feat(deps): bump planetscale/ghcommit-action from 0.2.6 to 0.2.7 #573
test.yaml
on: pull_request
terraform-valid
/
Config Validation in ./test/terraform
27s
trivy-invalid
/
Config Validation in ${{ inputs.working-directory }}
0s
terraform-valid
/
Trivy Vulnerability Scan in ./test/terraform
22s
terraform-valid
/
Generate SBOM in ${{ inputs.working-directory }}
0s
trivy-invalid
/
Trivy Vulnerability Scan in ./test/trivy
27s
trivy-invalid
/
Generate SBOM in ${{ inputs.working-directory }}
0s
terraform-valid
/
Render terraform docs in ./test/terraform
11s
trivy-invalid
/
Render terraform docs in ${{ inputs.working-directory }}
0s
Annotations
6 errors and 6 warnings
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L36
AVD-AWS-0005: API Gateway domain name uses outdated SSL/TLS protocols.
You should not use outdated/insecure TLS versions for encryption. You should be using TLS v1.2+.
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L33
AVD-AWS-0005: API Gateway domain name uses outdated SSL/TLS protocols.
You should not use outdated/insecure TLS versions for encryption. You should be using TLS v1.2+.
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L40
AVD-AWS-0005: API Gateway domain name uses outdated SSL/TLS protocols.
You should not use outdated/insecure TLS versions for encryption. You should be using TLS v1.2+.
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L18
AVD-AWS-0054: Use of plain HTTP.
Plain HTTP is unencrypted and human-readable. This means that if a malicious actor was to eavesdrop on your connection, they would be able to see all of your data flowing back and forth.
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L29
AVD-AZU-0038: Enable disk encryption on managed disk
Manage disks should be encrypted at rest. When specifying the <code>encryption_settings</code> block, the enabled attribute should be set to <code>true</code>.
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy
Process completed with exit code 1.
|
terraform-valid / Trivy Vulnerability Scan in ./test/terraform
Cache not found for keys: Linux-ee7f5cf6376af8e8fa886379e52ce1ba74674318
|
terraform-valid / Config Validation in ./test/terraform
Restore cache failed: Dependencies file is not found in /home/runner/work/github-workflow-terraform-config/github-workflow-terraform-config. Supported file pattern: go.sum
|
terraform-valid / Config Validation in ./test/terraform
Failed to save: Failed to CreateCacheEntry: Received non-retryable error: Failed request: (409) Conflict: cache entry with the same key, version, and scope already exists
|
terraform-valid / Config Validation in ./test/terraform
Cache not found for keys: Linux-ee7f5cf6376af8e8fa886379e52ce1ba74674318
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy
Cache not found for keys: Linux-ee7f5cf6376af8e8fa886379e52ce1ba74674318
|
terraform-valid / Render terraform docs in ./test/terraform
The `python-version` input is not set. The version of Python currently in `PATH` will be used.
|