Closed andrewhertog closed 6 years ago
It's probably due to the fact that the new fixed-response config values contain valid Ruby string interpolation variables which are eval
ed by terraform-landscape.
#{protocol}
#{host}
#{port}
#{path}
#{query}
Culprits:
I do question the use of eval
s as it poses a security concern.
References:
Totally agree about the use of eval
. You can see that I explicitly ignore the security warning.
This was a quick solution to a problem, and it's clear we've outgrown it. The proper solution is to create a Treetop grammar to parse the hashrocket-style attribute declarations.
Would love help with this!
Given that this isn't security software and therefore doesn't need to deal with malicious input data in the same way a search engine does, a full grammar is probably overkill. Could this be kicked down the road by simply running a quick and dirty escape on the input string, converting #{
into ${
?
I tried submitting PR to fix this problem: #73
Fixed in #73
Getting this error now with recent release of terraform aws provider version 1.33.0.
Please see https://github.com/terraform-providers/terraform-provider-aws/issues/5661 for expanded details and stack trace