
org.sonar.iac.docker.checks.BuilderSandboxCheck Maven / Gradle / Ivy
/*
* SonarQube IaC Plugin
* Copyright (C) 2021-2023 SonarSource SA
* mailto:info AT sonarsource DOT com
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 3 of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program; if not, write to the Free Software Foundation,
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
*/
package org.sonar.iac.docker.checks;
import org.sonar.check.Rule;
import org.sonar.iac.common.api.checks.IacCheck;
import org.sonar.iac.common.api.checks.InitContext;
import org.sonar.iac.docker.symbols.ArgumentResolution;
import org.sonar.iac.docker.tree.api.Flag;
import org.sonar.iac.docker.tree.api.RunInstruction;
@Rule(key = "S6502")
public class BuilderSandboxCheck implements IacCheck {
private static final String MESSAGE = "Make sure that disabling the builder sandbox is safe here.";
@Override
public void initialize(InitContext init) {
init.register(RunInstruction.class, (ctx, instruction) -> {
for (Flag option : instruction.options()) {
if ("security".equals(option.name()) && "insecure".equals(ArgumentResolution.of(option.value()).value())) {
ctx.reportIssue(option, MESSAGE);
}
}
});
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy