Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New files for terraform/environments #9216

Merged
merged 1 commit into from
Jan 2, 2025
Merged

New files for terraform/environments #9216

merged 1 commit into from
Jan 2, 2025

Conversation

modernisation-platform-ci
Copy link
Contributor

This PR was automatically created via a GitHub action workflow 🤖

This PR commits new files under terraform/environments.

@modernisation-platform-ci modernisation-platform-ci requested a review from a team as a code owner January 2, 2025 17:39
@github-actions github-actions bot added the environments-repository Used to exclude PRs from this repo in our Slack PR update label Jan 2, 2025
Copy link
Contributor

github-actions bot commented Jan 2, 2025

Trivy Scan Success

Show Output ```hcl

Trivy will check the following folders:
terraform/environments/laa-stabilisation-cdc-poc


Running Trivy in terraform/environments/laa-stabilisation-cdc-poc
2025-01-02T17:41:30Z INFO [vulndb] Need to update DB
2025-01-02T17:41:30Z INFO [vulndb] Downloading vulnerability DB...
2025-01-02T17:41:30Z INFO [vulndb] Downloading artifact... repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-01-02T17:41:32Z INFO [vulndb] Artifact successfully downloaded repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-01-02T17:41:32Z INFO [vuln] Vulnerability scanning is enabled
2025-01-02T17:41:32Z INFO [misconfig] Misconfiguration scanning is enabled
2025-01-02T17:41:32Z INFO [misconfig] Need to update the built-in checks
2025-01-02T17:41:32Z INFO [misconfig] Downloading the built-in checks...
160.80 KiB / 160.80 KiB [---------------------------------------------------------] 100.00% ? p/s 0s2025-01-02T17:41:32Z INFO [secret] Secret scanning is enabled
2025-01-02T17:41:32Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2025-01-02T17:41:32Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2025-01-02T17:41:33Z INFO [terraform scanner] Scanning root module file_path="."
2025-01-02T17:41:33Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="networking"
2025-01-02T17:41:33Z INFO Number of language-specific files num=0
2025-01-02T17:41:33Z INFO Detected config files num=1
trivy_exitcode=0

</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>

```hcl

*****************************

Checkov will check the following folders:
terraform/environments/laa-stabilisation-cdc-poc

*****************************

Running Checkov in terraform/environments/laa-stabilisation-cdc-poc
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:

Passed checks: 9, Failed checks: 0, Skipped checks: 0


checkov_exitcode=0

CTFLint Scan Success

Show Output
*****************************

Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version: 0.9.1)
tflint will check the following folders:
terraform/environments/laa-stabilisation-cdc-poc

*****************************

Running tflint in terraform/environments/laa-stabilisation-cdc-poc
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0

Trivy Scan Success

Show Output
*****************************

Trivy will check the following folders:
terraform/environments/laa-stabilisation-cdc-poc

*****************************

Running Trivy in terraform/environments/laa-stabilisation-cdc-poc
2025-01-02T17:41:30Z	INFO	[vulndb] Need to update DB
2025-01-02T17:41:30Z	INFO	[vulndb] Downloading vulnerability DB...
2025-01-02T17:41:30Z	INFO	[vulndb] Downloading artifact...	repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-01-02T17:41:32Z	INFO	[vulndb] Artifact successfully downloaded	repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-01-02T17:41:32Z	INFO	[vuln] Vulnerability scanning is enabled
2025-01-02T17:41:32Z	INFO	[misconfig] Misconfiguration scanning is enabled
2025-01-02T17:41:32Z	INFO	[misconfig] Need to update the built-in checks
2025-01-02T17:41:32Z	INFO	[misconfig] Downloading the built-in checks...
160.80 KiB / 160.80 KiB [---------------------------------------------------------] 100.00% ? p/s 0s2025-01-02T17:41:32Z	INFO	[secret] Secret scanning is enabled
2025-01-02T17:41:32Z	INFO	[secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2025-01-02T17:41:32Z	INFO	[secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2025-01-02T17:41:33Z	INFO	[terraform scanner] Scanning root module	file_path="."
2025-01-02T17:41:33Z	WARN	[terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.	module="root" variables="networking"
2025-01-02T17:41:33Z	INFO	Number of language-specific files	num=0
2025-01-02T17:41:33Z	INFO	Detected config files	num=1
trivy_exitcode=0

@ASTRobinson ASTRobinson closed this Jan 2, 2025
@ASTRobinson ASTRobinson deleted the date-1735839560 branch January 2, 2025 17:57
@ASTRobinson ASTRobinson restored the date-1735839560 branch January 2, 2025 17:58
@ASTRobinson ASTRobinson reopened this Jan 2, 2025
Copy link
Contributor

github-actions bot commented Jan 2, 2025

Trivy Scan Success

Show Output ```hcl

Trivy will check the following folders:
terraform/environments/laa-stabilisation-cdc-poc


Running Trivy in terraform/environments/laa-stabilisation-cdc-poc
2025-01-02T18:00:24Z INFO [vulndb] Need to update DB
2025-01-02T18:00:24Z INFO [vulndb] Downloading vulnerability DB...
2025-01-02T18:00:24Z INFO [vulndb] Downloading artifact... repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-01-02T18:00:27Z INFO [vulndb] Artifact successfully downloaded repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-01-02T18:00:27Z INFO [vuln] Vulnerability scanning is enabled
2025-01-02T18:00:27Z INFO [misconfig] Misconfiguration scanning is enabled
2025-01-02T18:00:27Z INFO [misconfig] Need to update the built-in checks
2025-01-02T18:00:27Z INFO [misconfig] Downloading the built-in checks...
160.80 KiB / 160.80 KiB [---------------------------------------------------------] 100.00% ? p/s 0s2025-01-02T18:00:27Z INFO [secret] Secret scanning is enabled
2025-01-02T18:00:27Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2025-01-02T18:00:27Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2025-01-02T18:00:28Z INFO [terraform scanner] Scanning root module file_path="."
2025-01-02T18:00:28Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="networking"
2025-01-02T18:00:28Z INFO Number of language-specific files num=0
2025-01-02T18:00:28Z INFO Detected config files num=1
trivy_exitcode=0

</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>

```hcl

*****************************

Checkov will check the following folders:
terraform/environments/laa-stabilisation-cdc-poc

*****************************

Running Checkov in terraform/environments/laa-stabilisation-cdc-poc
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:

Passed checks: 9, Failed checks: 0, Skipped checks: 0


checkov_exitcode=0

CTFLint Scan Success

Show Output
*****************************

Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version: 0.9.1)
tflint will check the following folders:
terraform/environments/laa-stabilisation-cdc-poc

*****************************

Running tflint in terraform/environments/laa-stabilisation-cdc-poc
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0

Trivy Scan Success

Show Output
*****************************

Trivy will check the following folders:
terraform/environments/laa-stabilisation-cdc-poc

*****************************

Running Trivy in terraform/environments/laa-stabilisation-cdc-poc
2025-01-02T18:00:24Z	INFO	[vulndb] Need to update DB
2025-01-02T18:00:24Z	INFO	[vulndb] Downloading vulnerability DB...
2025-01-02T18:00:24Z	INFO	[vulndb] Downloading artifact...	repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-01-02T18:00:27Z	INFO	[vulndb] Artifact successfully downloaded	repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-01-02T18:00:27Z	INFO	[vuln] Vulnerability scanning is enabled
2025-01-02T18:00:27Z	INFO	[misconfig] Misconfiguration scanning is enabled
2025-01-02T18:00:27Z	INFO	[misconfig] Need to update the built-in checks
2025-01-02T18:00:27Z	INFO	[misconfig] Downloading the built-in checks...
160.80 KiB / 160.80 KiB [---------------------------------------------------------] 100.00% ? p/s 0s2025-01-02T18:00:27Z	INFO	[secret] Secret scanning is enabled
2025-01-02T18:00:27Z	INFO	[secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2025-01-02T18:00:27Z	INFO	[secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2025-01-02T18:00:28Z	INFO	[terraform scanner] Scanning root module	file_path="."
2025-01-02T18:00:28Z	WARN	[terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.	module="root" variables="networking"
2025-01-02T18:00:28Z	INFO	Number of language-specific files	num=0
2025-01-02T18:00:28Z	INFO	Detected config files	num=1
trivy_exitcode=0

@ASTRobinson ASTRobinson merged commit 55677df into main Jan 2, 2025
18 of 20 checks passed
@ASTRobinson ASTRobinson deleted the date-1735839560 branch January 2, 2025 18:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
environments-repository Used to exclude PRs from this repo in our Slack PR update
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants