Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(ec2): enhance security group with any open port check #5215

Conversation

MrCloudSec
Copy link
Member

@MrCloudSec MrCloudSec commented Sep 26, 2024

Context

Fix #5172.

Description

Please include a summary of the change and which issue is fixed. List any dependencies that are required for this change.

Checklist

License

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@github-actions github-actions bot added the provider/aws Issues/PRs related with the AWS provider label Sep 26, 2024
Copy link

codecov bot commented Sep 26, 2024

Codecov Report

Attention: Patch coverage is 87.87879% with 4 lines in your changes missing coverage. Please review.

Project coverage is 89.07%. Comparing base (8e4847e) to head (8c44665).
Report is 1 commits behind head on master.

Files with missing lines Patch % Lines
...tygroup_allow_ingress_from_internet_to_any_port.py 84.61% 4 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##           master    #5215      +/-   ##
==========================================
- Coverage   89.10%   89.07%   -0.04%     
==========================================
  Files         993      993              
  Lines       30510    30509       -1     
==========================================
- Hits        27187    27176      -11     
- Misses       3323     3333      +10     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@MrCloudSec MrCloudSec marked this pull request as ready for review September 30, 2024 13:10
@MrCloudSec MrCloudSec requested review from a team as code owners September 30, 2024 13:10
jfagoagas
jfagoagas previously approved these changes Sep 30, 2024
…group-allow-ingress-from-internet-to-any-port
@@ -650,7 +649,7 @@ def test_ec2_non_compliant_default_sg_pass_to_avoid_fail_twice(self):
"SecurityGroups"
][0]
default_sg_id = default_sg["GroupId"]
default_sg_name = default_sg["GroupName"]
default_sg["GroupName"]
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
default_sg["GroupName"]
default_sg["GroupName"]

@MrCloudSec MrCloudSec merged commit 38e0242 into master Sep 30, 2024
9 of 11 checks passed
@MrCloudSec MrCloudSec deleted the PRWLR-4920-false-positive-on-ec-2-securitygroup-allow-ingress-from-internet-to-any-port branch September 30, 2024 18:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
provider/aws Issues/PRs related with the AWS provider
Projects
None yet
Development

Successfully merging this pull request may close these issues.

False positive on ec2_securitygroup_allow_ingress_from_internet_to_any_port
2 participants