+6gUf+i7nOSrEh*&W_Mv*E>XUa!)cv_P^? z5RIJHseueW!&rC>s$!8`d*n9W@x5&VQ7)6`2?cCqaIAsYH3*1hQ}RKJQOiFx3u`6M z0o&|eQiG{)5xN&JyReJO50=%lhs4#l z!-2yTr76?)lnD86n@^= z#M@*vjXZ^g0aY^Q>b0eoa-f}?x=W37UUBxQM8{C3=eacOHPHO)!r~Jk z{dFz24(Nq~GCTw$Rx_~`TcMkXJUr~M7nWk~Ho5OYm zpC0<*%v_`%H#9mF*LO`R85Q8qw?MtjJ7%*`8|`^_XFqjqb$;lBPMV!nDJ$%!wNM?O zfU$e^`kU>~HmChfYb@(`ahT324?M!46sUOfy4G#9tcyo6p>MO}86oE0v(2h_Gw z9Wlu5MoJ?|Q5KlH?-Da!G`2!xWt>2f&}k6Ra3&y<;2%|q&IxrS_&B#TJ<~BJc@qC! z=E-op&6`nj*+f{jOH8Eyd^5yie_?MuuG!qP5Zy_niP|}zUn60 z-vwO1k3hBMt9Gdwz;YRRX`w*QN@#iTL*F(YxLs*cGQMw}?p|S0$bVgdwmCR|yM!BK z_c^g#x`|6>sj*l4-G*LSWkAwH0|?xSSc?17_Iv4O`S~L8U=v!WKAJu5t+#?yB&8=@ zZ3*2~iN)gAF?6n13{9a_-iC$*YaHH8q&6i1PXX6foM7j!-9`E|vz=@s8 zbaQ6VhD)k1N_J)98jj+Qx})-u?JyYX&5_ieh#s;{DiJ1l%uY?=$yxdvE%xFUiDi$c z>SohTIjMHxlHVO&6zpF`Gd`T^kggKXVEeUiB7{os-P^p7HY*F4ly-2}Yc{0Eq^GOQ zQI!71)7U1XQ7IG3I3U+KJ-9V8$QI9C@Wp{^+(|ggBs|{7aFa7Lf2w9PETSkgI#Ao2 z%gNYdW~~hl!{e1--)J_Ku?eKp;cWN`;F_GU$aW9xpp!5ab*x3-b#e`IvO%TsI6u!* zb^R`oI_SVjCLTMn!5;`0x*6^Zy=0)BN1$IxTW=K)Pai5ryt_SZmFsQjS31DAUA}XY z3A|hU$v*8`%3G*En|hg(e`gY?&Dhmofo)mm9&t6nWi4k@|K{pT$~d!V>BoE_E<#PE zs7m-{VF`sngf*k0{i|<=d#9TNAU+cLBQ37vRr&*!E#yIXG)Z}@C*$)XQ=J{!l@E-8V-H#<)%F*DDF zkXDyus!+z?VWCwP<6@_UX4 zN%tctqitJAxdtmI3MRX=3#x?>G7p>{vfo2q6-qLvEBG2e$|z;Ar9g0A-SOtGqragh z%i*syYkWum&b)z2KWxcBap|&01j9gOZ4b&Nc&EzA?qPk@@Cu7DrLOHhKK^3{%Dy_A zWXm%}A<=aio%f5nVx3ha%04z&jP+1&{R_o103t<7vEtq@z10@>t}|~PM!Oh1+Hrcn zm=G>kjP7|+_k$8hn>pedZIs$sT3nWd%=ka23K-VGFNcH2QI;Ou#(WX1AdgOh-L0jz z{zG#3rsJrsP*t-EkGE2L{s!Lyh&f(h1Yk@z>)x1?eVK1EOs73C42QFiuPgELOmUR4 zeZow9WUZ(kR*U?rFSg1`DYsv2pX^&$wlFG(#Pq$UI~0~NuCl#7S&R@Bk3@brXPB@z z2qu)ZZ&*@@)2@uUUaX}FNG}9@OO8}E2LDBd}8?N;c;+EOqwvfH>Ze< z%Ei{?zn3j-8-+4K6x89>Kg7JEtyEi58qbm8Hzr3t4Xgg`yNPZUO)h8MVOYO7%S^|9 znX^DwC&^UJo*|vrm}}$x7KZ(FnKw(8@%5N3+Rxp&o!b?@icZC_Auo-tnJ-7@1^QBM z^)AYDiFc>QO!>(9N=F#@t3-p63AtZY?Xgfd@Zbe3u(j{&JUtC4r-5t4$|TYl0L?W2JeOtJwG z&Q4NGO+vf}3?Ce9W*(%jARYbP*sYGv@htO%h-XQFwry}h%iAp!%Uf)o5pt^U)A3zx z>!z39(;u68ur~z)cFj||^|rrU0AG@>#7I10%nYpEi+ej!mR`H#TWa10`}uLOESqbK zNn`Q&LbEfl)RAcRCSAB996)K#K8J@crN?lJF+ZiFRU}{#@*N?n_gwAI?_{)+IS`ITdvZ>6!QgFfQ@v`VAyvyW-`c{HxfZg5Cz0ql zEQ?ucuMrgT^=`gT0Hg3T^rb&xK=`ZV1V33sD;%?OH}5!(jMp@$Z*~bF0ky*+rH9PY zKP9)lM*_k{D`^#7Q7K=W5Xs+R-tF5ZQVzKxc~f=hNiXptrh1hGFh|62jXsICIDfiG z#Mma_a3Ufhsz4Q@2Gyhv{bZ*a9kzEvJ=UxdNNBlHa+4ma`xYZ7c>*`JWVp6kuY7*? zr1*wF0Km{F_BP!+&{F-h)g2u_@e9HUyv_I^JQQR3Dn&WC7)i5Q%kH-nKM$Sa)7hEt zl%UTCosn$N^NP&7j|-DbL-~4sE8iRO05bfZ*O)-}$g`kxHo+6NGv$i>at@1$0Y`s4 z1DH16CYO>VU2BzO)=;PTEXau1snB-;CUB!X&dr%wV6n2B-5!1GcVqml!)~p>-V_N}uj^tL=_ofT1N$ z>1A#4d6Jmoqv=oN@-IgVKr^eldp*+M{Gf?Yf#GJ_G@VBp-~uFuH($zA!sYI?Zh5n1 zzF(kdznHGNU@!)I1qVg~J}3b*dH3ns*-E<5@TT&E8(nKol5TE*9N$=03+wn;|4F2A zzdS}K9GfK^`$HjZ?OCIr%uk6f1{9fK;m5W(KN*7YCKI;s7-yViS8wjbn+P+tjy^Fn zvtGr+0YrSZFcz)sNrR(~h$HC|B-Suyxxg2X#1Z3~uiF~ehF^ff2R8$1*K3BPkiX|*{*!inHi z2i)}bkA)g1a0?G^8#QU_`CTSChQoc$3mYucvLF97|3qe2;4D;?$TQXbZ75nc^eJ*y zin7NMKUoq=ylJ!xJg>Qy<41$%ZH*M8v*e4iSc*16_c>njwKN7ji;872%B}RwfzxOr zLfAt)glVI0C4>q*N{IW1p#fWe2GY2>>i+L)!?4rCsq8j0%C?B(!_~D*2X!kBVKZ2R zbbx23)D12~Sc`4G`oRYJdtqLR0&!Dehq?Uq9HV{@%(-gc%M9n(?UaK;uHAtCQ_u-V z4~#7D#=h7Pi<4T$(T`;l)ACvrm5JDAzSM+bH(Y>h6QT2Ow63i?GACF3>g8w0pDvA7 zeeQ0~eNXx`QMFC;*hgE5=~1bv)dWiMEz$ZIWx%8KrKV;*eWXT_3!gP4=R(88h7VVe z%|bopCHfl42eU_K9W4(-Or5xi7IU}x!$X8Z1iE9wkEb}kp7xtTi-i*RJ6HQ#$D?p; zY#5h0z&kPv8J0^2F-zRLAI*}k65~-d`~!S@Zp-SQ@kxY@0lq4YN^^-`QuDDX7i9?x5oQ2 z-#yFnHJ#uM$g4aL{c>`@o*@VP5bILlMwkZb6Lcb+Thc$QWDFh0_BX!ePDr3DX{9oH zXT4PxT%;vQi2S{G@iJ@=zuDc`LcwFUNxdQk0b}**EugR<{-HGKIAGo+Cg6v;8bjxM z7rMK}O-KN5kmtm+S`!P^8|vA}mnJdi3OPMFt0UEyDB}G_w!Pz*?^KUK4{3|qvSYql;YMKeQamwBHX@n`&4gFC?}?QRZ7of+rMG7!?lo%`zYwPj0i$mF z*;GN>K}T{4!d-E(ISj|7HqxS=v9g(s5C))gDP2a{>_EH0O$+Np^7umP%G@`~@9a=8 zi|+(2%N=F`07K1F30^L0n~_dlU;5+2c+QP);^!A;Gg-v=>}XY{%Xo_N#I}1R%=9qv zG?YK@&?LQ_AH@Leg0ZWCsg7XktJh+*8UDzQFo9A_d#I7wpnUMx^A zt2cG>E*_Ug;3z995miwgA3djBspQcqupP;0wY(dA!3`#zwQc zfRpuV_*q$)K;hF`QPt-0EV|+2cLsMknka}|QtI>*A6(Ai#Ux{DrP1jJN-hmfP5ygV z+1#dsy(L-cv<*H_?DM906Xdl06rupP>8sR;T>Kb*e!Iw7*0|bozaQt*zB9kk<~VP` z%of{Mr()T3eS}w71!@owhsL|0;(dDmC8$U<)6KQCXI^`AdnsK9o81|Yux7OwmEoDw z`Pu+4+Eo6(3gZ>*q{Xk`)(og?AX?xErLg#P%Z5TlhsN7UP9@erg;fPWzXHr;y-@|U zK#!#S)oK0u1_u@5m~SphCDh^1@d|JN3FTLW=?y72@gE6T2vk$?H-pl(gj<#qQO8;1 zqii%y<0~XKQNOqJZyD^z2{dNEug}Z+3VxCp8k8~uN<|K zI5?!_AEf5<=Z3^Ht57njre{^+ZUBFw75_`$$q|FeX$%s5sK2iN{~4xFuPC?)15Np5 zq~B%!Kb;cr2eZ@4K|vV5P4IvI#K8qO5pE^o#{b`D|GJo9pjN7?<)p&7AV|_WTy0FQ z8I8F8Q>01&vQ9cPlStM+0zcM39b1{8SR?!U4HZ}sTy@v~lqd1;ZcftpL`BKLMp{yo zE%XjV1Bw)sl+^al-t(!ODV2)aBzin8`r#{iN3snJhpm8wk?v@w50(ti=wE`e&g&>DM*^FjC<;M>!+Qj{(c zu4+Zp>j&qDGS#I{ck+;)y|)mmhz?v8Paai(h|M=jH?6<#7XA}P%_KnG<+Tkm#N#E| z3siU-DHkc37Ukil7p|fWgc9GuWFS5ah-SY7;T7m|(*08a*HrDzw{O1TMD+%sw{2)A z*?IJuefMP!%>Gvt1!`?SUhUypB+evq4e73^rL5wF|ARJw!@S7?Ehs%+WqPqib2941 zdfB&KXKdtIag+`dYbe4js8|163m_U5Wv)~Ti#XM?83Ke|q^|UCFJ`tmHKtg5KWa=F7`1b+faQQ@UP=Y2y%jqs$wr{DO>}Re>3TDBDC(B4*Zxy+T9H)3WG%6ma zd`?73!xJTQz*0KTRGbmsTQ>PRYso&*x#yU?Y3bo&H6v_I95dDuh&S7;$;|STb}r|| zT-)P1y1iXM`Z-~o&DC+A6yWLd?iKVs*M6qlBILepP{`@-TKBgV1*r0p{rrIAr z)apw$>6`1VXjqs^RfQS|z)2cX({#F8`K8&hYX%g930EcLq`YO>#eAR#L;?o&Bz$QBW{cbj~M3A{bEf&UY~{fgt2_J^%k=OqTS8VS!`}$q4>E& zB#2moFAIV3zX<%UdVU4_nHDq394+5Gw;+nDKH9Gg+k98YJZ9@m1al)y=?@# zFF)kXYBh_45{{jf_MQzidW!pcKXc`O>tY09O3Hh+!eg_IxJu)5Im!`5r6IocIbQYg zTz6Co*VV2r3g<$6&#pjJU#8I{j(EI6OWK=8AM6R;pPshRy+(zhbB6cjVeVmS9j$EO zIhoDIP9avhMZ3`9u!*>6yPH&< z_@qq;egi7&RGm{{d!BW`R=ruy^5l0rRGE1~h9%C@h7zf~5%2r10H0CnJeZ?+$Xphw*s7tcr6JcLpGeT6{Ak;s zePYrK71`s?V?79uw*DPxlDG%asebW2Vf(hdmDk#a*iZ19fOXPO6%&0Elx)P`*rLq? z`p~O#h53ymtbq87`B>0+OszqQrOrcWGmKEjuER*Yze8(+!CVrv?-=1ZDc`utG7shpi)$z6c@(lQ9Sgr?Qj(UccqSmPw99-z2ts{k+NhBG$4A5H?B=I z{rnhfOO~bB0?&6$8KLOPSlXZAH?a*yWv#QFjR*#yX}aha@&e)5*j~ux&1MuW(|& z`tZEoSd&{>*&fDWIH|tP7ZRFw&rRjIyg=#5w6VcO$YxjkTrDDWwfybdw>K6I_Ggjy zm;J;n!Y4jmVJ>*b(4#{kA{XJ%1&q$7hGm*s1tXNUJc`(>4UNt{sMy?hJa=8<#}+}0#M zV-r~VV${gB1N}D-l1+ul=`Q!U;^wPZ;_ZM z1(yajTn%&2>d!8tz7atn#T=!~G&cu_g)kGxpHf-O5bOBo*pdogf!`$1nz{oDQ07lb zJm@fqV6qYdB*P5CDQgK}^SBeq2mq_;ibcZU`3%C~&;kcx^r->`zPhc75KQw>h$1`t z15Iv4`2&?+b-k|_NO7wQ(3ltXM}Z;uu(|OqaPZhl)37T!p62^(m?@;4*~UHwO)?$_ zu}^-v`~E7F?#n>~L2n?XvbA+NHW~r5G;1z0WIzJ~pF!yexhMdIn5>LLe>A8HO}Z|V zs2PO{PHA=)=o}9RHs%#Bgy}o=pGHtDzm$cVcyk8)KrOu@Rug#ikwYo9P)*M&k9R<@ z%*oDC-qkV?j(fkfmMtQ6fRho=$JjW%xV;zG8cvKD@Bb z`3@D$JkZ4E>RiMa9>(Q6(!B^nExR2){La+=5ex*v-P-4t%Oub+m$A^z`MEtC|FVF? zk~?Oyu<&>0ps&cs%s+n)UBGpq2_eJZ!0ACRJE)1dmLd?cEXTQd)lSF_Mx-?l=pl57 zz<}R}fW`&jJ^B1J1wQn0(RrtluHT73pTIQFu?^G3##56-17poPYMBX-&pQ%V7kQHX zdD%zq$+(L z!%>`jNcaf>Q8cm7`AH80Bh%t7K?S<>2_0iXK>_sO?Q#4K<~s!lVs4fip$KH_)v0Lr z&uwA+E&;V6RuV1 zSKR~`Dbu0J21D)BHuRz@wDCNbHJk{{|MLT`M1RakVuu&`*(h) zrSMmWK1VAlWGOR^JYz)Z?bBsi+2;EY1Dr7wq?9sDSMSa*q>^^T+^$yX-)OSlSZuhx zp@?O)bpyE7_t?Edz;%QrE0K~{bNxXC9dGm_Fk{>MfJTw2(AOPad1^3)^xXGOBk{6U z=>~Z<#Qikxn=SNcMLLZXf?~(cg6xXJ%!Sh{Szg+k_wOAi?>w#}of$?OS1U2CTJE_UTFaKH5* zM5awKPWPtdCz%ygryL3%mLenv+(lS#HPvuwVWjX>wr(#Pp|8RW+-ByNYh*z$>vgR<|VqqpX_q&mA- zJVt|PJ%c4!<>?~*6NYZng0swbaf>a91hZ2MR4h5HYxu$d+FHaqo{Kts(BKDsd9#B- z{CEyAkYYK|=?uN>oRt+ZfG`51DY;@M!2CO*vvTe2ZL-7&(+o}~9=zq2E6A6$l~&OfB2= zOx~ls8y#uQ)!vV;UxaC8h-^@hr_<$qPw%UW4WDj)Y7UwhlLM7TeR`xQ?i?{cc|t%z zz45QJS!m4(*}@imf8nA#eX`KZnEv-7m?9 zghmSY5+TBg2PhoIs?nJQ_u#C%jh(k}hE;*B4AKEFcNzs@C&pN{ccZ9r_YHU$h*7%l z7?0B#fAm|`dXHMiS`4ZpA&U^f4d35-Q!4Gv*HmDNHDAJY)lL<9nb_FU;?wer_ zE0$KxAC7;~MdltG9VZP8FPJAnXz){&+V}Cy*SO((BBP|0bRecz@F4~HL1-LVY~Yfh z`@P=e@!kFQfzK}!Ou+CXo10+s{IFd~*Z;1p61(y|-Q$7hs@VY;susF({5I!XjO=T{ zR^II*;_&cXA{(ZvgyreA{?VD4I6P0^yl58ogvM`F<85R!Q5p+RYE+GRREXYz%A+Aq z#_Dk35@S_S_t!PjG79B;M5IW^8KjvyXbv0he76Il%7lj3q&(XSd`kvEDvxVIL!Lb3 z``|H&3(eEh)pzGGOc6?qAJh_#A2l+Gn@@jK54qQ$N(q%-kB*r8pD0A6t45lQaJxE@ z@7kb#p+9~;2Gz8*8MqFN|A$5R&lmGVf$~;dA!NYuz9)H+g}HgRVvHiZjy`fD*iCKS zNxUhc;2Ds^vKp%=St#c6MivVEAmkdfn)e)Lw;GKuzvipi^iWLH2^> z5DddY#i8+Vwxlfz=-zMK$9I&vN8+6@*RWVYX8u5VioZ~Zo=@-72*`V~g0`ZW9c`}fT*OmMIch=<)Jh}srE6;XxGWDW1qzWnQ z7u5qkZ1Q+|@gj`6%n*2nVa>I(h#oAaZ4)Ted2d#9i6Zsm20qKZ6`UjF9&P32a@T2y zsM-^<^az^k5%ueJ^1d;uyLf!-J8qJ3uuSnD7xHrpiIVC6BqRQxTdzqx2%rUkrD{kK zSyMG;zK@1`&gNmjSuXAR^mcH-We{uYkm^nh35jX6RsN>bdgPN^C^0(tE!C)O5L|u) z@87&3>mM29G3UwRd0^mW!1Q~xTB#Lmy4 zRgGSxm#-A(g4a?Siwa{h<8H(w#t^~21zl5lc+4qmoi1jT`&JL2^=$>ckEC3K;xE#)yR69krd?C?L>) zZ-cZy5Hr~UvGL+Gkc(uE4}O%7XSOm60=_wZy&>?!2I*km#A=!U3W9T|pXyo@21ptl zSwTq-1Db-j%&f$~l1TvSc4S(S-1*vo-E`lHJ7&_x5$;UVFamOuc~aX$^}ef@f$y8g zoUka_N13V(GC%Nf1lgtss=xCpndWa!y|&DXs0S#v5K?`KeCZy}xNGcic)FeU1B^AN z8|_m(>bd4Nz9Ocffq>Tr96vlIxF4@QW-5OsN-BNvatm9zU-rMrKqD$6fi&v4M(e5r z9=NAR9^g;~MsRI0It)t9)eOS+of=mkFa(M5>IBIaZf-!vM3O>yxn=pB;&EXMcJ@Ub zgZgdWo+QuXb>YCT#gICRb$~rQiSzU{(Lwg3~=-jJ1=XK>m`r!2@k|(y>9*BomRiW&|9!i5L`x@&R5b@D?u2N zva@I;)}*~i-2Jv4efi_*mtf=29gj(PGOEW&Ffys#;^rQ0|H8Ug?FaIr1AA7-L3V7; zJp;s4SQ$9E@$17Mgez}_t~`yFk5(CWnrGJt?Cz`UwH{sB!UJ4d zX#qrs+*vbnAxQ3DX5r#Li9GggI<`aabUM%^mGeTcyuCSf-A9#)w|0f6aeK=A${mHR zn)~A*rVp1$-)VW<=@4rZ16E+|YfI z^G(b1ITbhD*Kheu@S@GOge*a4BMr}eRRFgH6b3ToZeyerJxeWV-T6xW=i%+#d*6AE zbm94^m5D&%;0JLQ=%6QU0AH_j?(6i@9lq7nIE<}2<`YRvrnI+E$Z3O8#(-!l^_1?F@SD(FMcC?q7LcfvKr(!5dM z@mLn*4Ue61`%&*2Oep`U(>>G^^fDYMrl(j7wXTsQ!$W14CF0ytz&i=~$f!tdm0Dv| zvqai~e}LsD*ipCz)zC}{gnNgud)L?3HzyU@62D^8z26zjd;u~M@;pv}U+fI~oV3&V zTpc=B5(QT$Y`)u@6;O+ah#+{sN89u4?@@Z|>*qw7^r0lCD5;m1m_dyY5!fO%hUj&6 zaBy&fZoP7*;9&48?9Dhivbe%5zfU0Fa|ML03zz!@@=b*Gynf|Yl1)GM-~TkCfJQO< z*OBPgyc-l?U712WZQtv|vwm_h3C!C4RpM?!=~@+0xO8_<&yvjUYv4?tN!irgYK~Pc za^@Hc;N(A3@xLgX!W8iz*gva=-+kZLd&yzf_l>Z|d=RV4`Sa%z&CLg8MMW+$Q?a|# zpbsEnT@dg}*OTzZ0fb#WVVldnugiiaokL0ymjGw=fodZf% z;dfZ3`jl(-DbtDce#1My>f_pR@Owl2f{`ZqiuQr2&dm#_Ve#g9uR-R zn}u7d>I69K}_TFa^mUDtZH z*!tn>XhHk9?LwKWl&#}h66Cc_=ymoJaoQrSEaFt=51^{qS)IXw0ZbIL#%1r)Z=^z6 z4lR4MUKgW$7VvX~YxoO|{V~}XF}X2OPw&(g`Q^u7kIM<};5)kt zSI)1uC1<-w#z;J|^7rcIrkKs-u_+mOxHB6Z_Y9c=sTQN+SB-&Nc3pHEu8{?r#F|lA zbQAwfJ^T@eBMQ~H1ywjyZ{M30S=pvF-{;N_1j2u{o);op4n@#JjtI0R-n=0& z?@fJ=p%sQJ2jcl9GCxp_z1W{9vODEp)eNRJF*&9k7rsIEI(!h?lAou9)vG&Cl*_3& z^Jji{=DrVJ`|(@d@${5yn!3_$nNFjm`$g-L!%bvVRH-DB*5C5GMJz~B6Y6C+(_TB7 zR?4WTsGIc=Lnf9}=gS#A$3e3g5!wMMUi*3OfY^XcIwmtN*7hL{y@qQ!_)R=)^eh*? zGC0k*OuOWL`TZ9*?clBBgW^kcA@xuY$NLU7j665o5Qpof51z2brF&$!$#P?j$tc^g zEiNKo*kx2NG@>6)W==3lx;HPuAo2)B6LS4Faoqv&vthnqYuOjH$;q8MsBANC>yI_F8|fWn1feJGCb76X5S#yk zttgx?FBRAyG#qUPDpn>f2{kG>$roJ`^Gm-uT%mitJ@P$sfj3=nV2anG@8{$XPq9~% zqj=xzjv-mT6nk=ST6a!>6M7*dnT*D!6`+}RD{_Iy^U~3L;^QVc566}5tM!9YlS&=% z4AI9Hn|mTC=k2E&&X}|oO#VUxr((C0xrK0hJ>If--Ig%`$l>>Gm{R+yDIv!;Gra%8 ze=WKo6h-Xc$>4t)tG_X=5ho$AXzJTc4<*LiP8BH8>eo>9hGCE=X_jiGepX87O+-wi z#_!&QuuxuSpIqSW7M;a>+r>Q7`R^Xs@XiU?zM|1?`qO;FNjAJLtr%Z7JJ?!p_>YYy zRvYPNd(=z=1=abH$5D;2YBIQ>g5?AFba`OSioYcHJx?);ILXVSK3@Y9Qh4 z&pz_>;x*%((`pH^L*lFWLYw0n9cTUsC4asZ_eyc6AQ@S19_YA+NXlGbf+HyAmL7X zq$n=%+Q&v6Xr*sF4GMeR_JE{`aBiEcJ$cd$1tBkbZB*QiI_5vduGMVz!)r{Y-{aEC z4SNxB>SnJc6VEh(N}mnhns3$oq(gBAZCs@M?HX}~*r`=G#(gzG{kW9SMZ(F8StFrv zrmBs8*Sw;t36jQe2ZkjdC~yBY{lIv#Q4*VT*2WVu+41{539nr?wv>Z$(T6b3E&gVU z?Rz@?(&LcLcAw1^f1epZ=Mud02Uc;nQLeX^E_|%*R>bTO;A%5HuJ{wrIDU<~e_+5F zTgi|a=i5|<-s$?{u*B8_-F!C(+Wz$OGTj^#)8?{kA zf~Uhd0@EO`%clYb#Kgv2fn5Dcv0v2-htnSczeLId10}s~;%@U*MIIf%Co!_W_ZQp4 z?B=Rw!YzxgkBJ`>f*5XT)Y{vrG}-I+`d-Vdf5P^Z^TsS)cBwL0XiRe)kGZ6_IiJE< zA$C6QZ?0WhOPsBGLRtOzF|tZ-oI(CijY7M1;vgLHO zfDy0+q$9J9k&~&;eOM#qD~V99NVi)uGIp)D<7Ka7p{>Qv5@MSqzcRoct(RFD=UG81 z_1!#P7^(J@&u!Kjle1H(s6W!s=gupz(F-Vp4K?3{oS`LM%PSiEfEwXMIqzI0cbYxI8rJYz|w1V zJ8u#n(f9=gv=wamF2fBqI@gKN9U3k8|X_bp65tu|V`y-_C zp?hyMd(wI$8vpoe%XX%WqxIuW$${6>``>SVy<-+$JUk7@Y=)*0qj}X77yydBLlRN- zK=w?6ez*0>!-oWOJk^DBz{%Fk_IEgMA@&~0U$zYT*POn3HXYLsCR*A{uNvShY_qiP zjro*IU5Kc!7-dnnVbHNUysJJvU&mpG(o z3f*^@!7at@HgxsrWfwB}Ks#)iiOX^%R_M4%YT5TfDV5(j_uad9 zO@mTx@XdIYp>Tc$1%>mg1;=zjR+W5HPoNR{ zsKs9MY?(6i3e`6okU@whSz*GLbnxp;J`1_Q=!mUpSVxjK#hkvR&c=p6P(})~R;hyh z#G7B`a9WNGcx=JI>Jn}cf7BynJ6zySr(ypC-caTBMJl9S`{Bk4#`<-Ew>&v4%WE+B zZNpdlLa)Z{SKXN7qMj`ZE-^~a5Mm^ajQJghXO3l0SwaV)jmtD*EO&<6eit&SX9zPB zh5dkg*}RsWH8I7CP~!&G9IOUaDPbmC?Il2IO~at_=-Z^sR0bs;Z9-^Czk&YtE;3l@f@QoS_xq{L0AT#-*6G4yZ>ORS6mauKz*Au5hJ&g1B zJ173`-^`37sGQKLW zo6RY&&yk385eL<2XWiDO%I#DvDH&D@8{9s&Ka9J?-%1Sx<&z3pcMRWl(xQ}VGbcx9 zVwv~lYo{?{UdBq36VvN^97WL<&L@+D>Gb#<+3g;n-L-;jVGOP7E$N%t5kSYbPc3Sl zh~O`Kt$EGm!2)u=guwB*scEz3KtJ#o>1V zv7i*rh_)b|Hh5ytjoC*g45;#bnA=HX7VUgDelpdM``LPw=?HN!Vz>h(<^XHksU&=_ zFsqCTw^;DK^wc)3?-;N;@EIU%?#Ls6;6+zK1)8BFh$^YldF@_nPXANK&1uK+c~N}) zG0c2NE7fb!7jplx3~5Eo$anshml1gE2ue(q%18ct$zH&F?4oZK7SlFvAk!Bw;6#29 z*^n|z2V*AfiiC$}H?PlwLqc0zq?=zuSH*{(dfn_5M&YLxQiO_5;NO%*NTBpogt;?> zoA@On41OvLUT~C-r|rVbZ^eE5f#UqZ_$vkPH?ezwa87?S4Q^y3;JM)64&c&TYsCMH zNZ!dSD1WT1o}3scF%F@?BgS_Orriw6<#~g2y1qa2qw#RA{>S@e|EP^)FZ}~)9Pm>}zK!6h$A4n4p%g_b~$IcHVp6g(Kh?Qclu}L_? z93B>Nz{~5N|2#lOrcq;@Bi#_a$hbao znrkFya5B;jzrXB#7`4^}L*!pM_kV@;`-B0qOc4QGE_Pd6TM?VnT>BYs{%%MR5LG7w z&BQL&QP#&al8nELjs8elB@lKPGZaZ*BD897Q3YDq=(f8=jOGSBM36}OQ1Cs_+ITBAl>N9^g z$|EPk!y%yHEjQey#|u;MEpRc3Wf3QN)4t8Dhd=M{@q572$yWPfRyYLyM!7GyyKT#ktlA; z)mh;A=Y)2TsUq>O>Te$P4`VmK)mS77Jc|Jvna5`Ynl^8kg&3f}u0~GLTDJXsRy9*c zWS~9!+*X7+N2lfj$=tpMVyZpca*j(2!y+VejHi{L!T@e048M&0c4Qjwsf9DR$dY(c zSn=7k!^*8@Fz`q@6%3VTopJ2-5#74yZ9mZ1AsLqh^T!qBJUt&aEK5EyH0_poS%(kz zijlWG{t6ZL@1aY&>6olfl$ZQA&~i`3klJxj9sHNc%XUCPfS+YP2T%4$Hn1`xph~T- zZeQ|9nUdrRXQNWwMi*o(P{h0)vU?j*5@cFQ&i5q?_4%m8``qhGCpHp%#Mp3ck5dWg zfu_%XR+yq3_Hjvbxt?^Up%P|~Z|*B?2I`?G8%9474KuMO6`YTPp@EZO1vhNk-T*RdhpuNAxZN$L;R z^*_Fy`WS+rq*h3_(9{?TEz*F%FvU3E#yK9wU>2jt(Caiv5i1p6hKc86dVqIx$j|fM z463=r?NZ#zzXmG5c>_N3<VB zs9P9D_?n8C7a8M;QiqeAxt9@qCzDt!a!U)(_ z<>2xgpK^utc|G$CR8wUG;?rA;te!hdGtD|br;o*Sd*2?Ox(q&Pg#*_-YXxwT+^Yq^ zmO8N+Q?=f;fdKD|0SfAHntY+Hop#LeOhzQ+0jZnxzp10h5Jd82Dt&i5Yni(&!0Nod zB_mT~o?J@VP59`{&^?c|Ib=fR$Xsq7HeKXlXauUwH8hTU0+GRU32oNUWA1V zx1yVv`L|B6j`kpZYaC*^`FK1`yB7&oO04ES5|h0pFEccLOqhK51?h>m$8v02koL&S zq#tPWtu~;NlEFK68j!~g??g64$mBO;5fp156Pn~?E0e)8A13@b(>VT45?bI@DNkXl z&pE-`8iQk7lrCQy{)8(i(TDVWJrKM9q78rKo-%XgM3fPFc){GyAq;dNM#o@Fc1q0Y z?k^>}X=ae=7vmC_wUwu0{&ezKUixek*WkdSb(99y|AH~QvlSiY+}|&AjM?hvJOm6h zccjEb96y-1_LIQrQ(hRx4!Ae zJu)+W*Yq)<{xm*V^R5u>fS`yfYXCw_8tB!7eF?&H)IwSDjILLV4s}~Omxz0H(czw; zly-3OhHXR&p+DSM5nLR%^SU>@Rh~YnEz#G>`t!=Z|LiG**bJDWKsxp`S3+N74xIh5 zFwVt_vn^gxI-tn-m1z-*3Brmsa+3%h?(M3(r^q`L3m$OI@EA1!W|s-h(DY3|6nj-9 zA2_fu8H#So`8aeO(BQ8Jilt91y?6?TU@qfUn8cClB{WzamJsmNt{s&HBv2TOII2A)$5+Q0NLT!hRa>MBX3K1G zQ;m@Wn6JYkT^BJx;A2LuAcKmTiv}qoPV|G)oT0`jHCYw|ukK^*U)L(N^>IW5>#5SC z_}i@&sYv&Lj!lwWzTp0n`75k7f(u`_5~bJ!%nN^)=qVHkLcgbyg>T*6$PxAd`uzE0 zYu_9cq*Q$?Kv=xi84!U7fACw}zB#IkLUkLr_w|INk^jDxZMu49wGh>bPFbxAsj;sW z_xjutN$K4HdOGfBKz;rfZ$Kikr@&E>do;Ew6%{r$6GpFF5pFrcL#IJS-e@**5{k_C z!HgM>g7oKeL=Z*(u{diIe;$(`tu4||Hra%-Uma17@k~{Xav=nW^4iNf1A4)_l%Bf2 zb@G#O*tQZAU%~_LY~>f1OUum+vJ!1Bao#4~^KmKCyY7u(c zy&JuaGkhe9_1O5;&3QI|*={*>ltjNyhLH<2?YHL;Mo7M_2Z^a7j$uon#GfZG48NQp zF&&2SD|HB!M(ub?Dm=7l2OvSjDr}K3+ZQ>C&&*Re96jqUW?YE|_i%+T4?!+1XFU zLaeq;dk{rqwq>6&9XuCm<-s2|Q=3Yfg5UUw3X}q=km@!5*hkEjZm4I5TNF`AbMf%6j?NXSC z(=V5}*w(?&#^(WVh!KgObrboCpL5h->}?Uowg>hN)hqds`?Y)=%5acB;0$Vo>24gb zKW9Fdx?dk~r#_Q~TVj#evoPd}w#ishA@Su4samzAwOrf}#)z(h%M!q=wY7EcBZ!A+ z_q^q$s}}?A?(G!?&}7;F_p}%SZWp}Nsi?E}Lt0X{N#YO0j z8i+H14!caD>Y%kvWwEecibDE@j$MK~{#N~$S$qmtUi?&_c2{P}w+60NpFJ7gMr+X| zN1$S+8E108tE;gTd2NDgt*lAtc#H=T_G4aq$?>BmG*eZL*q1WAD~T?%si%aYs8=qn zrtvukiautrG0fU}7tGc;{F7)IRSH0ZMiy5E({4F_O00ayj zI5nNqC+`T#;FC9OY}w!pD|N@{8ny_KEm-A(8Qq$0k`{}txB?$4XNjA7N*&xn8T{HS zNcgCq)Z&7M(tl!w72#uipt}O$kY)j-bz;tY6ndxYgl1CN2Ph-7aTOWYBJY-Y*urT+ zYknY}x1ukkqAP{^6H7z@YI1>(W;C#ZG)ck>(MHsAcIkt~(p2}koyMJe@uJc)O0ntH ztBMS3l;%rr6t=2vEVZ!<{vw>>;*AqCus2+qr#kV_;gg3;axu&p`zP%9ee%SHKEa@RJ;Qyv4bK8uz)CXV=a09VDVC;O{Sje zdi9Fw7*Ftw`(H3jaWmRgDA7`iBXslFKBt3Z1B&x%hK*>`8{Qj9BV4%-4Z&%+P@Tiq zajkwST5!p5^t=_K>p!FUZUAOco*uF2R-i}{h^*>0BRrDWgJOZAU3(LT`6RvK)q^LQ z#~|jZaiIK5soCUu;(}&X6;ZM&^FvIeHuP7UChdxCD^80leAr)(&alYuygu6t?(P?+ zqvk9LOJlt&$(mVUHEW&!Ca162#}!|+-S3B9`179X9kem+@wF@1kPrRKfSGQ?wp`GQ z(p{S+y+*D4t%^x(u{Dm+ohP1m;h{%M(63StC+cCoRVDHrbDLO3u|DX$^)Zn&H;yNA z#vapGk6)|AXRoCpB-Mk@&P}>zXm8cNC`Cslo)Qtxa0w2a2!-dOQ$usybp#9Z)&rUX-3EisPDAP+Op z^ZIsO=O7Z^_<9*mql-{D7eKxH8Ln+q6p?XOx$~IT!#rwDKak`di5E_=7s5LLM+cx^dWW5>0b`*$s4y*lTF{F<-ud;BYPQ zM|}DZsxhafW{mYA*Bz-t=T|JT$lDGcOMKtAj5x(V9G6&G&Tf*oaM3)MP?1`0`jweE z`KkRSImj+KXb1_U#2;3^e6nB4x#4x?!`bi3E5zNOY_NL9$JsTF-OC)@*8P!FF{IXi z-=SE}t^94bHsM0KiT|m*?}Klvokl>uqFeTwEBiw6;4d(j7_ z@DgW}kt@_Q^QTZ|;F8wbuW5lk6Bmay-9FbgQw)#CvW%iy&5+N*JVqki@-ozgn=h2{aQM9{EzA1YmxWRM~BZ z8Rjt}p`w}^LG>U8!xeYs2kW2yXtXF9w3;HzsH*0{mVHhzQ7D5!oN(}Xb8~#U$tR+B zYhJM7kxZX)kuA?Lv=yN53d|agf}3+n>N@`p{Z~fEoR_TmmB;94;mWUu7WLiqAKlNt zKCVH(lK7=$!HELDv1XH_0E5FD<)l>JHlT&pdghg)q|_>(sJ!-U*6gg^eh#H*q#QBy zM>+8`(MidG*rE*gMqKN;q=|p{i+gWp;s=Vl!gVZ3dewRMTcTjBlzVwQ@W$ebTYnRc z&*Ugiu;JPo9{j6vQRitJEoE5$*QvvnLqsw5ywx+X6iQJNO~VJn97nY5g=^Q`Ggr>0U4?U)x`%?_aMFIP6pt^`Hfcv@}h+)%-Gs%607v2AMWgU&W zOnfnj|7F}(yoF88akeH-I_9CMgYy^b&GC)B!IP!5jiC~9cf^)IP%V$W4HlgeB!BM% zs@@_{IK{XE@_s)XE^|Jd>>&T(G2Aam>%%A8I+Ev3XbGYiFh1lZzinZ=+8yK)YvK7e zZtqdmyZu_;1LNeK(3%j|2DLc`)YwX8*9nCqL|4>udtxV2QTb4Um(cWv3LS1B z$@d!H21;Z|zhW2jl&>TEn?h24 z6JQO5V86$61dbfAxS+}=+_5?sCP=AjGKEsss%>eRvVz7Acz^5izK7_n6{+u9)KU05 zY@0 ziU7`>)4==f%q;JtCEWh|SlU^Jnj*afS}C@2WzL81SNPC}AO0yq08cnJDn~!2aL_Au zdPLRZPYLwOh3~8Wn_cr4{#Mr7hAqk=)X)hcu&@Dzr773T&Cs6YThQ4aSq%MUW5=<$ zH~ZYV16sL9DbBHdwvqed>+0zR%yk`>`SbS(NB6ApdiVIS4J+S9!q4rydZnKRU`aO5 zDGwR<#$&5GG+E+!Zg~{^9dU~_xIKbBgI2yN&1uR2L0G`$zSz{oB|vE5f?@Gm+h(Bz?-`Yr&^}9{cN01>tBRJc#=K~gc-QKEFH;g5TD=2V4G9N}zpSoi4|euncg*hiD!2Dx`9*K!y}+2!d$4qyHB8zC#X+*xs53glUCRZG#(h^dxFchs*DQr~{A z@Y~Q=76A9&A7(l}hlaBJ6=1}{3BY2CpuDsheK@=meDR`;;sEYvU+~9q7B3{8AQ8w^ z1yT$O{*|Vvc#f226ZV&+;NR?#HXee&(4O&iMYvY~z0&vnmt2D6r~gFM;L0KFv~l^i zNZ9}3iYGE075}y$`BNi+DH_4AFgXkf82@=k{vWsa2vhxM|I{;Wl0W*snBdy^Pgmgl zYsNnmAx9xt=RXb2o%a{oNn4jn2yQJ?vimUd%1X7Y&>T}r5Q9Yga zAyxi%0~bE#P6(Lq>F&;x9i7KAYV25@wb{ze&6E5&G^Q@IP5>M|a?HA4DmDC}6-OYI zt(?GWaFg3yHEc%0{oex_&`pV{#y@Si{Hb3Qn$fFKzFmtwE_~%fD7ufQ!0)T-2RhFj z=Y$JC)taZalfX({kAm0ZI>WYrj zO&u^WqEubQ?|$_$-r39_--XY4ydC3S%2T|yx6r9R6aS~uz&gH{cXVu(eRvjM`R;YOq710j6M$dF6s5s$0;|1fF`xUbebhvJWF~V)*#n;*DX}rg(W=ana(Yp3hhn_n^IbRY|7{9*ZMdI^S6uwt~bAFaDTEw zThLzKxUi%AE_@l4zPH8hb$qrGxp34`w42*pd)ZifDYFx~@b!&>&%hN+dSpV=&L}3B zoZ7L&!16;Tv#mC3{QLc`#U`8ADhM?`9TxUhrixJ<=>FwUiqNBqe=^^2Gr|=N{A-Oh zxsVy-PcP`XY_@cSX@4{s2X{1S?K0&liEtGka?Z=Bv>_3UZ<>|ifK;&yE9xh6h6472 z9&x2F4S!%TRM(gd)25!n!@hg3Nk-oSfkmInLpw`NdgiAmTYz$@*Kj$3;Hc;&@Au;! z&%WU=Dbx3#I+|?qauq0rji|Dfy5F4QMvyA; zzY}V-=k*6qiy9P?IaRiw(z%v`A68A>LLyuamSBSsG_UguBXn>XHIs^0{8&np*piIz zCBlE#Q_CurUjqbE-6T71z1t3#tCjlh_6^ZtHImuK4@=}D*L>whX4`1?yw-~vq0w!F z;TmBW$J#LwF`JjgIQpEF3dS`K)2KExCFQ>zf6Mba>aa!bjB1V7#+@I74KKoUF zl6{~9@+>bB@8-)KH0&#QDqo$6zhX$u7GTCQJ$_ zz8AKfk)3ndy6n0)>U;L`!ZSG<`$KpbbFlk0 zXV*tL$HysZVbcnZv6PbO7iO~H6~7Bys38Lz-|`g`Hc=WVi7|bqGLhUJwDxPVSdVS5 zC|CMtM51{WXW!22oBQhiARf+}XrB+ag&Ljdxv-<9#G|jfl}d$j@q0xO#ccPzm;h~D zd?1OiTd?#2KjS`Z3gY-exU>bjPiIoWKG)(596)3JJa7|%MliC0Kin^uaR3M#P8OBGuHjEQ{^99l??=3PP5_5^WdfF%XtC=YTQx{HOFaS zL4~SeXZ9mcPhQeYYQZDrQ(HlJ?<@FzyyxhV7rgxX{Kw-9yOuc4rtKEuyw6cY-!l^4 zDdLaC%LuY{l_`ad6$~sAilwduVk`8Io{%c9uV4YfftRCVTYz=73xku~$ADa!1CJV) zy>4SosJ@5N~!;^ionm%@FdkiBO=W3rj*h!^**wXa;}0uH^)JON0|CQcpSjRrAlSq$h^ zf|;ji{cWGK>x)&GH0jvt#P`>;@%I^h{@m~cjl<(hL}fKm^xaW%R*8IzOt)qoQ=#c{ z7tm)@%3v4;*8S{Zg4ls`)Zr6&zC&P$xK#wj>aRj%RX!Vo+E9eaw~k9^?6S$H>i|Tx#ixt#&br z#BmKWIl0x%`A_6Wu9Z=v$A`DKyv;igVgxzX`;99pcUGX+5^t)KI2zs=jNf{kaQAa* zbOvof8>!^uW#x?uE*{5-D?iVkBjH}j6+c-LoVBk}e<3?d3KOMpC+6n8uXT*5(D_9o z85}Bs$-C}WhHGh~ynXg_#glS2BU``-oNqOr!4XK&c40>>eCbV%x$au!uYP}@ZUXt~ z`QIVN2c(&JUy}w^=>yRuCu#B_7RPYIdt_pXSB9v-mxlJ+ti?)#>_ zq=2sHHPK5xHYoF03Ibl;;buod9*H){EY7bD6ICLe#dn>KuYe z0&u5b=H&Cx>Tx&D=MH|mX7g~fQHBk7?CfqZzTaE?k?e&MY8BwAgD*^@Y!O9nN+Zl@ zSBk3*VZWAa$BDH)l>V4|x8D)=O@1q*Qt4o3h%c+d(cu}>Y{Mw=i;EifDQ}xxjA~Zk zDh5p@9@%=ybP)q4JBHP$W9AJy+Qto|emCv6$IfqsHKC^-CrjfQJ;Nrr8+c=>CcOzS zT>atzxD=mCQ$7<56H#;fmREW+-qcj~gB{6YiFs`b$iA>lGg(wHgvOR2eDa0`fa2~% z!C#8bf4Mv?>R!Y~Kuw6r>dpk#CL|P8RQUR@cy@feKc}_*ST?~tTFrSW1*-a?j-goQ zUDu@P6x5IJlGAk>`wi^c7w@1Q?M=BVX+^r;TvUaGl9i5#@Ln4{>)MHfH-V7zk0+-*dHvKeth!WEm^H5cCOKb@0} zMu^N!oyQT&Wx`G-F{H!$f!jR+$qZ{Ab3h3P!4)X-?}$5 z!q~cB;xp2WDSxN(3*qtodYl?%$H74R)GoLQ?Jbt=E9RBQ#x1p^+^mzEr4td@OTkXZ zCw-wSD1btN{?x3M2yuH!0y%&u3sf+40zC*u8*x`xLIR@yv-lNloQJiNfJ#4$i z^Oa?IZ*)zPK5m=0aOLZJ9r$K@KQnlJX<%KLTLBhucDaP=wMdIN`dscg&d_YXdE_we zzK;2zEqTv3eY^5ad}Ed8zaMydB<(W#27?!G7rw{Pz1MK7gX?Jie0PTr=hbcQa&pNO zZEB^`-|qU=(SJ+2CWp(-jAqD+@coOcI%V(j7s%rE%4I-RDYZzGZl*xb?ZZQ#+yB)F zHWn`bFtFWU@CvZrNkvVqbd41aDY3#Pn{l;8*$BuNz;Zz@HS3>I5{P(ypn_O>qdGTP z!ncZg`@;|cvV5rM>B1lk`wcm7{%Z9fMq1;fwpxZ6(tcx?Hfi5()o`PR(#;_#Ptj;T zG&o;q6&Qw7p|}RtpDZqgo9<$CFCMBc2Hjqz9bCQcMme%2wAqtgmE^aePx|gM8IL1! zrW42wK^#~85`-=GsMAjBm^8*XPjz=*3tJh}1XZG^v5g+rE|CfAArdPc^hc4>jb+x; z*x?bhj)oGgMq$nvvg++urle?VBV)*pM)vdeJ69rLw7YvPZriy}SG%+JLfL^HjfTLe zeia8uwE^<-{k>Kv@mteF=B4ZIhW1vE_v%MsEN(j%QM2xF@31HO4R*TF?7Ci!Tc7Px z=CKfX)0Y)>gfNy$ljj?@mWmXoea{JYnPoZP!tdkb2GU{C1M;`Ps=GU_=b!y2>LH3N z5{PPsd5#NmwNnEL9UuAzKd1|CSJG?YquFMH7 zz{FRV1}NNgV=cb-NfjC@R(EowcVv=zKQqWb2H@iDgNv6RE%_HV|GT0Y2QPq03r8vi z#3q!p#yC)E?t=?w+&Iv$)hds2a@seK_-#Ksiz1BT+0*l;4UZz>_teD&w|^?z)DFGb zH5+spDY)|dN?@}BvGRxIH`4Bf6;9!e*1r%+HKoxDqeqSjz9VQ;|IX8|?QjzkMpgLY z0K+3Os9&$@%ty?QYywmC8!?Co04T$<4RNO_?N6Cfwgu!j9<8)0#%pEqz@0F$LN~8+ zbPA6}l$tDcabF*BTj!B6gyq@yE1xeVXAK0j`*3TNRTidwX1v;}EBiX;#hIt#fNnn= zNg1J(N@%M>>IrFV*blO%9AXi=~T-%wVw=KOs1hC|5?qsJkpDLRa4fuciW zY=}l(spsP<;rd%NjO_t@p40h*ZxDiRVv~OE6@usF0F>#7QnR)k!6LqR&khFl*?z_P z{rV3`x9KN0QG@;==0goH_G1kCZbfwbDdtxtT$*Sv!;Aw(sX03A0sMUcZ;Yl-v4sQ6 zlo)HqRkqxezV_((ZQir;8_wpgRVOfLG(155l>{1PE(-Z;O9b6HE1<~7Qnhnas-O@pn^fhl;K838rWUQ;9h6b1%%Cvf9{2uKCa$1dk)bX!TwuMk0(I=S^Yn*H21wJH+$ z(79?8?9^MzgO9%r7=Zp5fd>&4WEe>icXZI@un#CM5YJR_nwSn8g*Jy;?Y>`9?Y8M4 z;IF(Dd~>N6uo!e5CGImI^0Klfiij%Hs0a4yj!~<`)Q`zYzu-e&F&<_7{YwlUumu8G z;F41hb6ciJpd2SWx2Al~iL+2;nFvQG_UN&`0QL(87QUTf?jEP?MQ`@2gDaa!{cFLw zwp}Tgr148Og$hM-bS?}(*k5_Z0Lhvgssx^&Gpq}7%Jc1fVGquTMcL|i#Ny?bXuk#q z$sLN~p4$g`a&<^uk@E(kSO#>w4%mLD)7~U%BqITM-)%-jncuJlUD3Gp>-aD9Puv8H zehy@+d#nv`awht&U}gP=W+7JPl|TEP*u}sz9^c=iE=$%-T@TyPgTq|Wl{1R4yqgQF z@l*Y<#sQC|W-Nri(LA@F=ksqLyPjeQTq{mzC_H*WWmLQl>6;O-PCP#`q~A82*u`iq zU^lL?c6iC}E^cc9Xo#9~OE0!LnB?90m27n-W!UWW%|yHL4BJ)lmy;{j zlmUB7VlvaS&UxwhE3*oYm>`Y3;5Ffgk!qKEc*?~Pqru}O=i~^qfwU#%-Tih@hw#Ip z;`V6>U4I%h4djs6qp*4A;`gu-SxLn42I6fSEqq7mN$BzRkZYBwR*0^mD<0h|G9$FQ zY|`C-2Z%xBn2_8jvj3{~r{~YPXy6K)m@l3DY*hWLE-bQ-SDpi`T(>*q<^$os&R4Nj z(w`rXik{l8qCq5(?~EIIQtn#O20j30q`np_?| z(v9jhO1w4mzZtgeV>+6)dMqOQu<}{nEaO-lZaeoQJ-+jBWjt@ApZm@+@muo+S?!yu zHJND9-FcWHeiJzic-1Aud2@wO^Bx4L%QA;F;-U!+EW5xQFU82}c!Vz3NoL*`ZHqWI zv4O$39rLnTw0>t_=X9Q@Grud*`9|Wa{IcV?N1*C+p#WLj!Q0TNr+r{pgH^^!2Rtp* zQ*0Z4-w*43yOn zc!!8*o{s~6%2s>yzq615zJMx0^z<#jWOyY+9=lr)L-gS@`2vrX_56Wic`T3rR^)*f z;Q#RUmSJ^l+q&)y!Cis}5AM#u-QAtw?(V_eg1ZEFcM0z9?hxF9+ZoKY*4cZmB=`Kg zf5%f#jjCR~daw4i*1lH;KT6pOx6d~MRU6c)>*2E@%ptoVN0NdISz+^)yiDcGPJp|1 z6N~k#wAFMpe*t1#BE9RnzWW0};GlI_b7(xUiQDl3SrFKC%VEJx>$qc>aWxg`DWgmO zT{9@ae2g!s(zqcx^On~fOMh?%@m!*+eFEW;6*0qKhWoX;_3~Ju@7pjg-b3vCg+3fX zNbBvAU<;&SgT2|Jq&quSQn9M>dW3I9uJ$d zyqB^4hK|CXf{+*>XPxD>bFIrPn||MfR?6eL z8LLt5LKoN||6b~6o71jc6ojx>-)`%zd@$q**7^n36eA~%!+~Ms#Xdx^o%jsLECVRqmzi}t;z2COHZ~Tu>>T?oaxsg;z9vvjm z^Utjoot(*lYX~?E=wnP*p}#iq#l9o>;9zNU7WOOQc{6;&SMNHz$0(Y<6{0xL9#t*&x!o9wKI+aj7ucCtxP;++}Sp7zZ#z2Ag zr(PzqP|%!jlww6wc{>i`b_1(nkWHUp{&Ww~yhwy!qQzW-`4Bn0mwpXp1V#_$_N+kZnXt;_EF4Mbw>`9WA2IU$`Hv=vzo+R5Ia@6-{$oP@ zCwm9vX!E~;)1$vvtN-bM90_3m(_}jK%`YU_eN*Gk%u?GvBkIK48in)4-)lvh61HVv&UM ze0-&#jAP*Oi=@D#-u*_oSJ<^18og)9E?y+>qpxDW@?l3{w6R&9vRyk`KJkVjZhj7@ zMO;v@NMhM0dM@n=rY4F;g}msaf>c-6Q&`F9l0$T8yuREIDclNIqTsr*zpCTm+qtX~_O;RH&HHbQlA>P+U-nf z53b*U(zrlX{0%bz$}M7Sjjzb{9~;R@UkiUg2Tb+1s~{v^qEgW_F)}Lr8)h&xNk5|E zM>0xWZ2?fLao~$I@8otk;t;Jb)uA2~3+W7fXj{uyU=;%-Q@Ph$U&NUf>M3frfmb_r zV~saSc*>SYdlt<%7J=I9!_Cotl3FR#=SZ+2Q=Qb*y3GI@_)DqRqmJDBv~k!gRn*vA z)#HG55bTd-#4IY10%()B-Q3Ffd&R4*dXcX%x2(qB%>!TVW=%F{<;WqQu+vSbUuLFH z7?j0wt#oDu#eQS7-KAjUc))eGXs{luqs?G*_d)dyZ~n^E zqF=eB2p2njrxqHXGLb6!Ck%S7{h3#v`QhCp5s1&RI31*e2>c1Uv+(JimN-kmWdDtp zJ5*1-QrP}*jNfCfdq?L~sg(O-i+!qrfdNc~Dg=+`tzpJpk4be0FoUoo@u5VULwiUl zew-k*SFwy_UplinPC=H;vXcX4Yu0Dg6+QpSam0PC6)^U2q2b*S=+J)q-8|2C%rX#K z^U&zWRR-1}9GaGxcWn*OQgh;5G>z+;Lrg;I+7&_O*G)!Ka^uIQpKr&oZlcx)>^1fg zmyl;??w(M(BJ9)%-7T{QPG?JhSnHDn@*~C?T2O%5Oly279wvkL9#hmt6>rp|7RQu7 z8}35O@XTMErFIrd_8um$+EERNUHBS~$9i3q3JSCXDa0^bYcyl#Ci*3AFrC=6DMNh}&)JR7kQQG1sj2XBlg&%3g=U>5Jl@JtD_6g*)x!^iGcMXO@lL!9+aQEv z=In10dryRr5)ROMPWL|DB7>)vsfH~S)1Tcb0BRJ6X}lX>zBD_mNwyU3KQGBOr0Bcw z_s*M>scO6cYoTVf-v?pDz^_T1Q)w_A86U7ZV=_rS4G*bG2p33F&vBR%A4PcT^!(Qg1}9uZ=eL zG+4?Ner+&itMxh??&2sM(0D&xK=F-fobAL<8K=4MR$V{={)G0+-NhI zb1*Gy$!>h(8LG|hPI!Tk497|r|njb~ub zW^wPkn5c-~QVQrDI=I@aRNm|(vUr>f<6^LZ$2B1HtIk#j%Gek6wr-+)(O)12Z$^)} zW(8G>4frWG<&;~bxlki>!Vzc7&1F2w) z_E0WUD22pJb3GK(*)j#;2Oc3pP9Sg&bW`;AL3fo$-@=|1?iWITHt9w^Wk8sdl`t=) z1L=Gp=%INoyVzzKW}#Zc4~CM6B!y37soAC}6k9{`X(CQZ28VOw=oO4A=w?&Q@pJ_+ zO~Pp~WF|@g3Tu5dvrTa#Q5s0dFRE_clX0p7$IvStA4&%zR1A%sI$tjDGirEvUEY1a zh^mLz*|*-xcGOMZ6F;Sn>kHO{2Z@^Jc&{UN0{h4xMfu9*kVVp{W>B<~3BGfg*nMdDZeDU2=#rXtsa4~Uy{QDqFGi}HqtPW`1n_czfX2}m?>JmUDSY2Q9GCp**(mpVZIH_^brK*I(QN*CU|bG-b#kv+SwKF`(Y6jZU)RjV0%zT12CL3TB8Szj zM+fC)5jOp2;ZaGAA0n>LmTY$CU%b|zqs-T6dE7ub?7z(q*Tb1dpi><7wGw`EUoXeW z|G<5=l)@-Ef8^x#YlL8f$b0uGqx&K;SA8h2cKDE-CCfBPFcB)z8C_Ld593Z7NHo|^ zG#a8L>N4b=o@nb8FZyD0xHFjbkznO}2@x=fg-K_Tt5~8o91Mo|HDN57#_HNjOuho! zMT7674_$!y)$BA7R3&v&@C}9fSpD|;dE2MP;1o9VBvXliTA8aEzjBiRN1M@6 z(cudOJSgLiPRipIfxUGj^r!Q`O3E{2Ajid($8i^ciDH8*_Tl$%TTm9Op+d#^xLhe7f1FrT`u6k7fE-;;Yua|xooFK6TtmHlIKkC%E=&P$RVB2pUkqm6je|?ydG{~WB}d} z=QB0-Q9gWHCml6jE5@$v*9oztUq{krtXEd7*N^Lbn*3R@fObYLj61$#NPBQ-IvrKz z?;7UZS87b(_sEsX7_S!?M!Y|Q(8C0kvY`09eAo*UUZ?;dnR9WW)}R~KEG{^rs@4Rw zBwc{6Pd6LSChna38P+$uPLobyTU+NL^StR3k}7pyxOPY8*+g*bTxp( z@Y0W5jyWo7C7BaeMFXYB;G9g;m5+IdhULKJUF1x#S@2)!J$ldd0EJqs9--dX4U<7# z87QTZA}b6@j_cQ=l90|}-^cy4b=fz$?G0$)5u(>VBvfRKbjh@s;fPo-$xSSCvIv26 zXz9QJ;CKTXaMZ%*rQI({7kt95B6~cYi1fIgyotMFrj?#NYz^$|JnyX%P@(# zq=jn9{o-b~SIZ312oFw!w`R9?3x2o^4u^LFpc9UU#m&%0lt~zQCWatwX*XjwOL6=% zj;Ip-0|)Bt!dY2pdiO8}j4xkdyhQPPS-M}DzUx5pbOL@_%w~e5$V)3M7Yz`PUJp>i zFRf7qF2Ka&9Ga?|@nF^*{{k8;mve;&2h`PgkJDU>YM6oQ3~y6wd}ztS4X^Jkfd!Xg zcBxCBpO9TXju!VIwd)>hUw_0Q{L~lFRDr6a(tBw@6b^=!`22iR9+vrQkVW%1&_D?Y zG)RqHW$Km1xi_qi_btYE`}*v!iCDLr6NzNm9g(<@TeqmK*Z3Tuy9uIpJkDc4+MQWD zNBurU5c1U38>t+;o{{1seg_)vN;(1%Xy9OT_69W2fqMfQNTr`I3JGB~m=G~D=Z>15 z&xj8qhuG*$Rehr{tD}qE`(S?Teq+{78;n!9-*chgr%?7SP@{{IWOKqxq15!K-j0M= z$ev(S#fPZZ|J~9pdLM@%86?DjEBGXst_LLFmEqq&18mMlI;#Q3M^D1iE3E6HY|I2YwzTcGGqkc!YNONW^WEYY@M@A7d3oSk*95l*`9;0nAWU>~tKD zG_A(=4jEi!fU}L+S>BG=4Rd=0CYt?cpU6#OkzWM|GEI>EpNojT7%` z8_+tMGkXNPnP`I|=x#_zWOx>7sn#2<`kdwlk)GhB<+jv-w#4BN`xC0QS%+EmLEAok zy&j(ge*|9dbFEc!sE0y3=lqj$bU!fR(c3cA;}2Tn1M&c=`=O}`E_~5t zHN!CAK`9RT=v+?#d*52FQ=sd~YPGiH665$|QsnWJMPGE{A*KT!n+xCi<6$>5EEYB+tS=SByiGmFha!_7{>X zOy94baHJDsdaF(FEs}&C3m#HSCzhh++SzufnhrwL}~`W{#Y?95kLKfanMQ%f0Kt#(&9<6&mN5hZqV;Zc-$1)Ul&>)6NsP!(N{!-*-w zkk*1G43{~~*2|s#=jHMUVygH~`Mh&svD-6HnH<2_`Tx=kG_q_L4b#pR@Za$aLEiV= ze&CSiH|c(&ommz64Z^31=*vE30r5xf&+=>E0gwy>Uz?^!`%KRfmy57dEY*y6S)A8m z*SG(bw>a*%vH=!9L8_iDlrJJAlHEN_EqvK+qvdvWOj4x8qp4}o`B=WIHFw{nvuy)# zTcY-U1c)T23(>F#vMTtW`nq&o@OsD*@Q_A(e1tmp3;^%4|HR|#pGm@15VH=u#vHI1 zxQfw5+;SA@y9_kLeedp!RRw{|foPr9;<&VXVfD2%CJQU%$_x+vd6 z>pLb4AJKC@bvZN$a-d@$Ud*!|Tcnh4ePc|Uw?fAa0Dd$uuLU#aOIFIHI=e&@@Sr;- zJEXL|u?$-O7t0`?{)khS3xl#R&_>YOui*nHK0%W1s1ntWn~)$j2moe z)IU-)Z|B_@!naX#%4}tru#5Y34gA+HLT?a(9CpUzKSBhu-yi}eCTjmIx%r=t8D6jKkwoRxd4X1?71f5^#1vV{MJ8MN4krAY%YFH3mR&PFIhTnIZLo zN>L0ji#ylNf_;})H!y(fZoJA)UZVEbtNrm*hQjxb@fEUaJ4IEJ4hmBuEQlas@lD2skbB`TnyQr#&qjw*L3F8saf zw^KmV2!vSrLpM#VXt6bRPh|{|$WV?@7-&Bf6cq3S-d#^G=K?X6(Kr$olR;41{e*d( zdBzY(GXS8Te+P=}OSX=A0{f@PDh2IG%W15zO{c>5SHsrg%aK}X1+?ttn#96-dL>#8 zxYyeri*}1$t3m;-(wZE0wJV;l-ST5VngQy?BhqH!tl7+0~(97^H#)at-T5r{S>4=ZirZ z?s%>bLiSHnjUv0p$&49Sa9FG{I;*$Q7TO)s+>aa7JgXS+qjdxz*5?vKVf2@3OwhLb$3@)YBm)08>dGir}! zgp8z9J>*#N7p^;u3MEsS_-HgMyG&^*;=)jp_K$?uDJ0NFVu&CRcDAI^ew)rCg9RZT zQy77QB1G?jR5eJzh>wf=v|Mi)t56_4h>4o&biAMoN^gw$k>_s1&jn^tz5ZkasR!6t zMa3g?|JDZs#2LJGADH#d(mTGDu)1Cpi5T4H-0v~A#xK>Lne-$_W4HK&xnJY$n3l~e zz31xB#;vuQ9}KUsXtK-D(Dpo)xqOO67{2KFmSLZ`oh5dK_I1-q;xZ&RETtkh!!5n} zS~05i*h@!|44ssakWkW-*}QLei{=lvLj^)Sp+JQ_dp)mX&7GT{KLiAjBzks^Pm*SO z5RUV_w&Ei!o^N)8@q;^M!1fBSc?6Ny8+2;k>ux3PxxADf*zH^6#*vI_h-doD416Yyr=lZy#uyW_d_C_MW`y@>6N+=;Q2svQ8(kF%`&`WPH~$kdumGDm)q#KG4BB}(X@FZJ{q5_+ZPd_Q#1UA| z#t)9u7zzq@&+~QG@LLSK@M|0>H=Y5*z_ioJKx(dQNxi%{tH#1NL+_-!_)j=Idj}o2e3YmR z&c$Cs+S$uY!{+R|%bZgbZeKR(7u!5j`@QXI=Z;9wH*~Sbp}U=DM%HT;3dcZ@=*jbpCtme%o;`5y`4D^pun| zidN(%?$TJv<*H?n1*uF2(BsP92fkvfF zekfKhvr^Hwi%e#r*d196knOv38?ZNWEm*A}{CId{?6g)RbY*0^u&$|4D)l&)u{Dr> zvs@)3I?Qr1(lnHkS~C8%nuPboPvOAv{K4@0(5j8zJcg&BXl-kVb@Z1Go^fcR?rk!G> zeD)ux@^+JE6+6et3Av(IDtQAMOb1@=s&?tV0Sy%XFVFx;6@_Yj>G~UJkR#>px=~fY z>AL;aY?P<9Z&ht_O0`&N762XVx#I?xEIE5V3};^I==kHims*uUrx1TyjVJDJw}lVf zKFCMpdm}2lobZ7&O^mr$Y!jY{DxZzVGh%?fqxPD_`Nd3@i$lP|xa%%3wI+v{eMa~V z-JiGU{ezjWH-UiHB^d7^TO2&E+ksg0^x>nB_m4M2Ew3JA?JiN7~yN zG?0nG0ul{M){I=MG7CIPGE@)Vhz9d!3x?@#a2}z0h}RUwg`j@7>Pevzbp8T*#*+S8 zz-Gyjv{are^h?^1=KpvBTt!w68RL0Qd~^@`loHFWZDzEqzT9pY3v_fgcsbSyCsXc_ z+y3Z`KXdWaRI|6ztTddrJ}Z!y^MCOMz#bt|k*JR>gtH8z%X_q9+L?T3`FYbFFMeC8v2lq)R+X~= zfcw^c8q?->&Cs>bXuHkHA@|Vz(t{$C^d!^RZZwKjLz&l6J$B`k;}lE+><}M;kAjTR zsA%epCN;k+Or52q(pa!t!#=*7zI}<+?;q$JRZm(aZ95AafEMa;Rq-eO?3y?@P}#$g zHa;*EZ)6R`8=#5pS+<;Q_MZq`t?}6>jHa;&X_i|cP0%0~V;Chy4M3v@6eL+DCoA(z zvby9fI=wsr9%bn|q}`7qRC3+VN|=l_5Kscu%KBsvzPS#)ygaeVjL{mq?w~A}-Our# zSi2;U1+z!u0(Od^2{KaW)CiImxEvzfg6ihE9Zr`d9;amlh|z~~EBf4ruKrnq^Y3Lf z%LKTT0(!sPb|dgG#p$>m5c5qv7bz4B1tSr0Huc#cHTBzAUhWJ6=?3*cBE)xY*at7^ zZjx9gJWLBrL9? z;-!BeZ?i+1<8^C8cBbfBhZ@Q*1mmZhAiik7hIO=6s=s`*o^P`Qollo*hU1FV+wzZB z+XUKQcDP($q7bmpn1dapDNAz5e`PxUz4xGy`DExN3uE{~OsMF15=Zg8G=_f!$iJKi z@eGLId476}3&7#9Tm}SMfusXHcqHH|$aM*{Voza6D3H%DXzlQ$Rf24Kjp0f0P~X;m z2>K|+M#yYFuWVfm3B(&XtR74z63k=R#l%yh6GuJY3nkON5G}^keaor1T-!&6$Du1g zoV)Adc_|?XE|3J`4eah#N)63jPtRUsMt;JEOc*?#k1bW3t_lg6o3v9~;6`V6t$Dv* zsEq%MZ(ywboCrl!Dpym#x0*r#De#fg!vAl+LC#R3imh44KCX*?UB#4=*YkH(H8$(~ zr_1eIz!FDH92ry)JXXwMmGKM3J`-q7D0Fn{FH=A={{;S=tQ^k3p|;KRw< zfQ)04p>N<2$jPCu$gQD}4aZ~@2J#JZ_4^~I@};m%m+Q-p*E`k)=m-e-?48no0-H&3 zPl5Oe`h8#s1Z#9I|FAzyD=NQ5U&EoNncggn=vOd{?R{TE3OaRjEItmcBiM$*^QbzO z25kM3H_SECY&C_}7Ncw6D8M%k!pzUpn2%XD@0%F}_8i?iTz?ec_dHsl&~FI%sDYVc zOfA_>8C7I*`_l2cd63vdaFo|XvK~}6kMrTg!}KnETk44Ftk|e*3G(ubC)bO>HgQlo zDH40L=dh9MnT|4{+X|!ol0oeDa2Y`ia0%=u7gHcW1TROVU3c3yL`|L}YnYM;u*}hc zqAbT!a#7Y!83nnYz`;$$zrW0FyT0v6@nW)Anc2B!udshzggCpCJVhWtNO1WX?0S3c zD}|^`t3%;<#2OvLx^5N9J0XDVX^~|!yxKtzm?e?9}qammNodcmY2K1NVgo;ToQX&dQV8AAow@@8VrB8T?Y|ZX} zL>vHq-Vwu~)6~)yi7KfKsT5jt?Q@d)ef-WrMM%hxFU(ijqzGQYS`fTjq26 zpYGVrg&d6jC+!D5*j;FK#F`_jV7Ds`h*Jbb2!8>W3rlE%OpLzWagaKsQiPYo9oJtf znBKCE5+YeWuA%R=OjkpYw)!{UyU&vg1>z0Nrds2VSL=vW z*1U=Je|`k}rIz9^s5lFddUVw+xg|sK&pDoyMF9UQpju&?QS=|B1?tCt@CHDYWt+eW z*sB?f&xI(eO{opK(Oaj)3Y+y?6-jgP&7~udJir;<&W!+1H7}|75U@8@qswQ+p}^J6 zz@+BZe7co{Y{#Y-E$*89ySMo5MGi&+ZrB)XME!HXS_8o`bo#^NKk^L>iDkEtPjr-1 zEdIzhPzCZ0l&SJV(tpkP|Es)~O!Td&^()EIpZEr3Xm9FTn5iD=ui3saX~s9*Bc&0K{+i zx^l@IUk`RJrmv-JBwP&J&t+~KJK{ZcYnMxIhtW5S2w?wt<`t`Q=v((0mHn`Cw*R4|5G(6Ctlw!k`gs#jo+i-Lq zZaDt(%zbjCvU)=Gq)LLsx>bjfXcRIRu>1VQwhkm+Pu0x_V&@Bn6DjSv>2%gvB>QR` z$~!oTwB~RJ;u1ytB_g2FIc7G;mbt|lYaUO_Xi)j9mFQ~|?X(R>J7G~7tCuT}QtHXI zxU~|!zJ4-_aEd(AXwQKouiSse_gqp**UIm z#K0!L9G_I~KtCCard4Uo^NBuQM*-f$NKUVp*FL7K#J{Qg$-EPC=6uR>e}Dv-p>|0Qap-LM2b#QiwR8$SU{Zuyh`lFh zc%;lqt$Nukuc_QK&Qu-0&bU&9r~15y ziKNKfMj@Q0T)RcOqC#&^rSs5=G=lAXgD~O7^&5(-^^{fd8;(PzAf_S}V$HVI6L{(*r+fE!V+2t)}dw=i?Xf=$;YHz*Hdt=)ZujmO&1Q4tRD|Kbvl zNNUEDi(25wqS3|4-;9T$E4};}j6`Sod<>1#?wI8gtzO=(Dpld43$Us1VYo#^4{5{I2vy?3F|j67K)pQR z6s~R`$^|}re*L)n)m&W_FpszdmEDbYS)9<&7aGl5&@di_EjVVlYjh;fLxWb=$*d7`UaG~To zZ^~jHtx`zdd-{^E3<##GQxxQ1bX{iLb@uFHzE$*(Q#NH26F3<%P1hr;F4o=}6vf=qg5w1BUhe zCLY767aodAvI}1ex@h;h%Pcmo=lU;jS{j8j{$Xwe{Okd?6hVR7-4AFW2U>(c4J^+p z;^lUCtqA`x`IbSBn1DQPARh4}4PgVr@s$MWA(6`q61n4Xr~?8{9Cw1QI|Ws+O^v3U zwk2Qlas(?Y_)K`Dwh>-9W`Ni;>WJF)8iaH z|46tDMNxTp+b-!stDs}RQJ|=jGD>Gd5wYvg`p=BL0JlrpA)0M5+D?x&k72m#~rQDAeSIg zxLu~1{3syKX{Dpqs>e~P%2x|qSuKmZv>B|8SX`4ap7A^Gv}WK;#m%C&KKi;_#_CzK zOy`#sFfk>Q0Ip3m=9Z#dH#b-?JYDOFYJ?T`RBxP+vO|^R_%tf{kn4c zdQp+Anqv!lS0UC5Of3P($PDl6|10G^1n&61xAzcXv!8uwCF5*9;Jm+u(2=Dr;OnZl^r!@iXk7jL>DsV1R+9_#8@s>Vl)C?iS6- zTzzkIH}`LK(DFy3$2a(#$h(Yhvb0&r1`)*wnZ6+S*JechK#eFEE2Mdn_k#X=BFQ#Z zQ%DkE9htO->vtSkM88Tm^L17mWsoA$b$N}@dk^&zrcm;C-A6o!E_@i*QmM!ZZ$~u%aOug3@rJ5t{ za_VMsOB08$cSqau=096m-$EmwEuoFjpC7tEc$N2>e0TpxFBKY@6Dp*<3S zwVA{G;nLzJ_AF%2-Z>23^2k*tc1<7&XSOG=3#FGF7-9CTbr_J0gDO&NjKF{8wGw@B zk*`*_j?4^Fw|%w*C58NY<5A)XX}w+UbN~*vN%D&NkgFb3HBGT&0{V^Kzp+z-T4J7I z|Jb!wT(x3gc(xR%UQ_D!=_54AOlj)P;^?6s*1=ulD#`Vk4$z|x2y=9O!aGg0XRtm* zqlfHU6ZcSL;hJi0&mKxrp*O;j7rP4enrg61`wE3%oUjtUV zetA-Kjw{T$^NLPOxE7xEe%S25*+9~Lq|UAFAP{35u8sx%dph|(qm(o~dFup1(<#JdOvVm&9*MAQwSBIQbKf-z|URa8h?Rz!<;gK1O85b^qqZD33@Qj*}73kwD&|MSFrw%VPrTke=;MO&jZw`-=H?UC!+ff zQp-p-dcn^sJjHae^7lIy2agzYlS!;Z^qgI=ai#%5kf2cv+wTfO2Wu$$@Y9gDpe~Ek zrCL<|FV;ag%S!3-Ic@iCCCW@c9x=F9L@(fWWt>o}jv}QTajv&IVjMxv>X>szt79EN*tLD~rQBEpzvhT< zf%Y=1jgGq8C2zHyqd>bv?EVA}9si~a_nAft-dvRU>m?CHas$DuhUN3vXXlyIW;Fa@ zf~V;l2m1tsdN24xw~B1tF`TV#$M-N2a7X#6XcNDF!iux_gk`cw+_>0>!{67Q{;=SB z8e76$U0Up+KjkJP&G;vv}Ql0gWe%itEZh?HepI6gV3W+r&#-k(I{LZJQRGXEqc z074*45X0^y>kn*5tMPhV8=w7FmKdr>R!2Dqe^PT=HSB-cZbK?aPpOHl8{%F|Q>#_u z+Y5AKm)LOCa-Q|r7XGA#5ZhoK5)Fzvn0B+uPKgkEmBw13aCp7Fl80y*(}>%&Sb4M$ zbjCMGJjE|;4n1`n3w2Di)J&2@1nktH1_NSPWn}qEehE4D04Lq0h$6o^3 z)hrvXUuD<+WbXYO2)UTFkswT;5be4Xr?GcP6PK-8bEw=%3R)jTY812{4?P|obvm(1 z%j{5N%N%nZBxtW6;9kvD zQ0Nw1H^0hFTUdhCGcK$~h|${hSv2izN{9GZHN<8C&FgX}JH6x3nMAHTkYK9o#=M&e>3nW>d z{UHn=X@%R&TH!dr_J=az=Fn{DgEFt#D+cLDuX&E_#9BO z5ERW?aKh$fyS>(GX2#&91C9hyO6T>dryu?+SrdRSpiymZpBoZrn)!}qHF z7Cqm+PijjbEgfSrv_WvP{b_j91}Ha7udN_Bc$PT?bNP|$)>1TaGq2+jrtXB}^vD}^ z@%fo|r{~$4Ry5Yoz3l7hNa^5UGm>sKutGx5^XDuMuKAI=FaFITY}oxirQ+vVKIJHQ zR$q)B_JYN2o}$|{36yRq5GGY_o>Aw;&qomUj7l9Ph-w$lWrg-N0RJ?fF|Xew1+(su zAWNnzlbSUGEJZZoClgA%X9BCamO5SiX_PeHMCQ_Z~r#_Bd8_0=mVrOgIPYJ83g{?;c-u&LJ%I zI!}<>EZtuInoP<1f$}dWj=S?gquH+AtCp@^<7?l07t>QPKMCg5bB}7Sn#*MpCuI+N z#WDZ0&O<>Ol4B=~5&UMVMay{pv4XsoX(<|DU-51~zM1MZcsYb?G4v9?G(mw%J&!V9 zL$ns&9w6xl)Fgs;6MZn-p+sV;2B%?^@d=xnKwHfVvpN^pHS|-<`O9|TcfI0*ubQ}7 z9X?4K_t(Br{ip7QqYxTAPTC!^NBV$Yb+avrH{A>y-uTeUZxP|=okt!9Xncf7b$|P{ z$z}vjQ?^NO=68X0gMqU2m8n+Y#>LKyEI0I*S~&sk=bdiK7ot7LUzhaqzy0V1e6N|C zCAQ;D&YK^GWmNVSDthi|3hBMuK|qY_lhkFet8st19$@$q3hH6JM-$3rnEC68|NTqW zmp5ky{OHoaKWXB3Zz8tGUMSaZE4ALDB>XoK8}d`huL0D*Rc`J#5j(RZXMbj_O0hVyzK-rCR;M15EcQq(euz!dD=oTN z&_j3cjf56Qk>!nk;Ms3mJId1v{qi}3HPhXA@8l{y8GC;-?drek0~K+AqgXsvwd(hI_(BRVwS*%`=qMz9PSXQk(*Jd%kvVt=!T4Cafz2e}(sS)y+=zUm1@= zc2Fx(x#Rm+_xIl3+gz$T9=&5xowi& zRHdK|tHvXr{>xo-R{if2F%yaXQ@PpS`ZsASUa%WhAL-Z~;mD=Xd#$DmZ5dZ?dlX#m zbCSs;fdGcx$Dgn6TsmsDj1TZwp|-Ksqbkp*L78Od?Pin3)IXhbDrXu^ z|H^RL6IynTPhcOx!+(1XQF!qv1+@)r_Pm8 zDB<;*=FaIjb3L)q5EpE$dbftZw%=1or*m4NaP`SF;b?QW-<_9v>rFP)OiJv{?hQTX z5`M}5iiLv4Y-GFl>|QwCtOa48f~%cDW^UeD!Sjp=G|C+as!~dIlBI8~{NPIR5wGov z#LmtRxGv@JUy$XX&!J9@}s?6yR4uV={Xodtk8$>UnV1TRoM@zB9U8fHJ{a z0MYScLP^HNG{LtDK*?V-63i?d5T&}?gX!rLL=}@P(-B@_Lc(cr5OH!ss~-+q9O~ss zaq8}2KlHGman0kXtXIorKOS%XR`>aZZ~{wZnzlqr$+W3YD*p$lP&o&B05BU(t@%_^@VCR zXyCAThNVvR)~mrd8Z0SB&w>lbv(|LQN)>_K5I2i`GhOVCN1OHTxLr;~C20JPT%1*c zd$o)X_SpgtOy>e+>UC9S2jlfex7)4OlAfp)?9MQq74m49wnH8d2sl2`?e7ttY;>|c z(Udk!BrQwyQq_kX4<;LQ-{6TSyJf10n(*!{@o>ncz2R6#>7nHmWtfboL znd~;w$;4|L$G*D{+s$OeZ6^E*94Plj55Q<}t~1Z2NX_Wj(3m4_gT*TR^G>@c8(!iW z;Qui8)?ra~?f&>9k}4obNJ~q1x1_+(3^0^*mq-gpDKMmTmw?pJ0}S2L9nu{`O2ZJ} z@jbuup7-&b=emCXz=mtjwPx?V_FDHR?)x4aZVc5PuSjD^b{WnTM^+)6v}>LDdM5fb zE&5`f@0)=44`299edVoDdZ$iSQ}j15aX9(-*il>_;{99%Mi=wsnyqiNv*KHo#O2^c z-B$0APA>3G*{GFwf5v61k4|?<)~1)Z+uHX|aWJ#}auK+w>g)^J)+M|U%~giLr$-k| z-<8#ScQPoGB?8_u#e%b5c6_BGrm=s>%!OG9{U0wiD17()%31MzJdH_oXQ!x!UOx2o&*ODSbGYD)hLS!5Xn zli||n*sotB5Z!2{f^TK(iP-eXTpWhCsc6N-7N-Y|Q5lRSB<5YJKS@p!v(Vd}9G|@@ zWM3Q{ID}h(D;+mAw8~fQS$PzBvPuV^-PW(@@6W;dp8XogZP*fo?`zAEnw3}%&0Sfn z8jv(LdbQ8=^L0PrIQbwb?*AZh<#JEH9?tJRt~D{z?%Sv=!JJ8fU#Z-y##JV0Gw|7M z)XRE~>2w?lR97?PN?6W$+=$0KQ&tj+z36jZ>sG=wdInk+y~Dx#aIx~G!5Hkhbu}$c zMHa-0hvL+XcvKUYWZ`B}%|J}7LmMcQ{-n-w^;@Wtcnh|DZ~jjg-hzulQ){P&+EcxApFT!7QY)K)bc-tD-#4V|nZ&@ATBS`9tp9c#z;BzPfJr)Eb?9t7_EYfU&Hn_Al)Tbd&OZ_YhE* zulzdExxPzdy{gZXW#gp#U?rO*=OZ)!{_Z99Wsv*35%%i?y_k|z4__)eMnm4fWFq7W znRWuBG%7gy)b{F(K+0tTHWe!9N?Hdl`4%2?VG}8umUALc!0`7-Du68L(`lp&>GcSW zhLNobxrk{OUF``eQ=-!Jw?xL9lY`~&SZf=yx^bXza%eTm&H7XSFO7{NOWvEZ-w6X4 zBIWZq-ZD3t4-8a+(rRqyDY41;hUsA`{a!6_aQ0W~H?y*p-U_f}YgW$_EvA#>IFE;r zu3%67X7R^g61~Nl@nHjC#49{8WI0-!y$L_7rI{=et_s-_eru-f2Df!#nXp>W;8)l0 zNAu5r>gn~MyfyI9{6)&H`uz+Np((g5OM zQbn>c!@c5cS6fQ^Ev61uS;nI+An4suh5)Bg@b~#cuTf0%wCVeB!q(eYL}Ek%tn1;N zxd+-2^*|kQc{8{#;do=#0vWNxj3D)@C^|No#S4tG?bu84(6}TYhh+_ezox443%iCj zFKlZy7koBWmc)`DrmQS6OWY#FX_?85;t_mutk%P_nUyN5sdfFXov8`eH#U^B;~PaG zX{j(l(AYrLx{?^5;7n1I}&};qq^XWFAbNW;M2FebI@t&vzN~WNdobzs#(5 zt9E+(?{x+hvTa|~-|(x|j^wrdbkc3cUov&cUrY8S6}Ln|4+k4H)w5>e5wrLTXS%OK>@R^U0@1Z4Ec8vq z1Y86rLmLvW3HY{TT^cmnB{dD~dFR6IG72ndKno97aSDKD^U{x#Gz^T4b))Z?6IXT8 zE-3IEt<(vqX)=4R#);kC5H$tJ+$xXDE(V2WlvDPxz;z}%fe`Y*X2_t!^Iu{iggv26#ble zbpY<*m=9vV(S7fcRHNXqAPuZ-{oOR88Qw7rog%Fo$YX~W~Pg^KY>X}`8 zpPq?y+n%VLHeMcBQH5FTX;c3I3XP~BpEtxbq^RgSf?L&N=EKfJn`tb`3%B93IEGff zRFohP@oP|Ohv~=sZ*+atjzUyrkdYb&Lg})%A=-eVBvvz6eS;pj{tswa{|IYgGVwKZn1s)#T!oC*%hPh@5;{jUAiNPxEXIhoKs(ZY4xx~FDf%O2Pwu#0LUX+f4o z@cWeNTMhd`p(eygQe^E|a#~?(()6Opn;b|4JgTS?#=8qn9Z7g8c5zoor)My?e+sb> zpBo{R#^NbB-&~yYcehM*6PR&NuUE8{yiv7ku{hyF*IfE*UPw=fMnSi<>^&d*W&jAg zC_k02NIUCEDspxt5^irU&waTA8pEalN=Hv?kJSYkZD!&$;zvX3FBPhEzi$F;GxBHj z*lOQ+U-s@`)xDgVZmNXUEY@~`s-sFqOdE&W<*w9zX~%&Yi%LqvO`|ej5b`uN?ddlL zX8Gsghb4PA8!kY?v!PMpvrPL!V?IE`UuRy^EmIn$G+%qV5qhQ;yHAREDDQ*n*KyoE zCG@tnW{={g-jshwXdwC!U(oE9qo8PaK)SB(6o$+b3@kT~8ul1`mz(%JNI2`n^0V3t ztr_RLJ1FcsqhY1m6wb+g0l`lumOt|Pv}{nK9&>2#YO;8q{5;|Q2K)=o{*A-Xj1f?+ z_iVOqRQR;@-hh=(!y%yT@@UBhzQk)2Zc}nFbvH^n(AVO-VSj)rgWEIW{rP$AU7OeHvgr|)Wo|h z??X~oMKiBW0OQ8T$<2Ow1J=d-!`gy7ANP(zDd`t8tZJr$ZVB)1MaWUdIEFn*UExs( zD!yq2Z}uSh2)?2CqVSitTm>j`upV^qW@1#i%lN)#3@S*+j$u#U7)n8pT*H-a#ww)O zZUmo~&AW5H$;-5xk7|#C)g%;Q=3P!#aIHs9CG%M>)-KS(Udc{;B62R?3Vs?!G&5~m zYO#MVY?CsW1QZbXN-5#R|w&LZ$eq4nJVE}FKvOTI+WI{o%ev|GQ*B{LD ztvHsTAGkbMnfFue6VwYP&8R7W99lFo!6Yqv-!>rkS2Fhm&$q!f=I<=hw*A9>{6K?h zaZh4@&%=k51OjP+@?L@J`!7r$3*Z>>$I4>9UM#QqzcSSz;IBDK%(~ww$3Z-WoGz^R zOHc{f-KVO^BD?HhVedbi)}4)AqnMYElMtZ4?VBC{0bw)nccrf)z7WxSbM ziOy9gqu!(_q|= zn`bPBn?8XV#ptsN-V7GVK<~Wgvg{65a@w)tjeI=b%QeS@6Tsj}* zXY^@HPmsT7&z7*~zVpk;6ScUh)QuuuVB;mHTQy-njCI<{l@Z$K(^I^;Bbk0lVF{j^Q5r zz*R$*fL+E{dp_|jaj>wJ-IMuNV%YP~5Q4oOp)qe{GnoLR7tLRIcblyM98EVIX|oId zKQQq`<=^FX#Z1^i-maS*#Onrmh@A<3SpAG-y63uj_ZDiu9JEY$!;v|J3ENp8uF|ca z@fdzHO)fPmDWQbtk~0q)+P&wcI`AJaI$6D2KnnZH|a_X-}o}aTP7b7`CcZJ zu6Z?f-RxN$N*nIy3Kmr$YiAq#2l&v{w}@wX`@P9~5YbH2PymoL*OiN2Y@eiIu%Mqn} zthUt6Q9-G4%_wvHiRqlbO&5!=6tsnon74QQ%;sPlGzUVw?t|v`PBf6X>y&;{3_Jf~g8NmFM6X5bn{=wbgYSQ5sY|B3KvLRU3O}j;=>&`4V^kSa5C8AF z3;*&|D`XG;Haxq2+yBR+ySZ5PFc`I%SlMi+1_28{Gw=^a^uMTaI<4GU5&gaGl+#MlUeSNLfL8(i zN}ss8nU88$2mgth?hiw9*Y8mV9RG>jX68V0*9n(%&X#{pivLdO*pxv&R-pikx_>$$ zAqhD~zmJ39KNhln|63zSZ>!S($EowXko9IWe>%xO%?u$tXZG*Q43DJHEO`EDa(qH{ z#6&?0Hw{x!7wGC+e9ah3n&zID{$wQR|9(~wmPZmtfANSfGM4XItgQUg_00q!uWwH( z!|V^`;NS6@feunafUx-CsQj-t>%VTIv)J#~kaALp;U6xq&5d5|UH09ca2}ccu@SX2 zXT{9UN2~K?z4BM|o2D%vEq{+C`4-djrtYuwVruHOm+&jzKz&1}F3M&7uk8IbkZQ0< zDmpH&Z-Fr^H1sa5zviKTT+d?NNUz?R@^2T0T=bD|&~{0!&jTuJi14)!_WYPT6+3$)v zTx@)3>L+7bWgx!EqV?-Pk6S`m>K!;nK~$SN>@BqWaU-wV>e4t}U2XBM)GY~qX28hQhn z(z)95+r_XkG5=ClWx%ZL@=V_XFYjbLbam25$0$c@HTA175%TU;15H(b8^} z?@|PJaZu5ra@azbnuXEpy+^H5@5g0PYwf{UFOEJ{SM%Vntw(&?J~Vn^?0^1fZF9D- z4=dN1}b+;bd(K=>r!7H zw@Hj;YYTK`;Yhm?3y?3L(c+Y)SnZWmP&~McjoF;t9b>}-Yc^2#4bG^@=bL7=%6C_T z{5)EpWf8S2r~-Q06O7l|`kjyyo{kCH*XV!awbM zD~dmo!Ra>tEIlIIPk_utg=Y@8mBImiIXsoJB~%DX*6Mpgt`Uc?Y>3+``RwCy*68U3 z|DoHS+0ojA$o@-Q>vTYU<|1~%us5kkfa=jqWYNTDa&XELI4vH`m!^i>5s}Op23ld;y zJqr+W0Ik2PgItU22Z<011<B#bxyVtbywwlv zO`~yedvBO7QbR(mnZ@T?d$CRbCK;5SUr1*l{(An{QcXzw07j3_CczkMzb)%^8VEvUfA=&RDE=vHQ?)jmy0S+}AzBDGqy8zH7eo z#N5h!7Cv`G(6iWrbNRC(G(5bkAhLw(W0#EmQVpo9_OA~+v)#I3ZhO;YZ)si`DTq4VD8@TH+|xSmtWdfR za^TmiV>VIZg}u7GJ@mplVI@rHm>#av##(N{U;S}cN(H)Oy9Hf7&*>#;^t=6wqIUsT zz-3*$!Hwx=;aZ@El9ORX|DE@&hP!Wk!5)3nl^quYbOfzyL9pl6)dDl3Aaq0dzR@4RhRd8#VCS- zWfiTsP%AZx_K16;{E6@Uc5BETOZWrAfWU+2_1|9)WK_Y2+^7jZc)>pG)2?apM`elX zI?}>m^&OoP^V6*$i(MCJ6DCk5JTi>C(?B6Y-mS7m?NYwB-t+Lx2(~prCMpIPj1Gr z@pLmuyQkf_m8<<&UhFPKG)|=gWMuQ8F7IyIergu6sr{qIYSe9<3JQ1Tw?vR z%*VpYzwQp2MZW!xjtG1u;KF$1yy2jrS0)AhtO0$dcn&!_3qT{C)T}DU#RKK z{~DIdlronQBt=>gN=i}WFZ)cX&GVUM-p#FY)+;`%Xkt>5sXS38O%|tK3k?$^qE6J< zP5Nrz>6UTzlIFrmvbbvt#wxWt1!CnHFfH=3908#QMzDpxNlXU*tZRX?M{{X^xW z$X4LMz=&=$oaPby!iMnpiCyop zs%ff5vb~yBBNXX`lXfZ?$Ul8w$qLuvMsQ75JuLax8H%O{Q%7U#= zvTJ1zkY%9d=N|?8B&VoXwkbaGtoBMORTjGr6`v_jY2??uWgDwv3QZuQnvazXKoup! zF!_;pr0@w*Fe}_^T9#0ki{7J}q-ydOtr98nbU||am3RuEZ!$el2a*IV+ms!|D`gBk>MM{6X`THD1qF9;VuWBy1 zz35*MK^9MqrChpXJF(B1QCcVdt;BxtpV)`_>nBZFoSw=*R>c4LGn@Oj^Na+7vi;u> z@Q?7FPA%v6psyWqka79{d5#(h5@eJ-(+P0>H{AZ?;JX?UGcgkgVEl1E{(ai_XTQhz zT+$}=Z=ChVf!6EaJ7Q>~x7+p;@<{1FDAa$SOd$7(8DL`G&)KT)EO7?sN3FG+mO@6D zi4eU{J3FD=Ic%$pV1#U98dQ&ILzUip|f?A+c+Uc zNx$6Gh_7k89gZAdJKugw*3`Y4`GuB9D4-dV*y3@IJx|;Mo_y*8wOoJTCpH4iC9i|W zRs}2FurAosLiQt`>1QCDZ1xoi-z=O9)a;1iOqolttaI}ZdgC$HmDf8K&hUCZhb`S= z;6LUb ztBP%10~N(4NNzId(cR4qdjKfg%9!X(f{& z4Ld-r5vRRU^Gm<>^9fDwo0J*O?fGaI=38B%tekv=up8WD?hH}sx@~!ODE88A&+Fap zc*tzC>(h^9S0)SfyT6gin7UP^^_YEEw_Mt1$3s3Y`zzEBJEO8qz^V$@UWQW8bv087 zI|rLUWZGvUwz*gOUCnH1Gw%ip_zGA#zw-%u9EKec5A*jP;c1Kby@Dd_Q@#?>EM)$9%E0xN;Qr6rsWTq; z1ub$3qR$o5K4UO|{4-L~o*FFsr6;|r|#bt-o;@qyyoV3IU%;mA z+O2v%c)SJ`+uPC3=65t?vjy$UoMH^yq@gw7Z9LctoBsSor;~hIdtGk9m-6&=$J>iO zR|SBgWY;~Qz!!T4BuDUcxrI9^%@}}7b=HWmxT?XF^S0&2f!yL_0R7D7UI$TXX7LB6 zf_*5uTT`pEEgNOZlH;VW)x>_Q))|VmCgASXN*3M9znn%OrUw6P}w=kMe-DmNmj2a7?*)#a9~Yrqp+!zh4pvuVGrueEA8a#5=PAO@bu%2I>oJbgoxoRar>JpzgoBe-VhACw|gfJbDwWGeIyk(lXrVA zciS3O)l;kV8onAB?{s_XwAC^J6}USm3m!()6&23B+jp(5{56mi(P;MIV=T4!d1w__ z0&$@guU*%%PrdWsN=+AO!j`yOCg8cfY8|Rm3HnbeGGJNg5&9g*HrXqEBNZHq#mK+B zgebV2@!?ay+75jai7Vez!rnA`xVcKNGdy}Ju?h^PSh5Socgre5+6O7U_R+qD(RVEz ziA#q!=`Oi0XW6@wah+JA@;ikgi&A{@(s1P1IfL^(M-oe&7o*sM-sTc=k*UEq;@Hai zsv|enM9E#|OHwAWv38@`^k-;J_HC3~4<5}YGh4GI-HRhO9J+dB%{~wIB70Zk0Swg3GZ~={ zhF?Inwt4Pl!n1WwB9587ozG?zhrPx(NCdraU$qdgRtJ<*^(^pCjcMt+hqR^hm$_8v z&wR`(YtI0if7qzI7Ho2a6nSueAh}?>8=USbiz@6Q6`?Vm&Z^u)q*zayyt-LNc<5h; zO0-0Oicv>0WCVNSUO-d`sdHj917QVB`S$Tz{+%#h=UNADw#uDcf&Hg?`(k~AS-6m3 z{hAW$MblfE{I>l)jxV+hJwJ3EP4sqZ?h!BB- zY0A_l@*Z8>pGcH?J*X-~fuHAW8FLq8g-%VaF4nN6dQgR!k@-uSZm6H(&BzSRY`mC# zBu(j~8k}HnpMK{NTy{6Sl{;JfFhs*G22RcssWj}0|NjUXWf6Jfxl4fm9nrZA=iK#O zqv=7-&oj;PoXv(q-V?_f5?;f8OVgn*s^Qk2D9q?KbLSIZXwZF4E}|jE*2AYeH%CL2 zcS+&u-owAFSOa5wg2}EY3p*GI^;>+gNs5TM&cafl3}OWm;F}>4vpYtP(Am?fdOA=S zplsA@A;_A}RL^rqLxyTTOvQ{+GAPkdd4BHvZk7JFv;rz?ogg;Iirp=`acOOM@f_#B%KYO)9R{l z%(z+G3!z#;HuX9?5JHJ_g5f&(UL|qY5uM_JOWhsVIK~_u4|fFK38KgdYCJ8)ZY^Wo z=BfSAYCWbi+vt<#P`c!co|k&-aWyJ_+Cj=rB+nK!my;7Jq`plP(H6&^Nb{EXMPzqe zvqc)n&SANdvb9X#@y2cj@^miLZSpe<&=M*|zQ2(X4b)aD2<2J5+Qk5O_wH&Y)^pp^ zPnYRC(a{@sg>;=3%*gz_IFjhF#L}KsI}rKMnWD*9;eM{6nIA+>9Dgz_U$#mb=6SK1 z#N%>ug@-I)hOBLQj84jHZ+=BEDZkWoy*v~MGHVF4p3*EudKe$LoDxu?XUYu2DRRg* z=k^Jenjxl(n_);7-|edzHCax=1yi$;6e#6+le1nh09pJPB3A;WaNgK?L@rwKRLuJs zXCUa|z7x=pi4kMg1s!guzPj!eGSy48>A%wE449#%!P_`YEa%L5$v$mD!+>-e3Wu!2 zt07#Cx!v4~L7`RydmFT*?(NuY$~QcJYY@kJJVYt(lJ$U z5dLu10>`u_(NhJ@*T!>lvYf`1gRtimQ9Un1Vb~}!_*7=a!N`s?Vqgivu`&`zzfDHG z_kr0&3dj&IQJ)+&t?H}$5*B2?0yUJJPc29=dq z{A>tHi-}FN4NlA!e-TNa4*DoG<(xoW?aahQs!mfcOF3(A2YE_C*PAX?K5s13wY2=4 zak~AYNN>g@`B!U(oZ$HFXoFMg8t_g=mtYLUHe1zA$|Dy{l0{^=vJ5FS(Vm}Q?%Gle zmtdh;c)N2BEhsSj9QF$OOurRT*LUJHuU|Tg{a!(qIjJeCSK)_K}PXXeaJHyrI_$Y&osKD=F;-h+uO*1A;k=D`zJ&YL~^zQ}+@w zQXI>GI~N+J&!)i^DFx_KhLK=fb(cXTLmcjWO{Jf8fq*I>{u?JD4;EsOm@DDb!eOpH zgaldB!mVB8y*#r({68E(muk(CC27bk~ zZ6&X5vsx5zWaXr)QnUFSFY%rbAvRc%*%P$*VtvgtqFW!EILUy>Bjnr#KFOsSpPFh5 zg+LNdb!HT6>A(?!Axbt(1b^y8L#ljyCXQE3S&7FAO>gYvAM<1(T zSwL@vigmx~Uz~)@w{aIZJ*`xkil(EONYxVEV?>zuzVlwZ3b#Pf|I(yCaviS7VRy&f1oR$c&V+ zf9a&3ApTTmZgauu!qz5%_TjE#XAdPLRuC`fUgT7J5~4|*C$}7k^}?}pNi4@Q_7m7t zY>Va1z@vTc>WfpSKwlrWk|{$KC22sIyd?l2)5Y|9Gb4I>Y}N!Yb*Ue}c48}}LrJ+?# zE6cQ6gk@STGmEAKu^3NvXDE~neNYd9(OeY0wm1s3H5NGX13n4_hks`d^}V{6cuwI< zgiU%yHXvS`%fh_d@I4vXtCCn&+roX=)tL3^6kF*d#*P9{|tIBwP%G z|2jQonE*^-aSX)?0^ElDio0&dwIs5A*;yFln2eL?aS~PE$?xSjq%n`=7w|OF_bjIi z*k50WsHhB&zSP-W!zo=$3#YQ_OLPaRhD^a}Hf9TN)+~zxXHV*mh>2U&@W5{(SaKG$ zptd1lB}`aj$9OtYZsim8mKRL);vktqQr+vr^^2dfhlO4G!SF?i77ifjIz&41ZGpkm z8szS{Q8}XKMVfzmO0$kEE5$b$Sk@j&rDhghq;1p{5Se@%oxkJ%uvbuSo>Bs8D!V>T zK|yQ$PAgKma?N#Y{qj?c%}Dm%Hwha1A&<|l@NPkub9+ZJxyvazIz;7kq1U1}mf~}PP6fFCSpZy7$ zw7=}-@Z;kZijj_LhyW4W-J5$Ce+Qyh-K0(US{j$aZdv4F?p2kb)8n&_HmSUbn7oNS zdZ}wZxx|)z2Jn0?h{`6$8qnzBAXRsGH`*l2@&ZGdtqF&s0u$AWKD7CX0)?=L9Mw_X+WnOk5bcV2lyHBnDs%nY#^_q1jXjU@B8tMvKF4yN15eX{6tCLncP zdzVd}2VT6tG;okp}g?g&L7TQKxE|bW$_WV zH-tS52|Brf@}TW+T?Hpt&k|S8amnxs4zi1mv8=7SQj=daju`~j)$I#NvBr~1JrA|lcjl$O+s9NI&jsl%a&7xPxA{|9cM4iyGl@;#4pK%a zkZ^n0w7N}y%T0mK$YM05)^I1jpXS~Jvdz1* zdyj+$+#h&{iflYt7yj^S z&YNO;SuUe%mR}zDORY!wZW>U=yt`fHSLah1&d;w;fxA76wTlzjt#y>R#i=0?{OK&l zwpPYhL}oiN95iTx)Bz&(i)$nP4ucsVZ7*-z=G5Et#H)RtaefOtYO;=xwt zmyTZ(82F-QBS=(}-Qn(Dhv7;l9oM>Ht+h|%3KtxLc_SYuGI4p97FAqZU&Cq#)RYz= zJy98^;=8*fS37zBsRgdv9|MafjyexKMD3%d#9aE;O1RRLEgu;pYllB)fgZf%H>F`` z=uslCv-j$&Ybv#MlRwpaEwy`;`0fH%{I;~RSf6!Wue<0mhPz@q(j=<@^o>Yzo&Lrm zF;^H>wPsds6cmBB0K%F!)*83_cG@V+2*xa8`3Q$6rCB7X8lG#GjjDXsH%QZ}(W2Iw zx9RWy5$~lyHQsZ}IG-^upm^-h5z%b(#1V%7PGY}5JW+ON_tGennthnW^pWPY&GzMy z$uX_ddI51O4@y6MrC)ywP412^3ti?!1>;g&+bKs{4u@fAH-t)@7csxpY*CsW*ega8 zI8MuuI8{}5C}2@yb&n@a^$=ZZf9=1eTjp^QDw6GMOD?Kl8WzbzWYy?@)zz`rEXk+(ALrbccT1H9n(^aZCzcP1vWsTM|qsr zh|Kn{=pW&q^OTpOLY&eLmguX^&z1dMaoX3Z_`KA=un`q*Nw$2rPc0n@J}j}@MAE+< z*DkMO|Y+`&!4*bHlQrDtZvRD0*6i-*pa2LpZf2)E>(hCNO=rI}uV{mjQJMty9y z34}H=otnB%+_`uK5RUXZnK=|dk{F?&QokwhAvnDF9H#6!sJl7j$J*61I+ywPR|faL zbSpyV;;{MzdSShL_#L8Mtzm?hkH74_YDIFjD=>-F>$=XLWTF6`x=qKf0SAKAG%h7; zDOrBNhT+1xYK^%klN9RPS}~0|!*3DL#3Jofb|W>l{uo`wq9pc|cc(!0VR;{kG zW}0|H0UK6Mi+2Z|Eg8c+98|ScnmOu=ss{sZhqZPywN9CK#)}$Y#eO*nG%k+fvP2Q# zq_rBWj4JwfZn7+;I)u;C?dnOSXq+hA-cDXz97azI&kc9i0wLVBmQVKirt7Z>`5?7a z2qf=PB1l9)HP~Wgf*@^FUOe1KW4AMux0n`2bC@F3ih~8sG0NNT?s)yZBAt%KK zyOzEDgXI6wo{(CIB-WJ|#)|S4*QiFsrF0114;HvC25_}I_R6$2wQ9O1U`_Or1PwL zOT^TyOmoh`WS`uSg`%XQfk+!TDN2!Hr+z7AQ!hfQx}B=ST9efZb?a(xVgH-s#%~$b znhA&od5APc{!$|rmaR?YCSpaK{1N+ZhxrvBF;~A5kT8<)a&)3F$~f-3RvYJa6@2>q zQ(ZKN3T0ir;GE9rr^}H1rbO?MDKl}b_|KoL)?azvV61lWgXcjuH}A;sUtiip=% zkj$b@UzkF8SVe;Cmp@fqMa55vru6i{jvKcTlEeb~;3&Xq1a3`wm1gjy^daDVym_%W5| zM7rE%pQ_2(MD?Iwxqen>ynxPzNb{r1mhdot;~0+CZzP$KL8C{9NlKHf$Uv(8G)PUK z3~2#exa*_z6mW1jA@$e?yKoG*JMajsM_tyfB+mE;AkBt?eNO$ah01Yg4|&h!?!1WJ z6x{xt#{JW!qma$}n~?Yn!kVkGBV;AQ)tjyI#U9QS2^pH#$;ojttFNz5%uf2Mqis@* zq@C%Vbo+^neSe9!TwnO-+Z)0x;Zbvqm+$IlO0}&qT+LN5E{<4h($VOg^Y9hK{fTNt zKb~e7QC#1>jgm(ICEwcrDpDSg_Xwt%i1(ud*4N+v2B(-LK+*8Y6zpwWT0KU7p)q^uPrhx5 zyFt6;(}P|?Lcje~1Z)}yMZc!wyLy~@i93aito#ZBtvWV6-Fy#fciFPDX!pDcj#x3+ zAo(b;ZKg>%TZJw6EDMt=3%x!j`P1m=`D~L-q>X^ZT(kAcp4ElbpeH#KQy=Ej`5^2) ze?G4=kcZ?^OVH5$joX0B+7(`Pxv?93vhy30NBc}K)!VlxC@tmzkrSh<>i{n?T-+-@ z`@l#tV5&F^SmgTwUA;7l>~jTC50sP6$4RMf&u7gDkXlkV)XOOcs`^64>9()t;=g30 z0Hh3O5Fr#fWZW9~TR75VEC0O1b^i9M?#OB(r&Bt~Y(l48(vVDE;u38EJ|%F@(9(n{ z^fP7ld>uou*{7_JWhe=$q}SKav}bl_&2Bj##&j1evvvP{Ye4P}*`-*c8l|OSTe}?l zvqoGWoZmbw<&7d6{h(MdL6=hS7D)f7n~!f(3q{jK#BteHu_7EZh) zKhXmy`8B}dTIqAi?^@4kyxnXXqU2EC;nHo_mXb4H4l#>QNV}ezL$Db%~$Ul+evxtAdXX>W(UuB zX874xNrDGKoZB%3h1OBQRBm3(VYfbI{?LHb8oOK*ugqw(ZV2@7>+F!`Pioq8n$O}~ z6E$PyloMI9cUu{i_i@A(HWvdw`YXCF6_czOKHTdIHc!w<9w9xXuH>%vb!84V?rSQP z1i#px-W__OA-;32n`*Q$fNHL`wn?V3p&@Vi(<)}nUsrl- zEe)%62^Qi;F2ZN0PQ~u;lLfXlU+jx>QR8?hq?f~|GGY@F!tNi-(X1&8`rWLOO)Tze z_Bt#cVlG;*#a$zDGBQ!R&uO%cN*;$wvWcA0xar+V6opu5SMVv+9Tw-ki%-K5g6zC4 zuniv`{_PlUxqZ)|5`I4G=Ti3ZK15(N+k{po1I+1*6x~hEi@Pmbot90k7rqItndS{~ zwJKzb{0($1^QkopwLq~NNFvY0Z|Iu70Omk~>*I};?S`XN*gsizYYn-+v()3%* z1N|eypk3S=I(@o7FTZbxQLGW^sgVlrGtj0YQ~hK&eom}?PJK*R3!%Th;^iGOGh+>u znj;)5^*T-DSKr^Ml!j8{%h;D_574}xe<(Qhajev`Rnr?VKNwr%Ek>xr}{ZCio!TuFcKc#wd$TBc_+oX1B+ zHVCL89v%sf69?5ZOp<`RFCH&himEKLiF9tpCV{LyiER4j-~T&evN0=!W5%urx@l5Pmf?%qtA7t%jrl_?)v8ePb0El!pOGYYA2?b7Sl!#sVRKub> zkR};{TwNrY$`rnt+xhtK(NaLw?qel>sBo1q?O6ks7%pM79|jvh>$gKGn}2S zhfHTkO1kIWM9-80{$sORo1c?gw+>tDTImn3=~JQV(WZ9z8~ne4{Y(2MH`~kBR8Mr5DXxiVw8fGS6t~-81-n$R5-ABPr`k%quw19mM`P1g-7T02!l$Xy{4nQF*F43Xc ziDB`<);qnZo%CxjfUXv?(Xg$+}+*Xf;7_D?aa(K^CsUr_x`=lbABAUn^Se_ zoT}P;t+n^w?Dfj&2sB#CH=E|WK4!&b*3zXJcv{rp%mt7k_nlI^t9OAyC9pT8sAgW}!g?JqoPNw+J zFP6GLS!jjQ1o|g$2|>1nFbXAh6ohZh#P=ti2Tn~Hzc%+kr$97t=&-eVMpco)C4rbY z!T_&M{a0Vlb8PLk{>1AEDzuS4to|yp`c`_v^@ma|o-?PySVs5#w5oPQ8Stb*e5<~w zJnEG6z$=A+T5dS!HH*guIO2tex_pwh8uJGpL&oxm)(W?~o#820>K8r_H{X>%Vt_uq zfp9W+-N?qg`DeImLpj;jQ2c>mP=nIj?aB~_kCE7#e3e-Y2Mt6mg=EH>M*?O}B_o{m zIrdI@BSX|ppA%g|Tl*=aizH3PnBO4+9(L(rm6#!Dk-a`^rdPFE$NsVx=WQ9!;*9_@ zNA^Vq`K07~$Mvm!Bdi}7|JXu38z3KB-`J8pVuHh}TH2r}Z+eu!Qc8W8PGX~^L*$q0 zcVr@f=qLkX{2xlf zKN|e!pAsTq4{7jg)qiu4e!%m6%U*!DMFPD0dqpQ71Sv6i{V;4*OZjsl{#Sz=Z$I+M zpS*1hyC z0Sl$U%F`bq2RlM5Xn`sJMHR}I1(^y*qsJcv!*q%Gqw*PL<8<{yhC5IeoO`9R&Sox` z)EeIbLrZ%l(sq-}cswJhb_Nw3L{J{aC)m*!7{n8Da&lsE99Slv`40K#wasfbWkG=+ z`k4ze$cE;%K<@U21(U5U6_g}(tbwtCPtG_N!sG=qKpn=~kH7q_J zw=-0p$4e*oo70XUbhB{SRyyPMoan}cP{@^b6@qj)3#n$}vC5|uLQmeN=c zquhe+Y1uUaeF68pR048gi1`@4lINITl5gP?^Uxz^t&JV`S+>S{RY4&?t8Oqu)$c$4 z{0>aGPh8Dm1T(MVE55wX$ovAY4Z)hH*qxWe$By;P+otCrbzox#|4kkXv$dV6eC*v#}|C-9(IIH3JSJd+#Gp_LZ z7fv;nFtFOjG9~nAK3&XsB-vU;xA)v1sAjQFAoL&Bx%HA0Q7KWG%sSp}TOzO-re+O1V_b;E zQeP( zL@*lVN3AAgcquaOwX$bmTeSB0vaQ(d=M>Ujtd;V2{!2(?r`C5mkwtX`_&NnO9Zu*% z760QHDGJ8EgYrZ}RCa)xhv)0zKNU8=; z&&l((dD}0$7=_v$L9m4tP}pB|d6SXH@I?>YhY290-u@ZoCYFi(YmXSiAl}>pFm{=# zW1R`z=|M8vScEI~>KB*Bl!TN(rry>&X=-XQ0ogd0x2#R6K5eH-sn?zT+|!nm77|b(7>3FXU)~?B zySKbTe#P7vJ;_y>hcsQuOEtdQw~1Il*(W+TQw>LYDa6oy3_s)$IFq0jaLG zUBiHkn)jc3DCKLgQ)lFegnh^IUH6Tod&!S)b8I+H*pu{8FuYDZp^)ya9R)hI58a5mNhpzTRDA+X` z!3Bpwp`CEG9i?pbK!)%YL93&EWLX#wdLY>d{NXnGW^!(oTQ^S0&h4bx!lnJOddPJ4 z#kjDs4y=3b-8xQjUj=itfX3O9h@1`@p&jqhd@jxOB5D9j$*@Dy*|td-Fi*AShRtn2 zA-w|S9|7*aA-1HXU~}U=ZD?O*v)j@vn>z7ZnP?q{pB1+mq9P(3=(NwcD5C3rDx;hq z#Y-vL)$cs9Lct3To6}{Y-83%44w(USeu;oN$JZ|y{_r>vlLq7l-L6i@L;U+=+?9IW z6$3-mS|ro;-ZaY}x9vIf^~W~5{2)i87j#v-H=5>4gMJBaJ)c1EQOT~bX8QL|pxW|F zSfoiZ{rU1TOdj{|cKb8zPxvZ3OyuJgl*0cEa{KnsN>PGY_2aUB(5jlYMO8yKOo?7ug8ruEGi9yrx%4RJoAEVT${z$IR`HMBw>@EZFS%f`&I|_S<0L z>1l+>=|dM7GXTeQ$Dse29w?G8?pKh-ds^lCo;Fu-?3v$<<4F(yqb4MSiAj|frATO| z04F7XCz!X5Nz{q|1|&6AIVv9dvL7x@_U%cf3cH3Z?1A~VMb_>r7wcfHtzvNQ)gumT zd9@0Cydji&6!T9YYgc?9mEv%-bczb0f=cGh&gP*XFZX@*;(W!jwb#Ij*L^QIu}Py5 zRlHZkCQ&f(fc{7AlY2aAc~rSpk=;;fRd4C*ftrd^Q?uhpP7*n9NQRzXcEM8dVGc97 zMc z4^xH&oG9fNIW_WPa?Z7p-CE7!d64u71#UPqL$wmuzwn?ki$!bto=uKS$(26J}khY`yt>wS;RR!tWCu1}+CWyc7!s`#FQs5?-^H+P?{=N&ZVAOCwLiqI#teAP2L`1EhD|>SP@l9c@zxFdpSP^pBcW z(iZxcb>(9u;TxHRLdd2gIV{gN%~kUndOl1^75J-n$xYiuIYNazc-J9+x7tt zb!S~+mVJS9t}7JYC2((4bF%H0Te}Pg1_2=p8s9zLoajU<h*I;@ji^}9z)~&MV$6~jbRW@?%PkJmMtTEk zuyssEro60&8S-$C>i#rd#wn?ZDq;+fAJ26vQuNuPdaO}SD0@I}+VrSnexmlpnz@|i zVX;J*6Z>W%faxjc6qSA_Uc$;IrA@s|evZP+;DtqX7TW1RzDTPi0+Xvw!Ap`L6su?L z+IP^78$w`4&f2q+X}1iGX*&ncars1grh53Jq+%fmLC`ucsul4joE8EBuPFwyVn>v^T#P8*Lw*?y+OlUChyjj+9%Q z>pL_&eC(KBLVtHSEq=XNa6WgS<9YXtGBnhzR%YZ{a6L0!F^#zHB_STvUwR^cW$gS&?A8@F{fU}76;~}(k^_*6{>YO64gi|TENf0z z`k!0?Y0cM}go1s=$Jt#FPeN8pA`^G8(*x<<#B_$aRFlKKd9WV0r=qc)8NG~_eRzl{ zc00Q2>g*nz`_UMZ7H7*1=W@+ppIcbOIm-vyWxAU5s<5z7E^M8aE7%n{32?GhYe<#B zjhG)l9&vb&$C93%-7IIOPI0=_l%!IjC5DXr6-;ExGrFwu1dFDetY7YSOcuq!qHT*P zI2N2ahWnMBale&ge>p#{;K|JH5=dq< zi8kdXz}$Rq?;41hOA&Lfgd0x4D|LqZOtqB_JORVtwcE5+TyuB!ogX>P|Vk^%Zs39YI%h40jgPnHZkYI^Ie=wpM zEc7S9OTL7%Fccteh$Fl;q=;mb3&xc0+G6dv)b7JP$e_QR$$SKL_I#p~+Z-3^BpjC~vpj(&t$^TaPxFir(ZvSjFseVaPXJ^*`-A%4)YXByFK~G3w=w1kl^$59x**{^o~>0!GHb?Oo5t%A@i$1p z`efYvSmJh$mfh#nWKhQsP4;O%ii*)y+-xT5)*|oFb_^8?>~2d~C<0s}1GVy{KpN^DG!TtU%R#}@$uXdC@0mhDsQ!3^ z86dz>G%nqiQsM#tzaU5uh~;;|LlVKCPVaP_wAD6&`RAcgce2W`{>rm?YE+`l7_CObS=7KUrrnoF>IMB}oL6zg_uf*86(09+L# zbUNl%OF|PjR?P$}_W*z+2VK53yApD32uLO zWg)F(UG{#{a?rHDzT*RxtZGhv`)N&&NCJ6ud*Pyqy#6#jX)06R5P*< zG5RHHWWv0e+}~iMnZa9qu%IYRa#v2k%r2{^nssBduHyh2B_dy_`C1$C+>00h6);UV z{=S9!wO2^EhjPbk4T0jgrQ-RkcgI;*2eHAWGmuN{HY~yj9g47Wo_dq0D`uHT2BX6n zFK!9|v-^f)iPxu&;`=l}&c;g|3GQY^KUZf=79W56yDeGS_vJIvtrJ3iyzPgVKlc=# zb?DrI#!kE%H9U*~DAfPE@xg&+l$>7KA7~`!f(hSn;N?K{5 zc$16=jF2zRjzom%D_TyxWTYqbOr?0cJBC#BqI0%n>_G?7f(h@4XD-v@DqnrvittHu z3P3V+_?lmfG5m#)w$($_$?DK(lYn<(RPj8YJl$2f@t?L$lq z{(0lEJmtW6L62|FPEWeQF7=2y!}`1NCMNXEo_CZ&t#UVpjHu%XeW#O*wM_YWt_}|A zlGA0|`uVg8ipISydGvLlBQm_wJ_L`5_g5V74gr3MtwA!Unv%#0W|kBI^#}9RPVtzgO`R)m zG@?{PZfc#*EI@=ImyVn3PiL-a$j=&GP5t#$vJ4lAj7;0?@W;0BzuV4o9k6_;C3#O5 zx7%DS&oncpdW4&fdne)&+y!tg4lcJ_pF8u5%h_M{( znK4d!-jtJ(;mf_GJz+OBGv`F*kWJoQG)%R(EzfpBGNhADi8tmuTd~RF@6R#R%jb|! zi;r>M%Pn+gc`l3@U{K=YTdPs1U>?_$-d`;7g5!nTYn+s8j-Vc{H z(UyGe!&MuZ=n@(oO^S-j_m6ut*`FS_!>=9Ep^x7yJxo`_Zm60EmwFLFqNPn(HRcJZ za$arQueP^<3l6y)Na9Wbr&1_>7ZB@7&pMV{>+9jjbNC_PefSjOEcHhrFB**9UFHW* z@pT3&u9e(0cB<`GH+|aC*6UFXXZ*}AhA=_$y0?I&=6%%%>hnF!+%&e#1>msyLqv}PkdH(Q_W;7u_^qT8gSXx;fh8Hmc ziQx%siFFgEmkD_Kb>NH~yMJm@1onQeIzU*RUB_7ODDkCNUihIa1kNGQs^9MUni`Us z5SDx9q$h~jupeB$1e3oY8l})eHLW37#pX=Ak%OJn0iVHZb|emED#11!A2zJkFnTzY zna1AHo=Em4-eJ=T?Sca=!y4D|IXIZ~!JSI%*0EF{(kxBA6|bpvXeMY|ZNAMBJjo&@ zN<7J7mz0$y_3HSzn?#KJ0DHoZjxrq(^GvXr3tT+nA@TNf)u4pm<}w*( z@AQ=N`}XO6(7d~6Thh1K+eftI^Qw&8E7(%_cXO+k!HU zGRcEB$$l)u`26!T>!;c`!h_zB)Rq}5bweYeg@3rmrea{Pc(%(r=*#8aNkIwj;j-?t zrjfR`vOC*@6KU(r?4AEMe(7F<6qcwa#(B5`s$E*<`qj|u<4?XK5y?`kEw=?t>mE{~+uH*xsp}pO z^s8NiF9lLcu>0Fd$borjh z!^eWF_tUN2L%GtuE{a1#cbpVYyAKq5%N)V}yw63R=19w98C z9cHm!Nvx}wo}0aqMDJSo;FBWB$_~)OaC75>nRNcAHSX`F4Kqj`{=}Ot5 zB*p8&mo*0J;>)F()NOJZVlN(HCSKkI0m0=-fA|C$#!~x_N=#}HKyi2EK%l&PafF3= zB_b|5!f%@rFz^*u@6n{OQeCY77KO?zNM7dwa_7UVK|jNxA$G*sI2cdsR6|{v4%G3E zuLwACwhEZP-@rd$115BcpQskpoIwwbw6J1IiGn3OJ_s-st%G=kqr>D2$-nDp%&G6V-y1V=1C*TQI$%83;TcfVEGddbNx~cH| zs9Q-Si=jmUiav@g?(Tj?>)hFs#7*uT`sAy(_D&WeH#Z2efKB(bvN^^==BP4wZ807Z z>-N#XrXzrUrXC}h%8~gVk)GwwCb~Y6~w@;xUPGry9C}te%a}#}#1~{-cH3CZ58Dt6aw69F22f2^Me5=g} ztY<5PTg28n(p5aZJat%U@G73S6}+S^0W+j5UTz^t&$P;t6AeCt-Nz#3kpW4;DwyZd zCwe6n71yHD;F5`j%^9~o$zU6>UrOWlATuN*Ta@iI+xzr<4$o12Bf8Xb2UmU5RO-q! z^Y01s>x6F=1^hz8g^uTvO!n)JD-izzLE}WExUgg|3u;i8aBeYxCmfOJ6^~U*5VCpR zH0~cFN~fZuInuhjkj=|L*M}salW7+VM><~j7g!^s!`7Qp?Z`ke577HECveq=+vnJn z6o*-%Dw}+yB>lw=j_tUnBWQz+qt1l}*b1~^+KEDp8z|1e#Q1IHm=J^2 zy06F)d6&=85SNgUlibn-P&+|i%BIQ7;MFAd?%&#Y3!m-^asq8W$Wl;TB=VcBYDu)$ z!m`TbR94#Bf1#&6+_BU6`JgqlSt(p4qwP8oNoX+Z6vdBekW!DtVDE68glZo0wYxuh>LVQ!_tWt9l78X`UlF1~?@bl9YC33$-Bv_M`#CQ?N%Ogeod$_NE zbTrNSpLn0r!s!%ghssjJCNX*8PubtlzNYV=$sHU(An2*sK^IDd{s;oHTjTUcYL9Hl zHmXGwsEMACP{91lXzurHh<85`Rd{z)%hmY6p$JN4-AnZao84rQ6&1YNBdvU31$rh; z%F9f|Op}Fd@abFv1VqYolY`0O!})UoqAmi=`+V;=qVmhmc(H8Fwv!RKLy7#XGO04U zo)_s$x>g^N1j+61F*06Kw6s%ZO=X1w@#&95j#iqWjf{;WZFyq!Jqj!9dF}Z!X1Z;Y0COX=@MOKAE57jMHJM{C`c|xt2$$Q5i9yY2?y2|vC_dUbMBb{X+?wIPr&FR4cCvuI43&l%$8+l@D z^7RP>YX7Q({`F32-3}q=aG9eeA3=LC+*SNpOnrO-qr;@rvTe!W9Q~An*^`sT>-@F7 z-ECGUVymDI4e_i8)5Xu}h=||8D^nQA$onVCGllU5!kuw;uRXe!YoAL>8C?^_McZ~f zaaG{(xGp8(SR6Ov85sU#&VZ3aA(zR?&E2LpEF~mZfAz$%!reO9yXePat;Wwks#&e} zHN4uP#_UJtWO3Ne4~@<(v46pzf#k`6uV3X&O*!rD%p^k8-GhUVihEego@a_sYR!8E z-n}>FPp2lsTKb8ELP1?iUG=xQ}pZ-;LG>I_L|>awZ$&(qmO<4d>foO1q3lK^U=xx4 z#&kHIIX2NTG?~R|)}Qs^`L7`C$W6@99k62}%89qg8Fo2g@;Oge>4@>b+vQMd#W;A~ z_Aser=0{IJsN%)WYVjK=rwKo?U{-mxh^kn?o^N}dYKSu`_Yp1jAYi3rl6|S&b1cqeUUeixpg6 zm_FjJre{OVGunTR%4tM4&nv*bFH6NQwcfOq{j{NZaP1uiM*OX`oEA+~&-r%iOuFx% zZ|Lr0TQ!7j7ml|<&T0L;e9khowWk5B*GB#rdzgU-?AtNgOnXi2sB_vF5)>BZvqqo2 z=xF_b!(X$ih>L0)eQ&ebLrh5}Ug0>tw1A3|FFBa6^a)F+7u?iQM{~>8$Fsk4t$O`D z@VuJd!JknH3amC3thv_0uJ2|3&0y7{g1DJC-#WHh8wkY2o^T+c(Yk+=HZE2cvy6e5 zfq>LZFgZreB92h-P9WO&o}G5pb>`R|b7V`V2#9sIO0$=t_B zuI{}f4X*FO!6BbGsT2XISgzA)(&ENhWw1bk&k8|y2~OpoK6vkK^}@v!Ppi-n+1waM z#JD`Jlz{v2dE?H3I0+sBmDfMP(Nvwg%C z9@+QN&NnS}XUwjwtR@HqAHdb2`?l7gW5;w<7Z)*1--a0at4wp#<95%~?RY*|9J?-E z%!`0TcOFnz7<|E1BfIW5SfYI2Kv&PJx`NneXEQQtzK)F>_luwO+Otsu-9tI6^prD|JEQTXnPJ}}?0=YW#?C!8 zNtIDiR+qRoTr*JJGu7Em!bbR8(Z#CCxOyf+k&hy~l;-{qBprnD3y~&XpPSTR1g_=Z z!jtG2_QeDCFiB4}1lbPjH{jTML7Qaz zm-AYiPrw5i(oaDc%M(ci(_jF5jcB>c2~I0=Ar;(e<~0?91<|IXQML}TzIwMwh(X~9ay29y5c0xrggQs z9Xq~G2aSHy?Yf$o+z4H(pLJoaaWyGLS^AT24m8xl{uUXO_;X$XmwmRhZs_owvBEZ|#u8v6;a2tjh5^oI zeKOg)_Gbja!CsNeG>U9naTiTO_59pfnr7({RhW<*J$lbhZa?RlYpg8V=s(f*E)8}# zhxn0(E(h8$s83bj-yzY(axcCYPW7>KyH2GJGb>tKN!_1vJZ>Dw^3q3!P{S)ZOdr5q z3d%*UrqprD%G#7b#bI!y1|IW%zhw)P$zU%MP}xmFk(89yJFlW)@_Z~iq9deF_k4VI zpxoh(wnKlsp$WrxL+S0YH6;jGdLAI`wV&vWB8L7HDmu;dWt$!k)Y&X(X7#{OkU_ADi%}dgyGRL1(JTCW2 z_+W_C>->D8|r7(rcNPI`&X#t9WjDgjEeF$?3_*n_m>7h^u2hq%!KM z1W*@_XiDjpBiPBkrJ`C@C4qAkzF!1Y%52hZrH75~hA&`|BNkEgFiJwwSB03!78^c~ zmE+GG*JDs!#>O3Uw?QO{V+W{7Y`HnS54YCJ?2Ac=!9DtV{D4!07vMAW8ivRf%C}zu z#w{R-4-=bH0M@98I&p9lE}Yi-r0fRO>i!HZj$Eei(}tY7AZOEY^aklJvd-bg$q-@n zqYXz&DjV#ZzsiKX{YAit2+e6?hpxlBYnv<)I5^k>#z#SN;EGxFB~JfJkxV|G4_FC6lEUDM8QSL<( z!ruA)i+)(oi^SE|8-?P$_*N1W1U=(r(jiiAJ!%RL3zd*sY;bAeNaX9A7UEFv_y_yo zMvApuI2m(DvXA$0baksVyL!ttSP;fiHY4>r`CvxqQ?MvFHc?HhBAYq|l6WSehrTJC zlF49VHF@i%86^H(b9E9o8+sL_+z+Pt7y>FXcw4#x$-W38gojIzpj=2oR>e{6O@nJ@ zsHavM$##_+ntXUyZ`*lWn<%KF=~tg+HcgP7-uCu@yYA+6ng4;EHR&t#n)}r%li4NS z^<+TJ!tlwrcgJy`=rA&zJ8sWa9-BY`;kvp2in*pr6Icjk_>%l+r9CqL`2}fS)A(lIF z@ABLm|8BH?apbV(H#BZVo55giO7uPMl7|VnbxxBK==%9L$kx;p@&sq;`|-BxZU6{R z(c~zB#r;Q^yS9vt*B$QtJ!Fx+D7v6^$DzDOiVKgc4y+jH`&)NH{Scacv@0Oo7eX-% z*TU7YAQVxxAC^UAt%_}IVeubUObwv`ZXs;4v5|c$*39T+A zMIZz6@{O4@DS7y`;{y$@ePV{W&#pNJdt*QeDKsdnfp07`tDnh5TTsCFhd+LILLRP7_yP@56XvV?D6i7 z&%hw(0oi=rSr@4>)i{Fx>JWYRu30=F~`&INJZ6;bqp36Ez#UOn-yjTT9jt* z6-8^wW;}lw?k+mrjb~gN&FNgX0-+=f&r6&=$fnH3?#b#O*KdznLN>_ObZ|QEaMJE9 zu-qJz^nQ%Xj4$hC`kqQE^VA{;7L?d+%{>;bjrUk>;@Uj1wc5jGE0yu-)E(E)zUA8~+$KeIm8ZVsSV`t;*p%|55_bvAY6UK&!?HLcSVff5R%`WG%;9!-+@V@@2CU$UI zID=-tm>1b3R}3TLRMlzo+h4LjvnOl!t!+G)BVU6>D(T16mj@TeZePu~Ov*J2WQLLp zTRoeU3zYntfHWW1^6+Ztg+BO_8KwHvfmYd$EKplK=SpJvlp6{5?FrSv=T$1kclaF_tkJ#~b|w4R z=&FFzgOylW`BtB7(e-Yh1P9L&8fx>lEP)TFc-kZ7qFj|=b3tr(0UNZ?ZysI~@G>=? zr%TR@=x@A#Frt?e^T~eUv{>yj|EYKIob)Bh*a{?-c_nT)v@JnZbHm+u#WzOE65hjT zIsQ1@_LIqm&dLMqKFVQr5k{SYYQ*}~bKh~b*$Ov1v_a3mOC7yk zC4MK+hF|;|)7NBkv{XEkgA4_MKV?W~q`QDpez?H_QHi7xB_&Rp)%coY-ub&EC1rr# zhr)aViGj>(=HBtI9>~TNO_fsWRdH*MQ}Z*aT_Vc`fe2}FpV^P=3Z$fsl#@dDhrX*S z$Bzy^z1&|yAANk?-KyVrx_e)I1l?epz@d1e^i2P(Dg!xxluW@h7piyG@Pbib=> zHq24}LEoi5zfIRyO>rkqub}J{uvSM=KN>zAc0JOUW=8Ar4T--R#uo7j2+K)-TksY8 zMx5OtnCE_7(_dIwCnec|Ykxj^8t;mIMhqo((%v7f2PU@h7U5M}XL9aNo(e-;GSTHRU`GTKezYtyj z^toio#YE<$%9xuOsos35e+h@tg;zODuY5eNe0F6)xlDA(VrhIOvG8{bv4kHi8dLST zL>rrwYOF4hQs4^7TX0D7vl}#@Vv&50TCc`rqZVJ^fi^yrcEvWJRbpZe$bm>EDRe$G4`OV zh5W05`uanmG(>U%rcl*Vu7;=qKWYhaB_{fB3+lhvwT))t%piR*i#We}y6yjm>gnGM zT)7FDBP`!v?Qi>g7V(FZ#1F%4f{5yG$Ec!DtyYNVpeEYVcYoL5D@bh0*D=|NxRSry z)PL>1cb`b6uo#Y$Bus{-C1=RP>%V^am-9+6F_|bVWcoW@`5&%fVgZH^)xwf9`2X`O z{8-b6LxIOXkJ2f+o}WpNhY6*}{nr|E2qx?Z}aG5~89eB?-{~*Go>Q{d(NL81(<##b4eQ@Q0Pj z-`ZwrCjVPYuOQ1K`Q$?6f=`eo!)3yaMJXw%vwd0`rjrz5jhAO@t963(JKgzy)Z%mO z*NwBpPu**!B(GtB{?PsZ8|j!4gpk)Zpt$M+46!AcJ3HxkK1*=5&)O~Eg=RPW4@^s{DX%g}f045SdN8(bQjQ8W`rBVT59a?;Y? z0PgQ%%B*H1JVPc}P*;lU{8}2DXE){32J^(HOE`-uI zdj`G7@=!i2(AhyfMw8e%Hb!^pB)E+NQqc6Kfn zRaZ}v7<0btk(b%o6Vls6a@;e7&>k77v=_P>U2;As^o?gMKptgn4F-=dzr;5-mz(!_ z={!zoCM>*hgfIElqvjrA^{xBd4~T@a1iTV55}9pYRtj)O>|Zbe4qVm7{RjlP#1AeO z1i>2)9Ffd~e1?p-Gif+&0F*$;iO`F$B> z33Q!2_LQP8KSv=Vzr{kE)&_hjM1C7;KhiNSiV-H=b@4@6GqtiD{Wt!BO7Gn7-ZSf%n~70D@*xWDT^fO*=& zUIPlC6vOFCt4tjhy&dJQkqOl%3F|S@>1vgqDP_uaqMSjn+~xAh9zbPzz?A`!1yC;%Zf zV??-2HfRE*y}dKJMO0|$s1u#q%M`ng(R#NM^RwzXgl^j&lW(0ifEauGlljcUrUMJ& z8dbfXKM?OXt0Xw6!^`uJ`v}w*!7X-@CQ?Ec3+KI@vhq07v31o*q zR4(Mh>igqIl9H0v2DEMTz{z#tNOLn@x({C25pqkfRs@P(O4WxP<)+&#mPnT*6z$8O zDU+C)tZ_m^LnHTbvXtk*?T=%v6rC{?Te!U2dq72`0q7W(_4ZO@+7()_XXS`-z1m$w zt7sZ^x6wx)qV7_%--1OiyH_{E>LOCiGN)>dAmHE=MLbotN~tl?AaRQm53DJrf8OAE zPRCPl%3m17_76{yg1rbB2;)8tWq(`uE)PAc%xw3&uIa)Z#UtVw)>F-DksHA!+VcFx{KVIL9XIkGfH)!{x*o~ zT<=`#wa)_l3|aY=Xv;rwXB$~I+xM>9@yj>@y7EbECDGPY=jyV0=D_reX@fzhfDpzr zZ_TOU^Ub8TTI!&xLwxnZR+pYBQ7EQn!`d4F4UgmZ-hdpthq%m1i;d5-Bb}Y;xOi!W zfxY13UoKTYj0^gh@w7Da{PifEiViYxB%A&c|KdoUOBFL z-=rPS5Z+2v04rsc#WLB@?!Khd-pIzjICZw7>d;s#pO=+d4kYOzxymeK4mSa~STrR` zO>M0Zo=HkldU?7Y62I^UG77(BdRYjyA)eBBJdM*iuh=YBd*GMZVkb_C?aGzz2j`fY z8aN<6lNNK($&_@N3u1+CIyh!T*8_om_o6Rbiv`Z(NPY9Ov8HGGtV>Yah7gy%L4rC~ z1xf%#uxh+J^kq}I;65hlqjIkdS%REd6SN}ku6q1=xY}56$PU56{~_r_Ksv(Kr zvfWxa^iG;*IO4}G`wd#*Y4#gbY8r+uL@AY3^|%bZK&n#E&ny5LS)X$_bc`fMp9wz` z&x_Ei*SS3g`uNPeOS!Ck_JD8*l9zMXPjZ3vzAwdO@Ccg+#Qv%71(iC!;$ZY@oQpSC zNN~F(k^zfHyFhAzF{rUzA8sU8l#jhPCyNz8eddYcc=r;?M@Sc-n%SLES?2aCDyYUW z78NyUs6>i;f}*F>@uUwR!_8!pT!xB-GsIDt`a8hgA}lOrhPmR0x+%E5l&y{3soGH= z;s{sb>)MywsUpw=#^l~mHQ0zI9=UwABVj_} z-&xYR0UKyn;&Tc z@iA{`t>)S)%jP=a>!R|XkkX$l$OrbR8AL0;t#Q=cCX7-|{2u&bx6v3>Tddz{)a-k2 zgh7ArRg@)BwZ*86lHMmZ3 z)p9&xn>4F3+Y_Ju{1)}^-ljd*Tc?fqOD`o{^26b(RLb3zh77)+$L22HA2TORHHzTk zb&Z0PGNj6WxJTIVE45Y{^7I@Lj}ws_{U94LdMhFe3=$nh5t6+c#9_8oE<9buwWPoo z+0-NTPf6MKnC?ZruL#52qw#H#Nv$m`EGju~!=NP|slBZa}z=RgZQz?zAwig|Xks7)<3K(?@1N&rC`MfanOccn*L|JFM z_X|cD^>yUci%>Zln&vyxwewqjYDpnHWnUJ7iAFSrW&MWL!6yjSh+G&o1|(3KWGu~q z3-ts>Nhw_hKM&eaTm3HaFs}YB>A~#d5b`ood_LjI<%axU#^lsYRJOPBE`;9-&B!?< zC{UA=l9ag48ow5LpD1n!k(mb3zOhVlWf#-KiTJiTPc6Js^QFjKZmvBP2*at{G@)o0 zembw>(G@1y?y@2c)|HerwY-$_A@Eq;Cg5c9u-*0|3qkl?o1Eu8A&QI^|A=`eTgo#C zaG$SJ$&>?1?iWO^wfT@n%N=UJpqx&NP@JYcoNDZ0voMi`|2M|}@4!-!Fw99g+t>`X zc0VO6Be;aD@@Z=iC(@*Cgbl5a+__E-V03j0xI~R7>*StK62*8N$deKHy>~{JPjqrD z_26CGT4(rMfB2YDB4->XPj#s%K>Y)c*zySe#di~&`CVQa=5f*xMM*(E~e*( z6|1WUNsOl(YK2Zcodq3GrT7VLr3UbTR9~GkJB4ynRyO;4gY6O&8zv0!aPRZ4hHp+$7OwUa zuHm5efF7S7$~-5H!^O%F)IQ6jR0l>_XxFV6-CA1y+{RKX7MqWx088SwmsXR`PTBUD zGtgnsRf3z=mzU1>PV@{z^{#8G7y^wXf#N6ov^#yNlR2 zOxxy~^b6R>LVK8472$nfR7R(>O2sh%qhl7iG-ZFa&2QezA`hBLkfZc!2R7!aWDo$^ zD=!%)mT{LxH8;t~i5I$`i}jy( zaq25`ds(KkeAJ2Wj2qRFXSSZ<4;OdPOx`}0E-g9YGDyLxSFvV5r$12MNF>jV1tgl z#mt|uJVX*z!U>7F#zhelo)qGAh7t<{^BYeJ< z<(-kgx}Ct~SqW{^Fpdg#arC*K%PUxUZhmlnTXupjN8+R zTcvsH@W{^AxgoFs~|NJL>Z>{et2*&HqZ%LP#F zE6vJ`E75Padr;ab!z|A12R3{WLF6p*0ZP^_vm4%{58<7N@WlqM|bd(uFb(j zezGuWCANX0jt+OSiukKGz+&iYdpJi7U$%eAjtMhpu|!$kG@*CBNcdf!iulOeud|iv z{NXV1?kBT5xXZ#~q{n^u3>PprR7j*srhPIJy$C%s+>JMv^tq+%P3$gd=i~PLJyuSS zMvJG~x)CAqh+e!F_e&;-YLyz@6n*c?atL4R3Z*k)^BtKB0xxmkA~%)DyoxgAOI^t#%u^iFAh)Mkl*P-bXrr(11O zkyA+Xa|P}vRn4XIv$aPS*tyWQcR!YK`!qD|ihggyD3_LzsR}0~zopI#a4&E>m`3)|O2Rxb4^nE!B||M(bzZ$z1RVg7Cr|MSiQ9wgJd zu#)ue*$Be$4ebBoqkkE+oI)_*_R}U@4upS$LX{9E{(pG-f5F;620vXS-sCO1H1D(+ z{tGG&`ETwY{_86JWl+Tfb@Sss%ErcKXlg3#81Hy!em=@>uD|;vNkvPGD)Do&qLLDk zezKN%wB^4X|9h}x&Q!QjR8-XV@pK^b^tiICI{D65GYF#Cy2MvkTbm2PA_pr|VLa|X zC<^)FM;MEJeau1qm$}Z_Krv6qOMx}oBujFBV%#y&Yw*+%WsSeNq!89Nu!r?Z;}XWI zPb0+nJIwIMbO`nkPVS2`q4e~Mj3y9b;Nr@1ta-B_eqoQ)Znl-%#CCnUbI`8;iuioq zgOrevP_V{^(yttcR;qS%qpGazuPDuj{pYg3|IWK$55*rx9wH(qiVwy&+B^YY&nV19 zFmy^ngenqU=~!74f|c7W$~Sgq!1sVONHZA=ibM;cQpl6N!?Ly-P$1tBI2 z=JWU{#~sS-=YOTAryqttp3~6pfUw&x54OXa5vPr%b3~`H+muzu)tZbhv!)(-vR_Qr z*Soc3p{)NoH~GIrNL5VV#VNvvsN&;P^;uAQARHl*=^S?Ct@3hmb7j|O2L}hkBGxC% zjjWcll%9K;Zr3i%NvGS=KCw&iJUm{O5Uz!`{+qn@q+DrhmSe`lV5#e9j$MG+)E(RVPP3La0} zqjyJBMLq*h-?eseY0?dg~Oo?6nn1)%g(<;`qcxG6#U zE1tP;X?)fwUSHDMvcQ`v3CZc@3`ka>DBG?x6z&E;g0bgIW1rU6h?@Bm${Y_yE*_3j z)}&T`ZN1{E6^m(`=JIF(zuUwY{svE(Gm?HeQa1&=hpoNV2V_+VGm6BCvF~D~Ru*GA zfr@*!D;D5s0eYQaSl0lFsNBLUzrt=|JO0vHc*=b9$ngPe%orzSLm^p zTSH4s6shNsr~-mLZ)qmJ2gTdfXLBYmLem;b=Lr&p!w|o_(ypmxwUPawS(y*aGMJU! z%hM?z<1IkD;0C87@;Tlj3A@87vo~~F=QL#a0%Zimbt;&LleH}OFwip_0gvW8d20v4 z{T@CY7eVDZESE?K)0i;O&5A@R!C6*gIt|LV7_0noLH!X8ez)@4eOVftL~d)w6EPvl z$%lTo`3h690gqCmzo=%;h#4?4JD>IihP`ARBN4IK!~5!Ow@;2ntat>!s8{D~$A2uV z_EU69bG|~5=EPTsk{_QfwW7`B@(F*@?F@_>AW*g;RRHaWaVUwZQaG;nV4$|1*N$6;4D+(kb?ASv z;Z=y=#gC|VM>fN=v*{@`bagY}k{bd!>F9ny$nXo(*sSIwp`f5>U6jD%7VLUh`W{B&-R9xF16)AH1M88k;mX+en9>Jg5Kf0>vm zcYG=TdWvt!tFP~8gO%tcJGP<3WtJSs+yooTYsP)n0HYNcUt7*hceb<(w&Fat%e2H; zAyZ$|bu3y`q)q;b>d+A|f$)?d1$`9jEWGlF5&TW z%zMMs(Ribp&r99nemrvEgwH;ddKtWcQCDA^pXCFixF*!23ZN~;>g8(g9kCh-7O=Rm z6QE(JGt>8oSZ<0YGj>4IJhqckn zj)4OM;pA>T2zB}-%$Kke*2Iph7EL0$#H}Ye^6H?$;>40{yi%uCl>k5mgCPkayc|`u zUbv~W#IqsE+h1SR`#gNVs;qgf-R0R@wl)Ud3?k18x6+_j^4~bM(J{Y`sw~6*XO6~& zD8YR6K6>32!9H5WFwU7OJ)T5e{kVg4h~NcMc=+^3E#j||FHBYykypxLOXshwRy{^z zSfBQ0DgvSLjFn`|S#IfxNBbgDAIRV0j_>!Zer2oOf%h|3s6Yi%Cf;sGfm1!A6;k%Csa%yU2TemNcv-Vym~(RNdXu_KJq?|MmV2ZhohFh zYyxf6$cB=imAtIUfz$SmD3WAdDekQ+j(a|3(r7xM26&Aty!FW`d8XRyCo8-73cItY zlLutQp4z{X;QR+dus`|8s;xwu-Lt=aJ=p2e=E83^5AgiKalC1j8exXP z00F$mYkJmsna97EZ0I#ak@WL^zCy3sCWw;KID^Ma90EVM_n*uJ84MrfdM)x)z*iGB zN$3M62tOtM7QOO&kYB_9b8qqgqATD4!Td2Qa`&!>LmDxU`3fyksoP{)Enzfr*~vYe zcg+3z#sqo?}@#dA%t-Wa(2_@*HScwKCjXkv5Y9a_R>qVjJuV% zCF~uv`dPqXL_`FH<_PmM8cL~;NkbdE?}30x3pHwODFwWw(a>?&S8HbR+sO`o~GL3vOS*b=*srP$7cL7d}m!j>hpW(w8qH8I)^rQbvAE zDBHcDGe!aoLjRnbTl5gOELq;%<+}$MW#w+Bhx_!2gTy^E>N7T!1B9_4F_nJ`+`j#6 zq?m-|>l;pFB*hmLc)mvCyBcL-b=Va3JgyxuAJ5=owO(X|gNL7q$GrHu3iL=6&FJkF zeYgSHseQ>TR&MR|QNt9dL%v*(pD6d%W*C3q$duue`979j&ym={9cB-meQiEWx{$I> zY&Bg##rGV&u)lD&J6Ri!hA!90K`+A>UlC4PaWUuT*Gm+-M6HqHz;pkbzmBBi=`=(Y zpe%ipVXY6W|1@yYUSaWO4;0t)PFid6aevKjUqLD|8l>>*?bQTFf&gnh?$N9s8%Xqt zfJca|HCg0cT3cHkr;GHO1hBTv9h}on;F-Z*sV_%^$xy<&78L0$&F7>YrmFCIg*d#2 zEX#mF-8T=(+c&a5uZE;F;^FP#8ZKcnD6@>Kktbyopj99YTwE>S<=FGSTzVU6w~vOa za1F?(Nz-7AYZ%7Vy}b1f-!ITPQyjYOOP5daeLM(pzLv!0yPmyD$WE5H@_PaB1>mo) zCUocJrEH_qKw=uh+)XykOf>OEwhg?0Z~+8!ZeUrt6>971lr0a7uB3;JzZ)ISmVSl= zV@ym;pYibIGPzyyAS{CiAB&2L9LK979wtzeD17Sb>QqxB$&9s`FO(nF$26!&_~bI9 zuzuGiqW1RA912vwiV#4RdblR41~Lq{Tex|v9-uCA^XGt-R_ zA>#~=16j?*2_*a^JCRv*l0`i{s&cVuXeAv`r`pr1-#8y;#W?A_JL>`;DdSNCh&k^& z7k&AKltz-tvv;^{v&Y-Zd{kMb@N2TW9;H2ohKAx%xjnDXi5|S0=utYZwK}em61U1D zMTkKS5i!KnUx^fDTf*J%A-2LK)&j}NiBy4rpieQyJWH1hJvR}D=b#+VT(KLMRAG7G ztTT6hs?DZl_(<)im%#0af-LzhCXoW|^KUJ%?V;Ewp~ViLFO6`B`C%LiDsrNe@euU= zTQ{BCYPn-A= zGLkyE9nJsPedW)N?*o-=-{bKd3L`eU6c!i8CpTk;39@@!nk+Y1#H;ratI;^x?3Q-# zT?b*%_wtOcu4aiwqW;>oOm*+T4%bv0qgl0^-<>YAMA&l7l)%%wXwhh6x0-i&-I`G1 zg7?k_z9wDRXg)9f=C0HVm_y4Y`lndu+uZw#sm2EOALA+&B_%OEXHc4hjtlQVwZ*llp}T0Gz5WEQ97IBmyc zi9Jb5$(vNy%H+n*{i62QG_VgvO(P}vT;YI>%uwZuqLkpgso4m8#Ti)HqW=r}^2f^@ z2ee7x&(W2_`63kZgRP_1lZol!Fx1C1$g=xc`O(SxM(iku7%>u`+S} z)6M$>p9vs*qf{YejfU~@U%)QK^gqaB$mJrT|K$slgn!gbB7*|O{uu OFpN9TnU zn(;rben`~J3JWO?#_44@jQzK(Zj^$w%h^o#YW~|75d9$pLLX}7G)e#MN^Sli5K3qL zM;fI6fvWxwO~vCfZUz4jbWr$yaFpu<8C@7nAst0%2A*{ZFr%aq3SOT6oDbV!ZdY-;5+8rwnAR!_d9)~L-qr|N8$mky`n-)J!oOSxt*VnVyeRVT)Gh0}@s8?C_ zY6hNlxIF<0_A-tfbN!|s^&3>@I2}(In;VqJC&n*F=HHQZQAC=$*eMRInD)19v!N%* zHrU~%hnlcqXw}J?4E*xH6qr|#w<;!1{Vgy~M|aq|b9?qkx@UjkrMz+!r#J#e{;yJ_NMww}C1wO_y_Hbp) zbDgm=H@KgMJB&Ma4P7>AI)z1i&bVxctoM_uIqr52s-Ya`2$Lg^_tl8VbC8D0B6mPG z#qEU>PR;IWq5*m=n%h5XbAI#XuM0ic?X?$b={0+|bW>D&Yn;a{mNX5bZFOueyy#xU zDYRMgX)QBg&eAu2Xv~W+a@8LdyJz4>KV(0HAI=tl6-7VkuC5%-er#}*SvjOfr;(-z ze}1IENAJ^h6c(GHA?fcd@ZJR5Xu`yn!+41}L7(7`zz;tYJeu@m#Wkg6I3jD?Ewp-X ziz?!0YcWd1t9V^&qiXR?$s|ooC4pCz<@#pW5er507M+qk;C`@`;H!03k6sOFSdHxA zQ|BdS(XH$@yRJEc3(>sGC%Qq3lI3Iow72%*pAAT(f$2m>J0Igif$8G!j|m9NL{!F3;I zuQP~x66xsn{q=V~17JVl!!sCCSrfR?te-d0q5Vr{G!JPizuxmcv2m`P%5i0ql_bu3 z88harNstw>WFTASg|%q2(LA(mCEaU#n;m*J!E~sg#j2S05w-mEHT^JNqH{1FTE|E) zcJU&!_3f_|0u`YOSGHtb9#T0*7>mD39SA~|isfu(kE=vTjIOd)Q%tvpkqPqMH!5^a zDavAXUuLz=8uvzxz=Q%h2e<(k)ySJKoGX{wM zu2>hZ@bDn{=Y}(u%V%KLe2Y-RaLHCu#6!!DZ-*V|_{F=Ki?CzvsIUkQ+u-s6D%-oE zyA3W&?c(9TM0}~=iXt*8rR$n>-9*c*@r>^Vlu0G^)Eipu9`0jE>aBWIw;y+ zs@0Iip%0>OxrO&^-yWsMm(qyl>WTtI1sq=7jI4whEr8k^2hYT{jZ!2A z9(J-lc0h7(J*4?aGj~JhK$~3{ZYP`NLsw$Weu9UCgqKmA*oO-uDxwXhPth_^tmMy0s5G^6vpyWHQK zZ-dpJNwLFY);&zcQDlGH>RBT5p)qK$5Ej^TBlhv$mAtq9uS+oo=RIvBA=`tpZO1nl zjq-<}*Xd2pQ3Pu<4^P}#MJXL*k&p|6hmj%v)Vn$bavvQ+lXYD^bb)S=#nR8RcYD%S zM@|(uipDExLanYPIuA|C4D5JHypmqv4l9*t{N`ocvRv+cdu=z zz#wg(?}Gv70~Z|~j@lIE6Ugrs^#x8C@CSb>X20$rnR&=&+m9D>D^r{h3@_itj}H7r{L%%#1TMbA*hzN~fOBt$aX#Ub&jsOj_3x7+NKXqYsBf?p17tC!G>? z&SkeLaHPmm);xJ!7mhA~fpn4^aGwvu__D(x$8zHzs|mG|Bu)#@G_qAg@9Gx9nSD0F zK8#}pXBcyS*`DW@CKw|>YyGPv3vQrfuW1TE5{|F@GQj5lCCj8avTheUu;NQ_acU#X zTijMSqLQVoAdbx4xF~M7*egaazn>L5N)#SrxLPfJ+WD#XT})UqqlU8{hf?ZxJY{B7 zr*?)-WTD@Q<_SctfFk>yrVWkk*UV0IyLuGQ1K++idB{Qo9r#!)fB_5I&7KvxH%LBt ze-Y!15i})LJfGFa_R{a>-}-f)dv%rVjaHE#u}c}SV-8>j(eo^kom@g=;_B3@2(K#M zMTN*ek%5-kP|@2fJYz}V@zvcWU%uuK!i>Bl*Pq)dZZWaesJ4au2BY2;Jf!u!=1FJ{ z!{*y=)u41H3RDQJ73Ar`24IYH~bdS3|&y@S>U3=&_H#V_~GKs zXF^m#)}!22wHnhyu6h0*&lri-hV-=?>J(>fqxC29D6Q^A9)~WI?@hx?LJ#rEBJX zmIr)%Zdz%rT^Q6^dAh_t^`PFzTOHAkA5h||-_7l>B%2MJo(XyDo~UKDHIRlI7FTX_ z73PoCH|py3efb&X2FCLdo*aFVj-LFjyDm0M^ZhrwW@)MoZAe`h%$ec}RXSP*(pPUr zB9e9PPpUK&h!^GZGxj8ftmY}Mp@kJ%@Klx9ro-!9GaeA}o49_c<++G5*B|xs2wS6I z{P6JJ(&4Xv`(gLu4LF9oGG1pu1DyyaKx08`rS_M9pYzUm&O8OP2H#~2X!7QLhI0^H z9<^>}K|0f{io+KTW4Tu$zB)n-1>85)jODqq==%oQRhJ{%_d?$X^k19kNzA+J5qBy~ zUWtqM9YDy$kFmC_P)L&7#G?G|D$Cj~d^|i8+dN-lO7U}w%ht{29XGrl&z^WwYe&lv zv+QaT+n*h?cUeYDNG@+9fH=y4$t)K#eW|~QX%d1zK2eG>!E$@CCeZ)JF<&I?jn_;{ z_G<;{5r!iUU79;S`7?v9KB#`CakrOH2KP`uEe0QM+$$-I5T6feV9*P=q|V{vYg1gS zMb{GHlV}qmpa#R(F8-Di;wt>HV|sl#pX^PkPEs#XT% z_z#s%`$*Qm<^?5@1MUJ5Va_LQLyC#G?$zGWRnwIRqF14pXWy`GoFOM0ct!6&H={3Q zGlc&**;QAnILG}~0wbbH46L&(ze_HaS}+W|9&4*x2Y&*?ep&uy_r40FEr7fqYIC#0 ztX)>}i|gmcJzU<nj#w? zE>2eZgjlKxwWH6Dk_H&&3trOp#sS$bstJI$71RxT>**bQw6svABS1>UR^&mWVQ;S8>&H^A|oG?<_p^Z^|`iA8PDdrdAcf#I9n$Fbu+s+ zjBfE{Ww|z?r%fSWs%oK`exm{P4XY=bcS&3iMpp@DU6kGNQzGt!|LhG4LQ%=*oX5L| zyRmDnh;&x2l@-gj@VRFV@G1rqz`tfx^6=eQP)*Z9@=;(x_X!yOcq^;TH_;!NgkMVR zAG7(lyLg+|u`VT_oxBZ|Xr3NK`FmzQvYk$cxNK($k27EiU$4goI<*c2kQZYK7h9*- z3$bnwnej%io6ZXNrGE7JohCv6#Cj0z zr5DgQ7&Ex}Q}>#|V!}E(c)o57?hGMCk@ayA$1fYb>H3!wKu!c z+i~_xC?&e7MwJZT0i5#9S(I_wx-D3en2!QJi#tvF|TWT6`ZUKG~PY?65;UltkeGK=W`@!IW$P(zN2f-S_x`+d~?EMbHp^((vWsFq(F}n~4J;A-b+;<(G$lYHiw#lt? z?%$|o__<_Fz?Qp3yByg?>jZzb(7ZD0@-E6s!`#m}D>Y*OiX_Zth};*$fbgMO;mOv} zS1=<;v01&x6;vic3hb@O>aI)))O( z7gcfhJ)CMhvt5}Z$2Xv|jN4tInNu{syQitU`cG0C2~Avl`i=XG`CD|iX#TljUhcFm zf)k}Fni8lGFtYV6EK=?Hi?Be~oF2x>_SHFcfF93cInn`rJPoCU8+`+xDMlG5bb5B> zefK4rOZBwqbIlL0cWt1;x$)b>?@&6xxl8JR6!0t={!*b~*~#@UJa#h`XQ7FVSxnM9 zJHP^6bJlJwE;zxT5XIu+0o(Vv6tBW{&-P|$i>31M=e>^n)t6Xe%X*AR6wiYM zz3q4SkyA&6cVe!VCqF_18lmd~zxy;1)*)!!T=%=IT#)|eT!hEBOJueewpE&$c za4LDH0(GZ8>o~nP&8?0Uj5AVZnZ!q4_ocIIP__6+yu)MliC0c%a-Y z&ehJ^L=mJb<0?42IhQH}Xu?2;^xc=o0Ndd2wFGNC2ClX?dEG1so74z~S?BTrDL+VF zb*wV8Ie((2GwmYx8nEZLk6)Kjl#Gu(oexw}1Ff8x5L-`Te*1}fMcZ!Ya=|nTxWbx` z3iAs6&B9CnR7O;8a2h(raMg`8z2SQNKG`|zE71z$viH-D<9_rVg=2uw_D_)$-?4$9 znquDexF_-Bwqy35qq=CaOWWl7wfw|X-ZeA)taM9viuX+J`GFvo!?{{LF^W(%_Z%@> z8dxJFzg>=8y?D$!S$+ohM1+N_6fFJ9+YwZB7=!HckT9Dy>jwUbale5Jg*h4MV6RT& zG6iJm@C;pK?@2UR6<10NA-N*S{hd>6-*{w#EVD6HT%Lj~({u5F4Rphliw6t(dCcEt zXr^z|+Y0O>W|Fk6CqIbhcALqelnXtZXGbhFKPl&OkS_a~)v}ReyEw-~;h_Z<5|3Wz zPCVzfI^ITp3#Y}xWNLR1MixQ!2yEz%iFr={u}JqhFLEH1*ue2sB55yurAx8ro&a*Y zN03+H-+u78@U--IDds}e@^k2-Xmi~J^Bg|!5;ROCmVD|U8r8!}ViJaWWn3|15BSL& zOo)))_=`cmqDhB2Bplew&0`Y=*G27Wf{xG z*&?Mrevr*#e7cD|H1~)xWC?j4r7AIw*uC`^Vhw@~7Vr-K1)5>+ksL8f);<=FaQP-j zc$%ht=hoA?>gxxIWh>Me*k=PhD)rQUjZ+&#yMi<>GyjZ|eS5E*{jFT?aU5DfdU=DY`*w3qqX6x;txea!mc*)E zGrvtX{~^7ZtI=`$!cs&cO|B5#dw{5zmGGTj5&870>rb*NM{1%o>`Q+l0Zj|UZdGwS zngvaV!|tf0bJcpZ3<;X_QD5ivY#K)T@%z|};T#^tDtPMmQds)gu4{m@G4sZ(g`7E zQ|}wIR>!Cwu{{1w;QT+&0=4ggiRgV8rV+H$+vla$Di|;>3oWx~N6M+#kK%u|B>(xz z5TSu-w7j@nMZjN|+J7gN`XfXa7~)|p%Apee#r^ot%kSF|z2qd`q>8YAIYv$#GDJ{W z>O=Sn=|3LeEvh6wt6={7yXIv)C}PsGt+Sr<){m@HA==7D@~cAm*?&? z1r`xWWS#Zg2QGy|J>q2a`si>)IPW4IM&@nGp_U8QMDqLP3OvC$Qq|2`BkG&3$;W%F z^UJcH6k3MUu&g%o!j`iosSOXBD1X+S7wki(TvE~PyKdC1+}yYwebJdw&Id4d$+_umM>K=Y|~&FPu10WLhsP38x%$H zU^-Y@Jk%257q`EocG;$C{EeyO#m!Asd)~AaqY8M+FT2NQ2UYYjW{)nK!H()cO zN8XC1G;_4t`p&{kx_*}o^H&6j0yfBaqP;~naB%a6EOkNO0bE_EbJjUj5$Ez3*hTft zTRZ3mEqXbC*VUQnYZl+-F%8mCOl-ay@sE$P+)0G}5NF86am zWxJ!^Ftp2K0sOdkkGB}*tL|3ynu%oY7vBtvhhuv}O!lH|J|T>UvwOY*A1r|CG4~q-I^ltS>$ha zw+FlL*Kjh$gqX2}w9y2fv+WYOj`-2w|JD&U@v00{9 zt_iCZIn2#Td~1DIoZZWYhBqQZt1_md6v(g%uaYhpC5p+p%HAj#_?BCVL#T*@eCB z@5~PwSF&>y2@ZMc`CsX{wlc1MP?!>~C*M1L9V%uiO4&TWy21s5{&SHZ9|L9RlcV(72B&&LcIu;xM&h8? zq=1dzULtv~tPd)W>c5_F$8}ib1E0<)gr6PS_Qv(R1`W^$4EMK!8_PwKjWdszYxN+Q zDkY#=gFodmszSSo(|Psa-LB--yv-8>PCjJJEN~X^5^-cYvioCNWI<7WT;Aig zQNx9PH|6SLo_u~d?rcv6!ZT8!7xJmjaY@<3XS%D;A}VK7^JshfyGY^Mw_nN%3rE;n z^vK??LJRdBrzc?S$}#t@=YhI5k?iUA6jt7hyT03fFGeeZ}}3 zU8b{5HpAW(*=RD_&WgGo3XiHqvljTEzX<*1YdMuF@m8z8u}Y zA!jli>mT~|YG+4lQ+x~I zsv~Gu$8s9jdLNnGl&Uq&nICo^6|yHo|Jqui*QmStau%_hYx`RadgJ>b$qaXWrmp?L z&O=VyVyFRqv`&-FQUy|)NI_A!Lk&4~gY)rku_n6}qs{@(i^ofoVNks3#&5e(vY9oX z9`ChQpYr=CMT$@{nq-DJk2P;PAGIezp0LI1W=IQ&zVBE1XVE@{hI)?dkAXiFiaLwC zyFVOEmOAC04|yWuNIynps%ln{%&d8ccpknZ6~)wqREe8R*2FSBQ{CH`vR8z3ayLBk=;5B>1u^l%| z1z3<~6$Bn~XjKiNiGSD#wC{fKsks@MiGG&j&v>W`rvY5WfJ&s$h7K2(I!A%|^pR_| z`4T(D8hR9n*8qV>`!ZZUU)8Dyuv`$Q;PE%gz}Ab?qw2v2w({P}O#m-sgQ%3CF?IgW z?ts<7EX}F0c;;rI$CgX)Gtb>O9Hol{%S`YRRd?LkeP4*TL5_ey6p-tDx_ftT-LDGK zXG%b^u*VnvY4>`DZ!uNYh+?tkxg#*0S4j40!@I%-s&;Fkd9`#$`(XLL8g43L%rhYL zvmM>_7e-O>EGG4$gADHteZOQpP}64|hK4UA>_@z>Cd-dSU9go+h|fc#hlKA`?Vor3 z^!I_k^R70R1CN5-A2VM}T{xvg-orb}s+FtjX*Z4~*mgYZXLw6kE>zI%9oYrj$XlT; z7*u9BO}*!G+^zw#A9!r71Z~MX^;%?BXtqsO_`!kP(HBu|Ro`i=Yv)?{nVdTnIIluCeNhXQ|JsQ$*Pmfh*LguCLH zI+5jhs8XFm$JEX4F*BH}7 zSCWlF?6MiSv(W_LOSHD*c-*wn;fT;6I2SL`&}H?yQUez$3)MbLWzLlsr(2+98Glhj zNKZXOnXOmoG8Z$(4@e$tuJ2TRdrWiivLB!JBp}mQlz8aDF=7ohnP+OX6kiWYuqy+Q zmut`>+I;#}1F4X9#e{qA7V$XYJ~)JSn{`k5UT8y;M9cgP$jkCjN}$QLJzx89FWxC&?f-nqIfoq!w6+|AP_aG-eUCm~JkrLm>g~ zyl|7{BOnS4nQ)j9e35Bj@0pPBbxnggpXN)L`0zRy13NMJK=O!Y2M|v}dj0gaQ)S`w zFz7LAodf6Q@Jb=o&7F$-8J`ddPn7?B;OwWK-*Y>aM%qgX++R^=#oYI01(dF;9W(|2 z#Ki9<@0?oo$e+f%9o&Z|LtFz#!Mq-V`(a^F)Nf}s-;yGOul@4Q&O`a*3)9(UZVT- z3{uLIE70Z@GrM zY8DDg7-E3nqaVRQmU}X6x2Zz$UZKG~KQOLn2pdiENMEuX>#7l?t%4Qb4m?X@a~~HJ zH`QR_yTUWdBg&?!9wHy~KETwI?g7P{m!Q?e!Zz(%*PI;`W!i=|GcbQ`>WxHQ7 zYvbM2F5kauqT+K~Wjj6a38rxR3Ru_TzxvfwvOd=yt@HfJyu=9hp_IhsE#?L!?TL#Z zCX3z?^HL&@L!Y5yU1}SK@L=%*nJ=$a*B^Zm8AR_gPjbH-PtiX88stYpqJ-t?x|*rpy_WMo9wz{sZ^oU5x z4H0`xnejqHJkhDbT<1p#Zcu|}bhr2hlE8W3wAw8e=ls?z?;g6H!0}2mv+66y%yu@@ zdt^IX(-})-$F`lXT_&t&JoX%PPPq;3xtaSIDS-eKp--`IrPaIcxcI`8io|*)f!zwlnUy19*<7j+*~C90At|i z(`9_VC9jIcHz?qH3Vb%>IloCpY^PPR%MLjAui1Y})F!w#@$t3T6x-<8D%9&Z& zXYJM3Z|$5+xhyS3l@Z_TY7&JDOk-5bHZ>(O-W+Wh?%#h6Waf0__ck?uWE+23pgAxh zjy!DUfs6WE*&RuiXD8QxX2#43FkR5{8dXW6L|0Ycq7Hegq>=kg`8{#<*EY8{ocfl@ z!+t%`XrEP;t}<Pn`$qY7T^+gU2iZ(FI{ghWjCc{I`}Y{(Ye@yXr02zeEb1uP$1iGR+jUGEYM z;cMspp2sz8G^YL4%r9P?nSe3vhMpUcgHqPZy6tx4uH4bB#Or9w_jq_T!K#Y#`aW7C zENWB_o=G=vR?%7xR%AnpmPeg1e`Z9=$B-!$LCkmV*S2$7b%$PL1~O|q0oGX~>y5-kEkYg5<;d(-8t@Q$0xB_4~WZyG#(5&i{{bA>`9L$CW|*f9lV zRagvj=2xn8HE>C-{25c=eAIRt+}>vQ+!U(O!Q?zt*P;egzQGmyR}Y0|L7)8ECs~VF z>(XvDBtggGt7wYx7V z4NG7=3hQQ#F2!w(451kjjhau{QJ;b&P~$@vU>Dsex#T@M!o?NV0L6;qO&3TX+wVuO zw8jGR8}HYpyn|~8%=mAfm~DN_vNAlov!O_QfABiej>&Vk5VGaP`}wT5P`zKGSq>C9 zG0V5Cj_7kH&(GSawR-XoTB{@W%kNhpBlp&v+mEdTW?y+%IuQd<#O!R;C?I=+B-ux# zKYFbHh<@41#y4BZr+shDSFJ?TJaR_@;qN)^{K9DO7}f9DZ2edsjV`rUxAT3`um$zZ z_Acr24j`)(%8IJn`{3bm2+JI>LGH^}a3iEDTbxCKpSTEog*hl6rOa><#as;#(qStp z&(cK%{VW5@h%SLx8^fSEh12|kbL?uG{@@x+qaebxJo)hcBf*0?zx_~GU4eeDu!ZTV zO3lPvFyz!~1{Lr{iqf5^XV#^|f5N{iZeb=uzWFQ!PJ71q9odN|Wf^wJ>Gu#IV7-+k zb6~E=*?IXF=OYB;kVCkIET*#wjb~T{17+TLS5+kNRvgzGR1O9^e()wFBRQ_F{@e+E zX?wJQAk~<6HNzCY)C;R^vOGqXM%olTNULwtb`4#oS2gsZVV>6&xrte7AHQ@!g-k4E z&Hmm7QZg@4!O8U4F9)OrbOSFL&XZideAl&G{`yyd!bBUe=>Sz0U?17MgS5?<8|+nf zsFZ3WjX5x_Td!}Mf+JwNvF-~ClLvyu5{q@38y_%riG`=;4WQWcnR2b`Z$EU*!MhTd z#kV8d_RW}q3gYeJFA~`?^H+rXhaL?*Utgio#?tq{vUs+VY1@bzNej8K@(@OS!GmQl za}G)|LWng-V@DRub6lq@|}eoSkhIdv`UTJjo(WI>8M%L9WGMr8|>w-n_7XI&vo_u07b0KPlQ?ww<~2nGD_?u z*r^FxQ7do;*i9cE7C-mw30GKf9qPmzWnO31DDa>UFQ|8Hepx_F5-|-?{ld5}DafM{ zkab;rCT`Q>dJMQ3;yN>M5991DmgKi7=F)|lTN7u?ZWq&cF>UXNZhTEs?zUkl10Hx7 zoX$ALikH70ej0J;Ym(?4_#X2nZ5IvLI=I<;RiD+~cEG!Mj*$Cu;cA?om3Qpl5Nn9w4E|25deS4qv$_`n`#zwK{_td*hq=t9 z_;{%^Pxv%qT=^oz&Erd8U`a=)0761dtLq**vdX?3<=}w1x+5;d8m8fOM#H(Ji=Ck} zN2Iw+V%TA49xDP_QXMEL{$~DOjZ(z6s0pjTTD@q>dJ(=b_HU?MBDgfgU!>rMxPqMk z18?(OA)xE(#TUxN4s~OY>bn>MT`&m2jAM-;2tZB;$^xh*!9_57Q%;Ak{!4HRI}SAb z|7C*5j9{z`9#6|1%RNo3R2`zTtAOia`kdNQEjcU_e&P#TI&|vS>47*gcqM|>)qT!# z(+rkD>G-FI%_LSmS1%qx`g0-)5K0WNqhWnS)p@WrYXHsRRH6fCPvjfNpdR611tZ+M z_(-bz-N;tyF51p-t`UmWuw~KMA3s05+Ww{XH-7WK;GB2rff8N1p3aDSI2H~P!Uz-^ z{i((j7r`heM&cf@FzE|H44^WglbWA3;dHGio$jp8`fjjf=*4#NIKaOoi0RHU#CnA{@A=gzga^f3fDitx zs!xQOztGEPyCnX3&fg#OdCmzUbN}xZmK0~c??z5#Pc~Wbr_RUWm^m3_%Z)0c4Ni;t z7SBu@x|4=F246pj$>?#f1o4DZ+z=iReiF}43w*CrYE+g#7hL1;9ddjW<%#?;)L}mq zqdO+yv?tCey77FX%`FaeIvNaF?4&F#jSIzYs{jKMuQd^8KP|77wJ|pyn8iD8M987w zn2hI>ISqd4Z6?elqDcQ|QO`eJwM*e_vFWbuKiA~8EYl@?!=RRJike#z`a(h(eQWjV zG_B-wI#%uQl;!q;%<!+7!KFWtD#oeaR%rz*#Oj$lA#{~v1)=*(*T>tX9Ti7JUTL&Bk-m{m>UC3~ryTv=s z#}{s>K1-y)?fZN?6~#=L^oznI@$by^uRt*m)5JJ$qBvoxQ6>ASFJk++xWcNh9!>Q2fbZhZw zX)?cZERw69VXVv`^@N-$bPf8(W!@JM?`0`Sw>9FK7wH4DpB#nT&wNPEKRF7*wy{8> zQc`@bNv&ZOQI}!e3^5lMr@r0|jww&q1PptsFla@hVR@MIRJAJ8D44H9IC_|E2P}j} zZtp~J93KUHtPZQoocyquXm-p#w#-W1nmOrh_O7*?7{1hX`wJMmCFc!e#;7SF`3i$o zyxh}trK{1@3~MWSpkK%vx-C8$jQ5Xw^rP-53JM+}})HAh~^r~O85*C^AGn&hiQ0hVqVq&8;|+KwE*#h2t?L3H(6)f6Ah z`5i}_B1WMm>JUoSS00RU*h7k3AvY!_XN7%R>EkU^KghxXj0iFkQ&Mtb}6Nbmg|fursK1PQTYw)U{9Mi*DQ(dWXXn`Gs1 zf1K&&KZc3Kkb3*5hw0)Aji`@Srv}3#>q_MwNAcAVv>R*6czI1h&Wb#)ZKBxc@8&v` zzTmwv>G?Y9i{))@6pCZuJAGrH9x`kl4(13xi4}&;Y!$3T(aqz?s~BnClGDQ2-b|}) zE$DQZ5Y>(he>1)ed5>IluSi@fYm4(~<)iQ!87A5s#%?QtM3FQYV@Xo2j$@JbF^0Gw zsta6?Ha$SjcDyyMUqem6_1@$Fqkf%dhm$qizVmO@37dU zg5?6Gdl{ms6&60}v?5NUN%xUZP+j znZfDi%Sw3rOdDK#A^@O#4ValZI$j2T<#2jAM!{qJU9xNI6@sA-$@>f_LhOG2tD9Jx zPJK8~3`@-F@g1=ut)Jg7>bVP-1-NPY%8R<0FiYk@Da~rdNY1P+Mr}9V#LXsSGGF?( zA6DNwub?omKM0TbiDi(uwk_x5BaNBBXtV3^TQcTwW3{TFQq4T?HxGNp zyCr=h4TchAp8v3>Z@D*n4ZBd1asof@8B|@yVdnTWCFVptkp>mJkKC}w Date: Tue, 19 Oct 2021 10:13:18 +0100 Subject: [PATCH 17/18] fixing info icon MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Rogério Peixoto --- dist/index.js | 19 ++++++++++--------- src/commenter.js | 19 ++++++++++--------- 2 files changed, 20 insertions(+), 18 deletions(-) diff --git a/dist/index.js b/dist/index.js index a21e735..fdfa257 100644 --- a/dist/index.js +++ b/dist/index.js @@ -17857,9 +17857,10 @@ const severityIcons = { "HIGH": "https://user-images.githubusercontent.com/23239410/92157087-97285600-ee32-11ea-988f-0aca12c4c126.png", "MEDIUM": "https://user-images.githubusercontent.com/23239410/92157093-98598300-ee32-11ea-83d7-af52251a011b.png", "LOW": "https://user-images.githubusercontent.com/23239410/92157091-98598300-ee32-11ea-8498-19bd7d62019b.png", - "INFO": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png", - "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png" + "INFO": "https://user-images.githubusercontent.com/75368139/137872145-b13b5200-6919-43c2-a49b-d3fdbbc20f63.png", + "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png", } +const emptyIcon = "https://user-images.githubusercontent.com/75368139/137874724-5118ebc4-9769-4eb2-923d-e4ca479f747f.png" function createComment(results) { let message = "![kics-logo](" + kicsLogo + ")\n"; @@ -17877,18 +17878,18 @@ function createComment(results) { message += `| ![${severity}](${severityIcons[severity]}) | ${severity.toUpperCase()} | ${severityCounters[severity.toUpperCase()]} |\n`; } } - message += `| ![TOTAL](${severityIcons['TRACE']}) | TOTAL | ${results['total_counter']} |`; + message += `| ![TOTAL](${emptyIcon}) | TOTAL | ${results['total_counter']} |`; message += "\n\n\n\n"; message += "| | Metric | Values |\n"; message += "| --- | --- | --- |\n"; - message += `| ![placeholder](${severityIcons['TRACE']}) | Files scanned | ${results['files_scanned']}\n`; - message += `| ![placeholder](${severityIcons['TRACE']}) | Files parsed | ${results['files_parsed']}\n`; - message += `| ![placeholder](${severityIcons['TRACE']}) | Files failed to scan | ${results['files_failed_to_scan']}\n`; - message += `| ![placeholder](${severityIcons['TRACE']}) | Total queries | ${results['queries_total']}\n`; - message += `| ![placeholder](${severityIcons['TRACE']}) | Queries failed to execute | ${results['queries_failed_to_execute']}\n`; - message += `| ![placeholder](${severityIcons['TRACE']}) | Execution time | ${moment(results['end']).diff(moment(results['start']), 'seconds')}\n`; + message += `| ![placeholder](${emptyIcon}) | Files scanned | ${results['files_scanned']}\n`; + message += `| ![placeholder](${emptyIcon}) | Files parsed | ${results['files_parsed']}\n`; + message += `| ![placeholder](${emptyIcon}) | Files failed to scan | ${results['files_failed_to_scan']}\n`; + message += `| ![placeholder](${emptyIcon}) | Total executed queries | ${results['queries_total']}\n`; + message += `| ![placeholder](${emptyIcon}) | Queries failed to execute | ${results['queries_failed_to_execute']}\n`; + message += `| ![placeholder](${emptyIcon}) | Execution time | ${moment(results['end']).diff(moment(results['start']), 'seconds')}\n`; message += "\n\n\n\n"; diff --git a/src/commenter.js b/src/commenter.js index 0a28582..c938575 100644 --- a/src/commenter.js +++ b/src/commenter.js @@ -6,9 +6,10 @@ const severityIcons = { "HIGH": "https://user-images.githubusercontent.com/23239410/92157087-97285600-ee32-11ea-988f-0aca12c4c126.png", "MEDIUM": "https://user-images.githubusercontent.com/23239410/92157093-98598300-ee32-11ea-83d7-af52251a011b.png", "LOW": "https://user-images.githubusercontent.com/23239410/92157091-98598300-ee32-11ea-8498-19bd7d62019b.png", - "INFO": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png", - "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png" + "INFO": "https://user-images.githubusercontent.com/75368139/137872145-b13b5200-6919-43c2-a49b-d3fdbbc20f63.png", + "TRACE": "https://user-images.githubusercontent.com/23239410/92157090-97c0ec80-ee32-11ea-9b2e-aa6b32b03d54.png", } +const emptyIcon = "https://user-images.githubusercontent.com/75368139/137874724-5118ebc4-9769-4eb2-923d-e4ca479f747f.png" function createComment(results) { let message = "![kics-logo](" + kicsLogo + ")\n"; @@ -26,18 +27,18 @@ function createComment(results) { message += `| ![${severity}](${severityIcons[severity]}) | ${severity.toUpperCase()} | ${severityCounters[severity.toUpperCase()]} |\n`; } } - message += `| ![TOTAL](${severityIcons['TRACE']}) | TOTAL | ${results['total_counter']} |`; + message += `| ![TOTAL](${emptyIcon}) | TOTAL | ${results['total_counter']} |`; message += "\n\n\n\n"; message += "| | Metric | Values |\n"; message += "| --- | --- | --- |\n"; - message += `| ![placeholder](${severityIcons['TRACE']}) | Files scanned | ${results['files_scanned']}\n`; - message += `| ![placeholder](${severityIcons['TRACE']}) | Files parsed | ${results['files_parsed']}\n`; - message += `| ![placeholder](${severityIcons['TRACE']}) | Files failed to scan | ${results['files_failed_to_scan']}\n`; - message += `| ![placeholder](${severityIcons['TRACE']}) | Total queries | ${results['queries_total']}\n`; - message += `| ![placeholder](${severityIcons['TRACE']}) | Queries failed to execute | ${results['queries_failed_to_execute']}\n`; - message += `| ![placeholder](${severityIcons['TRACE']}) | Execution time | ${moment(results['end']).diff(moment(results['start']), 'seconds')}\n`; + message += `| ![placeholder](${emptyIcon}) | Files scanned | ${results['files_scanned']}\n`; + message += `| ![placeholder](${emptyIcon}) | Files parsed | ${results['files_parsed']}\n`; + message += `| ![placeholder](${emptyIcon}) | Files failed to scan | ${results['files_failed_to_scan']}\n`; + message += `| ![placeholder](${emptyIcon}) | Total executed queries | ${results['queries_total']}\n`; + message += `| ![placeholder](${emptyIcon}) | Queries failed to execute | ${results['queries_failed_to_execute']}\n`; + message += `| ![placeholder](${emptyIcon}) | Execution time | ${moment(results['end']).diff(moment(results['start']), 'seconds')}\n`; message += "\n\n\n\n"; From 90790a2f8dfd6e496940a5c26ac3fa33e2c69650 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rog=C3=A9rio=20Peixoto?= Date: Thu, 21 Oct 2021 13:55:53 +0100 Subject: [PATCH 18/18] removing extra column from right side panel MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Rogério Peixoto --- dist/index.js | 16 ++++++++-------- src/commenter.js | 16 ++++++++-------- 2 files changed, 16 insertions(+), 16 deletions(-) diff --git a/dist/index.js b/dist/index.js index fdfa257..6c2b070 100644 --- a/dist/index.js +++ b/dist/index.js @@ -17882,14 +17882,14 @@ function createComment(results) { message += "\n\n\n\n"; - message += "| | Metric | Values |\n"; - message += "| --- | --- | --- |\n"; - message += `| ![placeholder](${emptyIcon}) | Files scanned | ${results['files_scanned']}\n`; - message += `| ![placeholder](${emptyIcon}) | Files parsed | ${results['files_parsed']}\n`; - message += `| ![placeholder](${emptyIcon}) | Files failed to scan | ${results['files_failed_to_scan']}\n`; - message += `| ![placeholder](${emptyIcon}) | Total executed queries | ${results['queries_total']}\n`; - message += `| ![placeholder](${emptyIcon}) | Queries failed to execute | ${results['queries_failed_to_execute']}\n`; - message += `| ![placeholder](${emptyIcon}) | Execution time | ${moment(results['end']).diff(moment(results['start']), 'seconds')}\n`; + message += "| Metric | Values |\n"; + message += "| --- | --- |\n"; + message += `| Files scanned ![placeholder](${emptyIcon}) | ${results['files_scanned']}\n`; + message += `| Files parsed ![placeholder](${emptyIcon}) | ${results['files_parsed']}\n`; + message += `| Files failed to scan ![placeholder](${emptyIcon}) | ${results['files_failed_to_scan']}\n`; + message += `| Total executed queries ![placeholder](${emptyIcon}) | ${results['queries_total']}\n`; + message += `| Queries failed to execute ![placeholder](${emptyIcon}) | ${results['queries_failed_to_execute']}\n`; + message += `| Execution time ![placeholder](${emptyIcon}) | ${moment(results['end']).diff(moment(results['start']), 'seconds')}\n`; message += "\n\n\n\n"; diff --git a/src/commenter.js b/src/commenter.js index c938575..18e3b06 100644 --- a/src/commenter.js +++ b/src/commenter.js @@ -31,14 +31,14 @@ function createComment(results) { message += "\n\n\n\n"; - message += "| | Metric | Values |\n"; - message += "| --- | --- | --- |\n"; - message += `| ![placeholder](${emptyIcon}) | Files scanned | ${results['files_scanned']}\n`; - message += `| ![placeholder](${emptyIcon}) | Files parsed | ${results['files_parsed']}\n`; - message += `| ![placeholder](${emptyIcon}) | Files failed to scan | ${results['files_failed_to_scan']}\n`; - message += `| ![placeholder](${emptyIcon}) | Total executed queries | ${results['queries_total']}\n`; - message += `| ![placeholder](${emptyIcon}) | Queries failed to execute | ${results['queries_failed_to_execute']}\n`; - message += `| ![placeholder](${emptyIcon}) | Execution time | ${moment(results['end']).diff(moment(results['start']), 'seconds')}\n`; + message += "| Metric | Values |\n"; + message += "| --- | --- |\n"; + message += `| Files scanned ![placeholder](${emptyIcon}) | ${results['files_scanned']}\n`; + message += `| Files parsed ![placeholder](${emptyIcon}) | ${results['files_parsed']}\n`; + message += `| Files failed to scan ![placeholder](${emptyIcon}) | ${results['files_failed_to_scan']}\n`; + message += `| Total executed queries ![placeholder](${emptyIcon}) | ${results['queries_total']}\n`; + message += `| Queries failed to execute ![placeholder](${emptyIcon}) | ${results['queries_failed_to_execute']}\n`; + message += `| Execution time ![placeholder](${emptyIcon}) | ${moment(results['end']).diff(moment(results['start']), 'seconds')}\n`; message += "\n\n\n\n";