-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CKV_AWS_378 is triggering for SSL offloading of ECS services #6754
Labels
checks
Check additions or changes
Comments
Hey @Shanjohn thanks for reporting. I believe you're correct, but can you share a more full example? In your case, does it look like this: resource "aws_lb_target_group" "fargate_target_group" {
name = "example-target-group-name"
port = "8080"
protocol = "HTTP"
target_type = "ip"
deregistration_delay = "60"
vpc_id = "some-vpc-id
health_check { ... }
}
resource "aws_lb_listener" "https_listener" {
load_balancer_arn = aws_lb.example.arn
port = 443
protocol = "HTTPS"
ssl_policy = "ELBSecurityPolicy-2016-08"
certificate_arn = aws_acm_certificate.example.arn
default_action {
type = "forward"
target_group_arn = aws_lb_target_group.fargate_target_group.arn
}
} Where we could fix the check to also look for a a listener that has HTTPS or can you share more? |
Hi @tsmithv11 , yes, the code looks like this:
So there is an HTTPS listener and forwarding requests to the IP Target group is the default action for it. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the issue
CKV_AWS_378 triggers on configurations which have HTTP targets. But in a lot of cases SSL is offloaded on the load balancer level, and further targets use HTTP protocol to interact. For example, if you use a certificate from AWS ACM, ALB and AWS ECS Fargate service (which in my case is the majority of all services), the usual approach is to set up the certificate on HTTPS listener and offload it for the fargate service itself.
CKV_AWS_378 stand for
Ensure AWS Load Balancer doesn’t use HTTP protocol
and seems like this is a demand for the listeners. This check seems more likeProhibit SSL offloading in target groups
. I want to verify that this is an expected behavior, because I suspect majority of the users will have to ignore this check as a result.cc @tsmithv11
Examples
Version (please complete the following information):
Additional context
The text was updated successfully, but these errors were encountered: