Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(keyExpectedValue): convert is not to a recommendation rather than a current status #5575

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.load_balancers", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("%s.load_balancers is not empty", [modules[m]]),
"keyExpectedValue": sprintf("%s.load_balancers should not be empty", [modules[m]]),
"keyActualValue": sprintf("%s.load_balancers is empty", [modules[m]]),
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.rules.%s", [task.name, modules[m], cidr]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("'ec2_group.rules.%s' is not %s", [cidr, cidrValue]),
"keyExpectedValue": sprintf("'ec2_group.rules.%s' should not be %s", [cidr, cidrValue]),
"keyActualValue": sprintf("'ec2_group.rules.%s' is %s", [cidr, rule[cidr]]),
"searchLine": common_lib.build_search_line(["playbooks", t, modules[m], "rules", idx, cidr], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.%s", [task.name, modules[m], sgs[s]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("'%s' is not using default security group", [sgs[s]]),
"keyExpectedValue": sprintf("'%s' should not be using default security group", [sgs[s]]),
"keyActualValue": sprintf("'%s' is using default security group", [sgs[s]]),
"searchLine": common_lib.build_search_line(["playbooks", t, modules[m], sgs[s]], [idx]),
}
Expand All @@ -47,7 +47,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.%s", [task.name, modules[m], sgs[s]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("'%s' is not using default security group", [sgs[s]]),
"keyExpectedValue": sprintf("'%s' should not be using default security group", [sgs[s]]),
"keyActualValue": sprintf("'%s' is using default security group", [sgs[s]]),
"searchLine": common_lib.build_search_line(["playbooks", t, modules[m], sgs[s]], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.vpc_subnet_id", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "'vpc_subnet_id' is not associated with a default VPC",
"keyExpectedValue": "'vpc_subnet_id' should not be associated with a default VPC",
"keyActualValue": "'vpc_subnet_id' is associated with a default VPC",
"searchLine": common_lib.build_search_line(["playbooks", t, modules[m], "vpc_subnet_id"], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.policy", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "ecs_ecr.policy.Principal is not equal to '*'",
"keyExpectedValue": "ecs_ecr.policy.Principal should not be equal to '*'",
"keyActualValue": "ecs_ecr.policy.Principal is equal to '*'",
"searchLine": common_lib.build_search_line(["playbooks", t, modules[m], "policy"], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.role", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "ecs_service.role is not an admin role",
"keyExpectedValue": "ecs_service.role should not be an admin role",
"keyActualValue": "ecs_service.role is an admin role",
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.cache_port", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("'cache_port' is not set to %d", [enginePort]),
"keyExpectedValue": sprintf("'cache_port' should not be set to %d", [enginePort]),
"keyActualValue": sprintf("'cache_port' is set to %d", [enginePort]),
"searchLine": common_lib.build_search_line(["playbooks", t, modules[m], "cache_port"], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.listeners.%s", [task.name, modules[m], j]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("%s.listeners.SslPolicy is not a weak cipher", [modules[m]]),
"keyExpectedValue": sprintf("%s.listeners.SslPolicy should not be a weak cipher", [modules[m]]),
"keyActualValue": sprintf("%s.listeners.SslPolicy is a weak cipher", [modules[m]]),
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.%s", [task.name, rds[r], options[o]]),
"issueType": "MissingAttribute",
"keyExpectedValue": "RDS is not running in a public subnet",
"keyExpectedValue": "RDS should not be running in a public subnet",
"keyActualValue": "RDS is running in a public subnet",
"searchLine": common_lib.build_search_line(["playbooks", t, rds[r], options[o]], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.port", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("'port' is not set to %d", [enginePort]),
"keyExpectedValue": sprintf("'port' should not be set to %d", [enginePort]),
"keyActualValue": sprintf("'port' is set to %d", [enginePort]),
"searchLine": common_lib.build_search_line(["playbooks", t, modules[m], "port"], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.port", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "redshift.port is not set to 5439",
"keyExpectedValue": "redshift.port should not be set to 5439",
"keyActualValue": "redshift.port is set to 5439",
"searchLine": common_lib.build_search_line(["playbooks", t, modules[m], "port"], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "iam is not active for a root account",
"keyExpectedValue": "iam should not be active for a root account",
"keyActualValue": "iam is active for a root account",
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.encryption", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "s3_bucket.encryption is not 'none'",
"keyExpectedValue": "s3_bucket.encryption should not be 'none'",
"keyActualValue": "s3_bucket.encryption is 'none'",
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.rules", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("ec2_group.rules[%d] SSH' (Port:22) is not public", [index]),
"keyExpectedValue": sprintf("ec2_group.rules[%d] SSH' (Port:22) should not be public", [index]),
"keyActualValue": sprintf("ec2_group.rules[%d] SSH' (Port:22) is public", [index]),
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.user_data", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "ec2_lc.user_data is not shell script",
"keyExpectedValue": "ec2_lc.user_data should not be shell script",
"keyActualValue": "ec2_lc.user_data is shell script",
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.network_acls.default_action", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "azure_rm_storageaccount.network_acls.default_action is not set",
"keyExpectedValue": "azure_rm_storageaccount.network_acls.default_action should not be set",
"keyActualValue": "azure_rm_storageaccount.network_acls.default_action is 'Allow'",
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.%s", [task.name, modules[m], fields[f]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("azure_rm_subnet.%s is not empty", [fields[f]]),
"keyExpectedValue": sprintf("azure_rm_subnet.%s should not be empty", [fields[f]]),
"keyActualValue": sprintf("azure_rm_subnet.%s is empty", [fields[f]]),
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.ad_user", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "azure_ad_serviceprincipal.ad_user is not predictable",
"keyExpectedValue": "azure_ad_serviceprincipal.ad_user should not be predictable",
"keyActualValue": "azure_ad_serviceprincipal.ad_user is predictable",
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.admin_username", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "azure_rm_sqlserver.admin_username is not empty",
"keyExpectedValue": "azure_rm_sqlserver.admin_username should not be empty",
"keyActualValue": "azure_rm_sqlserver.admin_username is empty",
}
}
Expand All @@ -37,7 +37,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.admin_username", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "azure_rm_sqlserver.admin_username is not predictable",
"keyExpectedValue": "azure_rm_sqlserver.admin_username should not be predictable",
"keyActualValue": "azure_rm_sqlserver.admin_username is predictable",
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.public_access", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "azure_rm_storageblob.public_access is not set",
"keyExpectedValue": "azure_rm_storageblob.public_access should not be set",
"keyActualValue": "azure_rm_storageblob.public_access is equal to 'blob' or 'container'",
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.network_acls.bypass", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "azure_rm_storageaccount.network_acls.bypass is not set or contains 'AzureServices'",
"keyExpectedValue": "azure_rm_storageaccount.network_acls.bypass should not be set or contain 'AzureServices'",
"keyActualValue": "azure_rm_storageaccount.network_acls.bypass does not contain 'AzureServices' ",
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.access", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "gcp_bigquery_dataset.access.special_group is not equal to 'allAuthenticatedUsers'",
"keyExpectedValue": "gcp_bigquery_dataset.access.special_group should not be equal to 'allAuthenticatedUsers'",
"keyActualValue": "gcp_bigquery_dataset.access.special_group is equal to 'allAuthenticatedUsers'",
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.resource_labels", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("%s is not empty", [modules[m]]),
"keyExpectedValue": sprintf("%s should not be empty", [modules[m]]),
"keyActualValue": sprintf("%s is empty", [modules[m]]),
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.master_auth.%s", [task.name, modules[m], fields[f]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("gcp_container_cluster.master_auth.%s is not empty", [field]),
"keyExpectedValue": sprintf("gcp_container_cluster.master_auth.%s should not be empty", [field]),
"keyActualValue": sprintf("gcp_container_cluster.master_auth.%s is empty", [field]),
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.network_interfaces.access_configs", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "gcp_compute_instance.network_interfaces.access_configs is not defined",
"keyExpectedValue": "gcp_compute_instance.network_interfaces.access_configs should not be defined",
"keyActualValue": "gcp_compute_instance.network_interfaces.access_configs is defined",
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.disk_encryption_key.%s", [task.name, modules[m], key]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("gcp_compute_disk.disk_encryption_key.%s is not empty", [key]),
"keyExpectedValue": sprintf("gcp_compute_disk.disk_encryption_key.%s should not be empty", [key]),
"keyActualValue": sprintf("gcp_compute_disk.disk_encryption_key.%s is empty", [key]),
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.dnssec_config.defaultKeySpecs.algorithm", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "gcp_dns_managed_zone.dnssec_config.defaultKeySpecs.algorithm is not equal to 'rsasha1'",
"keyExpectedValue": "gcp_dns_managed_zone.dnssec_config.defaultKeySpecs.algorithm should not be equal to 'rsasha1'",
"keyActualValue": "gcp_dns_managed_zone.dnssec_config.defaultKeySpecs.algorithm is equal to 'rsasha1'",
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.node_config", [task.name, modules[m]]),
"issueType": "MissingAttribute",
"keyExpectedValue": "'service_account' is not default",
"keyExpectedValue": "'service_account' should not be default",
"keyActualValue": "'service_account' is missing",
"searchLine": common_lib.build_search_line(["playbooks", t, modules[m], "node_config"], []),
}
Expand All @@ -37,7 +37,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.node_config.service_account", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "'service_account' is not default",
"keyExpectedValue": "'service_account' should not be default",
"keyActualValue": "'service_account' is default",
"searchLine": common_lib.build_search_line(["playbooks", t, modules[m], "node_config", "service_account"], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ CxPolicy[result] {
"resourceName": tk.name,
"searchKey": sprintf("name={{%s}}.{{%s}}", [tk.name, modulesCompute[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("'%s' is not using a default firewall rule", [modulesCompute[m]]),
"keyExpectedValue": sprintf("'%s' should not be using a default firewall rule", [modulesCompute[m]]),
"keyActualValue": sprintf("'%s' is using a default firewall rule", [modulesCompute[m]]),
"searchLine": common_lib.build_search_line(["playbooks", t, modulesCompute[m]], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ CxPolicy[result] {
"resourceName": tk.name,
"searchKey": sprintf("name={{%s}}.{{%s}}", [tk.name, modulesCompute[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("'%s' is not using a firewall rule that allows access to port range", [modulesCompute[m]]),
"keyExpectedValue": sprintf("'%s' should not be using a firewall rule that allows access to port range", [modulesCompute[m]]),
"keyActualValue": sprintf("'%s' is using a firewall rule that allows access to port range", [modulesCompute[m]]),
"searchLine": common_lib.build_search_line(["playbooks", t, modulesCompute[m]], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ CxPolicy[result] {
"resourceName": tk.name,
"searchKey": sprintf("name={{%s}}.{{%s}}", [tk.name, modulesCompute[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("'%s' is not using a firewall rule that allows access to all ports", [modulesCompute[m]]),
"keyExpectedValue": sprintf("'%s' should not be using a firewall rule that allows access to all ports", [modulesCompute[m]]),
"keyActualValue": sprintf("'%s' is using a firewall rule that allows access to all ports", [modulesCompute[m]]),
"searchLine": common_lib.build_search_line(["playbooks", t, modulesCompute[m]], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.service_account_email", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "gcp_compute_instance.service_account_email is not empty",
"keyExpectedValue": "gcp_compute_instance.service_account_email should not be empty",
"keyActualValue": "gcp_compute_instance.service_account_email is empty",
}
}
Expand Down Expand Up @@ -82,7 +82,7 @@ CxPolicy[result] {
"resourceName": task.name,
"searchKey": sprintf("name={{%s}}.{{%s}}.service_account_email", [task.name, modules[m]]),
"issueType": "IncorrectValue",
"keyExpectedValue": "gcp_compute_instance.service_account_email is not a default Google Compute Engine service account",
"keyExpectedValue": "gcp_compute_instance.service_account_email should not be a default Google Compute Engine service account",
"keyActualValue": "gcp_compute_instance.service_account_email is a default Google Compute Engine service account",
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ CxPolicy[result] {
"resourceName": value.name,
"searchKey": sprintf("%s.name=%s.apiVersion", [common_lib.concat_path(path), value.name]),
"issueType": "IncorrectValue",
"keyExpectedValue": "'apiVersion' is not '2017-08-03'",
"keyExpectedValue": "'apiVersion' should not be '2017-08-03'",
"keyActualValue": "'apiVersion' is '2017-08-03'",
"searchLine": common_lib.build_search_line(path, ["apiVersion"]),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ CxPolicy[result] {
"resourceName": value.name,
"searchKey": sprintf("%s.name=%s.apiVersion", [common_lib.concat_path(path), value.name]),
"issueType": "IncorrectValue",
"keyExpectedValue": "'apiVersion' is not '2017-08-03'",
"keyExpectedValue": "'apiVersion' should not be '2017-08-03'",
"keyActualValue": "'apiVersion' is '2017-08-03'",
"searchLine": common_lib.build_search_line(path, ["apiVersion"]),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ CxPolicy[result] {
"resourceName": "n/a",
"searchKey": sprintf("parameters.%s.defaultValue", [p]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("parameters.%s.defaultValue is not hardcoded", [p]),
"keyExpectedValue": sprintf("parameters.%s.defaultValue should not be hardcoded", [p]),
"keyActualValue": sprintf("parameters.%s.defaultValue is hardcoded", [p]),
"searchLine": common_lib.build_search_line(["parameters", p, "defaultValue"], []),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ CxPolicy[result] {
"resourceName": value.name,
"searchKey": sprintf("%s.name={{%s}}.properties.endIpAddress", [common_lib.concat_path(path), value.name]),
"issueType": "IncorrectValue",
"keyExpectedValue": "endIpAddress is not '255.255.255.255' when startIpAddress is '0.0.0.0'",
"keyExpectedValue": "endIpAddress should not be '255.255.255.255' when startIpAddress is '0.0.0.0'",
"keyActualValue": sprintf("endIpAddress is '%s' and startIpAddress is '%s'", [properties.endIpAddress, properties.startIpAddress]),
"searchLine": common_lib.build_search_line(path, ["properties", "endIpAddress"]),
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ CxPolicy[result] {
"resourceName": cf_lib.get_resource_name(resource, name),
"searchKey": sprintf("Resources.%s.Properties.SecurityPolicy", [name]),
"issueType": "MissingAttribute",
"keyExpectedValue": sprintf("Resources.%s.Properties.SecurityPolicy is not defined", [name]),
"keyExpectedValue": sprintf("Resources.%s.Properties.SecurityPolicy should not be defined", [name]),
"keyActualValue": sprintf("Resources.%s.Properties.SecurityPolicy is defined", [name]),
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ CxPolicy[result] {
"resourceName": cf_lib.get_resource_name(resource, name),
"searchKey": sprintf("Resources.%s.Properties.LoadBalancerNames", [name]),
"issueType": "IncorrectValue",
"keyExpectedValue": sprintf("'Resources.%s.Properties.LoadBalancerNames' is not empty", [name]),
"keyExpectedValue": sprintf("'Resources.%s.Properties.LoadBalancerNames' should not be empty", [name]),
"keyActualValue": sprintf("'Resources.%s.Properties.LoadBalancerNames' is empty", [name]),
}
}
Expand Down
Loading