Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(terraform): do not check the network policy if enable_autopilot is true #4961

Closed
nikpivkin opened this issue Aug 8, 2023 · 2 comments
Closed
Assignees
Labels
kind/bug Categorizes issue or PR as related to a bug. scan/misconfiguration Issues relating to misconfiguration scanning
Milestone

Comments

@nikpivkin
Copy link
Contributor

nikpivkin commented Aug 8, 2023

Source: https://github.com/aquasecurity/tfsec/issues/2027

If the enable_autopilot argument is set to true in the google_container_cluster resource, then we should not check network_policy, because in autopilot mode, Google manages the security of the cluster itself. And also the network_policy argument has a conflict with enable_autopilot.

@nikpivkin nikpivkin added kind/bug Categorizes issue or PR as related to a bug. scan/misconfiguration Issues relating to misconfiguration scanning labels Aug 8, 2023
@nikpivkin nikpivkin self-assigned this Aug 8, 2023
@simar7 simar7 added this to the v0.45.0 milestone Aug 9, 2023
@knqyf263
Copy link
Collaborator

@simar7 When you add an issue to the milestone, would you also set the project to "Trivy Roadmap"? Then, the task will appear here. It is no big deal, but it helps manage tasks.
https://github.com/orgs/aquasecurity/projects/25/views/12

@simar7
Copy link
Member

simar7 commented Aug 18, 2023

Closed via aquasecurity/defsec#1420

@simar7 simar7 closed this as completed Aug 18, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Categorizes issue or PR as related to a bug. scan/misconfiguration Issues relating to misconfiguration scanning
Projects
Archived in project
Development

No branches or pull requests

3 participants