Skip to content

feat(deps): bump actions/setup-python from 5.3.0 to 5.4.0 #564

feat(deps): bump actions/setup-python from 5.3.0 to 5.4.0

feat(deps): bump actions/setup-python from 5.3.0 to 5.4.0 #564

Triggered via pull request January 28, 2025 12:07
Status Success
Total duration 53s
Artifacts

test.yaml

on: pull_request
terraform-valid  /  Config Validation in ./test/terraform
21s
terraform-valid / Config Validation in ./test/terraform
trivy-invalid  /  Config Validation in ${{ inputs.working-directory }}
0s
trivy-invalid / Config Validation in ${{ inputs.working-directory }}
terraform-valid  /  Trivy Vulnerability Scan in ./test/terraform
11s
terraform-valid / Trivy Vulnerability Scan in ./test/terraform
terraform-valid  /  Generate SBOM in ${{ inputs.working-directory }}
0s
terraform-valid / Generate SBOM in ${{ inputs.working-directory }}
trivy-invalid  /  Trivy Vulnerability Scan in ./test/trivy
9s
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy
trivy-invalid  /  Generate SBOM in ${{ inputs.working-directory }}
0s
trivy-invalid / Generate SBOM in ${{ inputs.working-directory }}
terraform-valid  /  Render terraform docs in ./test/terraform
17s
terraform-valid / Render terraform docs in ./test/terraform
trivy-invalid  /  Render terraform docs in ${{ inputs.working-directory }}
0s
trivy-invalid / Render terraform docs in ${{ inputs.working-directory }}
Fit to window
Zoom out
Zoom in

Annotations

6 errors and 4 warnings
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy: main.tf#L36
AVD-AWS-0005: API Gateway domain name uses outdated SSL/TLS protocols. You should not use outdated/insecure TLS versions for encryption. You should be using TLS v1.2+.
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy: main.tf#L33
AVD-AWS-0005: API Gateway domain name uses outdated SSL/TLS protocols. You should not use outdated/insecure TLS versions for encryption. You should be using TLS v1.2+.
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy: main.tf#L40
AVD-AWS-0005: API Gateway domain name uses outdated SSL/TLS protocols. You should not use outdated/insecure TLS versions for encryption. You should be using TLS v1.2+.
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy: main.tf#L18
AVD-AWS-0054: Use of plain HTTP. Plain HTTP is unencrypted and human-readable. This means that if a malicious actor was to eavesdrop on your connection, they would be able to see all of your data flowing back and forth.
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy: main.tf#L29
AVD-AZU-0038: Enable disk encryption on managed disk Manage disks should be encrypted at rest. When specifying the <code>encryption_settings</code> block, the enabled attribute should be set to <code>true</code>.
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy
Process completed with exit code 1.
terraform-valid / Trivy Vulnerability Scan in ./test/terraform
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
terraform-valid / Config Validation in ./test/terraform
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
terraform-valid / Config Validation in ./test/terraform
Restore cache failed: Dependencies file is not found in /home/runner/work/github-workflow-terraform-config/github-workflow-terraform-config. Supported file pattern: go.sum
terraform-valid / Render terraform docs in ./test/terraform
The `python-version` input is not set. The version of Python currently in `PATH` will be used.