Skip to content

Conversation

@iamasimforever
Copy link

Aqua CloudSploit Plugin Assessment: EC2 LaunchWizard Security Groups.

image

@CLAassistant
Copy link

CLAassistant commented Aug 13, 2020

CLA assistant check
All committers have signed the CLA.

Aqua CloudSploit Plugin Assessment
Copy link
Contributor

@matthewdfuller matthewdfuller left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good overall, but one small fix

Comment on lines 46 to 55
if (sg.IpPermissions.length ||
sg.IpPermissionsEgress.length) {
helpers.addResult(results, 2,
sg.GroupName + 'security group has ' + (sg.IpPermissions.length || '0') + ' inbound and ' + (sg.IpPermissionsEgress.length || '0') + ' outbound rules',
region, resource);
} else {
helpers.addResult(results, 0,
'Default security group does not have inbound or outbound rules',
region, resource);
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is a good additional check, but for now we just want to flag the group, regardless of whether it has any rules or not. Can you modify this section to remove the extra if/else check?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Okay, will remove this additional check.

Removed if/else condition to check length of rules.
Fixed Linting error.
@matthewdfuller
Copy link
Contributor

Thanks for submitting @iamasimforever - closing this now that we are moving forward with other plugins.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants