diff --git a/assets/queries/terraform/databricks/autoscale_badly_setup/metadata.json b/assets/queries/terraform/databricks/autoscale_badly_setup/metadata.json index 845b84e4a97..7af9affc3ad 100644 --- a/assets/queries/terraform/databricks/autoscale_badly_setup/metadata.json +++ b/assets/queries/terraform/databricks/autoscale_badly_setup/metadata.json @@ -1,6 +1,6 @@ { "id": "953c0cc6-5f30-44cb-a803-bf4ef2571be8", - "queryName": "Databricks Autoscale Badly Setup", + "queryName": "(Beta) Databricks Autoscale Badly Setup", "severity": "MEDIUM", "category": "Resource Management", "descriptionText": "Databricks should have min and max worker setup for autoscale", diff --git a/assets/queries/terraform/databricks/autoscale_badly_setup/test/positive_expected_result.json b/assets/queries/terraform/databricks/autoscale_badly_setup/test/positive_expected_result.json index 7b122be2d1e..6595e319ccc 100644 --- a/assets/queries/terraform/databricks/autoscale_badly_setup/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/autoscale_badly_setup/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Databricks Autoscale Badly Setup", + "queryName": "(Beta) Databricks Autoscale Badly Setup", "severity": "MEDIUM", "line": 6, "fileName": "positive1.tf" }, { - "queryName": "Databricks Autoscale Badly Setup", + "queryName": "(Beta) Databricks Autoscale Badly Setup", "severity": "MEDIUM", "line": 6, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/databricks/cluster_aws_attributes/metadata.json b/assets/queries/terraform/databricks/cluster_aws_attributes/metadata.json index ad03098f8ef..be9d8e0b06e 100644 --- a/assets/queries/terraform/databricks/cluster_aws_attributes/metadata.json +++ b/assets/queries/terraform/databricks/cluster_aws_attributes/metadata.json @@ -1,6 +1,6 @@ { "id": "b0749c53-e3ff-4d09-bbe4-dca94e2e7a38", - "queryName": "Check Databricks Cluster AWS Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster AWS Attribute Best Practices", "severity": "LOW", "category": "Best Practices", "descriptionText": "One or some Databricks Cluster AWS Attribute Best Practices are not respected", diff --git a/assets/queries/terraform/databricks/cluster_aws_attributes/test/positive_expected_result.json b/assets/queries/terraform/databricks/cluster_aws_attributes/test/positive_expected_result.json index 93eb7605956..0d330433390 100644 --- a/assets/queries/terraform/databricks/cluster_aws_attributes/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/cluster_aws_attributes/test/positive_expected_result.json @@ -1,24 +1,24 @@ [ { - "queryName": "Check Databricks Cluster AWS Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster AWS Attribute Best Practices", "severity": "LOW", "line": 11, "fileName": "positive1.tf" }, { - "queryName": "Check Databricks Cluster AWS Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster AWS Attribute Best Practices", "severity": "LOW", "line": 13, "fileName": "positive2.tf" }, { - "queryName": "Check Databricks Cluster AWS Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster AWS Attribute Best Practices", "severity": "LOW", "line": 10, "fileName": "positive3.tf" }, { - "queryName": "Check Databricks Cluster AWS Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster AWS Attribute Best Practices", "severity": "LOW", "line": 12, "fileName": "positive4.tf" diff --git a/assets/queries/terraform/databricks/cluster_azure_attributes/metadata.json b/assets/queries/terraform/databricks/cluster_azure_attributes/metadata.json index b72f849d3b5..a978d45b74d 100644 --- a/assets/queries/terraform/databricks/cluster_azure_attributes/metadata.json +++ b/assets/queries/terraform/databricks/cluster_azure_attributes/metadata.json @@ -1,6 +1,6 @@ { "id": "38028698-e663-4ef7-aa92-773fef0ca86f", - "queryName": "Check Databricks Cluster Azure Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster Azure Attribute Best Practices", "severity": "LOW", "category": "Best Practices", "descriptionText": "One or some Databricks Cluster Azure Attribute Best Practices are not respected", diff --git a/assets/queries/terraform/databricks/cluster_azure_attributes/test/positive_expected_result.json b/assets/queries/terraform/databricks/cluster_azure_attributes/test/positive_expected_result.json index 3ef88398111..437bff583f4 100644 --- a/assets/queries/terraform/databricks/cluster_azure_attributes/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/cluster_azure_attributes/test/positive_expected_result.json @@ -1,18 +1,18 @@ [ { - "queryName": "Check Databricks Cluster Azure Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster Azure Attribute Best Practices", "severity": "LOW", "line": 11, "fileName": "positive1.tf" }, { - "queryName": "Check Databricks Cluster Azure Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster Azure Attribute Best Practices", "severity": "LOW", "line": 12, "fileName": "positive2.tf" }, { - "queryName": "Check Databricks Cluster Azure Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster Azure Attribute Best Practices", "severity": "LOW", "line": 10, "fileName": "positive3.tf" diff --git a/assets/queries/terraform/databricks/cluster_gcp_attributes/metadata.json b/assets/queries/terraform/databricks/cluster_gcp_attributes/metadata.json index 4c37ae81e4d..7da98e19114 100644 --- a/assets/queries/terraform/databricks/cluster_gcp_attributes/metadata.json +++ b/assets/queries/terraform/databricks/cluster_gcp_attributes/metadata.json @@ -1,6 +1,6 @@ { "id": "539e4557-d2b5-4d57-a001-cb01140a4e2d", - "queryName": "Check Databricks Cluster GCP Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster GCP Attribute Best Practices", "severity": "LOW", "category": "Best Practices", "descriptionText": "One or some Databricks Cluster GCP Attribute Best Practices are not respected", diff --git a/assets/queries/terraform/databricks/cluster_gcp_attributes/test/positive_expected_result.json b/assets/queries/terraform/databricks/cluster_gcp_attributes/test/positive_expected_result.json index 0b7c36b4172..1b156b03c5f 100644 --- a/assets/queries/terraform/databricks/cluster_gcp_attributes/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/cluster_gcp_attributes/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Check Databricks Cluster GCP Attribute Best Practices", + "queryName": "(Beta) Check Databricks Cluster GCP Attribute Best Practices", "severity": "LOW", "line": 11, "fileName": "positive1.tf" diff --git a/assets/queries/terraform/databricks/databricks_permissions/metadata.json b/assets/queries/terraform/databricks/databricks_permissions/metadata.json index f12debed083..91e61013a01 100755 --- a/assets/queries/terraform/databricks/databricks_permissions/metadata.json +++ b/assets/queries/terraform/databricks/databricks_permissions/metadata.json @@ -1,6 +1,6 @@ { "id": "a4edb7e1-c0e0-4f7f-9d7c-d1b603e81ad5", - "queryName": "Databricks Cluster or Job With None Or Insecure Permission(s)", + "queryName": "(Beta) Databricks Cluster or Job With None Or Insecure Permission(s)", "severity": "HIGH", "category": "Insecure Configurations", "descriptionText": "Databricks Cluster and Job must have restricted permissions", diff --git a/assets/queries/terraform/databricks/databricks_permissions/test/positive_expected_result.json b/assets/queries/terraform/databricks/databricks_permissions/test/positive_expected_result.json index fa8ae3b3161..2c70b6990af 100755 --- a/assets/queries/terraform/databricks/databricks_permissions/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/databricks_permissions/test/positive_expected_result.json @@ -1,24 +1,24 @@ [ { - "queryName": "Databricks Cluster or Job With None Or Insecure Permission(s)", + "queryName": "(Beta) Databricks Cluster or Job With None Or Insecure Permission(s)", "severity": "HIGH", "line": 16, "fileName": "positive1.tf" }, { - "queryName": "Databricks Cluster or Job With None Or Insecure Permission(s)", + "queryName": "(Beta) Databricks Cluster or Job With None Or Insecure Permission(s)", "severity": "HIGH", "line": 12, "fileName": "positive2.tf" }, { - "queryName": "Databricks Cluster or Job With None Or Insecure Permission(s)", + "queryName": "(Beta) Databricks Cluster or Job With None Or Insecure Permission(s)", "severity": "HIGH", "line": 16, "fileName": "positive3.tf" }, { - "queryName": "Databricks Cluster or Job With None Or Insecure Permission(s)", + "queryName": "(Beta) Databricks Cluster or Job With None Or Insecure Permission(s)", "severity": "HIGH", "line": 16, "fileName": "positive4.tf" diff --git a/assets/queries/terraform/databricks/group_without_user_or_instance_profile/metadata.json b/assets/queries/terraform/databricks/group_without_user_or_instance_profile/metadata.json index 3ce6c1b2576..f0507e29e7d 100644 --- a/assets/queries/terraform/databricks/group_without_user_or_instance_profile/metadata.json +++ b/assets/queries/terraform/databricks/group_without_user_or_instance_profile/metadata.json @@ -1,6 +1,6 @@ { "id": "23c3067a-8cc9-480c-b645-7c1e0ad4bf60", - "queryName": "Databricks Group Without User Or Instance Profile", + "queryName": "(Beta) Databricks Group Without User Or Instance Profile", "severity": "LOW", "category": "Access Control", "descriptionText": "Databricks Group should have at least one user or one instance profile associated", diff --git a/assets/queries/terraform/databricks/group_without_user_or_instance_profile/test/positive_expected_result.json b/assets/queries/terraform/databricks/group_without_user_or_instance_profile/test/positive_expected_result.json index 0fadf818ea4..f58e91aeef5 100644 --- a/assets/queries/terraform/databricks/group_without_user_or_instance_profile/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/group_without_user_or_instance_profile/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Databricks Group Without User Or Instance Profile", + "queryName": "(Beta) Databricks Group Without User Or Instance Profile", "severity": "LOW", "line": 16, "fileName": "positive1.tf" }, { - "queryName": "Databricks Group Without User Or Instance Profile", + "queryName": "(Beta) Databricks Group Without User Or Instance Profile", "severity": "LOW", "line": 14, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/databricks/indefinitely_obo_token/metadata.json b/assets/queries/terraform/databricks/indefinitely_obo_token/metadata.json index c63409fd92f..74ada6d0a3b 100644 --- a/assets/queries/terraform/databricks/indefinitely_obo_token/metadata.json +++ b/assets/queries/terraform/databricks/indefinitely_obo_token/metadata.json @@ -1,6 +1,6 @@ { "id": "23e1f5f0-12b7-4d7e-9087-f60f42ccd514", - "queryName": "Indefinitely Databricks OBO Token Lifetime", + "queryName": "(Beta) Indefinitely Databricks OBO Token Lifetime", "severity": "MEDIUM", "category": "Insecure Defaults", "descriptionText": "OBO Token has an indefinitely lifetime", diff --git a/assets/queries/terraform/databricks/indefinitely_obo_token/test/positive_expected_result.json b/assets/queries/terraform/databricks/indefinitely_obo_token/test/positive_expected_result.json index cc134659b5a..86ef5d8d51b 100644 --- a/assets/queries/terraform/databricks/indefinitely_obo_token/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/indefinitely_obo_token/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Indefinitely Databricks OBO Token Lifetime", + "queryName": "(Beta) Indefinitely Databricks OBO Token Lifetime", "severity": "MEDIUM", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/databricks/indefinitely_token/metadata.json b/assets/queries/terraform/databricks/indefinitely_token/metadata.json index f7b46d497c4..25cbcddfcd0 100644 --- a/assets/queries/terraform/databricks/indefinitely_token/metadata.json +++ b/assets/queries/terraform/databricks/indefinitely_token/metadata.json @@ -1,6 +1,6 @@ { "id": "7d05ca25-91b4-42ee-b6f6-b06611a87ce8", - "queryName": "Indefinitely Databricks Token Lifetime", + "queryName": "(Beta) Indefinitely Databricks Token Lifetime", "severity": "MEDIUM", "category": "Insecure Defaults", "descriptionText": "Token has an indefinitely lifetime", diff --git a/assets/queries/terraform/databricks/indefinitely_token/test/positive_expected_result.json b/assets/queries/terraform/databricks/indefinitely_token/test/positive_expected_result.json index 804551b008f..6f7c657529b 100644 --- a/assets/queries/terraform/databricks/indefinitely_token/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/indefinitely_token/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Indefinitely Databricks Token Lifetime", + "queryName": "(Beta) Indefinitely Databricks Token Lifetime", "severity": "MEDIUM", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/databricks/unrestricted_acl/metadata.json b/assets/queries/terraform/databricks/unrestricted_acl/metadata.json index 80daf742fe9..3ddd7db37d4 100644 --- a/assets/queries/terraform/databricks/unrestricted_acl/metadata.json +++ b/assets/queries/terraform/databricks/unrestricted_acl/metadata.json @@ -1,6 +1,6 @@ { "id": "2c4fe4a9-f44b-4c70-b09b-5b75cd251805", - "queryName": "Unrestricted Databricks ACL", + "queryName": "(Beta) Unrestricted Databricks ACL", "severity": "HIGH", "category": "Networking and Firewall", "descriptionText": "ACL allow ingress from 0.0.0.0/0 and/or ::/0", diff --git a/assets/queries/terraform/databricks/unrestricted_acl/test/positive_expected_result.json b/assets/queries/terraform/databricks/unrestricted_acl/test/positive_expected_result.json index a70c25b0fd1..a4f0d2a9ee1 100644 --- a/assets/queries/terraform/databricks/unrestricted_acl/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/unrestricted_acl/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Unrestricted Databricks ACL", + "queryName": "(Beta) Unrestricted Databricks ACL", "severity": "HIGH", "line": 10, "fileName": "positive1.tf" }, { - "queryName": "Unrestricted Databricks ACL", + "queryName": "(Beta) Unrestricted Databricks ACL", "severity": "HIGH", "line": 10, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/databricks/use_lts_spark_version/metadata.json b/assets/queries/terraform/databricks/use_lts_spark_version/metadata.json index be54932e0a1..0d4a8c54c6b 100644 --- a/assets/queries/terraform/databricks/use_lts_spark_version/metadata.json +++ b/assets/queries/terraform/databricks/use_lts_spark_version/metadata.json @@ -1,6 +1,6 @@ { "id": "5a627dfa-a4dd-4020-a4c6-5f3caf4abcd6", - "queryName": "Check use no LTS Spark Version", + "queryName": "(Beta) Check use no LTS Spark Version", "severity": "LOW", "category": "Best Practices", "descriptionText": "Spark Version is not a Long-term Support", diff --git a/assets/queries/terraform/databricks/use_lts_spark_version/test/positive_expected_result.json b/assets/queries/terraform/databricks/use_lts_spark_version/test/positive_expected_result.json index a076127c380..bf3d166a95b 100644 --- a/assets/queries/terraform/databricks/use_lts_spark_version/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/use_lts_spark_version/test/positive_expected_result.json @@ -1,18 +1,18 @@ [ { - "queryName": "Check use no LTS Spark Version", + "queryName": "(Beta) Check use no LTS Spark Version", "severity": "LOW", "line": 8, "fileName": "positive1.tf" }, { - "queryName": "Check use no LTS Spark Version", + "queryName": "(Beta) Check use no LTS Spark Version", "severity": "LOW", "line": 11, "fileName": "positive2.tf" }, { - "queryName": "Check use no LTS Spark Version", + "queryName": "(Beta) Check use no LTS Spark Version", "severity": "LOW", "line": 10, "fileName": "positive3.tf" diff --git a/assets/queries/terraform/databricks/use_spark_submit_task/metadata.json b/assets/queries/terraform/databricks/use_spark_submit_task/metadata.json index 737df74503b..d60a9e3b273 100644 --- a/assets/queries/terraform/databricks/use_spark_submit_task/metadata.json +++ b/assets/queries/terraform/databricks/use_spark_submit_task/metadata.json @@ -1,6 +1,6 @@ { "id": "375cdab9-3f94-4ae0-b1e3-8fbdf9cdf4d7", - "queryName": "Job's Task is Legacy (spark_submit_task)", + "queryName": "(Beta) Job's Task is Legacy (spark_submit_task)", "severity": "MEDIUM", "category": "Best Practices", "descriptionText": "Job's Task Is spark_submit_task", diff --git a/assets/queries/terraform/databricks/use_spark_submit_task/test/positive_expected_result.json b/assets/queries/terraform/databricks/use_spark_submit_task/test/positive_expected_result.json index 435ab8cd80c..1d38cbb24d0 100644 --- a/assets/queries/terraform/databricks/use_spark_submit_task/test/positive_expected_result.json +++ b/assets/queries/terraform/databricks/use_spark_submit_task/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Job's Task is Legacy (spark_submit_task)", + "queryName": "(Beta) Job's Task is Legacy (spark_submit_task)", "severity": "MEDIUM", "line": 36, "fileName": "positive1.tf" }, { - "queryName": "Job's Task is Legacy (spark_submit_task)", + "queryName": "(Beta) Job's Task is Legacy (spark_submit_task)", "severity": "MEDIUM", "line": 18, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/nifcloud/computing_instance_has_common_private/metadata.json b/assets/queries/terraform/nifcloud/computing_instance_has_common_private/metadata.json index c214dcfa7f0..377d505f8be 100644 --- a/assets/queries/terraform/nifcloud/computing_instance_has_common_private/metadata.json +++ b/assets/queries/terraform/nifcloud/computing_instance_has_common_private/metadata.json @@ -1,6 +1,6 @@ { "id": "df58dd45-8009-43c2-90f7-c90eb9d53ed9", - "queryName": "Nifcloud Computing Has Common Private Network", + "queryName": "(Beta) Nifcloud Computing Has Common Private Network", "severity": "LOW", "category": "Networking and Firewall", "descriptionText": "The instance has common private network", diff --git a/assets/queries/terraform/nifcloud/computing_instance_has_common_private/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/computing_instance_has_common_private/test/positive_expected_result.json index 3b339c90f90..005b6d9d25e 100644 --- a/assets/queries/terraform/nifcloud/computing_instance_has_common_private/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/computing_instance_has_common_private/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Nifcloud Computing Has Common Private Network", + "queryName": "(Beta) Nifcloud Computing Has Common Private Network", "severity": "LOW", "line": 1, "fileName": "positive1.tf" }, { - "queryName": "Nifcloud Computing Has Common Private Network", + "queryName": "(Beta) Nifcloud Computing Has Common Private Network", "severity": "LOW", "line": 1, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/nifcloud/computing_instance_has_public_ingress_sgr/metadata.json b/assets/queries/terraform/nifcloud/computing_instance_has_public_ingress_sgr/metadata.json index 36526a5d242..4339fdf8008 100644 --- a/assets/queries/terraform/nifcloud/computing_instance_has_public_ingress_sgr/metadata.json +++ b/assets/queries/terraform/nifcloud/computing_instance_has_public_ingress_sgr/metadata.json @@ -1,6 +1,6 @@ { "id": "b2ea2367-8dc9-4231-a035-d0b28bfa3dde", - "queryName": "Nifcloud Computing Has Public Ingress Security Group Rule", + "queryName": "(Beta) Nifcloud Computing Has Public Ingress Security Group Rule", "severity": "HIGH", "category": "Networking and Firewall", "descriptionText": "An ingress security group rule allows traffic from /0", diff --git a/assets/queries/terraform/nifcloud/computing_instance_has_public_ingress_sgr/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/computing_instance_has_public_ingress_sgr/test/positive_expected_result.json index c155888d657..8c06e21dffa 100644 --- a/assets/queries/terraform/nifcloud/computing_instance_has_public_ingress_sgr/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/computing_instance_has_public_ingress_sgr/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud Computing Has Public Ingress Security Group Rule", + "queryName": "(Beta) Nifcloud Computing Has Public Ingress Security Group Rule", "severity": "HIGH", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/computing_instance_security_group_undefined/metadata.json b/assets/queries/terraform/nifcloud/computing_instance_security_group_undefined/metadata.json index 402e4d64303..5d7f718ed86 100644 --- a/assets/queries/terraform/nifcloud/computing_instance_security_group_undefined/metadata.json +++ b/assets/queries/terraform/nifcloud/computing_instance_security_group_undefined/metadata.json @@ -1,6 +1,6 @@ { "id": "89218b48-75c9-4cb3-aaba-5299e852e8bc", - "queryName": "Nifcloud Computing Undefined Security Group To Instance", + "queryName": "(Beta) Nifcloud Computing Undefined Security Group To Instance", "severity": "HIGH", "category": "Networking and Firewall", "descriptionText": "Missing security group for instance", diff --git a/assets/queries/terraform/nifcloud/computing_instance_security_group_undefined/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/computing_instance_security_group_undefined/test/positive_expected_result.json index 9aa880cd9a9..d7a177748f7 100644 --- a/assets/queries/terraform/nifcloud/computing_instance_security_group_undefined/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/computing_instance_security_group_undefined/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud Computing Undefined Security Group To Instance", + "queryName": "(Beta) Nifcloud Computing Undefined Security Group To Instance", "severity": "HIGH", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/computing_security_group_description_undefined/metadata.json b/assets/queries/terraform/nifcloud/computing_security_group_description_undefined/metadata.json index 504786c8aba..462d13ee61f 100644 --- a/assets/queries/terraform/nifcloud/computing_security_group_description_undefined/metadata.json +++ b/assets/queries/terraform/nifcloud/computing_security_group_description_undefined/metadata.json @@ -1,6 +1,6 @@ { "id": "41c127a9-3a85-4bc3-a333-ed374eb9c3e4", - "queryName": "Nifcloud Computing Undefined Description To Security Group", + "queryName": "(Beta) Nifcloud Computing Undefined Description To Security Group", "severity": "LOW", "category": "Networking and Firewall", "descriptionText": "Missing description for security group", diff --git a/assets/queries/terraform/nifcloud/computing_security_group_description_undefined/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/computing_security_group_description_undefined/test/positive_expected_result.json index 7925353ee7d..6c0795acbe7 100644 --- a/assets/queries/terraform/nifcloud/computing_security_group_description_undefined/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/computing_security_group_description_undefined/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud Computing Undefined Description To Security Group", + "queryName": "(Beta) Nifcloud Computing Undefined Description To Security Group", "severity": "LOW", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/computing_security_group_rule_description_undefined/metadata.json b/assets/queries/terraform/nifcloud/computing_security_group_rule_description_undefined/metadata.json index 4009b25d01b..2b90ae92f1a 100644 --- a/assets/queries/terraform/nifcloud/computing_security_group_rule_description_undefined/metadata.json +++ b/assets/queries/terraform/nifcloud/computing_security_group_rule_description_undefined/metadata.json @@ -1,6 +1,6 @@ { "id": "e4610872-0b1c-4fb7-ab57-d81c0afdb291", - "queryName": "Nifcloud Computing Undefined Description To Security Group Rule", + "queryName": "(Beta) Nifcloud Computing Undefined Description To Security Group Rule", "severity": "LOW", "category": "Networking and Firewall", "descriptionText": "Missing description for security group rule", diff --git a/assets/queries/terraform/nifcloud/computing_security_group_rule_description_undefined/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/computing_security_group_rule_description_undefined/test/positive_expected_result.json index 15a66c82427..a809cccbd29 100644 --- a/assets/queries/terraform/nifcloud/computing_security_group_rule_description_undefined/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/computing_security_group_rule_description_undefined/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud Computing Undefined Description To Security Group Rule", + "queryName": "(Beta) Nifcloud Computing Undefined Description To Security Group Rule", "severity": "LOW", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/db_does_not_have_long_backup_retention/metadata.json b/assets/queries/terraform/nifcloud/db_does_not_have_long_backup_retention/metadata.json index 1e0390de4eb..3b3138bb773 100644 --- a/assets/queries/terraform/nifcloud/db_does_not_have_long_backup_retention/metadata.json +++ b/assets/queries/terraform/nifcloud/db_does_not_have_long_backup_retention/metadata.json @@ -1,6 +1,6 @@ { "id": "e5071f76-cbe7-468d-bb2b-d10f02d2b713", - "queryName": "Nifcloud RDB Has Backup Retention Less Than 2 Day", + "queryName": "(Beta) Nifcloud RDB Has Backup Retention Less Than 2 Day", "severity": "MEDIUM", "category": "Backup", "descriptionText": "The rdb has backup retention less than 2 day", diff --git a/assets/queries/terraform/nifcloud/db_does_not_have_long_backup_retention/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/db_does_not_have_long_backup_retention/test/positive_expected_result.json index f88d80d6387..edc06a1bd4b 100644 --- a/assets/queries/terraform/nifcloud/db_does_not_have_long_backup_retention/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/db_does_not_have_long_backup_retention/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Nifcloud RDB Has Backup Retention Less Than 2 Day", + "queryName": "(Beta) Nifcloud RDB Has Backup Retention Less Than 2 Day", "severity": "MEDIUM", "line": 1, "fileName": "positive1.tf" }, { - "queryName": "Nifcloud RDB Has Backup Retention Less Than 2 Day", + "queryName": "(Beta) Nifcloud RDB Has Backup Retention Less Than 2 Day", "severity": "MEDIUM", "line": 1, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/nifcloud/db_has_public_access/metadata.json b/assets/queries/terraform/nifcloud/db_has_public_access/metadata.json index e1d3f8ee8bc..2b7ff892620 100644 --- a/assets/queries/terraform/nifcloud/db_has_public_access/metadata.json +++ b/assets/queries/terraform/nifcloud/db_has_public_access/metadata.json @@ -1,6 +1,6 @@ { "id": "fb387023-e4bb-42a8-9a70-6708aa7ff21b", - "queryName": "Nifcloud RDB Has Public DB Access", + "queryName": "(Beta) Nifcloud RDB Has Public DB Access", "severity": "HIGH", "category": "Networking and Firewall", "descriptionText": "The rdb has public db access", diff --git a/assets/queries/terraform/nifcloud/db_has_public_access/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/db_has_public_access/test/positive_expected_result.json index f1c041a3ef5..2377a8da06d 100644 --- a/assets/queries/terraform/nifcloud/db_has_public_access/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/db_has_public_access/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud RDB Has Public DB Access", + "queryName": "(Beta) Nifcloud RDB Has Public DB Access", "severity": "HIGH", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/db_instance_has_common_private/metadata.json b/assets/queries/terraform/nifcloud/db_instance_has_common_private/metadata.json index 62b0f9d855b..6bd87e0a76c 100644 --- a/assets/queries/terraform/nifcloud/db_instance_has_common_private/metadata.json +++ b/assets/queries/terraform/nifcloud/db_instance_has_common_private/metadata.json @@ -1,6 +1,6 @@ { "id": "9bf57c23-fbab-4222-85f3-3f207a53c6a8", - "queryName": "Nifcloud RDB Has Common Private Network", + "queryName": "(Beta) Nifcloud RDB Has Common Private Network", "severity": "LOW", "category": "Networking and Firewall", "descriptionText": "The rdb has common private network", diff --git a/assets/queries/terraform/nifcloud/db_instance_has_common_private/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/db_instance_has_common_private/test/positive_expected_result.json index 0c41e6b1eb8..a0282f06b17 100644 --- a/assets/queries/terraform/nifcloud/db_instance_has_common_private/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/db_instance_has_common_private/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud RDB Has Common Private Network", + "queryName": "(Beta) Nifcloud RDB Has Common Private Network", "severity": "LOW", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/db_security_group_description_undefined/metadata.json b/assets/queries/terraform/nifcloud/db_security_group_description_undefined/metadata.json index 438307172d5..348aa4e079e 100644 --- a/assets/queries/terraform/nifcloud/db_security_group_description_undefined/metadata.json +++ b/assets/queries/terraform/nifcloud/db_security_group_description_undefined/metadata.json @@ -1,6 +1,6 @@ { "id": "940ddce2-26bd-4e31-a9b4-382714f73231", - "queryName": "Nifcloud RDB Undefined Description To DB Security Group", + "queryName": "(Beta) Nifcloud RDB Undefined Description To DB Security Group", "severity": "LOW", "category": "Networking and Firewall", "descriptionText": "Missing description for db security group", diff --git a/assets/queries/terraform/nifcloud/db_security_group_description_undefined/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/db_security_group_description_undefined/test/positive_expected_result.json index 1248f859278..4c82e57e2ba 100644 --- a/assets/queries/terraform/nifcloud/db_security_group_description_undefined/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/db_security_group_description_undefined/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud RDB Undefined Description To DB Security Group", + "queryName": "(Beta) Nifcloud RDB Undefined Description To DB Security Group", "severity": "LOW", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/db_security_group_has_public_ingress_sgr/metadata.json b/assets/queries/terraform/nifcloud/db_security_group_has_public_ingress_sgr/metadata.json index 3e3867f013f..85b42fa0dba 100644 --- a/assets/queries/terraform/nifcloud/db_security_group_has_public_ingress_sgr/metadata.json +++ b/assets/queries/terraform/nifcloud/db_security_group_has_public_ingress_sgr/metadata.json @@ -1,6 +1,6 @@ { "id": "a0b846e8-815f-4f15-b660-bc4ab9fa1e1a", - "queryName": "Nifcloud RDB Has Public DB Ingress Security Group Rule", + "queryName": "(Beta) Nifcloud RDB Has Public DB Ingress Security Group Rule", "severity": "HIGH", "category": "Networking and Firewall", "descriptionText": "An db ingress security group rule allows traffic from /0", diff --git a/assets/queries/terraform/nifcloud/db_security_group_has_public_ingress_sgr/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/db_security_group_has_public_ingress_sgr/test/positive_expected_result.json index 425cc5d611a..b7a0afa2366 100644 --- a/assets/queries/terraform/nifcloud/db_security_group_has_public_ingress_sgr/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/db_security_group_has_public_ingress_sgr/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud RDB Has Public DB Ingress Security Group Rule", + "queryName": "(Beta) Nifcloud RDB Has Public DB Ingress Security Group Rule", "severity": "HIGH", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/dns_has_verified_record/metadata.json b/assets/queries/terraform/nifcloud/dns_has_verified_record/metadata.json index 5119197d011..b3775f61a4d 100644 --- a/assets/queries/terraform/nifcloud/dns_has_verified_record/metadata.json +++ b/assets/queries/terraform/nifcloud/dns_has_verified_record/metadata.json @@ -1,6 +1,6 @@ { "id": "a1defcb6-55e8-4511-8c2a-30b615b0e057", - "queryName": "Nifcloud DNS Has Verified Record", + "queryName": "(Beta) Nifcloud DNS Has Verified Record", "severity": "HIGH", "category": "Insecure Configurations", "descriptionText": "Removing verified record of TXT auth the risk that If the authentication record remains, anyone can register the zone", diff --git a/assets/queries/terraform/nifcloud/dns_has_verified_record/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/dns_has_verified_record/test/positive_expected_result.json index 13f8c977aae..4a73bd10d0d 100644 --- a/assets/queries/terraform/nifcloud/dns_has_verified_record/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/dns_has_verified_record/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud DNS Has Verified Record", + "queryName": "(Beta) Nifcloud DNS Has Verified Record", "severity": "HIGH", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/elb_has_common_private/metadata.json b/assets/queries/terraform/nifcloud/elb_has_common_private/metadata.json index 16131b6fa9f..e74a65c035e 100644 --- a/assets/queries/terraform/nifcloud/elb_has_common_private/metadata.json +++ b/assets/queries/terraform/nifcloud/elb_has_common_private/metadata.json @@ -1,6 +1,6 @@ { "id": "5061f84c-ab66-4660-90b9-680c9df346c0", - "queryName": "Nifcloud ELB Has Common Private Network", + "queryName": "(Beta) Nifcloud ELB Has Common Private Network", "severity": "LOW", "category": "Networking and Firewall", "descriptionText": "The elb has common private network", diff --git a/assets/queries/terraform/nifcloud/elb_has_common_private/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/elb_has_common_private/test/positive_expected_result.json index 93ef9fa8953..67e098f3278 100644 --- a/assets/queries/terraform/nifcloud/elb_has_common_private/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/elb_has_common_private/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Nifcloud ELB Has Common Private Network", + "queryName": "(Beta) Nifcloud ELB Has Common Private Network", "severity": "LOW", "line": 1, "fileName": "positive1.tf" }, { - "queryName": "Nifcloud ELB Has Common Private Network", + "queryName": "(Beta) Nifcloud ELB Has Common Private Network", "severity": "LOW", "line": 1, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/nifcloud/elb_listener_use_http/metadata.json b/assets/queries/terraform/nifcloud/elb_listener_use_http/metadata.json index 2fad7135e05..493f1c1dd82 100644 --- a/assets/queries/terraform/nifcloud/elb_listener_use_http/metadata.json +++ b/assets/queries/terraform/nifcloud/elb_listener_use_http/metadata.json @@ -1,6 +1,6 @@ { "id": "afcb0771-4f94-44ed-ad4a-9f73f11ce6e0", - "queryName": "Nifcloud ELB Listener Use HTTP Protocol", + "queryName": "(Beta) Nifcloud ELB Listener Use HTTP Protocol", "severity": "HIGH", "category": "Insecure Configurations", "descriptionText": "The elb listener use http protocol", diff --git a/assets/queries/terraform/nifcloud/elb_listener_use_http/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/elb_listener_use_http/test/positive_expected_result.json index b4725eaa116..558be99ef9b 100644 --- a/assets/queries/terraform/nifcloud/elb_listener_use_http/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/elb_listener_use_http/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Nifcloud ELB Listener Use HTTP Protocol", + "queryName": "(Beta) Nifcloud ELB Listener Use HTTP Protocol", "severity": "HIGH", "line": 1, "fileName": "positive1.tf" }, { - "queryName": "Nifcloud ELB Listener Use HTTP Protocol", + "queryName": "(Beta) Nifcloud ELB Listener Use HTTP Protocol", "severity": "HIGH", "line": 1, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/nifcloud/elb_use_http/metadata.json b/assets/queries/terraform/nifcloud/elb_use_http/metadata.json index c16c3aaad39..7025a7679b1 100644 --- a/assets/queries/terraform/nifcloud/elb_use_http/metadata.json +++ b/assets/queries/terraform/nifcloud/elb_use_http/metadata.json @@ -1,6 +1,6 @@ { "id": "e2de2b80-2fc2-4502-a764-40930dfcc70a", - "queryName": "Nifcloud ELB Use HTTP Protocol", + "queryName": "(Beta) Nifcloud ELB Use HTTP Protocol", "severity": "HIGH", "category": "Insecure Configurations", "descriptionText": "The elb use http protocol", diff --git a/assets/queries/terraform/nifcloud/elb_use_http/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/elb_use_http/test/positive_expected_result.json index c945fb23e0a..7cea218e290 100644 --- a/assets/queries/terraform/nifcloud/elb_use_http/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/elb_use_http/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Nifcloud ELB Use HTTP Protocol", + "queryName": "(Beta) Nifcloud ELB Use HTTP Protocol", "severity": "HIGH", "line": 1, "fileName": "positive1.tf" }, { - "queryName": "Nifcloud ELB Use HTTP Protocol", + "queryName": "(Beta) Nifcloud ELB Use HTTP Protocol", "severity": "HIGH", "line": 1, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/nifcloud/load_balancer_listener_use_http/metadata.json b/assets/queries/terraform/nifcloud/load_balancer_listener_use_http/metadata.json index 20a94e8985d..93e6d7d7e15 100644 --- a/assets/queries/terraform/nifcloud/load_balancer_listener_use_http/metadata.json +++ b/assets/queries/terraform/nifcloud/load_balancer_listener_use_http/metadata.json @@ -1,6 +1,6 @@ { "id": "9f751a80-31f0-43a3-926c-20772791a038", - "queryName": "Nifcloud LB Listener Use HTTP Port", + "queryName": "(Beta) Nifcloud LB Listener Use HTTP Port", "severity": "HIGH", "category": "Insecure Configurations", "descriptionText": "The lb listener use http port", diff --git a/assets/queries/terraform/nifcloud/load_balancer_listener_use_http/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/load_balancer_listener_use_http/test/positive_expected_result.json index 9b3c5ba1542..c312bb791f4 100644 --- a/assets/queries/terraform/nifcloud/load_balancer_listener_use_http/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/load_balancer_listener_use_http/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud LB Listener Use HTTP Port", + "queryName": "(Beta) Nifcloud LB Listener Use HTTP Port", "severity": "HIGH", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/load_balancer_use_http/metadata.json b/assets/queries/terraform/nifcloud/load_balancer_use_http/metadata.json index 1a6a23e9cb3..cc2ba011174 100644 --- a/assets/queries/terraform/nifcloud/load_balancer_use_http/metadata.json +++ b/assets/queries/terraform/nifcloud/load_balancer_use_http/metadata.json @@ -1,6 +1,6 @@ { "id": "94e47f3f-b90b-43a1-a36d-521580bae863", - "queryName": "Nifcloud LB Use HTTP Port", + "queryName": "(Beta) Nifcloud LB Use HTTP Port", "severity": "HIGH", "category": "Insecure Configurations", "descriptionText": "The lb use http port", diff --git a/assets/queries/terraform/nifcloud/load_balancer_use_http/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/load_balancer_use_http/test/positive_expected_result.json index 016f538cdc9..d68db05b691 100644 --- a/assets/queries/terraform/nifcloud/load_balancer_use_http/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/load_balancer_use_http/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud LB Use HTTP Port", + "queryName": "(Beta) Nifcloud LB Use HTTP Port", "severity": "HIGH", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_id/metadata.json b/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_id/metadata.json index 9189e5d335f..b8583713e1a 100644 --- a/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_id/metadata.json +++ b/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_id/metadata.json @@ -1,6 +1,6 @@ { "id": "944439c7-b4b8-476a-8f83-14641ea876ba", - "queryName": "Nifcloud LB Use Insecure TLS Policy ID", + "queryName": "(Beta) Nifcloud LB Use Insecure TLS Policy ID", "severity": "HIGH", "category": "Insecure Configurations", "descriptionText": "The lb use insecure tls policy", diff --git a/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_id/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_id/test/positive_expected_result.json index 3fde03a75e7..69817d0016d 100644 --- a/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_id/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_id/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Nifcloud LB Use Insecure TLS Policy ID", + "queryName": "(Beta) Nifcloud LB Use Insecure TLS Policy ID", "severity": "HIGH", "line": 1, "fileName": "positive1.tf" }, { - "queryName": "Nifcloud LB Use Insecure TLS Policy ID", + "queryName": "(Beta) Nifcloud LB Use Insecure TLS Policy ID", "severity": "HIGH", "line": 1, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_name/metadata.json b/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_name/metadata.json index 7c539e99236..61c44cea34c 100644 --- a/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_name/metadata.json +++ b/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_name/metadata.json @@ -1,6 +1,6 @@ { "id": "675e8eaa-2754-42b7-bf33-bfa295d1601d", - "queryName": "Nifcloud LB Use Insecure TLS Policy Name", + "queryName": "(Beta) Nifcloud LB Use Insecure TLS Policy Name", "severity": "HIGH", "category": "Insecure Configurations", "descriptionText": "The lb use insecure tls policy", diff --git a/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_name/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_name/test/positive_expected_result.json index 31e7ea93dd9..b2a6a1a6945 100644 --- a/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_name/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/load_balancer_use_insecure_tls_policy_name/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Nifcloud LB Use Insecure TLS Policy Name", + "queryName": "(Beta) Nifcloud LB Use Insecure TLS Policy Name", "severity": "HIGH", "line": 1, "fileName": "positive1.tf" }, { - "queryName": "Nifcloud LB Use Insecure TLS Policy Name", + "queryName": "(Beta) Nifcloud LB Use Insecure TLS Policy Name", "severity": "HIGH", "line": 1, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/nifcloud/nas_instance_has_common_private/metadata.json b/assets/queries/terraform/nifcloud/nas_instance_has_common_private/metadata.json index 35b30b09552..921b06eb1d1 100644 --- a/assets/queries/terraform/nifcloud/nas_instance_has_common_private/metadata.json +++ b/assets/queries/terraform/nifcloud/nas_instance_has_common_private/metadata.json @@ -1,6 +1,6 @@ { "id": "4b801c38-ebb4-4c81-984b-1ba525d43adf", - "queryName": "Nifcloud NAS Has Common Private Network", + "queryName": "(Beta) Nifcloud NAS Has Common Private Network", "severity": "LOW", "category": "Networking and Firewall", "descriptionText": "The nas has common private network", diff --git a/assets/queries/terraform/nifcloud/nas_instance_has_common_private/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/nas_instance_has_common_private/test/positive_expected_result.json index 25d43939456..afea74ba3df 100644 --- a/assets/queries/terraform/nifcloud/nas_instance_has_common_private/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/nas_instance_has_common_private/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud NAS Has Common Private Network", + "queryName": "(Beta) Nifcloud NAS Has Common Private Network", "severity": "LOW", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/nas_security_group_description_undefined/metadata.json b/assets/queries/terraform/nifcloud/nas_security_group_description_undefined/metadata.json index 0e808253438..d24d09f8516 100644 --- a/assets/queries/terraform/nifcloud/nas_security_group_description_undefined/metadata.json +++ b/assets/queries/terraform/nifcloud/nas_security_group_description_undefined/metadata.json @@ -1,6 +1,6 @@ { "id": "e840c54a-7a4c-405f-b8c1-c49a54b87d11", - "queryName": "Nifcloud NAS Undefined Description To NAS Security Group", + "queryName": "(Beta) Nifcloud NAS Undefined Description To NAS Security Group", "severity": "LOW", "category": "Networking and Firewall", "descriptionText": "Missing description for nas security group", diff --git a/assets/queries/terraform/nifcloud/nas_security_group_description_undefined/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/nas_security_group_description_undefined/test/positive_expected_result.json index c77a2e75efc..b519c074df9 100644 --- a/assets/queries/terraform/nifcloud/nas_security_group_description_undefined/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/nas_security_group_description_undefined/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud NAS Undefined Description To NAS Security Group", + "queryName": "(Beta) Nifcloud NAS Undefined Description To NAS Security Group", "severity": "LOW", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/nas_security_group_has_public_ingress_sgr/metadata.json b/assets/queries/terraform/nifcloud/nas_security_group_has_public_ingress_sgr/metadata.json index 0d91d17e4a9..0476a23f5c4 100644 --- a/assets/queries/terraform/nifcloud/nas_security_group_has_public_ingress_sgr/metadata.json +++ b/assets/queries/terraform/nifcloud/nas_security_group_has_public_ingress_sgr/metadata.json @@ -1,6 +1,6 @@ { "id": "8d7758a7-d9cd-499a-a83e-c9bdcbff728d", - "queryName": "Nifcloud NAS Has Public Ingress NAS Security Group Rule", + "queryName": "(Beta) Nifcloud NAS Has Public Ingress NAS Security Group Rule", "severity": "HIGH", "category": "Networking and Firewall", "descriptionText": "An ingress nas security group rule allows traffic from /0", diff --git a/assets/queries/terraform/nifcloud/nas_security_group_has_public_ingress_sgr/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/nas_security_group_has_public_ingress_sgr/test/positive_expected_result.json index 3aa266359bb..eeb8bb717e7 100644 --- a/assets/queries/terraform/nifcloud/nas_security_group_has_public_ingress_sgr/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/nas_security_group_has_public_ingress_sgr/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud NAS Has Public Ingress NAS Security Group Rule", + "queryName": "(Beta) Nifcloud NAS Has Public Ingress NAS Security Group Rule", "severity": "HIGH", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/router_has_common_private/metadata.json b/assets/queries/terraform/nifcloud/router_has_common_private/metadata.json index 3dc018cd839..4fa6613dbc2 100644 --- a/assets/queries/terraform/nifcloud/router_has_common_private/metadata.json +++ b/assets/queries/terraform/nifcloud/router_has_common_private/metadata.json @@ -1,6 +1,6 @@ { "id": "30c2760c-740e-4672-9d7f-2c29e0cb385d", - "queryName": "Nifcloud Router Has Common Private Network", + "queryName": "(Beta) Nifcloud Router Has Common Private Network", "severity": "LOW", "category": "Networking and Firewall", "descriptionText": "The router has common private network", diff --git a/assets/queries/terraform/nifcloud/router_has_common_private/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/router_has_common_private/test/positive_expected_result.json index 4ee87233b90..1ec4de4e277 100644 --- a/assets/queries/terraform/nifcloud/router_has_common_private/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/router_has_common_private/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Nifcloud Router Has Common Private Network", + "queryName": "(Beta) Nifcloud Router Has Common Private Network", "severity": "LOW", "line": 1, "fileName": "positive1.tf" }, { - "queryName": "Nifcloud Router Has Common Private Network", + "queryName": "(Beta) Nifcloud Router Has Common Private Network", "severity": "LOW", "line": 1, "fileName": "positive2.tf" diff --git a/assets/queries/terraform/nifcloud/router_security_group_undefined/metadata.json b/assets/queries/terraform/nifcloud/router_security_group_undefined/metadata.json index bd0b3ec32c4..96bd4dbffc2 100644 --- a/assets/queries/terraform/nifcloud/router_security_group_undefined/metadata.json +++ b/assets/queries/terraform/nifcloud/router_security_group_undefined/metadata.json @@ -1,6 +1,6 @@ { "id": "e7dada38-af20-4899-8955-dabea84ab1f0", - "queryName": "Nifcloud Router Undefined Security Group To Router", + "queryName": "(Beta) Nifcloud Router Undefined Security Group To Router", "severity": "HIGH", "category": "Networking and Firewall", "descriptionText": "Missing security group for router", diff --git a/assets/queries/terraform/nifcloud/router_security_group_undefined/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/router_security_group_undefined/test/positive_expected_result.json index 8bb5a2e951b..c27d67f4b9d 100644 --- a/assets/queries/terraform/nifcloud/router_security_group_undefined/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/router_security_group_undefined/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud Router Undefined Security Group To Router", + "queryName": "(Beta) Nifcloud Router Undefined Security Group To Router", "severity": "HIGH", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/nifcloud/vpn_gateway_security_group_undefined/metadata.json b/assets/queries/terraform/nifcloud/vpn_gateway_security_group_undefined/metadata.json index 59357e5d01a..c918f3e5e81 100644 --- a/assets/queries/terraform/nifcloud/vpn_gateway_security_group_undefined/metadata.json +++ b/assets/queries/terraform/nifcloud/vpn_gateway_security_group_undefined/metadata.json @@ -1,6 +1,6 @@ { "id": "b3535a48-910c-47f8-8b3b-14222f29ef80", - "queryName": "Nifcloud Vpn Gateway Undefined Security Group To Vpn Gateway", + "queryName": "(Beta) Nifcloud Vpn Gateway Undefined Security Group To Vpn Gateway", "severity": "HIGH", "category": "Networking and Firewall", "descriptionText": "Missing security group for vpn gateway", diff --git a/assets/queries/terraform/nifcloud/vpn_gateway_security_group_undefined/test/positive_expected_result.json b/assets/queries/terraform/nifcloud/vpn_gateway_security_group_undefined/test/positive_expected_result.json index 4ddada348b0..a3eef4a43eb 100644 --- a/assets/queries/terraform/nifcloud/vpn_gateway_security_group_undefined/test/positive_expected_result.json +++ b/assets/queries/terraform/nifcloud/vpn_gateway_security_group_undefined/test/positive_expected_result.json @@ -1,6 +1,6 @@ [ { - "queryName": "Nifcloud Vpn Gateway Undefined Security Group To Vpn Gateway", + "queryName": "(Beta) Nifcloud Vpn Gateway Undefined Security Group To Vpn Gateway", "severity": "HIGH", "line": 1, "fileName": "positive.tf" diff --git a/assets/queries/terraform/tencentcloud/disk_encryption_disabled/metadata.json b/assets/queries/terraform/tencentcloud/disk_encryption_disabled/metadata.json index 85f40eb8085..b017619a0f9 100644 --- a/assets/queries/terraform/tencentcloud/disk_encryption_disabled/metadata.json +++ b/assets/queries/terraform/tencentcloud/disk_encryption_disabled/metadata.json @@ -1,6 +1,6 @@ { "id": "1ee0f202-31da-49ba-bbce-04a989912e4b", - "queryName": "Disk Encryption Disabled", + "queryName": "(Beta) Disk Encryption Disabled", "severity": "MEDIUM", "category": "Encryption", "descriptionText": "Disks should have encryption enabled", diff --git a/assets/queries/terraform/tencentcloud/disk_encryption_disabled/test/positive_expected_result.json b/assets/queries/terraform/tencentcloud/disk_encryption_disabled/test/positive_expected_result.json index 7ff48719112..febce0d8491 100644 --- a/assets/queries/terraform/tencentcloud/disk_encryption_disabled/test/positive_expected_result.json +++ b/assets/queries/terraform/tencentcloud/disk_encryption_disabled/test/positive_expected_result.json @@ -1,12 +1,12 @@ [ { - "queryName": "Disk Encryption Disabled", + "queryName": "(Beta) Disk Encryption Disabled", "severity": "MEDIUM", "line": 6, "fileName": "positive2.tf" }, { - "queryName": "Disk Encryption Disabled", + "queryName": "(Beta) Disk Encryption Disabled", "severity": "MEDIUM", "line": 1, "fileName": "positive1.tf"