class SecurityGroupIngressPortRangeRule
Public Instance Methods
audit_impl(cfn_model)
click to toggle source
This will behave slightly different than the legacy jq based rule which was targeted against inline ingress only
# File lib/cfn-nag/custom_rules/SecurityGroupIngressPortRangeRule.rb, line 23 def audit_impl(cfn_model) violating_security_groups = cfn_model.security_groups.select do |security_group| violating_ingresses = security_group.ingresses.select do |ingress| ingress.fromPort != ingress.toPort end !violating_ingresses.empty? end violating_ingresses = cfn_model.standalone_ingress.select do |standalone_ingress| standalone_ingress.fromPort != standalone_ingress.toPort end violating_security_groups.map(&:logical_resource_id) + violating_ingresses.map(&:logical_resource_id) end
rule_id()
click to toggle source
# File lib/cfn-nag/custom_rules/SecurityGroupIngressPortRangeRule.rb, line 16 def rule_id 'W27' end
rule_text()
click to toggle source
# File lib/cfn-nag/custom_rules/SecurityGroupIngressPortRangeRule.rb, line 7 def rule_text 'Security Groups found ingress with port range instead of just a single ' \ 'port' end
rule_type()
click to toggle source
# File lib/cfn-nag/custom_rules/SecurityGroupIngressPortRangeRule.rb, line 12 def rule_type Violation::WARNING end