Fixing malformed policy bug in oidc roles #6029
terraform.yml
on: pull_request
Detect Changes
7s
Matrix: Reusable Workflow
Annotations
10 errors
Reusable Workflow (aws-analytical-platform-oidc) / Static Analysis
CKV_AWS_358: "Ensure GitHub Actions OIDC trust policies only allows actions from a specific known organization"
|
Reusable Workflow (aws-analytical-platform-oidc) / Static Analysis
CKV_AWS_358: "Ensure GitHub Actions OIDC trust policies only allows actions from a specific known organization"
|
Reusable Workflow (aws-analytical-platform-oidc) / Static Analysis
CKV_AWS_358: "Ensure GitHub Actions OIDC trust policies only allows actions from a specific known organization"
|
Reusable Workflow (aws-analytical-platform-oidc) / Static Analysis
CKV_AWS_358: "Ensure GitHub Actions OIDC trust policies only allows actions from a specific known organization"
|
Reusable Workflow (aws-analytical-platform-oidc) / Static Analysis
CKV_AWS_358: "Ensure GitHub Actions OIDC trust policies only allows actions from a specific known organization"
|
Reusable Workflow (aws-analytical-platform-oidc) / Static Analysis
CKV_AWS_358: "Ensure GitHub Actions OIDC trust policies only allows actions from a specific known organization"
|
Reusable Workflow (aws-analytical-platform-oidc) / Static Analysis
CKV_AWS_358: "Ensure GitHub Actions OIDC trust policies only allows actions from a specific known organization"
|
Reusable Workflow (aws-analytical-platform-oidc) / Static Analysis
CKV_AWS_358: "Ensure GitHub Actions OIDC trust policies only allows actions from a specific known organization"
|
Reusable Workflow (aws-analytical-platform-oidc) / Static Analysis
CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
|
Reusable Workflow (aws-analytical-platform-oidc) / Static Analysis
CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
|