Skip to content

Commit 4c7ee6c

Browse files
authored
#409 from cfn_nag issues, add support for relationship between NACLs and egress and ingress entries. (#74)
* #409 from cfn_nag issues, add support for relationship between NACLs and egress and ingress entries. * #409 Add truthy util, its spec tests, and apply usage for ec2_network_acl_parser
1 parent e46fdb5 commit 4c7ee6c

12 files changed

+392
-1
lines changed
+15
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
# frozen_string_literal: true
2+
3+
require_relative 'model_element'
4+
5+
class AWS::EC2::NetworkAcl < ModelElement
6+
attr_accessor :network_acl_egress_entries
7+
attr_accessor :network_acl_ingress_entries
8+
9+
def initialize(cfn_model)
10+
super
11+
@network_acl_egress_entries = []
12+
@network_acl_ingress_entries = []
13+
@resource_type = 'AWS::EC2::NetworkAcl'
14+
end
15+
end
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
# frozen_string_literal: true
2+
3+
require_relative 'parser_error'
4+
require 'cfn-model/model/ec2_network_acl'
5+
require 'cfn-model/model/references'
6+
require 'cfn-model/util/truthy'
7+
8+
class Ec2NetworkAclParser
9+
def parse(cfn_model:, resource:)
10+
network_acl = resource
11+
12+
attach_nacl_entries_to_nacl(cfn_model: cfn_model, network_acl: network_acl)
13+
network_acl
14+
end
15+
16+
private
17+
18+
def egress_network_acl_entries(cfn_model)
19+
network_acl_entries = cfn_model.resources_by_type 'AWS::EC2::NetworkAclEntry'
20+
network_acl_entries.select(&:egress)
21+
end
22+
23+
def ingress_network_acl_entries(cfn_model)
24+
network_acl_entries = cfn_model.resources_by_type 'AWS::EC2::NetworkAclEntry'
25+
network_acl_entries.select do |network_acl_entry|
26+
not_truthy?(network_acl_entry.egress)
27+
end
28+
end
29+
30+
def egress_nacl_entries_for_nacl(cfn_model, logical_resource_id)
31+
egress_nacl_entries = egress_network_acl_entries(cfn_model)
32+
egress_nacl_entries.select do |egress_nacl_entry|
33+
References.resolve_resource_id(egress_nacl_entry.networkAclId) == logical_resource_id
34+
end
35+
end
36+
37+
def ingress_nacl_entries_for_nacl(cfn_model, logical_resource_id)
38+
ingress_nacl_entries = ingress_network_acl_entries(cfn_model)
39+
ingress_nacl_entries.select do |ingress_nacl_entry|
40+
References.resolve_resource_id(ingress_nacl_entry.networkAclId) == logical_resource_id
41+
end
42+
end
43+
44+
def attach_nacl_entries_for_nacl(cfn_model, network_acl)
45+
egress_nacl_entries_for_nacl(cfn_model, network_acl.logical_resource_id).each do |egress_entry|
46+
network_acl.network_acl_egress_entries << egress_entry.logical_resource_id
47+
end
48+
ingress_nacl_entries_for_nacl(cfn_model, network_acl.logical_resource_id).each do |ingress_entry|
49+
network_acl.network_acl_ingress_entries << ingress_entry.logical_resource_id
50+
end
51+
end
52+
53+
def attach_nacl_entries_to_nacl(cfn_model:, network_acl:)
54+
attach_nacl_entries_for_nacl(cfn_model, network_acl)
55+
end
56+
end

lib/cfn-model/parser/parser_registry.rb

+2-1
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,8 @@ def initialize
2323
'AWS::SNS::TopicPolicy' => WithPolicyDocumentParser,
2424
'AWS::SQS::QueuePolicy' => WithPolicyDocumentParser,
2525
'AWS::ApiGateway::Stage' => ApiGatewayStageParser,
26-
'AWS::ApiGateway::Deployment' => ApiGatewayDeploymentParser
26+
'AWS::ApiGateway::Deployment' => ApiGatewayDeploymentParser,
27+
'AWS::EC2::NetworkAcl' => Ec2NetworkAclParser
2728
}
2829
end
2930

lib/cfn-model/util/truthy.rb

+11
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
# frozen_string_literal: true
2+
3+
# Checks a string for truthiness. Any cased 'true' will evaluate to a true boolean.
4+
# Any other string _at all_ results in false.
5+
def truthy?(string)
6+
string.to_s.casecmp('true').zero?
7+
end
8+
9+
def not_truthy?(string)
10+
string.nil? || string.to_s.casecmp('false').zero?
11+
end

spec/factories/ec2_network_acl.rb

+42
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
require 'cfn-model/model/ec2_network_acl'
2+
require 'cfn-model/model/cfn_model'
3+
4+
def network_acl_with_one_egress_entry(cfn_model: CfnModel.new)
5+
network_acl = AWS::EC2::NetworkAcl.new cfn_model
6+
network_acl.vpcId = 'testvpc1'
7+
network_acl.network_acl_egress_entries << 'EgressEntry1'
8+
network_acl
9+
end
10+
11+
def network_acl_with_two_egress_entries(cfn_model: CfnModel.new)
12+
network_acl = AWS::EC2::NetworkAcl.new cfn_model
13+
network_acl.vpcId = 'testvpc1'
14+
%w[EgressEntry1 EgressEntry2].each do |egress_entry|
15+
network_acl.network_acl_egress_entries << egress_entry
16+
end
17+
network_acl
18+
end
19+
20+
def network_acl_with_one_ingress_entry(cfn_model: CfnModel.new)
21+
network_acl = AWS::EC2::NetworkAcl.new cfn_model
22+
network_acl.vpcId = 'testvpc1'
23+
network_acl.network_acl_ingress_entries << 'IngressEntry1'
24+
network_acl
25+
end
26+
27+
def network_acl_with_two_ingress_entries(cfn_model: CfnModel.new)
28+
network_acl = AWS::EC2::NetworkAcl.new cfn_model
29+
network_acl.vpcId = 'testvpc1'
30+
%w[IngressEntry1 IngressEntry2].each do |ingress_entry|
31+
network_acl.network_acl_ingress_entries << ingress_entry
32+
end
33+
network_acl
34+
end
35+
36+
def network_acl_with_egress_and_ingress_entries(cfn_model: CfnModel.new)
37+
network_acl = AWS::EC2::NetworkAcl.new cfn_model
38+
network_acl.vpcId = 'testvpc1'
39+
network_acl.network_acl_egress_entries << 'EgressEntry1'
40+
network_acl.network_acl_ingress_entries << 'IngressEntry1'
41+
network_acl
42+
end
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
require 'spec_helper'
2+
require 'cfn-model/parser/cfn_parser'
3+
4+
describe CfnParser do
5+
before :each do
6+
@cfn_parser = CfnParser.new
7+
end
8+
9+
context 'Network ACL that has one egress entry' do
10+
it 'returns a Network ACL with one egress entry' do
11+
expected_nacls = network_acl_with_one_egress_entry(cfn_model: CfnModel.new)
12+
yaml_test_templates('ec2_network_acl/nacl_with_one_egress_entry').each do |test_template|
13+
cfn_model = @cfn_parser.parse IO.read(test_template)
14+
nacls = cfn_model.resources_by_type 'AWS::EC2::NetworkAcl'
15+
16+
expect(nacls.size).to eq 1
17+
expect(nacls[0]).to eq expected_nacls
18+
expect(nacls[0].network_acl_egress_entries).to eq expected_nacls.network_acl_egress_entries
19+
expect(nacls[0].network_acl_egress_entries).not_to be_empty
20+
end
21+
end
22+
end
23+
24+
context 'Network ACL that has one ingress entry' do
25+
it 'returns a Network ACL with one ingress entry' do
26+
expected_nacls = network_acl_with_one_ingress_entry(cfn_model: CfnModel.new)
27+
yaml_test_templates('ec2_network_acl/nacl_with_one_ingress_entry').each do |test_template|
28+
cfn_model = @cfn_parser.parse IO.read(test_template)
29+
nacls = cfn_model.resources_by_type 'AWS::EC2::NetworkAcl'
30+
31+
expect(nacls.size).to eq 1
32+
expect(nacls[0]).to eq expected_nacls
33+
expect(nacls[0].network_acl_ingress_entries).to eq expected_nacls.network_acl_ingress_entries
34+
expect(nacls[0].network_acl_ingress_entries).not_to be_empty
35+
end
36+
end
37+
end
38+
39+
context 'Network ACL that has two egress entries' do
40+
it 'returns a Network ACL with two egress entries' do
41+
expected_nacls = network_acl_with_two_egress_entries(cfn_model: CfnModel.new)
42+
yaml_test_templates('ec2_network_acl/nacl_with_two_egress_entries').each do |test_template|
43+
cfn_model = @cfn_parser.parse IO.read(test_template)
44+
nacls = cfn_model.resources_by_type 'AWS::EC2::NetworkAcl'
45+
46+
expect(nacls.size).to eq 1
47+
expect(nacls[0]).to eq expected_nacls
48+
expect(nacls[0].network_acl_egress_entries).to eq expected_nacls.network_acl_egress_entries
49+
expect(nacls[0].network_acl_egress_entries).not_to be_empty
50+
end
51+
end
52+
end
53+
54+
context 'Network ACL that has two ingress entries' do
55+
it 'returns a Network ACL with two ingress entries' do
56+
expected_nacls = network_acl_with_two_ingress_entries(cfn_model: CfnModel.new)
57+
yaml_test_templates('ec2_network_acl/nacl_with_two_ingress_entries').each do |test_template|
58+
cfn_model = @cfn_parser.parse IO.read(test_template)
59+
nacls = cfn_model.resources_by_type 'AWS::EC2::NetworkAcl'
60+
61+
expect(nacls.size).to eq 1
62+
expect(nacls[0]).to eq expected_nacls
63+
expect(nacls[0].network_acl_ingress_entries).to eq expected_nacls.network_acl_ingress_entries
64+
expect(nacls[0].network_acl_ingress_entries).not_to be_empty
65+
end
66+
end
67+
end
68+
context 'Network ACL that has one egress and ingress entry' do
69+
it 'returns a Network ACL with one egress and ingress entry' do
70+
expected_nacls = network_acl_with_egress_and_ingress_entries(cfn_model: CfnModel.new)
71+
yaml_test_templates('ec2_network_acl/nacl_with_one_egress_and_ingress_entry').each do |test_template|
72+
cfn_model = @cfn_parser.parse IO.read(test_template)
73+
nacls = cfn_model.resources_by_type 'AWS::EC2::NetworkAcl'
74+
75+
expect(nacls.size).to eq 1
76+
expect(nacls[0]).to eq expected_nacls
77+
expect(nacls[0].network_acl_egress_entries).to eq expected_nacls.network_acl_egress_entries
78+
expect(nacls[0].network_acl_ingress_entries).to eq expected_nacls.network_acl_ingress_entries
79+
expect(nacls[0].network_acl_egress_entries).not_to be_empty
80+
expect(nacls[0].network_acl_ingress_entries).not_to be_empty
81+
end
82+
end
83+
end
84+
end
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
Resources:
3+
testvpc1:
4+
Type: AWS::EC2::VPC
5+
Properties:
6+
CidrBlock: "10.0.0.0/16"
7+
EnableDnsSupport: true
8+
EnableDnsHostnames: true
9+
InstanceTenancy: "default"
10+
myNetworkAcl:
11+
Type: AWS::EC2::NetworkAcl
12+
Properties:
13+
VpcId: 'testvpc1'
14+
EgressEntry1:
15+
Type: AWS::EC2::NetworkAclEntry
16+
Properties:
17+
NetworkAclId: !Ref myNetworkAcl
18+
Protocol: "6"
19+
RuleAction: "allow"
20+
RuleNumber: "100"
21+
CidrBlock: "10.0.0.0/16"
22+
Egress: true
23+
PortRange:
24+
From: '443'
25+
To: '443'
26+
IngressEntry1:
27+
Type: AWS::EC2::NetworkAclEntry
28+
Properties:
29+
NetworkAclId: !Ref myNetworkAcl
30+
Protocol: "6"
31+
RuleAction: "allow"
32+
RuleNumber: "100"
33+
CidrBlock: "10.0.0.0/16"
34+
Egress: false
35+
PortRange:
36+
From: '443'
37+
To: '443'
38+
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
Resources:
3+
testvpc1:
4+
Type: AWS::EC2::VPC
5+
Properties:
6+
CidrBlock: "10.0.0.0/16"
7+
EnableDnsSupport: true
8+
EnableDnsHostnames: true
9+
InstanceTenancy: "default"
10+
myNetworkAcl:
11+
Type: AWS::EC2::NetworkAcl
12+
Properties:
13+
VpcId: 'testvpc1'
14+
EgressEntry1:
15+
Type: AWS::EC2::NetworkAclEntry
16+
Properties:
17+
NetworkAclId: !Ref myNetworkAcl
18+
Protocol: "6"
19+
RuleAction: "allow"
20+
RuleNumber: "100"
21+
CidrBlock: "10.0.0.0/16"
22+
Egress: true
23+
PortRange:
24+
From: '443'
25+
To: '443'
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
Resources:
3+
testvpc1:
4+
Type: AWS::EC2::VPC
5+
Properties:
6+
CidrBlock: "10.0.0.0/16"
7+
EnableDnsSupport: true
8+
EnableDnsHostnames: true
9+
InstanceTenancy: "default"
10+
myNetworkAcl:
11+
Type: AWS::EC2::NetworkAcl
12+
Properties:
13+
VpcId: 'testvpc1'
14+
IngressEntry1:
15+
Type: AWS::EC2::NetworkAclEntry
16+
Properties:
17+
NetworkAclId: !Ref myNetworkAcl
18+
Protocol: "6"
19+
RuleAction: "allow"
20+
RuleNumber: "100"
21+
CidrBlock: "10.0.0.0/16"
22+
Egress: false
23+
PortRange:
24+
From: '443'
25+
To: '443'
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
Resources:
3+
testvpc1:
4+
Type: AWS::EC2::VPC
5+
Properties:
6+
CidrBlock: "10.0.0.0/16"
7+
EnableDnsSupport: true
8+
EnableDnsHostnames: true
9+
InstanceTenancy: "default"
10+
myNetworkAcl:
11+
Type: AWS::EC2::NetworkAcl
12+
Properties:
13+
VpcId: 'testvpc1'
14+
EgressEntry1:
15+
Type: AWS::EC2::NetworkAclEntry
16+
Properties:
17+
NetworkAclId: !Ref myNetworkAcl
18+
Protocol: "6"
19+
RuleAction: "allow"
20+
RuleNumber: "100"
21+
CidrBlock: "10.0.0.0/16"
22+
Egress: true
23+
PortRange:
24+
From: '443'
25+
To: '443'
26+
EgressEntry2:
27+
Type: AWS::EC2::NetworkAclEntry
28+
Properties:
29+
NetworkAclId: !Ref myNetworkAcl
30+
Protocol: "6"
31+
RuleAction: "allow"
32+
RuleNumber: "200"
33+
CidrBlock: "10.0.0.0/16"
34+
Egress: true
35+
PortRange:
36+
From: '80'
37+
To: '80'
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
Resources:
3+
testvpc1:
4+
Type: AWS::EC2::VPC
5+
Properties:
6+
CidrBlock: "10.0.0.0/16"
7+
EnableDnsSupport: true
8+
EnableDnsHostnames: true
9+
InstanceTenancy: "default"
10+
myNetworkAcl:
11+
Type: AWS::EC2::NetworkAcl
12+
Properties:
13+
VpcId: 'testvpc1'
14+
IngressEntry1:
15+
Type: AWS::EC2::NetworkAclEntry
16+
Properties:
17+
NetworkAclId: !Ref myNetworkAcl
18+
Protocol: "6"
19+
RuleAction: "allow"
20+
RuleNumber: "100"
21+
CidrBlock: "10.0.0.0/16"
22+
Egress: false
23+
PortRange:
24+
From: '443'
25+
To: '443'
26+
IngressEntry2:
27+
Type: AWS::EC2::NetworkAclEntry
28+
Properties:
29+
NetworkAclId: !Ref myNetworkAcl
30+
Protocol: "6"
31+
RuleAction: "allow"
32+
RuleNumber: "200"
33+
CidrBlock: "10.0.0.0/16"
34+
Egress: false
35+
PortRange:
36+
From: '80'
37+
To: '80'
38+

0 commit comments

Comments
 (0)