fix(misconf): do not set default values for aws_cloudfront_distribution
#7233
Labels
kind/bug
Categorizes issue or PR as related to a bug.
scan/misconfiguration
Issues relating to misconfiguration scanning
Milestone
Discussed in #7232
Originally posted by kiwimato July 25, 2024
IDs
avd-aws-0012
Description
We have a module where we use dynamic function to get the param, but to debug this I just hardcoded this value to
redirect-to-https
:Reproduction Steps
Note that in the module the only 2 places which have
viewer_protocol_policy
configured are showed above, so they are already hardcoded. Is there any other check? I tried also using--tf-exclude-downloaded-modules
but then everything is reported fine, even if I configure thoseviewer_protocol_policy
toallow_all
which of course is not what I expect because I would expect it scans the resulting terraform code after the modules are being processed with the actual parameters.I'm not sure at this point if this is just a false positive, incomplete documentation (maybe this checks for something else) or maybe just a bug? I think you guys would know better.
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctThe text was updated successfully, but these errors were encountered: