github.com/wata727/tflint@v0.12.2-0.20191013070026-96dd0d36f385/rules/awsrules/models/aws_codepipeline_webhook_invalid_authentication.go (about)

     1  // This file generated by `tools/model-rule-gen/main.go`. DO NOT EDIT
     2  
     3  package models
     4  
     5  import (
     6  	"log"
     7  
     8  	hcl "github.com/hashicorp/hcl/v2"
     9  	"github.com/wata727/tflint/tflint"
    10  )
    11  
    12  // AwsCodepipelineWebhookInvalidAuthenticationRule checks the pattern is valid
    13  type AwsCodepipelineWebhookInvalidAuthenticationRule struct {
    14  	resourceType  string
    15  	attributeName string
    16  	enum          []string
    17  }
    18  
    19  // NewAwsCodepipelineWebhookInvalidAuthenticationRule returns new rule with default attributes
    20  func NewAwsCodepipelineWebhookInvalidAuthenticationRule() *AwsCodepipelineWebhookInvalidAuthenticationRule {
    21  	return &AwsCodepipelineWebhookInvalidAuthenticationRule{
    22  		resourceType:  "aws_codepipeline_webhook",
    23  		attributeName: "authentication",
    24  		enum: []string{
    25  			"GITHUB_HMAC",
    26  			"IP",
    27  			"UNAUTHENTICATED",
    28  		},
    29  	}
    30  }
    31  
    32  // Name returns the rule name
    33  func (r *AwsCodepipelineWebhookInvalidAuthenticationRule) Name() string {
    34  	return "aws_codepipeline_webhook_invalid_authentication"
    35  }
    36  
    37  // Enabled returns whether the rule is enabled by default
    38  func (r *AwsCodepipelineWebhookInvalidAuthenticationRule) Enabled() bool {
    39  	return true
    40  }
    41  
    42  // Severity returns the rule severity
    43  func (r *AwsCodepipelineWebhookInvalidAuthenticationRule) Severity() string {
    44  	return tflint.ERROR
    45  }
    46  
    47  // Link returns the rule reference link
    48  func (r *AwsCodepipelineWebhookInvalidAuthenticationRule) Link() string {
    49  	return ""
    50  }
    51  
    52  // Check checks the pattern is valid
    53  func (r *AwsCodepipelineWebhookInvalidAuthenticationRule) Check(runner *tflint.Runner) error {
    54  	log.Printf("[TRACE] Check `%s` rule for `%s` runner", r.Name(), runner.TFConfigPath())
    55  
    56  	return runner.WalkResourceAttributes(r.resourceType, r.attributeName, func(attribute *hcl.Attribute) error {
    57  		var val string
    58  		err := runner.EvaluateExpr(attribute.Expr, &val)
    59  
    60  		return runner.EnsureNoError(err, func() error {
    61  			found := false
    62  			for _, item := range r.enum {
    63  				if item == val {
    64  					found = true
    65  				}
    66  			}
    67  			if !found {
    68  				runner.EmitIssue(
    69  					r,
    70  					`authentication is not a valid value`,
    71  					attribute.Expr.Range(),
    72  				)
    73  			}
    74  			return nil
    75  		})
    76  	})
    77  }