mirror of
https://github.com/prowler-cloud/prowler.git
synced 2025-12-19 05:17:47 +00:00
feat(ui): add a default Mutelist placeholder (#8455)
This commit is contained in:
@@ -10,6 +10,7 @@ All notable changes to the **Prowler UI** are documented in this file.
|
||||
- Amazon AWS S3 integration [(#8391)](https://github.com/prowler-cloud/prowler/pull/8391)
|
||||
- Github provider support [(#8405)](https://github.com/prowler-cloud/prowler/pull/8405)
|
||||
- XML validation for SAML metadata in the UI [(#8429)](https://github.com/prowler-cloud/prowler/pull/8429)
|
||||
- Default Mutelist placeholder in the UI [(#8455)](https://github.com/prowler-cloud/prowler/pull/8455)
|
||||
|
||||
### 🔄 Changed
|
||||
|
||||
|
||||
@@ -16,7 +16,11 @@ import { CustomButton } from "@/components/ui/custom";
|
||||
import { CustomLink } from "@/components/ui/custom/custom-link";
|
||||
import { FormButtons } from "@/components/ui/form";
|
||||
import { fontMono } from "@/config/fonts";
|
||||
import { convertToYaml, parseYamlValidation } from "@/lib/yaml";
|
||||
import {
|
||||
convertToYaml,
|
||||
defaultMutedFindingsConfig,
|
||||
parseYamlValidation,
|
||||
} from "@/lib/yaml";
|
||||
import {
|
||||
MutedFindingsConfigActionState,
|
||||
ProcessorData,
|
||||
@@ -201,7 +205,7 @@ export const MutedFindingsConfigForm = ({
|
||||
<Textarea
|
||||
id="configuration"
|
||||
name="configuration"
|
||||
placeholder="Enter your YAML configuration..."
|
||||
placeholder={defaultMutedFindingsConfig}
|
||||
variant="bordered"
|
||||
value={configText}
|
||||
onChange={(e) => handleConfigChange(e.target.value)}
|
||||
|
||||
101
ui/lib/yaml.ts
101
ui/lib/yaml.ts
@@ -172,3 +172,104 @@ export const convertToYaml = (config: string | object): string => {
|
||||
return config.toString();
|
||||
}
|
||||
};
|
||||
|
||||
export const defaultMutedFindingsConfig = `# If no Mutelist is provided, a default one is used for AWS accounts to exclude certain predefined resources.
|
||||
|
||||
# The default AWS Mutelist is defined here: https://github.com/prowler-cloud/prowler/blob/master/prowler/config/aws_mutelist.yaml
|
||||
|
||||
Mutelist:
|
||||
Accounts:
|
||||
"*":
|
||||
########################### AWS CONTROL TOWER ###########################
|
||||
### The following entries includes all resources created by AWS Control Tower when setting up a landing zone ###
|
||||
# https://docs.aws.amazon.com/controltower/latest/userguide/shared-account-resources.html #
|
||||
Checks:
|
||||
"awslambda_function_*":
|
||||
Regions:
|
||||
- "*"
|
||||
Resources:
|
||||
- "aws-controltower-NotificationForwarder"
|
||||
Description: "Checks from AWS lambda functions muted by default"
|
||||
"cloudformation_stack*":
|
||||
Regions:
|
||||
- "*"
|
||||
Resources:
|
||||
- "StackSet-AWSControlTowerGuardrailAWS-*"
|
||||
- "StackSet-AWSControlTowerBP-*"
|
||||
- "StackSet-AWSControlTowerSecurityResources-*"
|
||||
- "StackSet-AWSControlTowerLoggingResources-*"
|
||||
- "StackSet-AWSControlTowerExecutionRole-*"
|
||||
- "AWSControlTowerBP-BASELINE-CLOUDTRAIL-MASTER*"
|
||||
- "AWSControlTowerBP-BASELINE-CONFIG-MASTER*"
|
||||
- "StackSet-AWSControlTower*"
|
||||
- "CLOUDTRAIL-ENABLED-ON-SHARED-ACCOUNTS-*"
|
||||
- "AFT-Backend*"
|
||||
"cloudtrail_*":
|
||||
Regions:
|
||||
- "*"
|
||||
Resources:
|
||||
- "aws-controltower-BaselineCloudTrail"
|
||||
"cloudwatch_log_group_*":
|
||||
Regions:
|
||||
- "*"
|
||||
Resources:
|
||||
- "aws-controltower/CloudTrailLogs"
|
||||
- "/aws/lambda/aws-controltower-NotificationForwarder"
|
||||
- "StackSet-AWSControlTowerBP-*"
|
||||
"iam_inline_policy_no_administrative_privileges":
|
||||
Regions:
|
||||
- "*"
|
||||
Resources:
|
||||
- "aws-controltower-ForwardSnsNotificationRole/sns"
|
||||
- "aws-controltower-AuditAdministratorRole/AssumeRole-aws-controltower-AuditAdministratorRole"
|
||||
- "aws-controltower-AuditReadOnlyRole/AssumeRole-aws-controltower-AuditReadOnlyRole"
|
||||
"iam.*policy_*":
|
||||
Regions:
|
||||
- "*"
|
||||
Resources:
|
||||
- "AWSControlTowerAccountServiceRolePolicy"
|
||||
- "AWSControlTowerServiceRolePolicy"
|
||||
- "AWSControlTowerStackSetRolePolicy"
|
||||
- "AWSControlTowerAdminPolicy"
|
||||
- "AWSLoadBalancerControllerIAMPolicy"
|
||||
- "AWSControlTowerCloudTrailRolePolicy"
|
||||
"iam_role_*":
|
||||
Regions:
|
||||
- "*"
|
||||
Resources:
|
||||
- "aws-controltower-AdministratorExecutionRole"
|
||||
- "aws-controltower-AuditAdministratorRole"
|
||||
- "aws-controltower-AuditReadOnlyRole"
|
||||
- "aws-controltower-CloudWatchLogsRole"
|
||||
- "aws-controltower-ConfigRecorderRole"
|
||||
- "aws-controltower-ForwardSnsNotificationRole"
|
||||
- "aws-controltower-ReadOnlyExecutionRole"
|
||||
- "AWSControlTower_VPCFlowLogsRole"
|
||||
- "AWSControlTowerExecution"
|
||||
- "AWSControlTowerCloudTrailRole"
|
||||
- "AWSControlTowerConfigAggregatorRoleForOrganizations"
|
||||
- "AWSControlTowerStackSetRole"
|
||||
- "AWSControlTowerAdmin"
|
||||
- "AWSAFTAdmin"
|
||||
- "AWSAFTExecution"
|
||||
- "AWSAFTService"
|
||||
"s3_bucket_*":
|
||||
Regions:
|
||||
- "*"
|
||||
Resources:
|
||||
- "aws-controltower-logs-*"
|
||||
- "aws-controltower-s3-access-logs-*"
|
||||
"sns_*":
|
||||
Regions:
|
||||
- "*"
|
||||
Resources:
|
||||
- "aws-controltower-AggregateSecurityNotifications"
|
||||
- "aws-controltower-AllConfigNotifications"
|
||||
- "aws-controltower-SecurityNotifications"
|
||||
"vpc_*":
|
||||
Regions:
|
||||
- "*"
|
||||
Resources:
|
||||
- "*"
|
||||
Tags:
|
||||
- "Name=aws-controltower-VPC"`;
|
||||
|
||||
Reference in New Issue
Block a user