Skip to content

Commit

Permalink
feat: bump tfsec to 0.39.0 (#201)
Browse files Browse the repository at this point in the history
* Bump tfsec to 0.39.0

* AWS067: add authenticator log type

* Tackle AWS069: EKS Clusters should have the public access disabled

* Move comment around

* Move comment around

* Remove blank line
  • Loading branch information
AntoineAugusti authored Feb 24, 2021
1 parent a5dfb25 commit 91fcc27
Show file tree
Hide file tree
Showing 2 changed files with 10 additions and 4 deletions.
4 changes: 2 additions & 2 deletions .github/workflows/terraform_static_analysis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,8 +16,8 @@ jobs:
uses: actions/checkout@v2

- name: Terraform security scan
uses: triat/terraform-security-scan@v2.0.2
uses: triat/terraform-security-scan@v2.1.0
with:
tfsec_version: 'v0.37.1'
tfsec_version: 'v0.39.0'
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
10 changes: 8 additions & 2 deletions aws/eks/eks.tf
Original file line number Diff line number Diff line change
Expand Up @@ -6,15 +6,21 @@ resource "aws_eks_cluster" "notification-canada-ca-eks-cluster" {
name = var.eks_cluster_name
role_arn = aws_iam_role.eks-cluster-role.arn

enabled_cluster_log_types = ["api", "audit", "controllerManager", "scheduler"]
enabled_cluster_log_types = ["api", "audit", "controllerManager", "scheduler", "authenticator"]

vpc_config {
# tfsec:ignore:AWS068 EKS cluster should not have open CIDR range for public access
# Will be tackled in the future https://github.com/cds-snc/notification-terraform/issues/203
security_group_ids = [
aws_security_group.notification-canada-ca-worker.id
]
subnet_ids = var.vpc_private_subnets
subnet_ids = var.vpc_private_subnets
endpoint_public_access = false
}

# tfsec:ignore:AWS066 EKS should have the encryption of secrets enabled
# Will be tackled in the future https://github.com/cds-snc/notification-terraform/issues/202

# Ensure that IAM Role permissions are created before and deleted after EKS Cluster handling.
# Otherwise, EKS will not be able to properly delete EKS managed EC2 infrastructure such as Security Groups.
depends_on = [
Expand Down

0 comments on commit 91fcc27

Please sign in to comment.