feat(deps): bump actions/setup-python from 5.2.0 to 5.3.0 #546
test.yaml
on: pull_request
terraform-valid
/
Config Validation in ./test/terraform
25s
trivy-invalid
/
Config Validation in ${{ inputs.working-directory }}
0s
terraform-valid
/
Trivy Vulnerability Scan in ./test/terraform
9s
terraform-valid
/
Generate SBOM in ${{ inputs.working-directory }}
0s
trivy-invalid
/
Trivy Vulnerability Scan in ./test/trivy
9s
trivy-invalid
/
Generate SBOM in ${{ inputs.working-directory }}
0s
terraform-valid
/
Render terraform docs in ./test/terraform
37s
trivy-invalid
/
Render terraform docs in ${{ inputs.working-directory }}
0s
Annotations
9 errors and 1 warning
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L37
AVD-AWS-0005: API Gateway domain name uses outdated SSL/TLS protocols.
You should not use outdated/insecure TLS versions for encryption. You should be using TLS v1.2+.
Domain name is configured with an outdated TLS policy.
Resolution: Use the most modern TLS/SSL policies available
https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-custom-domain-tls-version.html
https://avd.aquasec.com/misconfig/avd-aws-0005
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L33
AVD-AWS-0005: API Gateway domain name uses outdated SSL/TLS protocols.
You should not use outdated/insecure TLS versions for encryption. You should be using TLS v1.2+.
Domain name is configured with an outdated TLS policy.
Resolution: Use the most modern TLS/SSL policies available
https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-custom-domain-tls-version.html
https://avd.aquasec.com/misconfig/avd-aws-0005
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L41
AVD-AWS-0005: API Gateway domain name uses outdated SSL/TLS protocols.
You should not use outdated/insecure TLS versions for encryption. You should be using TLS v1.2+.
Domain name is configured with an outdated TLS policy.
Resolution: Use the most modern TLS/SSL policies available
https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-custom-domain-tls-version.html
https://avd.aquasec.com/misconfig/avd-aws-0005
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L20
AVD-AWS-0054: Use of plain HTTP.
Plain HTTP is unencrypted and human-readable. This means that if a malicious actor was to eavesdrop on your connection, they would be able to see all of your data flowing back and forth.
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L23
AVD-AWS-0081: AWS Classic resource usage.
AWS Classic resources run in a shared environment with infrastructure owned by other AWS customers. You should run
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L15
AVD-AWS-0107: An ingress security group rule allows traffic from /0.
Opening up ports to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that explicitly require it where possible.
Security group rule allows ingress from public internet.
Resolution: Set a more restrictive cidr range
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html
https://avd.aquasec.com/misconfig/avd-aws-0107
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy:
main.tf#L29
AVD-AZU-0038: Enable disk encryption on managed disk
Manage disks should be encrypted at rest. When specifying the <code>encryption_settings</code> block, the enabled attribute should be set to <code>true</code>.
Managed disk is not encrypted.
Resolution: Enable encryption on managed disks
https://docs.microsoft.com/en-us/azure/virtual-machines/linux/disk-encryption
https://avd.aquasec.com/misconfig/avd-azu-0038
|
trivy-invalid / Trivy Vulnerability Scan in ./test/trivy
Process completed with exit code 1.
|
terraform-valid / Render terraform docs in ./test/terraform
The process '/usr/bin/git' failed with exit code 1
|
terraform-valid / Config Validation in ./test/terraform
Restore cache failed: Dependencies file is not found in /home/runner/work/github-workflow-terraform-config/github-workflow-terraform-config. Supported file pattern: go.sum
|