Skip to content

Commit fb0cba4

Browse files
Update AWS provider/module and generated content (#981)
Co-authored-by: bendrucker <[email protected]>
1 parent 88c5499 commit fb0cba4

15 files changed

+53
-30
lines changed

rules/models/api-models-aws

Submodule api-models-aws updated 68 files

rules/models/aws_alb_listener_invalid_protocol.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,9 @@ func NewAwsALBListenerInvalidProtocolRule() *AwsALBListenerInvalidProtocolRule {
2828
"GENEVE",
2929
"HTTP",
3030
"HTTPS",
31+
"QUIC",
3132
"TCP",
33+
"TCP_QUIC",
3234
"TCP_UDP",
3335
"TLS",
3436
"UDP",

rules/models/aws_alb_target_group_invalid_protocol.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,9 @@ func NewAwsALBTargetGroupInvalidProtocolRule() *AwsALBTargetGroupInvalidProtocol
2828
"GENEVE",
2929
"HTTP",
3030
"HTTPS",
31+
"QUIC",
3132
"TCP",
33+
"TCP_QUIC",
3234
"TCP_UDP",
3335
"TLS",
3436
"UDP",

rules/models/aws_api_gateway_domain_name_invalid_security_policy.go

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,15 @@ func NewAwsAPIGatewayDomainNameInvalidSecurityPolicyRule() *AwsAPIGatewayDomainN
2525
resourceType: "aws_api_gateway_domain_name",
2626
attributeName: "security_policy",
2727
enum: []string{
28+
"SecurityPolicy_TLS12_2018_EDGE",
29+
"SecurityPolicy_TLS12_PFS_2025_EDGE",
30+
"SecurityPolicy_TLS13_1_2_2021_06",
31+
"SecurityPolicy_TLS13_1_2_FIPS_PQ_2025_09",
32+
"SecurityPolicy_TLS13_1_2_PFS_PQ_2025_09",
33+
"SecurityPolicy_TLS13_1_2_PQ_2025_09",
34+
"SecurityPolicy_TLS13_1_3_2025_09",
35+
"SecurityPolicy_TLS13_1_3_FIPS_2025_09",
36+
"SecurityPolicy_TLS13_2025_EDGE",
2837
"TLS_1_0",
2938
"TLS_1_2",
3039
},

rules/models/aws_lb_listener_invalid_protocol.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,9 @@ func NewAwsLbListenerInvalidProtocolRule() *AwsLbListenerInvalidProtocolRule {
2828
"GENEVE",
2929
"HTTP",
3030
"HTTPS",
31+
"QUIC",
3132
"TCP",
33+
"TCP_QUIC",
3234
"TCP_UDP",
3335
"TLS",
3436
"UDP",

rules/models/aws_lb_target_group_invalid_protocol.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,9 @@ func NewAwsLbTargetGroupInvalidProtocolRule() *AwsLbTargetGroupInvalidProtocolRu
2828
"GENEVE",
2929
"HTTP",
3030
"HTTPS",
31+
"QUIC",
3132
"TCP",
33+
"TCP_QUIC",
3234
"TCP_UDP",
3335
"TLS",
3436
"UDP",

rules/models/aws_storagegateway_cached_iscsi_volume_invalid_source_volume_arn.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ func NewAwsStoragegatewayCachedIscsiVolumeInvalidSourceVolumeArnRule() *AwsStora
2929
attributeName: "source_volume_arn",
3030
max: 500,
3131
min: 50,
32-
pattern: regexp.MustCompile(`^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*)):storagegateway:[a-z\-0-9]+:[0-9]+:gateway\/(.+)\/volume\/vol-(\S+)$`),
32+
pattern: regexp.MustCompile(`^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*|-eusc)):storagegateway:[a-z\-0-9]+:[0-9]+:gateway\/(.+)\/volume\/vol-(\S+)$`),
3333
}
3434
}
3535

@@ -90,7 +90,7 @@ func (r *AwsStoragegatewayCachedIscsiVolumeInvalidSourceVolumeArnRule) Check(run
9090
if !r.pattern.MatchString(val) {
9191
runner.EmitIssue(
9292
r,
93-
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*)):storagegateway:[a-z\-0-9]+:[0-9]+:gateway\/(.+)\/volume\/vol-(\S+)$`),
93+
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*|-eusc)):storagegateway:[a-z\-0-9]+:[0-9]+:gateway\/(.+)\/volume\/vol-(\S+)$`),
9494
attribute.Expr.Range(),
9595
)
9696
}

rules/models/aws_storagegateway_nfs_file_share_invalid_kms_key_arn.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ func NewAwsStoragegatewayNfsFileShareInvalidKmsKeyArnRule() *AwsStoragegatewayNf
2929
attributeName: "kms_key_arn",
3030
max: 2048,
3131
min: 7,
32-
pattern: regexp.MustCompile(`^(^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*)):kms:([a-zA-Z0-9-]+):([0-9]+):(key|alias)/(\S+)$)|(^alias/(\S+)$)$`),
32+
pattern: regexp.MustCompile(`^(^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*|-eusc)):kms:([a-zA-Z0-9-]+):([0-9]+):(key|alias)/(\S+)$)|(^alias/(\S+)$)$`),
3333
}
3434
}
3535

@@ -90,7 +90,7 @@ func (r *AwsStoragegatewayNfsFileShareInvalidKmsKeyArnRule) Check(runner tflint.
9090
if !r.pattern.MatchString(val) {
9191
runner.EmitIssue(
9292
r,
93-
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^(^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*)):kms:([a-zA-Z0-9-]+):([0-9]+):(key|alias)/(\S+)$)|(^alias/(\S+)$)$`),
93+
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^(^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*|-eusc)):kms:([a-zA-Z0-9-]+):([0-9]+):(key|alias)/(\S+)$)|(^alias/(\S+)$)$`),
9494
attribute.Expr.Range(),
9595
)
9696
}

rules/models/aws_storagegateway_nfs_file_share_invalid_role_arn.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ func NewAwsStoragegatewayNfsFileShareInvalidRoleArnRule() *AwsStoragegatewayNfsF
2929
attributeName: "role_arn",
3030
max: 2048,
3131
min: 20,
32-
pattern: regexp.MustCompile(`^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*)):iam::([0-9]+):role/(\S+)$`),
32+
pattern: regexp.MustCompile(`^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*|-eusc)):iam::([0-9]+):role/(\S+)$`),
3333
}
3434
}
3535

@@ -90,7 +90,7 @@ func (r *AwsStoragegatewayNfsFileShareInvalidRoleArnRule) Check(runner tflint.Ru
9090
if !r.pattern.MatchString(val) {
9191
runner.EmitIssue(
9292
r,
93-
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*)):iam::([0-9]+):role/(\S+)$`),
93+
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*|-eusc)):iam::([0-9]+):role/(\S+)$`),
9494
attribute.Expr.Range(),
9595
)
9696
}

rules/models/aws_storagegateway_smb_file_share_invalid_kms_key_arn.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ func NewAwsStoragegatewaySmbFileShareInvalidKmsKeyArnRule() *AwsStoragegatewaySm
2929
attributeName: "kms_key_arn",
3030
max: 2048,
3131
min: 7,
32-
pattern: regexp.MustCompile(`^(^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*)):kms:([a-zA-Z0-9-]+):([0-9]+):(key|alias)/(\S+)$)|(^alias/(\S+)$)$`),
32+
pattern: regexp.MustCompile(`^(^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*|-eusc)):kms:([a-zA-Z0-9-]+):([0-9]+):(key|alias)/(\S+)$)|(^alias/(\S+)$)$`),
3333
}
3434
}
3535

@@ -90,7 +90,7 @@ func (r *AwsStoragegatewaySmbFileShareInvalidKmsKeyArnRule) Check(runner tflint.
9090
if !r.pattern.MatchString(val) {
9191
runner.EmitIssue(
9292
r,
93-
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^(^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*)):kms:([a-zA-Z0-9-]+):([0-9]+):(key|alias)/(\S+)$)|(^alias/(\S+)$)$`),
93+
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^(^arn:(aws(|-cn|-us-gov|-iso[A-Za-z0-9_-]*|-eusc)):kms:([a-zA-Z0-9-]+):([0-9]+):(key|alias)/(\S+)$)|(^alias/(\S+)$)$`),
9494
attribute.Expr.Range(),
9595
)
9696
}

0 commit comments

Comments
 (0)