fix(terraform): Fixed CKV2_GCP_10 to exclude non http triggered cloud functions from security_level requirement #7008
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
User description
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
Description
Please include a summary of the change and which issue is fixed. Please also include relevant motivation and context. List any dependencies that are required for this change.
New/Edited policies (Delete if not relevant)
CKV2_GCP_10 - Ensure GCP Cloud Function HTTP trigger is secured
Description
The policy was requiring all cloudfunctions set the https_trigger_security_level attribute even when non-http event triggering
event_trigger
was used. There are valid conditions when https_trigger_security_level should not be required.Tests cases have been provided and verified.
Fix
This should prevent erroneous flagging of event triggered cloud functions.
#6946
Checklist:
Generated description
Below is a concise technical summary of the changes proposed in this PR:
Modifies the CloudFunctionSecureHTTPTrigger check to exclude non-HTTP triggered cloud functions from the security_level requirement. Updates the policy definition in the YAML file and adds new test cases in the Terraform file to verify the changes.
Modified files (2)
Latest Contributors(1)
Modified files (1)
Latest Contributors(1)