Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

aws-cf-checker

Package Overview
Dependencies
Maintainers
1
Versions
11
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

aws-cf-checker - npm Package Compare versions

Comparing version 0.2.1 to 0.3.0

check/iamInlinePolicy.js

2

index.js

@@ -50,3 +50,3 @@ var fs = require("fs");

if (checks.hasOwnProperty(check)) {
require("./lib/" + check + ".js").check(objects, checks[check], checkCallback);
require("./check/" + check + ".js").check(objects, checks[check], checkCallback);
}

@@ -53,0 +53,0 @@ }

{
"name": "aws-cf-checker",
"version": "0.2.1",
"version": "0.3.0",
"description": "Checks AWS CloudFormation templates for security, reliability and conformity",

@@ -5,0 +5,0 @@ "keywords": ["aws", "cloudformation", "cf"],

@@ -93,3 +93,3 @@ [![Build Status](https://secure.travis-ci.org/widdix/aws-cf-checker.png)](http://travis-ci.org/widdix/aws-cf-checker)

Options:
Options: (Object)

@@ -104,3 +104,3 @@ * `case`: Enum["pascal", "camel"] (default: "pascal")

Options:
Options: (Object)

@@ -137,4 +137,24 @@ * `deny`: Array[String]

Options:
Options: (Object)
* none
none
### iamInlinePolicy
Checks IAM Users, Groups and Roles for inline policies.
Options: (Boolean)
`true` := inline policies are allowed
`false` := inline policies are denied
### iamPolicy
Checks allowed actions of IAM policies.
A statement with NotAction is a finding. A statement with Effect != Allow is skipped.
Options: (Object)
* `allow`: Array[String] List of allowed actions (whitelist)
* `deny`: Array[String] List of denied actions (blacklist)

@@ -273,2 +273,47 @@ var checker = require("../index.js");

});
it("secure RDS instance setup with external security group", function(done) {
test({
"Parameters": {
"SGDatabase": {
"Type": "AWS::EC2::SecurityGroup::Id",
}
},
"Resources": {
"Database": {
"Type": "AWS::RDS::DBInstance",
"Properties": {
"VPCSecurityGroups": [{"Ref": "SGDatabase"}]
}
}
}
}, {"securityGroupInbound": true}, 0, done);
});
it("secure RDS instance setup with external security group as source", function(done) {
test({
"Parameters": {
"SGDatabaseClient": {
"Type": "AWS::EC2::SecurityGroup::Id",
}
},
"Resources": {
"SGDatabase": {
"Type": "AWS::EC2::SecurityGroup",
"Properties": {
"SecurityGroupIngress": [{
"FromPort": 3306,
"ToPort": 3306,
"IpProtocol": "tcp",
"SourceSecurityGroupId": {"Ref": "SGDatabaseClient"}
}]
}
},
"Database": {
"Type": "AWS::RDS::DBInstance",
"Properties": {
"VPCSecurityGroups": [{"Ref": "SGDatabase"}]
}
}
}
}, {"securityGroupInbound": true}, 0, done);
});
});
SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc