Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update route53LoggingDisabled.rego to ignore private zones #626

Conversation

matt-slalom
Copy link
Contributor

The AWS module route53LoggingDisabled erroneously requires CloudWatch logging for a private Route 53 zone. Per the documentation, query logging only works when the Route53 hosted zone is public.

See https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/route53_query_log
and
https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/query-logs.html?console_help=true#query-logs-configuring

@amirbenv
Copy link
Contributor

Thanks for the PR! The commit include changes to go.sum and go.mod, was that intentional? if not, perhaps rebase?

@codecov
Copy link

codecov bot commented Mar 19, 2021

Codecov Report

Merging #626 (88c9a0a) into master (55c1ae1) will decrease coverage by 0.05%.
The diff coverage is n/a.

Impacted file tree graph

@@            Coverage Diff             @@
##           master     #626      +/-   ##
==========================================
- Coverage   78.13%   78.08%   -0.06%     
==========================================
  Files         103      104       +1     
  Lines        2570     2596      +26     
==========================================
+ Hits         2008     2027      +19     
- Misses        420      422       +2     
- Partials      142      147       +5     
Impacted Files Coverage Δ
pkg/config/global.go 86.00% <0.00%> (-6.31%) ⬇️
pkg/runtime/executor.go 86.36% <0.00%> (-4.55%) ⬇️
pkg/notifications/notifiers.go 90.32% <0.00%> (-1.79%) ⬇️
pkg/cli/register.go 4.54% <0.00%> (-1.02%) ⬇️
pkg/policy/all.go 100.00% <0.00%> (ø)
pkg/runtime/rules.go 100.00% <0.00%> (ø)
pkg/cli/output_writer.go 33.33% <0.00%> (ø)
pkg/policy/opa/engine.go 65.56% <0.00%> (ø)
pkg/termcolor/termcolor.go 85.71% <0.00%> (ø)
pkg/policy/cloud-providers.go 100.00% <0.00%> (ø)
... and 4 more

@matt-slalom
Copy link
Contributor Author

Thanks for the PR! The commit include changes to go.sum and go.mod, was that intentional? if not, perhaps rebase?

Ooops. My bad. Should be fixed now, @amirbenv

@devang-gaur devang-gaur added the policy Issue concerning policy maintainers. label Mar 22, 2021
@sonarqubecloud
Copy link

Kudos, SonarCloud Quality Gate passed!

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
No Duplication information No Duplication information

@cesar-rodriguez cesar-rodriguez merged commit a4db22d into tenable:master Apr 6, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
policy Issue concerning policy maintainers.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants