Skip to content

Commit ffe24e1

Browse files
authored
feat(misconf): generate placeholders for random provider resources (#8051)
Signed-off-by: nikpivkin <[email protected]>
1 parent fd07074 commit ffe24e1

File tree

2 files changed

+64
-4
lines changed

2 files changed

+64
-4
lines changed

pkg/iac/scanners/terraform/scanner_test.go

+44
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ import (
66
"strconv"
77
"strings"
88
"testing"
9+
"testing/fstest"
910

1011
"github.com/stretchr/testify/assert"
1112
"github.com/stretchr/testify/require"
@@ -951,3 +952,46 @@ resource "aws_s3_bucket" "test" {}
951952
assert.Len(t, results, 2)
952953
})
953954
}
955+
956+
func TestUseRandomProvider(t *testing.T) {
957+
fsys := fstest.MapFS{
958+
"main.tf": &fstest.MapFile{Data: []byte(`resource "random_id" "suffix" {}
959+
960+
locals {
961+
bucket = "test-${random_id.suffix.hex}"
962+
}
963+
964+
resource "aws_s3_bucket" "test" {
965+
bucket = local.bucket
966+
}
967+
968+
resource "aws_s3_bucket_versioning" "test" {
969+
bucket = local.bucket
970+
versioning_configuration {
971+
status = "Enabled"
972+
}
973+
}
974+
`)},
975+
}
976+
977+
check := `package test
978+
import rego.v1
979+
980+
deny contains res if {
981+
some bucket in input.aws.s3.buckets
982+
bucket.versioning.enabled.value
983+
res := result.new("Bucket versioning is enabled", bucket)
984+
}
985+
`
986+
987+
scanner := New(
988+
ScannerWithAllDirectories(true),
989+
rego.WithPolicyReader(strings.NewReader(check)),
990+
rego.WithPolicyNamespaces("test"),
991+
)
992+
993+
results, err := scanner.ScanFS(context.TODO(), fsys, ".")
994+
require.NoError(t, err)
995+
996+
assert.Len(t, results.GetFailed(), 1)
997+
}

pkg/iac/terraform/presets.go

+20-4
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,23 @@ package terraform
22

33
import (
44
"fmt"
5+
"math/rand/v2"
56
"strings"
67

78
"github.com/google/uuid"
89
"github.com/zclconf/go-cty/cty"
910
)
1011

12+
var resourceRandomAttributes = map[string][]string{
13+
// If the user leaves the name blank, Terraform will automatically generate a unique name
14+
"aws_launch_template": {"name"},
15+
"random_id": {"hex", "dec", "b64_url", "b64_std"},
16+
"random_password": {"result", "bcrypt_hash"},
17+
"random_string": {"result"},
18+
"random_bytes": {"base64", "hex"},
19+
"random_uuid": {"result"},
20+
}
21+
1122
func createPresetValues(b *Block) map[string]cty.Value {
1223
presets := make(map[string]cty.Value)
1324

@@ -23,16 +34,21 @@ func createPresetValues(b *Block) map[string]cty.Value {
2334
// workaround for weird iam feature
2435
case "aws_iam_policy_document":
2536
presets["json"] = cty.StringVal(b.ID())
26-
// If the user leaves the name blank, Terraform will automatically generate a unique name
27-
case "aws_launch_template":
28-
presets["name"] = cty.StringVal(uuid.New().String())
2937
// allow referencing the current region name
3038
case "aws_region":
3139
presets["name"] = cty.StringVal("current-region")
40+
case "random_integer":
41+
//nolint:gosec
42+
presets["result"] = cty.NumberIntVal(rand.Int64())
3243
}
3344

34-
return presets
45+
if attrs, exists := resourceRandomAttributes[b.TypeLabel()]; exists {
46+
for _, attr := range attrs {
47+
presets[attr] = cty.StringVal(uuid.New().String())
48+
}
49+
}
3550

51+
return presets
3652
}
3753

3854
func postProcessValues(b *Block, input map[string]cty.Value) map[string]cty.Value {

0 commit comments

Comments
 (0)