avd-aws-0012: false positive for module with aws_cloudfront_distribution #7232
Closed
kiwimato
started this conversation in
False Detection
Replies: 2 comments
-
Hi @kiwimato ! We default to |
Beta Was this translation helpful? Give feedback.
0 replies
-
Track #7233 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
IDs
avd-aws-0012
Description
We have a module where we use dynamic function to get the param, but to debug this I just hardcoded this value to
redirect-to-https
:Reproduction Steps
Note that in the module the only 2 places which have
viewer_protocol_policy
configured are showed above, so they are already hardcoded. Is there any other check? I tried also using--tf-exclude-downloaded-modules
but then everything is reported fine, even if I configure thoseviewer_protocol_policy
toallow_all
which of course is not what I expect because I would expect it scans the resulting terraform code after the modules are being processed with the actual parameters.I'm not sure at this point if this is just a false positive, incomplete documentation (maybe this checks for something else) or maybe just a bug? I think you guys would know better.
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions