Skip to content

.Platform - Check PSRule #24

.Platform - Check PSRule

.Platform - Check PSRule #24

Triggered via schedule October 13, 2024 12:34
Status Failure
Total duration 21m 45s
Artifacts
Initialize pipeline
18s
Initialize pipeline
PSRule validation
21m 9s
PSRule validation
Fit to window
Zoom out
Zoom in

Annotations

10 errors and 3 warnings
PSRule validation
Bicep (0.30.23) compilation of '/home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/res/dev-test-lab/lab/tests/e2e/defaults/main.test.bicep' failed with: /home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/res/dev-test-lab/lab/tests/e2e/defaults/main.test.bicep(39,23) : Error BCP104: The referenced module has errors. [https://aka.ms/bicep/core-diagnostics#BCP104]
PSRule validation
Bicep (0.30.23) compilation of '/home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/res/dev-test-lab/lab/tests/e2e/waf-aligned/main.test.bicep' failed with: /home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/res/dev-test-lab/lab/tests/e2e/waf-aligned/main.test.bicep(49,23) : Error BCP104: The referenced module has errors. [https://aka.ms/bicep/core-diagnostics#BCP104]
PSRule validation
Failed to expand bicep source '/home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/ptn/deployment-script/import-image-to-acr/tests/e2e/waf-aligned/main.test.bicep'. Exception calling "GetBicepResources" with "2" argument(s): "Unable to expand resources because the source file '/home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/ptn/deployment-script/import-image-to-acr/tests/e2e/waf-aligned/main.test.bicep' was not valid. The number of resource segments needs to match the provided resource type."
PSRule validation
Failed to expand bicep source '/home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/ptn/network/hub-networking/tests/e2e/waf-aligned/main.test.bicep'. Exception calling "GetBicepResources" with "2" argument(s): "Unable to expand resources because the source file '/home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/ptn/network/hub-networking/tests/e2e/waf-aligned/main.test.bicep' was not valid. An error occurred evaluating expression '[if(items(coalesce(parameters('hubVirtualNetworks'), createObject()))[copyIndex()].value.enableBastion, createObject('resourceGroupName', reference(format('hubBastion[{0}]', copyIndex())).outputs.resourceGroupName.value, 'location', reference(format('hubBastion[{0}]', copyIndex())).outputs.location.value, 'name', reference(format('hubBastion[{0}]', copyIndex())).outputs.name.value, 'resourceId', reference(format('hubBastion[{0}]', copyIndex())).outputs.resourceId.value), createObject())]' line 7187. Index was outside the bounds of the array."
PSRule validation
AZR-000358: ***sbnmin001 failed Azure.ServiceBus.AuditLogs. Ensure namespaces audit diagnostic logs are enabled.
PSRule validation
AZR-000291: ***accwaf001 failed Azure.AppConfig.DisableLocalAuth. Authenticate App Configuration clients with Entra ID identities.
PSRule validation
AZR-000179: ***sfcmin001 failed Azure.ServiceFabric.AAD. Use Entra ID client authentication for Service Fabric clusters.
PSRule validation
AZR-000408: 864e505983a1f-test-cdnpmin-init failed Azure.Deployment.SecureParameter. Use secure parameters for any parameter that contains sensitive information.
PSRule validation
AZR-000408: 864e505983a1f-test-cdnpmin-idem failed Azure.Deployment.SecureParameter. Use secure parameters for any parameter that contains sensitive information.
PSRule validation
AZR-000408: 864e505983a1f-test-cdnpwaf-init failed Azure.Deployment.SecureParameter. Use secure parameters for any parameter that contains sensitive information.
PSRule validation
AZR-000043: ***apiswaf001 failed Azure.APIM.APIDescriptors. APIs should have a display name and description.
PSRule validation
AZR-000388: finops-hub-6e1fd3ab0c052 failed Azure.KeyVault.RBAC. Key Vaults should use Azure RBAC as the authorization system for the data plane.
PSRule validation
AZR-000388: #_namePrefix_#key07hubdmin failed Azure.KeyVault.RBAC. Key Vaults should use Azure RBAC as the authorization system for the data plane.