class SecurityGroupIngressPortRangeRule

Public Instance Methods

audit_impl(cfn_model) click to toggle source

This will behave slightly different than the legacy jq based rule which was targeted against inline ingress only

# File lib/cfn-nag/custom_rules/SecurityGroupIngressPortRangeRule.rb, line 23
def audit_impl(cfn_model)
  violating_security_groups = cfn_model.security_groups.select do |security_group|
    violating_ingresses = security_group.ingresses.select do |ingress|
      ingress.fromPort != ingress.toPort
    end

    !violating_ingresses.empty?
  end

  violating_ingresses = cfn_model.standalone_ingress.select do |standalone_ingress|
    standalone_ingress.fromPort != standalone_ingress.toPort
  end

  violating_security_groups.map(&:logical_resource_id) + violating_ingresses.map(&:logical_resource_id)
end
rule_id() click to toggle source
# File lib/cfn-nag/custom_rules/SecurityGroupIngressPortRangeRule.rb, line 16
def rule_id
  'W27'
end
rule_text() click to toggle source
# File lib/cfn-nag/custom_rules/SecurityGroupIngressPortRangeRule.rb, line 7
def rule_text
  'Security Groups found ingress with port range instead of just a single ' \
  'port'
end
rule_type() click to toggle source
# File lib/cfn-nag/custom_rules/SecurityGroupIngressPortRangeRule.rb, line 12
def rule_type
  Violation::WARNING
end