All patches and comments are welcome. Please squash your changes to logical
commits before using git-format-patch and git-send-email to
patches@git.madduck.net.
If you'd read over the Git project's submission guidelines and adhered to them,
I'd be especially grateful.
2 runtime ale_linters/terraform/tfsec.vim
5 call ale#linter#Reset()
7 Execute(The tfsec handler should handle empty output):
10 \ ale_linters#terraform#tfsec#Handle(bufnr(''), ['{"results": null}'])
12 Execute(The tfsec handler should parse results correctly):
16 \ 'filename': '/test/main.tf',
19 \ 'text': "IAM policy document uses sensitive action 'iam:PassRole' on wildcarded resource '*'",
20 \ 'code': 'aws-iam-no-policy-wildcards',
24 \ ale_linters#terraform#tfsec#Handle(bufnr(''), json_encode(
28 \ "rule_id": "AVD-AWS-0057",
29 \ "long_id": "aws-iam-no-policy-wildcards",
30 \ "rule_description": "IAM policy should avoid use of wildcards and instead apply the principle of least privilege",
31 \ "rule_provider": "aws",
32 \ "rule_service": "iam",
33 \ "impact": "Overly permissive policies may grant access to sensitive resources",
34 \ "resolution": "Specify the exact permissions required, and to which resources they should apply instead of using wildcards.",
36 \ "https://aquasecurity.github.io/tfsec/v1.28.0/checks/aws/iam/no-policy-wildcards/",
37 \ "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document"
39 \ "description": "IAM policy document uses sensitive action 'iam:PassRole' on wildcarded resource '*'",
43 \ "resource": "data.aws_iam_policy_document.default",
45 \ "filename": "/test/main.tf",