Skip to content

Commit b744b2b

Browse files
authored
feat(IamPolicyChecks): implement backend functionality, update UI (#4911)
* feat(IamPolicyChecks): implement backend functionality, update UI * Fix equality operators, add functionality to delete created temp file, added comment for S3 Client * Fix eslint errors * Update variables to be more developer-friendly and refactor * Remove usage of '__dirname', add logging to missing CLI error, move default.yaml to resources
1 parent e6d9b50 commit b744b2b

File tree

4 files changed

+626
-84
lines changed

4 files changed

+626
-84
lines changed

packages/core/package.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -214,10 +214,10 @@
214214
"description": "%AWS.configuration.description.lambda.recentlyUploaded%",
215215
"default": []
216216
},
217-
"aws.accessAnalyzer.policyChecks.referencePolicyFilePath": {
217+
"aws.accessAnalyzer.policyChecks.customChecksFilePath": {
218218
"type": "string",
219219
"default": "",
220-
"description": "File path or S3 path to a control policy for Custom Policy Checks.",
220+
"description": "File path or S3 path to a text document for Custom Policy Checks.",
221221
"scope": "window"
222222
},
223223
"aws.accessAnalyzer.policyChecks.cloudFormationParameterFilePath": {
Lines changed: 121 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,121 @@
1+
# generate fake ARN
2+
# default can be specified using the following format:
3+
# {<key>?<default>}
4+
arnServiceMap:
5+
aws_iam_policy: name?fakename
6+
aws_iam_user_policy: name?fakename
7+
aws_iam_role: name?fakename
8+
aws_iam_role_policy: name
9+
aws_iam_group_policy: name
10+
aws_api_gateway_rest_api_policy: rest_api_id?fakeRestApiId
11+
aws_backup_vault_policy: backup_vault_name?fakeBackupVaultName
12+
aws_cloudwatch_event_bus_policy: event_bus_name?fakeEventBusName
13+
aws_cloudwatch_log_destination_policy: destination_name?fakeDestinationName
14+
aws_codeartifact_domain_permissions_policy: domain?fakeDomain
15+
aws_codeartifact_repository_permissions_policy: repository?fakeRepository
16+
aws_codebuild_resource_policy: fakename
17+
aws_ecr_registry_policy: fakename
18+
aws_ecr_repository_policy: repository?fakeRepositoryName
19+
aws_ecrpublic_repository_policy: repository_name?fakeRepositoryName
20+
aws_efs_file_system_policy: file_system_id?fakeFileSystemId
21+
aws_elasticsearch_domain: domain_name?fakeDomainName
22+
aws_elasticsearch_domain_policy: domain_name?fakeDomainName
23+
aws_glacier_vault: name?fakename
24+
aws_glacier_vault_lock: vault_name?fakeVaultName
25+
aws_glue_resource_policy: fakeName
26+
aws_iot_policy: name?fakename
27+
aws_kms_external_key: fakeName
28+
aws_kms_key: fakeName
29+
aws_kms_replica_external_key: fakeName
30+
aws_kms_replica_key: fakeName
31+
# aws_lambda_layer_version_permission: layer_name?fakeLayberName
32+
aws_media_store_container_policy: container_name?fakeContainerName
33+
aws_networkfirewall_resource_policy: resource_arn?fakeResourceArn
34+
aws_organizations_policy: name?fakename
35+
aws_s3_access_point: name?fakename
36+
aws_s3_bucket: bucket?fakeBucket
37+
aws_s3_bucket_policy: bucket?fakeBucket
38+
aws_s3control_access_point_policy: access_point_arn?fakeAccessPointArn
39+
aws_s3control_bucket_policy: bucket?fakeBucket
40+
aws_s3control_multi_region_access_point_policy: details.name?fakename
41+
aws_s3control_object_lambda_access_point_policy: name?fakename
42+
aws_ses_identity_policy: name?fakename
43+
aws_sns_topic: name?fakename
44+
aws_sns_topic_policy: arn?fakename
45+
aws_sqs_queue: name?fakename
46+
aws_sqs_queue_policy: fakeQueueUrl
47+
aws_ssoadmin_permission_set_inline_policy: instance_arn?fakeSSOInstanceArn
48+
aws_sagemaker_model_package_group_policy: model_package_group_name?fakeModelPackageGroupName
49+
aws_secretsmanager_secret: name?fakename
50+
aws_secretsmanager_secret_policy: secret_arn?fakeSecretArn
51+
aws_transfer_access: server_id?fakeServerId
52+
aws_transfer_user: user_name?fakeUserName
53+
aws_vpc_endpoint: fakeName
54+
# iamChecks:
55+
# - AccessAnalyzer
56+
57+
# iamExceptions:
58+
# AccessAnalyzer:
59+
# - Arn: "arn:aws:iam::123456789012:policy/test_policy"
60+
61+
iamPolicyAttributes:
62+
aws_iam_group_policy: policy
63+
aws_iam_policy: policy
64+
aws_iam_role:
65+
- assume_role_policy
66+
- inline_policy.policy
67+
aws_iam_role_policy: policy
68+
aws_iam_user_policy: policy
69+
aws_api_gateway_rest_api: policy #note
70+
aws_api_gateway_rest_api_policy: policy
71+
aws_backup_vault_policy: policy
72+
aws_cloudwatch_event_bus_policy: policy
73+
aws_cloudwatch_log_destination_policy: access_policy
74+
aws_cloudwatch_log_resource_policy: policy
75+
aws_codeartifact_domain_permissions_policy: policy_document
76+
aws_codeartifact_repository_permissions_policy: policy_document
77+
aws_codebuild_resource_policy: policy
78+
aws_ecr_registry_policy: policy
79+
aws_ecr_repository_policy: policy
80+
aws_ecrpublic_repository_policy: policy
81+
aws_efs_file_system_policy: policy
82+
aws_elasticsearch_domain: access_policies
83+
aws_elasticsearch_domain_policy: access_policies
84+
aws_glacier_vault: access_policy
85+
aws_glacier_vault_lock: access_policy
86+
aws_glue_resource_policy: policy
87+
aws_iot_policy: policy
88+
aws_kms_external_key: policy
89+
aws_kms_key: policy
90+
aws_kms_replica_external_key: policy
91+
aws_kms_replica_key: policy
92+
# aws_lambda_layer_version_permission: policy
93+
aws_media_store_container_policy: policy
94+
aws_networkfirewall_resource_policy: policy
95+
aws_organizations_policy: content
96+
aws_s3_access_point: policy
97+
aws_s3_bucket: policy
98+
aws_s3_bucket_policy: policy
99+
aws_s3control_access_point_policy: policy
100+
aws_s3control_bucket_policy: policy
101+
aws_s3control_multi_region_access_point_policy: details.policy
102+
aws_s3control_object_lambda_access_point_policy: policy
103+
aws_ses_identity_policy: policy
104+
aws_sns_topic: policy
105+
aws_sns_topic_policy: policy
106+
aws_sqs_queue: policy
107+
aws_sqs_queue_policy: policy
108+
aws_ssoadmin_permission_set_inline_policy: inline_policy
109+
aws_sagemaker_model_package_group_policy: resource_policy
110+
aws_secretsmanager_secret: policy
111+
aws_secretsmanager_secret_policy: policy
112+
aws_transfer_access: policy
113+
aws_transfer_user: policy
114+
aws_vpc_endpoint: policy
115+
116+
validatePolicyResourceType:
117+
aws_s3_bucket: AWS::S3::Bucket
118+
aws_s3_bucket_policy: AWS::S3::Bucket
119+
aws_s3control_access_point_policy: AWS::S3::AccessPoint
120+
aws_s3control_multi_region_access_point_policy: AWS::S3::MultiRegionAccessPoint
121+
aws_s3control_object_lambda_access_point_policy: AWS::S3ObjectLambda::AccessPoint

0 commit comments

Comments
 (0)