Skip to content

Commit 92ac617

Browse files
autogenerated maintenance (#358)
Co-authored-by: PatMyron <[email protected]>
1 parent e0c88a7 commit 92ac617

29 files changed

+168
-44
lines changed

aws/mock/rds.go

Lines changed: 50 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

docs/rules/README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -335,7 +335,6 @@ These rules enforce best practices and naming conventions:
335335
|aws_cloudwatch_metric_alarm_invalid_alarm_name||
336336
|aws_cloudwatch_metric_alarm_invalid_comparison_operator||
337337
|aws_cloudwatch_metric_alarm_invalid_evaluate_low_sample_count_percentiles||
338-
|aws_cloudwatch_metric_alarm_invalid_extended_statistic||
339338
|aws_cloudwatch_metric_alarm_invalid_metric_name||
340339
|aws_cloudwatch_metric_alarm_invalid_namespace||
341340
|aws_cloudwatch_metric_alarm_invalid_statistic||

go.mod

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ go 1.19
44

55
require (
66
github.com/agext/levenshtein v1.2.2 // indirect
7-
github.com/aws/aws-sdk-go v1.44.54
7+
github.com/aws/aws-sdk-go v1.44.76
88
github.com/dave/dst v0.27.0
99
github.com/fatih/color v1.9.0 // indirect
1010
github.com/golang/mock v1.6.0

go.sum

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ github.com/antihax/optional v1.0.0/go.mod h1:uupD/76wgC+ih3iEmQUL+0Ugr19nfwCT1kd
77
github.com/apparentlymart/go-textseg/v13 v13.0.0 h1:Y+KvPE1NYz0xl601PVImeQfFyEy6iT90AvPUL1NNfNw=
88
github.com/apparentlymart/go-textseg/v13 v13.0.0/go.mod h1:ZK2fH7c4NqDTLtiYLvIkEghdlcqw7yxLeM89kiTRPUo=
99
github.com/aws/aws-sdk-go v1.31.9/go.mod h1:5zCpMtNQVjRREroY7sYe8lOMRSxkhG6MZveU8YkpAk0=
10-
github.com/aws/aws-sdk-go v1.44.54 h1:zfFptZ0iLuk+psnRLk+o0NMgd/pBsALlNE7i40iOmFA=
11-
github.com/aws/aws-sdk-go v1.44.54/go.mod h1:y4AeaBuwd2Lk+GepC1E9v0qOiTws0MIWAX4oIKwKHZo=
10+
github.com/aws/aws-sdk-go v1.44.76 h1:5e8yGO/XeNYKckOjpBKUd5wStf0So3CrQIiOMCVLpOI=
11+
github.com/aws/aws-sdk-go v1.44.76/go.mod h1:y4AeaBuwd2Lk+GepC1E9v0qOiTws0MIWAX4oIKwKHZo=
1212
github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
1313
github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
1414
github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=

rules/models/aws-sdk-go

Submodule aws-sdk-go updated 1548 files

rules/models/aws_account_alternate_contact_invalid_email_address.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ func NewAwsAccountAlternateContactInvalidEmailAddressRule() *AwsAccountAlternate
2929
attributeName: "email_address",
3030
max: 64,
3131
min: 1,
32-
pattern: regexp.MustCompile(`^[\w+=,.-]+@[\w.-]+\.[\w]+$`),
32+
pattern: regexp.MustCompile(`^[\s]*[\w+=.#!&-]+@[\w.-]+\.[\w]+[\s]*$`),
3333
}
3434
}
3535

@@ -93,7 +93,7 @@ func (r *AwsAccountAlternateContactInvalidEmailAddressRule) Check(runner tflint.
9393
if !r.pattern.MatchString(val) {
9494
runner.EmitIssue(
9595
r,
96-
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^[\w+=,.-]+@[\w.-]+\.[\w]+$`),
96+
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^[\s]*[\w+=.#!&-]+@[\w.-]+\.[\w]+[\s]*$`),
9797
attribute.Expr.Range(),
9898
)
9999
}

rules/models/aws_codeartifact_domain_permissions_policy_invalid_policy_document.go

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,9 @@
33
package models
44

55
import (
6+
"fmt"
7+
"regexp"
8+
69
"github.com/terraform-linters/tflint-plugin-sdk/hclext"
710
"github.com/terraform-linters/tflint-plugin-sdk/logger"
811
"github.com/terraform-linters/tflint-plugin-sdk/tflint"
@@ -16,15 +19,17 @@ type AwsCodeartifactDomainPermissionsPolicyInvalidPolicyDocumentRule struct {
1619
attributeName string
1720
max int
1821
min int
22+
pattern *regexp.Regexp
1923
}
2024

2125
// NewAwsCodeartifactDomainPermissionsPolicyInvalidPolicyDocumentRule returns new rule with default attributes
2226
func NewAwsCodeartifactDomainPermissionsPolicyInvalidPolicyDocumentRule() *AwsCodeartifactDomainPermissionsPolicyInvalidPolicyDocumentRule {
2327
return &AwsCodeartifactDomainPermissionsPolicyInvalidPolicyDocumentRule{
2428
resourceType: "aws_codeartifact_domain_permissions_policy",
2529
attributeName: "policy_document",
26-
max: 5120,
30+
max: 7168,
2731
min: 1,
32+
pattern: regexp.MustCompile(`^[\P{C}\s]+$`),
2833
}
2934
}
3035

@@ -74,7 +79,7 @@ func (r *AwsCodeartifactDomainPermissionsPolicyInvalidPolicyDocumentRule) Check(
7479
if len(val) > r.max {
7580
runner.EmitIssue(
7681
r,
77-
"policy_document must be 5120 characters or less",
82+
"policy_document must be 7168 characters or less",
7883
attribute.Expr.Range(),
7984
)
8085
}
@@ -85,6 +90,13 @@ func (r *AwsCodeartifactDomainPermissionsPolicyInvalidPolicyDocumentRule) Check(
8590
attribute.Expr.Range(),
8691
)
8792
}
93+
if !r.pattern.MatchString(val) {
94+
runner.EmitIssue(
95+
r,
96+
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^[\P{C}\s]+$`),
97+
attribute.Expr.Range(),
98+
)
99+
}
88100
return nil
89101
})
90102
if err != nil {

rules/models/aws_codeartifact_repository_invalid_description.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ func NewAwsCodeartifactRepositoryInvalidDescriptionRule() *AwsCodeartifactReposi
2727
resourceType: "aws_codeartifact_repository",
2828
attributeName: "description",
2929
max: 1000,
30-
pattern: regexp.MustCompile(`^\P{C}+$`),
30+
pattern: regexp.MustCompile(`^\P{C}*$`),
3131
}
3232
}
3333

@@ -84,7 +84,7 @@ func (r *AwsCodeartifactRepositoryInvalidDescriptionRule) Check(runner tflint.Ru
8484
if !r.pattern.MatchString(val) {
8585
runner.EmitIssue(
8686
r,
87-
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^\P{C}+$`),
87+
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^\P{C}*$`),
8888
attribute.Expr.Range(),
8989
)
9090
}

rules/models/aws_codeartifact_repository_permissions_policy_invalid_policy_document.go

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,9 @@
33
package models
44

55
import (
6+
"fmt"
7+
"regexp"
8+
69
"github.com/terraform-linters/tflint-plugin-sdk/hclext"
710
"github.com/terraform-linters/tflint-plugin-sdk/logger"
811
"github.com/terraform-linters/tflint-plugin-sdk/tflint"
@@ -16,15 +19,17 @@ type AwsCodeartifactRepositoryPermissionsPolicyInvalidPolicyDocumentRule struct
1619
attributeName string
1720
max int
1821
min int
22+
pattern *regexp.Regexp
1923
}
2024

2125
// NewAwsCodeartifactRepositoryPermissionsPolicyInvalidPolicyDocumentRule returns new rule with default attributes
2226
func NewAwsCodeartifactRepositoryPermissionsPolicyInvalidPolicyDocumentRule() *AwsCodeartifactRepositoryPermissionsPolicyInvalidPolicyDocumentRule {
2327
return &AwsCodeartifactRepositoryPermissionsPolicyInvalidPolicyDocumentRule{
2428
resourceType: "aws_codeartifact_repository_permissions_policy",
2529
attributeName: "policy_document",
26-
max: 5120,
30+
max: 7168,
2731
min: 1,
32+
pattern: regexp.MustCompile(`^[\P{C}\s]+$`),
2833
}
2934
}
3035

@@ -74,7 +79,7 @@ func (r *AwsCodeartifactRepositoryPermissionsPolicyInvalidPolicyDocumentRule) Ch
7479
if len(val) > r.max {
7580
runner.EmitIssue(
7681
r,
77-
"policy_document must be 5120 characters or less",
82+
"policy_document must be 7168 characters or less",
7883
attribute.Expr.Range(),
7984
)
8085
}
@@ -85,6 +90,13 @@ func (r *AwsCodeartifactRepositoryPermissionsPolicyInvalidPolicyDocumentRule) Ch
8590
attribute.Expr.Range(),
8691
)
8792
}
93+
if !r.pattern.MatchString(val) {
94+
runner.EmitIssue(
95+
r,
96+
fmt.Sprintf(`"%s" does not match valid pattern %s`, truncateLongMessage(val), `^[\P{C}\s]+$`),
97+
attribute.Expr.Range(),
98+
)
99+
}
88100
return nil
89101
})
90102
if err != nil {

rules/models/aws_globalaccelerator_accelerator_invalid_ip_address_type.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ func NewAwsGlobalacceleratorAcceleratorInvalidIPAddressTypeRule() *AwsGlobalacce
2626
attributeName: "ip_address_type",
2727
enum: []string{
2828
"IPV4",
29+
"DUAL_STACK",
2930
},
3031
}
3132
}

0 commit comments

Comments
 (0)