Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 9 additions & 0 deletions rules/magicmodules/api_definition.go
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ var APIDefinition = map[string]string{
"google_apigee_app_group": "apigee.googleapis.com",
"google_apigee_control_plane_access": "apigee.googleapis.com",
"google_apigee_developer": "apigee.googleapis.com",
"google_apigee_developer_app": "apigee.googleapis.com",
"google_apigee_dns_zone": "apigee.googleapis.com",
"google_apigee_endpoint_attachment": "apigee.googleapis.com",
"google_apigee_env_keystore": "apigee.googleapis.com",
Expand All @@ -51,6 +52,7 @@ var APIDefinition = map[string]string{
"google_apigee_envgroup_attachment": "apigee.googleapis.com",
"google_apigee_environment": "apigee.googleapis.com",
"google_apigee_environment_addons_config": "apigee.googleapis.com",
"google_apigee_environment_api_revision_deployment": "apigee.googleapis.com",
"google_apigee_environment_keyvaluemaps": "apigee.googleapis.com",
"google_apigee_environment_keyvaluemaps_entries": "apigee.googleapis.com",
"google_apigee_instance": "apigee.googleapis.com",
Expand Down Expand Up @@ -135,6 +137,8 @@ var APIDefinition = map[string]string{
"google_cloud_run_v2_service": "run.googleapis.com",
"google_cloud_run_v2_worker_pool": "run.googleapis.com",
"google_cloud_scheduler_job": "cloudscheduler.googleapis.com",
"google_cloud_security_compliance_cloud_control": "cloudsecuritycompliance.googleapis.com",
"google_cloud_security_compliance_framework": "cloudsecuritycompliance.googleapis.com",
"google_cloud_tasks_queue": "cloudtasks.googleapis.com",
"google_cloudbuild_bitbucket_server_config": "cloudbuild.googleapis.com",
"google_cloudbuild_trigger": "cloudbuild.googleapis.com",
Expand Down Expand Up @@ -193,6 +197,7 @@ var APIDefinition = map[string]string{
"google_compute_node_template": "compute.googleapis.com",
"google_compute_packet_mirroring": "compute.googleapis.com",
"google_compute_per_instance_config": "compute.googleapis.com",
"google_compute_preview_feature": "compute.googleapis.com",
"google_compute_project_cloud_armor_tier": "compute.googleapis.com",
"google_compute_public_advertised_prefix": "compute.googleapis.com",
"google_compute_public_delegated_prefix": "compute.googleapis.com",
Expand Down Expand Up @@ -267,6 +272,7 @@ var APIDefinition = map[string]string{
"google_dataplex_datascan": "dataplex.googleapis.com",
"google_dataplex_entry": "dataplex.googleapis.com",
"google_dataplex_entry_group": "dataplex.googleapis.com",
"google_dataplex_entry_link": "dataplex.googleapis.com",
"google_dataplex_entry_type": "dataplex.googleapis.com",
"google_dataplex_glossary": "dataplex.googleapis.com",
"google_dataplex_glossary_category": "dataplex.googleapis.com",
Expand Down Expand Up @@ -335,6 +341,7 @@ var APIDefinition = map[string]string{
"google_firestore_document": "firestore.googleapis.com",
"google_firestore_field": "firestore.googleapis.com",
"google_firestore_index": "firestore.googleapis.com",
"google_firestore_user_creds": "firestore.googleapis.com",
"google_folder_access_approval_settings": "accessapproval.googleapis.com",
"google_gemini_code_repository_index": "cloudaicompanion.googleapis.com",
"google_gemini_code_tools_setting": "cloudaicompanion.googleapis.com",
Expand Down Expand Up @@ -383,6 +390,7 @@ var APIDefinition = map[string]string{
"google_iam_workforce_pool": "iam.googleapis.com",
"google_iam_workforce_pool_provider": "iam.googleapis.com",
"google_iam_workforce_pool_provider_key": "iam.googleapis.com",
"google_iam_workforce_pool_provider_scim_tenant": "iam.googleapis.com",
"google_iam_workload_identity_pool": "iam.googleapis.com",
"google_iam_workload_identity_pool_provider": "iam.googleapis.com",
"google_iap_brand": "iap.googleapis.com",
Expand Down Expand Up @@ -500,6 +508,7 @@ var APIDefinition = map[string]string{
"google_oracle_database_autonomous_database": "oracledatabase.googleapis.com",
"google_oracle_database_cloud_exadata_infrastructure": "oracledatabase.googleapis.com",
"google_oracle_database_cloud_vm_cluster": "oracledatabase.googleapis.com",
"google_oracle_database_db_system": "oracledatabase.googleapis.com",
"google_oracle_database_odb_network": "oracledatabase.googleapis.com",
"google_oracle_database_odb_subnet": "oracledatabase.googleapis.com",
"google_org_policy_custom_constraint": "orgpolicy.googleapis.com",
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,91 @@
// ----------------------------------------------------------------------------
//
// *** AUTO GENERATED CODE *** Type: MMv1 ***
//
// ----------------------------------------------------------------------------
//
// This file is automatically generated by Magic Modules and manual
// changes will be clobbered when the file is regenerated.
//
// Please read more about how to change this file in
// .github/CONTRIBUTING.md.
//
// ----------------------------------------------------------------------------

package magicmodules

import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
"github.com/terraform-linters/tflint-plugin-sdk/hclext"
"github.com/terraform-linters/tflint-plugin-sdk/tflint"
)

// GoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule checks the pattern is valid
type GoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule struct {
tflint.DefaultRule

resourceType string
attributeName string
}

// NewGoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule returns new rule with default attributes
func NewGoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule() *GoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule {
return &GoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule{
resourceType: "google_beyondcorp_security_gateway_application",
attributeName: "schema",
}
}

// Name returns the rule name
func (r *GoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule) Name() string {
return "google_beyondcorp_security_gateway_application_invalid_schema"
}

// Enabled returns whether the rule is enabled by default
func (r *GoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule) Enabled() bool {
return true
}

// Severity returns the rule severity
func (r *GoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule) Severity() tflint.Severity {
return tflint.ERROR
}

// Link returns the rule reference link
func (r *GoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule) Link() string {
return ""
}

// Check checks the pattern is valid
func (r *GoogleBeyondcorpSecurityGatewayApplicationInvalidSchemaRule) Check(runner tflint.Runner) error {
resources, err := runner.GetResourceContent(r.resourceType, &hclext.BodySchema{
Attributes: []hclext.AttributeSchema{{Name: r.attributeName}},
}, nil)
if err != nil {
return err
}

for _, resource := range resources.Blocks {
attribute, exists := resource.Body.Attributes[r.attributeName]
if !exists {
continue
}

err := runner.EvaluateExpr(attribute.Expr, func(val string) error {
validateFunc := validation.StringInSlice([]string{"PROXY_GATEWAY", "API_GATEWAY", ""}, false)

_, errors := validateFunc(val, r.attributeName)
for _, err := range errors {
if err := runner.EmitIssue(r, err.Error(), attribute.Expr.Range()); err != nil {
return err
}
}
return nil
}, nil)
if err != nil {
return err
}
}

return nil
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,91 @@
// ----------------------------------------------------------------------------
//
// *** AUTO GENERATED CODE *** Type: MMv1 ***
//
// ----------------------------------------------------------------------------
//
// This file is automatically generated by Magic Modules and manual
// changes will be clobbered when the file is regenerated.
//
// Please read more about how to change this file in
// .github/CONTRIBUTING.md.
//
// ----------------------------------------------------------------------------

package magicmodules

import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
"github.com/terraform-linters/tflint-plugin-sdk/hclext"
"github.com/terraform-linters/tflint-plugin-sdk/tflint"
)

// GoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule checks the pattern is valid
type GoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule struct {
tflint.DefaultRule

resourceType string
attributeName string
}

// NewGoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule returns new rule with default attributes
func NewGoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule() *GoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule {
return &GoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule{
resourceType: "google_compute_network_firewall_policy",
attributeName: "policy_type",
}
}

// Name returns the rule name
func (r *GoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule) Name() string {
return "google_compute_network_firewall_policy_invalid_policy_type"
}

// Enabled returns whether the rule is enabled by default
func (r *GoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule) Enabled() bool {
return true
}

// Severity returns the rule severity
func (r *GoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule) Severity() tflint.Severity {
return tflint.ERROR
}

// Link returns the rule reference link
func (r *GoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule) Link() string {
return ""
}

// Check checks the pattern is valid
func (r *GoogleComputeNetworkFirewallPolicyInvalidPolicyTypeRule) Check(runner tflint.Runner) error {
resources, err := runner.GetResourceContent(r.resourceType, &hclext.BodySchema{
Attributes: []hclext.AttributeSchema{{Name: r.attributeName}},
}, nil)
if err != nil {
return err
}

for _, resource := range resources.Blocks {
attribute, exists := resource.Body.Attributes[r.attributeName]
if !exists {
continue
}

err := runner.EvaluateExpr(attribute.Expr, func(val string) error {
validateFunc := validation.StringInSlice([]string{"VPC_POLICY", ""}, false)

_, errors := validateFunc(val, r.attributeName)
for _, err := range errors {
if err := runner.EmitIssue(r, err.Error(), attribute.Expr.Range()); err != nil {
return err
}
}
return nil
}, nil)
if err != nil {
return err
}
}

return nil
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,91 @@
// ----------------------------------------------------------------------------
//
// *** AUTO GENERATED CODE *** Type: MMv1 ***
//
// ----------------------------------------------------------------------------
//
// This file is automatically generated by Magic Modules and manual
// changes will be clobbered when the file is regenerated.
//
// Please read more about how to change this file in
// .github/CONTRIBUTING.md.
//
// ----------------------------------------------------------------------------

package magicmodules

import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
"github.com/terraform-linters/tflint-plugin-sdk/hclext"
"github.com/terraform-linters/tflint-plugin-sdk/tflint"
)

// GoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule checks the pattern is valid
type GoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule struct {
tflint.DefaultRule

resourceType string
attributeName string
}

// NewGoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule returns new rule with default attributes
func NewGoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule() *GoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule {
return &GoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule{
resourceType: "google_compute_network_firewall_policy_with_rules",
attributeName: "policy_type",
}
}

// Name returns the rule name
func (r *GoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule) Name() string {
return "google_compute_network_firewall_policy_with_rules_invalid_policy_type"
}

// Enabled returns whether the rule is enabled by default
func (r *GoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule) Enabled() bool {
return true
}

// Severity returns the rule severity
func (r *GoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule) Severity() tflint.Severity {
return tflint.ERROR
}

// Link returns the rule reference link
func (r *GoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule) Link() string {
return ""
}

// Check checks the pattern is valid
func (r *GoogleComputeNetworkFirewallPolicyWithRulesInvalidPolicyTypeRule) Check(runner tflint.Runner) error {
resources, err := runner.GetResourceContent(r.resourceType, &hclext.BodySchema{
Attributes: []hclext.AttributeSchema{{Name: r.attributeName}},
}, nil)
if err != nil {
return err
}

for _, resource := range resources.Blocks {
attribute, exists := resource.Body.Attributes[r.attributeName]
if !exists {
continue
}

err := runner.EvaluateExpr(attribute.Expr, func(val string) error {
validateFunc := validation.StringInSlice([]string{"VPC_POLICY", ""}, false)

_, errors := validateFunc(val, r.attributeName)
for _, err := range errors {
if err := runner.EmitIssue(r, err.Error(), attribute.Expr.Range()); err != nil {
return err
}
}
return nil
}, nil)
if err != nil {
return err
}
}

return nil
}
Loading
Loading