You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Amended to include just Sprinkler changes in the release. This is based on the same changes that were made for cdpt but they have been removed from this and kept elsewhere, safe.
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-25T08:59:48Z INFO [db] Need to update DB
2024-09-25T08:59:48Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-25T08:59:50Z INFO [vuln] Vulnerability scanning is enabled
2024-09-25T08:59:50Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-25T08:59:50Z INFO Need to update the built-in policies
2024-09-25T08:59:50Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-09-25T08:59:50Z INFO [secret] Secret scanning is enabled
2024-09-25T08:59:50Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-25T08:59:50Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-09-25T08:59:51Z INFO [terraform scanner] Scanning root module file_path="."
2024-09-25T08:59:51Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-09-25T08:59:51Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-09-25T08:59:51Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-09-25T08:59:51Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:102-111"
2024-09-25T08:59:51Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:116-125"
2024-09-25T08:59:51Z INFO Number of language-specific files num=0
2024-09-25T08:59:51Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-25T08:59:48Z INFO [db] Need to update DB
2024-09-25T08:59:48Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-25T08:59:50Z INFO [vuln] Vulnerability scanning is enabled
2024-09-25T08:59:50Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-25T08:59:50Z INFO Need to update the built-in policies
2024-09-25T08:59:50Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-09-25T08:59:50Z INFO [secret] Secret scanning is enabled
2024-09-25T08:59:50Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-25T08:59:50Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-09-25T08:59:51Z INFO [terraformscanner] Scanning root module file_path="."2024-09-25T08:59:51Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-09-25T08:59:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-09-25T08:59:51Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-09-25T08:59:51Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:102-111"2024-09-25T08:59:51Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:116-125"2024-09-25T08:59:51Z INFO Number of language-specific files num=02024-09-25T08:59:51Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-25T10:24:34Z INFO [db] Need to update DB
2024-09-25T10:24:34Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-25T10:24:36Z INFO [vuln] Vulnerability scanning is enabled
2024-09-25T10:24:36Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-25T10:24:36Z INFO Need to update the built-in policies
2024-09-25T10:24:36Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-09-25T10:24:36Z INFO [secret] Secret scanning is enabled
2024-09-25T10:24:36Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-25T10:24:36Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-09-25T10:24:37Z INFO [terraform scanner] Scanning root module file_path="."
2024-09-25T10:24:37Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-09-25T10:24:37Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-09-25T10:24:37Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-09-25T10:24:37Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:102-111"
2024-09-25T10:24:37Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:116-125"
2024-09-25T10:24:37Z INFO Number of language-specific files num=0
2024-09-25T10:24:37Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-25T10:24:34Z INFO [db] Need to update DB
2024-09-25T10:24:34Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-25T10:24:36Z INFO [vuln] Vulnerability scanning is enabled
2024-09-25T10:24:36Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-25T10:24:36Z INFO Need to update the built-in policies
2024-09-25T10:24:36Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-09-25T10:24:36Z INFO [secret] Secret scanning is enabled
2024-09-25T10:24:36Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-25T10:24:36Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-09-25T10:24:37Z INFO [terraformscanner] Scanning root module file_path="."2024-09-25T10:24:37Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-09-25T10:24:37Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-09-25T10:24:37Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-09-25T10:24:37Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:102-111"2024-09-25T10:24:37Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:116-125"2024-09-25T10:24:37Z INFO Number of language-specific files num=02024-09-25T10:24:37Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-25T14:06:59Z INFO [db] Need to update DB
2024-09-25T14:06:59Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-25T14:07:01Z INFO [vuln] Vulnerability scanning is enabled
2024-09-25T14:07:01Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-25T14:07:01Z INFO Need to update the built-in policies
2024-09-25T14:07:01Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-09-25T14:07:01Z INFO [secret] Secret scanning is enabled
2024-09-25T14:07:01Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-25T14:07:01Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-09-25T14:07:02Z INFO [terraform scanner] Scanning root module file_path="."
2024-09-25T14:07:02Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-09-25T14:07:02Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-09-25T14:07:02Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-09-25T14:07:02Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:102-111"
2024-09-25T14:07:02Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:116-125"
2024-09-25T14:07:02Z INFO Number of language-specific files num=0
2024-09-25T14:07:02Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-25T14:06:59Z INFO [db] Need to update DB
2024-09-25T14:06:59Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-25T14:07:01Z INFO [vuln] Vulnerability scanning is enabled
2024-09-25T14:07:01Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-25T14:07:01Z INFO Need to update the built-in policies
2024-09-25T14:07:01Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-09-25T14:07:01Z INFO [secret] Secret scanning is enabled
2024-09-25T14:07:01Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-25T14:07:01Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-09-25T14:07:02Z INFO [terraformscanner] Scanning root module file_path="."2024-09-25T14:07:02Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-09-25T14:07:02Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-09-25T14:07:02Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-09-25T14:07:02Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:102-111"2024-09-25T14:07:02Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:116-125"2024-09-25T14:07:02Z INFO Number of language-specific files num=02024-09-25T14:07:02Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-26T13:00:32Z INFO [db] Need to update DB
2024-09-26T13:00:32Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-26T13:00:32Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: database download error: OCI repository error: 1 error occurred:
* GET https://ghcr.io/v2/aquasecurity/trivy-db/manifests/2: TOOMANYREQUESTS: retry-after: 171.661µs, allowed: 44000/minute
trivy_exitcode=1
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-26T13:00:32Z INFO [db] Need to update DB
2024-09-26T13:00:32Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-26T13:00:32Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: database download error: OCI repository error:1 error occurred:* GET https://ghcr.io/v2/aquasecurity/trivy-db/manifests/2: TOOMANYREQUESTS: retry-after: 171.661µs, allowed: 44000/minutetrivy_exitcode=1
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-26T13:15:04Z INFO [db] Need to update DB
2024-09-26T13:15:04Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-26T13:15:04Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: database download error: oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:254a28abc106a5d0995f0d95f5a5bd47c006fd4882dedc0701f6031f1bca1493: TOOMANYREQUESTS: retry-after: 525.683µs, allowed: 44000/minute
trivy_exitcode=1
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-26T13:15:04Z INFO [db] Need to update DB
2024-09-26T13:15:04Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-26T13:15:04Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: database download error: oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:254a28abc106a5d0995f0d95f5a5bd47c006fd4882dedc0701f6031f1bca1493: TOOMANYREQUESTS: retry-after: 525.683µs, allowed: 44000/minutetrivy_exitcode=1
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-26T13:19:16Z INFO [db] Need to update DB
2024-09-26T13:19:16Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-26T13:19:18Z INFO [vuln] Vulnerability scanning is enabled
2024-09-26T13:19:18Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-26T13:19:18Z INFO Need to update the built-in policies
2024-09-26T13:19:18Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-09-26T13:19:18Z INFO [secret] Secret scanning is enabled
2024-09-26T13:19:18Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-26T13:19:18Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-09-26T13:19:18Z INFO [terraform scanner] Scanning root module file_path="."
2024-09-26T13:19:18Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-09-26T13:19:18Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-09-26T13:19:19Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-09-26T13:19:19Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:104-113"
2024-09-26T13:19:19Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:118-127"
2024-09-26T13:19:19Z INFO Number of language-specific files num=0
2024-09-26T13:19:19Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-26T13:19:16Z INFO [db] Need to update DB
2024-09-26T13:19:16Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-26T13:19:18Z INFO [vuln] Vulnerability scanning is enabled
2024-09-26T13:19:18Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-26T13:19:18Z INFO Need to update the built-in policies
2024-09-26T13:19:18Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-09-26T13:19:18Z INFO [secret] Secret scanning is enabled
2024-09-26T13:19:18Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-26T13:19:18Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-09-26T13:19:18Z INFO [terraformscanner] Scanning root module file_path="."2024-09-26T13:19:18Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-09-26T13:19:18Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-09-26T13:19:19Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-09-26T13:19:19Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:104-113"2024-09-26T13:19:19Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:118-127"2024-09-26T13:19:19Z INFO Number of language-specific files num=02024-09-26T13:19:19Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-30T13:20:24Z INFO [db] Need to update DB
2024-09-30T13:20:24Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-30T13:20:24Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: database download error: oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:135ef359f0f53c941768feed653ca03b0f115f99e0d875df51ff33b8e9b88b8a: TOOMANYREQUESTS: retry-after: 641.196µs, allowed: 44000/minute
trivy_exitcode=1
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-30T13:20:24Z INFO [db] Need to update DB
2024-09-30T13:20:24Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-30T13:20:24Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: database download error: oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:135ef359f0f53c941768feed653ca03b0f115f99e0d875df51ff33b8e9b88b8a: TOOMANYREQUESTS: retry-after: 641.196µs, allowed: 44000/minutetrivy_exitcode=1
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-30T13:28:51Z INFO [db] Need to update DB
2024-09-30T13:28:51Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-30T13:28:53Z INFO [vuln] Vulnerability scanning is enabled
2024-09-30T13:28:53Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-30T13:28:53Z INFO Need to update the built-in policies
2024-09-30T13:28:53Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-09-30T13:28:53Z INFO [secret] Secret scanning is enabled
2024-09-30T13:28:53Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-30T13:28:53Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-09-30T13:28:54Z INFO [terraform scanner] Scanning root module file_path="."
2024-09-30T13:28:54Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-09-30T13:28:54Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-09-30T13:28:54Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-09-30T13:28:54Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:105-114"
2024-09-30T13:28:54Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:119-128"
2024-09-30T13:28:54Z INFO Number of language-specific files num=0
2024-09-30T13:28:54Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-30T13:28:51Z INFO [db] Need to update DB
2024-09-30T13:28:51Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-30T13:28:53Z INFO [vuln] Vulnerability scanning is enabled
2024-09-30T13:28:53Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-30T13:28:53Z INFO Need to update the built-in policies
2024-09-30T13:28:53Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-09-30T13:28:53Z INFO [secret] Secret scanning is enabled
2024-09-30T13:28:53Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-30T13:28:53Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-09-30T13:28:54Z INFO [terraformscanner] Scanning root module file_path="."2024-09-30T13:28:54Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-09-30T13:28:54Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-09-30T13:28:54Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-09-30T13:28:54Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:105-114"2024-09-30T13:28:54Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:119-128"2024-09-30T13:28:54Z INFO Number of language-specific files num=02024-09-30T13:28:54Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-30T14:39:04Z INFO [db] Need to update DB
2024-09-30T14:39:04Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-30T14:39:06Z INFO [vuln] Vulnerability scanning is enabled
2024-09-30T14:39:06Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-30T14:39:06Z INFO Need to update the built-in policies
2024-09-30T14:39:06Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-09-30T14:39:06Z INFO [secret] Secret scanning is enabled
2024-09-30T14:39:06Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-30T14:39:06Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-09-30T14:39:07Z INFO [terraform scanner] Scanning root module file_path="."
2024-09-30T14:39:07Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-09-30T14:39:07Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-09-30T14:39:07Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-09-30T14:39:07Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:101-110"
2024-09-30T14:39:07Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:115-124"
2024-09-30T14:39:07Z INFO Number of language-specific files num=0
2024-09-30T14:39:07Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-30T14:39:04Z INFO [db] Need to update DB
2024-09-30T14:39:04Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-30T14:39:06Z INFO [vuln] Vulnerability scanning is enabled
2024-09-30T14:39:06Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-30T14:39:06Z INFO Need to update the built-in policies
2024-09-30T14:39:06Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-09-30T14:39:06Z INFO [secret] Secret scanning is enabled
2024-09-30T14:39:06Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-30T14:39:06Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-09-30T14:39:07Z INFO [terraformscanner] Scanning root module file_path="."2024-09-30T14:39:07Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-09-30T14:39:07Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-09-30T14:39:07Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-09-30T14:39:07Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:101-110"2024-09-30T14:39:07Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:115-124"2024-09-30T14:39:07Z INFO Number of language-specific files num=02024-09-30T14:39:07Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-10-01T07:50:10Z INFO [db] Need to update DB
2024-10-01T07:50:10Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-10-01T07:50:10Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: database download error: OCI repository error: 1 error occurred:
* GET https://ghcr.io/v2/aquasecurity/trivy-db/manifests/2: TOOMANYREQUESTS: retry-after: 1.193225ms, allowed: 44000/minute
trivy_exitcode=1
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-10-01T07:50:10Z INFO [db] Need to update DB
2024-10-01T07:50:10Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-10-01T07:50:10Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: database download error: OCI repository error:1 error occurred:* GET https://ghcr.io/v2/aquasecurity/trivy-db/manifests/2: TOOMANYREQUESTS: retry-after: 1.193225ms, allowed: 44000/minutetrivy_exitcode=1
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-10-01T07:52:31Z INFO [db] Need to update DB
2024-10-01T07:52:31Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-10-01T07:52:31Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: database download error: oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:23d1b901e7534020d5ac5f238b090ad66dcb78afef7301ed7d8ebe6b974ab5f1: TOOMANYREQUESTS: retry-after: 5.841µs, allowed: 44000/minute
trivy_exitcode=1
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-10-01T07:52:31Z INFO [db] Need to update DB
2024-10-01T07:52:31Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-10-01T07:52:31Z FATAL Fatal error init error: DB error: failed to download vulnerability DB: database download error: oci download error: failed to fetch the layer: GET https://ghcr.io/v2/aquasecurity/trivy-db/blobs/sha256:23d1b901e7534020d5ac5f238b090ad66dcb78afef7301ed7d8ebe6b974ab5f1: TOOMANYREQUESTS: retry-after: 5.841µs, allowed: 44000/minutetrivy_exitcode=1
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-10-01T07:57:58Z INFO [db] Need to update DB
2024-10-01T07:57:58Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-10-01T07:58:01Z INFO [vuln] Vulnerability scanning is enabled
2024-10-01T07:58:01Z INFO [misconfig] Misconfiguration scanning is enabled
2024-10-01T07:58:01Z INFO Need to update the built-in policies
2024-10-01T07:58:01Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-10-01T07:58:01Z INFO [secret] Secret scanning is enabled
2024-10-01T07:58:01Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-10-01T07:58:01Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-10-01T07:58:01Z INFO [terraform scanner] Scanning root module file_path="."
2024-10-01T07:58:01Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-10-01T07:58:01Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-10-01T07:58:02Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-10-01T07:58:02Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:101-110"
2024-10-01T07:58:02Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:115-124"
2024-10-01T07:58:02Z INFO Number of language-specific files num=0
2024-10-01T07:58:02Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-10-01T07:57:58Z INFO [db] Need to update DB
2024-10-01T07:57:58Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-10-01T07:58:01Z INFO [vuln] Vulnerability scanning is enabled
2024-10-01T07:58:01Z INFO [misconfig] Misconfiguration scanning is enabled
2024-10-01T07:58:01Z INFO Need to update the built-in policies
2024-10-01T07:58:01Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-10-01T07:58:01Z INFO [secret] Secret scanning is enabled
2024-10-01T07:58:01Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-10-01T07:58:01Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-10-01T07:58:01Z INFO [terraformscanner] Scanning root module file_path="."2024-10-01T07:58:01Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-10-01T07:58:01Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-10-01T07:58:02Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-10-01T07:58:02Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:101-110"2024-10-01T07:58:02Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:115-124"2024-10-01T07:58:02Z INFO Number of language-specific files num=02024-10-01T07:58:02Z INFO Detected config files num=3trivy_exitcode=0
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Amended to include just Sprinkler changes in the release. This is based on the same changes that were made for cdpt but they have been removed from this and kept elsewhere, safe.
See also #5980