github.com/devseccon/trivy@v0.47.1-0.20231123133102-bd902a0bd996/pkg/fanal/analyzer/config/testdata/rego/policy.rego (about)

     1  package user.something
     2  
     3  __rego_metadata__ := {
     4  	"id": "TEST001",
     5  	"avd_id": "AVD-TEST-0001",
     6  	"title": "Test policy",
     7  	"short_code": "no-buckets",
     8  	"severity": "LOW",
     9  	"description": "This is a test policy.",
    10  	"recommended_actions": "Have a cup of tea.",
    11  	"url": "https://trivy.dev/",
    12  }
    13  
    14  # taken from defsec rego lib to mimic behaviour
    15  result(msg, cause) = result {
    16  	metadata := object.get(cause, "__defsec_metadata", cause)
    17  	result := {
    18  		"msg": msg,
    19  		"startline": object.get(metadata, "startline", object.get(metadata, "StartLine", 0)),
    20          "endline": object.get(metadata, "endline", object.get(metadata, "EndLine", 0)),
    21          "filepath": object.get(metadata, "filepath", object.get(metadata, "Path", "")),
    22  		"explicit": object.get(metadata, "explicit", false),
    23  		"managed": object.get(metadata, "managed", true),
    24  		"fskey": object.get(metadata, "fskey", ""),
    25  		"resource": object.get(metadata, "resource", ""),
    26  	}
    27  }
    28  
    29  deny[res] {
    30      cmd := input.stages[_][_]
    31      res := result("No commands allowed!", cmd)
    32  }