-
Notifications
You must be signed in to change notification settings - Fork 2.7k
feat(misconf): Add support for aws_ami #8499
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: Simar <[email protected]>
Signed-off-by: nikpivkin <[email protected]>
@simar7 There is no |
Also of interest hashicorp/terraform-provider-aws#40375 |
Interesting, since there isn't one, CloudFormation users are also at a loss preventing the run of malicious AMIs. AWS recommends to set the allowed AMIs on an account basis https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-allowed-amis.html But I do wonder if we will see an equivalent of hashicorp/terraform-provider-aws#40375 in cloudformation. |
Isn't it the other way around? Usually in CloudFormation AMI ID is passed through a parameter, which forces the user to search for the image themselves and prevents using an image with a similar name from an untrusted vendor? |
Signed-off-by: nikpivkin <[email protected]>
Yeah I guess that would be fine then. |
Description
Adds support for parsing AWS AMIs.
Related issues
owners
of AMI #8480Checklist