Releases: Skyscanner/cfripper
Releases · Skyscanner/cfripper
0.18.1
0.18.0
Improvements
EC2SecurityGroupIngressOpenToWorldRule
,EC2SecurityGroupMissingEgressRule
andEC2SecurityGroupOpenToWorldRule
include support for filters.EC2SecurityGroupIngressOpenToWorldRule
andEC2SecurityGroupOpenToWorldRule
support adding errors for port ranges.
Breaking changes
Config.DEFAULT_ALLOWED_WORLD_OPEN_PORTS
type changes toList[int]
- Rename
SecurityGroupIngressOpenToWorldRule
toEC2SecurityGroupIngressOpenToWorldRule
- Rename
SecurityGroupMissingEgressRule
toEC2SecurityGroupMissingEgressRule
- Rename
SecurityGroupOpenToWorldRule
toEC2SecurityGroupOpenToWorldRule
- Improved message for users when failing the
SecurityGroupOpenToWorldRule
andSecurityGroupIngressOpenToWorldRule
rules. - Improved documentation for the above rules, including styling fixes which have now been tested.
0.17.1
0.17.0
Improvements
CrossAccountCheckingRule
,CrossAccountTrustRule
,S3CrossAccountTrustRule
andKMSKeyCrossAccountTrustRule
include support for filters.
Breaking changes
CrossAccountCheckingRule
now includes the invoke method. Statements of PolicyDocument are now analysed usingRESOURCE_TYPE
andPROPERTY_WITH_POLICYDOCUMENT
class variables.
0.16.0
Improvements
- Add new
RuleConfig
, allows to overwrite the default behaviour of the rule changing rule mode and risk value. - Add new
Filter
, allows setting custom rule configuration to matching coincidences. - New RuleModes supported:
RuleMode.DISABLED
andRuleMode.WHITELISTED
.
Breaking changes
- Class variables
Rule.RULE_MODE
andRule.RISK_VALUE
should be changed to use propertiesrule_mode
andrisk_value
. These properties take in consideration the custom config that might be applied. - If rule mode is
DISABLED
orWHITELISTED
; methodsadd_failure_to_result
andadd_warning_to_result
will have no effect. add_failure_to_result
andadd_warning_to_result
accepts a new optional parameter namedcontext
. This variable is going to be evaluated by filters defined in the custom config.
0.15.0
Improvements
- Generate DEFAULT_RULES and BASE_CLASSES using code instead of hardcoding
Fixed
- Whitelist did not work if it didn't have the
Rule
prefix
Breaking changes
- Sufix
KMSKeyWildcardPrincipal
andSecurityGroupIngressOpenToWorld
withRule
- Sufix whitelist constant
FullWildcardPrincipal
andPartialWildcardPrincipal
withRule
0.14.2
0.14.1
Improvements
- Rule processor now accepts an extras parameter that will be forwarded to the rules
- Main gets extra information from the event and forwards it to the rule formatter
0.14.0
[0.14.0] - 2020-02-07
Breaking changes
- Completely changed base
Rule
abstract class signature and adapted rule classes to match it:- Init now only takes a
Config
invoke
method now accepts an optional extra Dictinvoke
method returns aResult
instead ofNone
add_failure
has been renamed toadd_failure_to_result
. It now takes a result instead of a reason
(that now it's inferred)add_warning
has been renamed toadd_warning_to_result
. It now has the same signature thanadd_failure_to_result
- Init now only takes a
Improvements
- Rule Invoke extras parameter has been added to allow changing the rule behaviour depending on state besides the cfmodel itself:
- Stack naming rules
- Stack tags
- User restrictions
- ...
0.13.0
Fixed
- Regular expressions had an unescaped '.' before 'amazonaws.com', so it might match more hosts than expected.
Changed
CloudFormationAuthenticationRule
now inMONITOR
mode and new test addedIAMRoleWildcardActionOnPolicyRule
combines three previous unused rules inIAMManagedPolicyWildcardActionRule
,IAMRoleWildcardActionOnPermissionsPolicyRule
, andIAMRoleWildcardActionOnTrustPolicyRule
IAMRoleWildcardActionOnPolicyRule
now inDEBUG
modeS3BucketPolicyWildcardActionRule
has now been changed to be an instantiation of the new generic ruleGenericWildcardPolicyRule
. It is set inDEBUG
modeS3BucketPolicyWildcardActionRule
has had updated regex filter to make it more aligned with both further rules to do with wildcards in actions, and the existingSQSQueuePolicyWildcardActionRule
SQSQueuePolicyWildcardActionRule
has now been changed to be an instantiation of the new generic ruleGenericWildcardPolicyRule
. It is set inDEBUG
modeSecurityGroupMissingEgressRule
now inDEBUG
mode and a new test addedSNSTopicPolicyWildcardActionRule
has beed added. It is an instantiation of the new generic ruleGenericWildcardPolicyRule
. It is set inDEBUG
mode
Breaking changes
- The following rules are no longer available:
IAMRoleWildcardActionOnPermissionsPolicyRule
IAMRoleWildcardActionOnTrustPolicyRule
IAMManagedPolicyWildcardActionRule
- The following rules have been moved:
S3BucketPolicyWildcardActionRule
SQSQueuePolicyWildcardActionRule