You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T14:35:03Z INFO [db] Need to update DB
2024-08-19T14:35:03Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-19T14:35:05Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T14:35:05Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T14:35:05Z INFO Need to update the built-in policies
2024-08-19T14:35:05Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-19T14:35:05Z INFO [secret] Secret scanning is enabled
2024-08-19T14:35:05Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T14:35:05Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T14:35:06Z INFO Number of language-specific files num=0
2024-08-19T14:35:06Z INFO Detected config files num=10
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource "aws_security_group_rule" "allow_all_egress" {
12 description = "Allow all outbound traffic to any IPv4 address"
13 type = "egress"
14 from_port = 0
15 to_port = 0
16 protocol = "-1"
17 [ cidr_blocks = ["0.0.0.0/0"]
18 security_group_id = aws_security_group.ldap.id
19 }
────────────────────────────────────────
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/environments/delius-core/modules/components/ldap
*****************************
Running tflint in terraform/environments/delius-core/modules/components/ldap
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/environments/delius-core/modules/components/ldap/datasync.tf line 97:97:"${module.s3_bucket_ldap_data_refresh.bucket.arn}",
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
*****************************
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T14:35:03Z INFO [db] Need to update DB
2024-08-19T14:35:03Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-19T14:35:05Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T14:35:05Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T14:35:05Z INFO Need to update the built-in policies
2024-08-19T14:35:05Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-19T14:35:05Z INFO [secret] Secret scanning is enabled
2024-08-19T14:35:05Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T14:35:05Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T14:35:06Z INFO Number of language-specific files num=02024-08-19T14:35:06Z INFO Detected config files num=10
sg.tf (terraform)
=================
Tests:10 (SUCCESSES:9, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource"aws_security_group_rule""allow_all_egress" {
12description="Allow all outbound traffic to any IPv4 address"13type="egress"14from_port=015to_port=016protocol="-1"17 [ cidr_blocks = ["0.0.0.0/0"]
18security_group_id = aws_security_group.ldap.id19 }
────────────────────────────────────────
trivy_exitcode=1
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T14:58:52Z INFO [db] Need to update DB
2024-08-19T14:58:52Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-19T14:58:54Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T14:58:54Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T14:58:54Z INFO Need to update the built-in policies
2024-08-19T14:58:54Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-19T14:58:55Z INFO [secret] Secret scanning is enabled
2024-08-19T14:58:55Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T14:58:55Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T14:58:56Z INFO Number of language-specific files num=0
2024-08-19T14:58:56Z INFO Detected config files num=10
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource "aws_security_group_rule" "allow_all_egress" {
12 description = "Allow all outbound traffic to any IPv4 address"
13 type = "egress"
14 from_port = 0
15 to_port = 0
16 protocol = "-1"
17 [ cidr_blocks = ["0.0.0.0/0"]
18 security_group_id = aws_security_group.ldap.id
19 }
────────────────────────────────────────
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/environments/delius-core/modules/components/ldap
*****************************
Running tflint in terraform/environments/delius-core/modules/components/ldap
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/environments/delius-core/modules/components/ldap/datasync.tf line 97:97:"${module.s3_bucket_ldap_data_refresh.bucket.arn}",
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
*****************************
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T14:58:52Z INFO [db] Need to update DB
2024-08-19T14:58:52Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-19T14:58:54Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T14:58:54Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T14:58:54Z INFO Need to update the built-in policies
2024-08-19T14:58:54Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-19T14:58:55Z INFO [secret] Secret scanning is enabled
2024-08-19T14:58:55Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T14:58:55Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T14:58:56Z INFO Number of language-specific files num=02024-08-19T14:58:56Z INFO Detected config files num=10
sg.tf (terraform)
=================
Tests:10 (SUCCESSES:9, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource"aws_security_group_rule""allow_all_egress" {
12description="Allow all outbound traffic to any IPv4 address"13type="egress"14from_port=015to_port=016protocol="-1"17 [ cidr_blocks = ["0.0.0.0/0"]
18security_group_id = aws_security_group.ldap.id19 }
────────────────────────────────────────
trivy_exitcode=1
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T14:59:36Z INFO [db] Need to update DB
2024-08-19T14:59:36Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-19T14:59:38Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T14:59:38Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T14:59:38Z INFO Need to update the built-in policies
2024-08-19T14:59:38Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-19T14:59:39Z INFO [secret] Secret scanning is enabled
2024-08-19T14:59:39Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T14:59:39Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T14:59:40Z INFO Number of language-specific files num=0
2024-08-19T14:59:40Z INFO Detected config files num=10
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource "aws_security_group_rule" "allow_all_egress" {
12 description = "Allow all outbound traffic to any IPv4 address"
13 type = "egress"
14 from_port = 0
15 to_port = 0
16 protocol = "-1"
17 [ cidr_blocks = ["0.0.0.0/0"]
18 security_group_id = aws_security_group.ldap.id
19 }
────────────────────────────────────────
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/environments/delius-core/modules/components/ldap
*****************************
Running tflint in terraform/environments/delius-core/modules/components/ldap
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/environments/delius-core/modules/components/ldap/datasync.tf line 97:97:"${module.s3_bucket_ldap_data_refresh.bucket.arn}",
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
*****************************
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T14:59:36Z INFO [db] Need to update DB
2024-08-19T14:59:36Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-19T14:59:38Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T14:59:38Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T14:59:38Z INFO Need to update the built-in policies
2024-08-19T14:59:38Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-19T14:59:39Z INFO [secret] Secret scanning is enabled
2024-08-19T14:59:39Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T14:59:39Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T14:59:40Z INFO Number of language-specific files num=02024-08-19T14:59:40Z INFO Detected config files num=10
sg.tf (terraform)
=================
Tests:10 (SUCCESSES:9, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource"aws_security_group_rule""allow_all_egress" {
12description="Allow all outbound traffic to any IPv4 address"13type="egress"14from_port=015to_port=016protocol="-1"17 [ cidr_blocks = ["0.0.0.0/0"]
18security_group_id = aws_security_group.ldap.id19 }
────────────────────────────────────────
trivy_exitcode=1
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T15:00:15Z INFO [db] Need to update DB
2024-08-19T15:00:15Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-19T15:00:17Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T15:00:17Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T15:00:17Z INFO Need to update the built-in policies
2024-08-19T15:00:17Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-19T15:00:17Z INFO [secret] Secret scanning is enabled
2024-08-19T15:00:17Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T15:00:17Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T15:00:18Z INFO Number of language-specific files num=0
2024-08-19T15:00:18Z INFO Detected config files num=10
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource "aws_security_group_rule" "allow_all_egress" {
12 description = "Allow all outbound traffic to any IPv4 address"
13 type = "egress"
14 from_port = 0
15 to_port = 0
16 protocol = "-1"
17 [ cidr_blocks = ["0.0.0.0/0"]
18 security_group_id = aws_security_group.ldap.id
19 }
────────────────────────────────────────
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/environments/delius-core/modules/components/ldap
*****************************
Running tflint in terraform/environments/delius-core/modules/components/ldap
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/environments/delius-core/modules/components/ldap/datasync.tf line 97:97:"${module.s3_bucket_ldap_data_refresh.bucket.arn}",
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
*****************************
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T15:00:15Z INFO [db] Need to update DB
2024-08-19T15:00:15Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-19T15:00:17Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T15:00:17Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T15:00:17Z INFO Need to update the built-in policies
2024-08-19T15:00:17Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-19T15:00:17Z INFO [secret] Secret scanning is enabled
2024-08-19T15:00:17Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T15:00:17Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T15:00:18Z INFO Number of language-specific files num=02024-08-19T15:00:18Z INFO Detected config files num=10
sg.tf (terraform)
=================
Tests:10 (SUCCESSES:9, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource"aws_security_group_rule""allow_all_egress" {
12description="Allow all outbound traffic to any IPv4 address"13type="egress"14from_port=015to_port=016protocol="-1"17 [ cidr_blocks = ["0.0.0.0/0"]
18security_group_id = aws_security_group.ldap.id19 }
────────────────────────────────────────
trivy_exitcode=1
georgepstaylor
changed the title
🔧 Update metric filter pattern for log matching
🔧 Update LDAP alarm for log error alerts
Aug 19, 2024
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/helpers/delius_microservice
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T15:20:03Z INFO [db] Need to update DB
2024-08-19T15:20:03Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-19T15:20:05Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T15:20:05Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T15:20:05Z INFO Need to update the built-in policies
2024-08-19T15:20:05Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-19T15:20:05Z INFO [secret] Secret scanning is enabled
2024-08-19T15:20:05Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T15:20:05Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T15:20:06Z INFO Number of language-specific files num=0
2024-08-19T15:20:06Z INFO Detected config files num=10
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource "aws_security_group_rule" "allow_all_egress" {
12 description = "Allow all outbound traffic to any IPv4 address"
13 type = "egress"
14 from_port = 0
15 to_port = 0
16 protocol = "-1"
17 [ cidr_blocks = ["0.0.0.0/0"]
18 security_group_id = aws_security_group.ldap.id
19 }
────────────────────────────────────────
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/helpers/delius_microservice
2024-08-19T15:20:07Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T15:20:07Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T15:20:07Z INFO [secret] Secret scanning is enabled
2024-08-19T15:20:07Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T15:20:07Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T15:20:08Z INFO Number of language-specific files num=0
2024-08-19T15:20:08Z INFO Detected config files num=5
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47
via sg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41 resource "aws_security_group_rule" "ecs_service_tls_egress" {
42 description = "Allow all outbound traffic to any IPv4 address on 443"
43 type = "egress"
44 from_port = 443
45 to_port = 443
46 protocol = "tcp"
47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running tflint in terraform/environments/delius-core/modules/components/ldap
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/environments/delius-core/modules/components/ldap/datasync.tf line 97:97:"${module.s3_bucket_ldap_data_refresh.bucket.arn}",
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2*****************************
Running tflint in terraform/environments/delius-core/modules/helpers/delius_microservice
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: Missing version constraint for provider "random" in `required_providers` (terraform_required_providers)
on terraform/environments/delius-core/modules/helpers/delius_microservice/rds.tf line 1:1:resource"random_id""rds_suffix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_required_providers.mdtflint_exitcode=4
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T15:20:03Z INFO [db] Need to update DB
2024-08-19T15:20:03Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-19T15:20:05Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T15:20:05Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T15:20:05Z INFO Need to update the built-in policies
2024-08-19T15:20:05Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-19T15:20:05Z INFO [secret] Secret scanning is enabled
2024-08-19T15:20:05Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T15:20:05Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T15:20:06Z INFO Number of language-specific files num=02024-08-19T15:20:06Z INFO Detected config files num=10
sg.tf (terraform)
=================
Tests:10 (SUCCESSES:9, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource"aws_security_group_rule""allow_all_egress" {
12description="Allow all outbound traffic to any IPv4 address"13type="egress"14from_port=015to_port=016protocol="-1"17 [ cidr_blocks = ["0.0.0.0/0"]
18security_group_id = aws_security_group.ldap.id19 }
────────────────────────────────────────
trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/helpers/delius_microservice2024-08-19T15:20:07Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T15:20:07Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T15:20:07Z INFO [secret] Secretscanningisenabled2024-08-19T15:20:07Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T15:20:07Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T15:20:08Z INFONumberoflanguage-specificfilesnum=02024-08-19T15:20:08Z INFODetectedconfigfilesnum=5sg.tf (terraform)
=================
Tests:3 (SUCCESSES:2, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL:Securitygroupruleallowsegresstomultiplepublicinternetaddresses.
════════════════════════════════════════
Openingupportstoconnectouttothepublicinternetisgenerallytobeavoided.YoushouldrestrictaccesstoIPaddressesorrangesthatareexplicitlyrequiredwherepossible.Seehttps://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47viasg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41resource"aws_security_group_rule""ecs_service_tls_egress" {
42 description ="Allow all outbound traffic to any IPv4 address on 443"43 type ="egress"44 from_port =44345 to_port =44346 protocol ="tcp"47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
trivy_exitcode=2
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T15:35:40Z INFO [db] Need to update DB
2024-08-19T15:35:40Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-19T15:35:43Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T15:35:43Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T15:35:43Z INFO Need to update the built-in policies
2024-08-19T15:35:43Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-19T15:35:43Z INFO [secret] Secret scanning is enabled
2024-08-19T15:35:43Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T15:35:43Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T15:35:45Z INFO Number of language-specific files num=0
2024-08-19T15:35:45Z INFO Detected config files num=10
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource "aws_security_group_rule" "allow_all_egress" {
12 description = "Allow all outbound traffic to any IPv4 address"
13 type = "egress"
14 from_port = 0
15 to_port = 0
16 protocol = "-1"
17 [ cidr_blocks = ["0.0.0.0/0"]
18 security_group_id = aws_security_group.ldap.id
19 }
────────────────────────────────────────
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/components/oracle_db_instance
2024-08-19T15:35:45Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T15:35:45Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T15:35:45Z INFO [secret] Secret scanning is enabled
2024-08-19T15:35:45Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T15:35:45Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T15:35:47Z INFO Number of language-specific files num=0
2024-08-19T15:35:47Z INFO Detected config files num=2
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/helpers/delius_microservice
2024-08-19T15:35:47Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T15:35:47Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T15:35:47Z INFO [secret] Secret scanning is enabled
2024-08-19T15:35:47Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T15:35:47Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T15:35:49Z INFO Number of language-specific files num=0
2024-08-19T15:35:49Z INFO Detected config files num=5
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47
via sg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41 resource "aws_security_group_rule" "ecs_service_tls_egress" {
42 description = "Allow all outbound traffic to any IPv4 address on 443"
43 type = "egress"
44 from_port = 443
45 to_port = 443
46 protocol = "tcp"
47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running tflint in terraform/environments/delius-core/modules/components/ldap
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/environments/delius-core/modules/components/ldap/datasync.tf line 97:97:"${module.s3_bucket_ldap_data_refresh.bucket.arn}",
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2*****************************
Running tflint in terraform/environments/delius-core/modules/components/oracle_db_instance
Excluding the following checks: terraform_unused_declarations
3issue(s) found:
Warning: Module source "github.com/ministryofjustice/modernisation-platform-terraform-ec2-instance" is not pinned (terraform_module_pinned_source)
on terraform/environments/delius-core/modules/components/oracle_db_instance/instance.tf line 24:24:source="github.com/ministryofjustice/modernisation-platform-terraform-ec2-instance"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_module_pinned_source.md
Warning: `server_type_tag` variable has no type (terraform_typed_variables)
on terraform/environments/delius-core/modules/components/oracle_db_instance/variables.tf line 36:36:variable"server_type_tag" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_typed_variables.md
Warning: `database_tag_prefix` variable has no type (terraform_typed_variables)
on terraform/environments/delius-core/modules/components/oracle_db_instance/variables.tf line 41:41:variable"database_tag_prefix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_typed_variables.mdtflint_exitcode=4*****************************
Running tflint in terraform/environments/delius-core/modules/helpers/delius_microservice
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: Missing version constraint for provider "random" in `required_providers` (terraform_required_providers)
on terraform/environments/delius-core/modules/helpers/delius_microservice/load_balancing.tf line 1:1:resource"random_id""suffix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_required_providers.mdtflint_exitcode=6
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T15:35:40Z INFO [db] Need to update DB
2024-08-19T15:35:40Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-19T15:35:43Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T15:35:43Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T15:35:43Z INFO Need to update the built-in policies
2024-08-19T15:35:43Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-19T15:35:43Z INFO [secret] Secret scanning is enabled
2024-08-19T15:35:43Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T15:35:43Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T15:35:45Z INFO Number of language-specific files num=02024-08-19T15:35:45Z INFO Detected config files num=10
sg.tf (terraform)
=================
Tests:10 (SUCCESSES:9, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource"aws_security_group_rule""allow_all_egress" {
12description="Allow all outbound traffic to any IPv4 address"13type="egress"14from_port=015to_port=016protocol="-1"17 [ cidr_blocks = ["0.0.0.0/0"]
18security_group_id = aws_security_group.ldap.id19 }
────────────────────────────────────────
trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/components/oracle_db_instance2024-08-19T15:35:45Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T15:35:45Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T15:35:45Z INFO [secret] Secretscanningisenabled2024-08-19T15:35:45Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T15:35:45Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T15:35:47Z INFONumberoflanguage-specificfilesnum=02024-08-19T15:35:47Z INFODetectedconfigfilesnum=2trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/helpers/delius_microservice2024-08-19T15:35:47Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T15:35:47Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T15:35:47Z INFO [secret] Secretscanningisenabled2024-08-19T15:35:47Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T15:35:47Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T15:35:49Z INFONumberoflanguage-specificfilesnum=02024-08-19T15:35:49Z INFODetectedconfigfilesnum=5sg.tf (terraform)
=================
Tests:3 (SUCCESSES:2, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL:Securitygroupruleallowsegresstomultiplepublicinternetaddresses.
════════════════════════════════════════
Openingupportstoconnectouttothepublicinternetisgenerallytobeavoided.YoushouldrestrictaccesstoIPaddressesorrangesthatareexplicitlyrequiredwherepossible.Seehttps://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47viasg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41resource"aws_security_group_rule""ecs_service_tls_egress" {
42 description ="Allow all outbound traffic to any IPv4 address on 443"43 type ="egress"44 from_port =44345 to_port =44346 protocol ="tcp"47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
trivy_exitcode=2
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T16:03:14Z INFO [db] Need to update DB
2024-08-19T16:03:14Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-19T16:03:16Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:03:16Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:03:16Z INFO Need to update the built-in policies
2024-08-19T16:03:16Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-19T16:03:16Z INFO [secret] Secret scanning is enabled
2024-08-19T16:03:16Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:03:16Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:03:17Z INFO Number of language-specific files num=0
2024-08-19T16:03:17Z INFO Detected config files num=10
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource "aws_security_group_rule" "allow_all_egress" {
12 description = "Allow all outbound traffic to any IPv4 address"
13 type = "egress"
14 from_port = 0
15 to_port = 0
16 protocol = "-1"
17 [ cidr_blocks = ["0.0.0.0/0"]
18 security_group_id = aws_security_group.ldap.id
19 }
────────────────────────────────────────
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/components/oracle_db_instance
2024-08-19T16:03:17Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:03:17Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:03:17Z INFO [secret] Secret scanning is enabled
2024-08-19T16:03:17Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:03:17Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:03:18Z INFO Number of language-specific files num=0
2024-08-19T16:03:18Z INFO Detected config files num=2
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/helpers/delius_microservice
2024-08-19T16:03:19Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:03:19Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:03:19Z INFO [secret] Secret scanning is enabled
2024-08-19T16:03:19Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:03:19Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:03:20Z INFO Number of language-specific files num=0
2024-08-19T16:03:20Z INFO Detected config files num=5
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47
via sg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41 resource "aws_security_group_rule" "ecs_service_tls_egress" {
42 description = "Allow all outbound traffic to any IPv4 address on 443"
43 type = "egress"
44 from_port = 443
45 to_port = 443
46 protocol = "tcp"
47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running tflint in terraform/environments/delius-core/modules/components/ldap
Excluding the following checks: terraform_unused_declarations
Failed to load configurations; terraform/environments/delius-core/modules/components/ldap/locals.tf:26,84-86: Invalid escape sequence; The symbol "s" is not a valid escape sequence selector.:
�[31mError�[0m:Invalidescapesequenceonterraform/environments/delius-core/modules/components/ldap/locals.tfline26, inlocals:26:formatted_error_codes = [forerror_codeinlocal.error_codes:"err=${error_code}�[1;4m\s�[0m"]
Thesymbol"s"isnotavalidescapesequenceselector.tflint_exitcode=1*****************************Runningtflintinterraform/environments/delius-core/modules/components/oracle_db_instanceExcludingthefollowingchecks:terraform_unused_declarations3issue(s) found:Warning:Modulesource"github.com/ministryofjustice/modernisation-platform-terraform-ec2-instance"isnotpinned (terraform_module_pinned_source)
onterraform/environments/delius-core/modules/components/oracle_db_instance/instance.tfline24:24:source = "github.com/ministryofjustice/modernisation-platform-terraform-ec2-instance"Reference:https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_module_pinned_source.mdWarning: `server_type_tag` variablehasnotype (terraform_typed_variables)
onterraform/environments/delius-core/modules/components/oracle_db_instance/variables.tfline36:36:variable"server_type_tag" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_typed_variables.md
Warning: `database_tag_prefix` variable has no type (terraform_typed_variables)
on terraform/environments/delius-core/modules/components/oracle_db_instance/variables.tf line 41:41: variable "database_tag_prefix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_typed_variables.md
tflint_exitcode=3*****************************
Running tflint in terraform/environments/delius-core/modules/helpers/delius_microservice
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: Missing version constraint forprovider"random"in `required_providers` (terraform_required_providers)
on terraform/environments/delius-core/modules/helpers/delius_microservice/load_balancing.tf line 1:1: resource "random_id""suffix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_required_providers.md
tflint_exitcode=5
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T16:03:14Z INFO [db] Need to update DB
2024-08-19T16:03:14Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-19T16:03:16Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:03:16Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:03:16Z INFO Need to update the built-in policies
2024-08-19T16:03:16Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-19T16:03:16Z INFO [secret] Secret scanning is enabled
2024-08-19T16:03:16Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:03:16Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:03:17Z INFO Number of language-specific files num=02024-08-19T16:03:17Z INFO Detected config files num=10
sg.tf (terraform)
=================
Tests:10 (SUCCESSES:9, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource"aws_security_group_rule""allow_all_egress" {
12description="Allow all outbound traffic to any IPv4 address"13type="egress"14from_port=015to_port=016protocol="-1"17 [ cidr_blocks = ["0.0.0.0/0"]
18security_group_id = aws_security_group.ldap.id19 }
────────────────────────────────────────
trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/components/oracle_db_instance2024-08-19T16:03:17Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T16:03:17Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T16:03:17Z INFO [secret] Secretscanningisenabled2024-08-19T16:03:17Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T16:03:17Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:03:18Z INFONumberoflanguage-specificfilesnum=02024-08-19T16:03:18Z INFODetectedconfigfilesnum=2trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/helpers/delius_microservice2024-08-19T16:03:19Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T16:03:19Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T16:03:19Z INFO [secret] Secretscanningisenabled2024-08-19T16:03:19Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T16:03:19Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:03:20Z INFONumberoflanguage-specificfilesnum=02024-08-19T16:03:20Z INFODetectedconfigfilesnum=5sg.tf (terraform)
=================
Tests:3 (SUCCESSES:2, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL:Securitygroupruleallowsegresstomultiplepublicinternetaddresses.
════════════════════════════════════════
Openingupportstoconnectouttothepublicinternetisgenerallytobeavoided.YoushouldrestrictaccesstoIPaddressesorrangesthatareexplicitlyrequiredwherepossible.Seehttps://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47viasg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41resource"aws_security_group_rule""ecs_service_tls_egress" {
42 description ="Allow all outbound traffic to any IPv4 address on 443"43 type ="egress"44 from_port =44345 to_port =44346 protocol ="tcp"47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
trivy_exitcode=2
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T16:08:51Z INFO [db] Need to update DB
2024-08-19T16:08:51Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-19T16:08:53Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:08:53Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:08:53Z INFO Need to update the built-in policies
2024-08-19T16:08:53Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-19T16:08:53Z INFO [secret] Secret scanning is enabled
2024-08-19T16:08:53Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:08:53Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:08:54Z INFO Number of language-specific files num=0
2024-08-19T16:08:54Z INFO Detected config files num=10
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource "aws_security_group_rule" "allow_all_egress" {
12 description = "Allow all outbound traffic to any IPv4 address"
13 type = "egress"
14 from_port = 0
15 to_port = 0
16 protocol = "-1"
17 [ cidr_blocks = ["0.0.0.0/0"]
18 security_group_id = aws_security_group.ldap.id
19 }
────────────────────────────────────────
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/components/oracle_db_instance
2024-08-19T16:08:55Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:08:55Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:08:55Z INFO [secret] Secret scanning is enabled
2024-08-19T16:08:55Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:08:55Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:08:56Z INFO Number of language-specific files num=0
2024-08-19T16:08:56Z INFO Detected config files num=2
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/helpers/delius_microservice
2024-08-19T16:08:56Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:08:56Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:08:56Z INFO [secret] Secret scanning is enabled
2024-08-19T16:08:56Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:08:56Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:08:57Z INFO Number of language-specific files num=0
2024-08-19T16:08:57Z INFO Detected config files num=5
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47
via sg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41 resource "aws_security_group_rule" "ecs_service_tls_egress" {
42 description = "Allow all outbound traffic to any IPv4 address on 443"
43 type = "egress"
44 from_port = 443
45 to_port = 443
46 protocol = "tcp"
47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running tflint in terraform/environments/delius-core/modules/components/ldap
Excluding the following checks: terraform_unused_declarations
Failed to load configurations; terraform/environments/delius-core/modules/components/ldap/locals.tf:26,84-86: Invalid escape sequence; The symbol "s" is not a valid escape sequence selector.:
�[31mError�[0m:Invalidescapesequenceonterraform/environments/delius-core/modules/components/ldap/locals.tfline26, inlocals:26:formatted_error_codes = [forerror_codeinlocal.error_codes:"err=${error_code}�[1;4m\s�[0m"]
Thesymbol"s"isnotavalidescapesequenceselector.tflint_exitcode=1*****************************Runningtflintinterraform/environments/delius-core/modules/components/oracle_db_instanceExcludingthefollowingchecks:terraform_unused_declarations3issue(s) found:Warning:Modulesource"github.com/ministryofjustice/modernisation-platform-terraform-ec2-instance"isnotpinned (terraform_module_pinned_source)
onterraform/environments/delius-core/modules/components/oracle_db_instance/instance.tfline24:24:source = "github.com/ministryofjustice/modernisation-platform-terraform-ec2-instance"Reference:https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_module_pinned_source.mdWarning: `server_type_tag` variablehasnotype (terraform_typed_variables)
onterraform/environments/delius-core/modules/components/oracle_db_instance/variables.tfline36:36:variable"server_type_tag" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_typed_variables.md
Warning: `database_tag_prefix` variable has no type (terraform_typed_variables)
on terraform/environments/delius-core/modules/components/oracle_db_instance/variables.tf line 41:41: variable "database_tag_prefix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_typed_variables.md
tflint_exitcode=3*****************************
Running tflint in terraform/environments/delius-core/modules/helpers/delius_microservice
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: Missing version constraint forprovider"random"in `required_providers` (terraform_required_providers)
on terraform/environments/delius-core/modules/helpers/delius_microservice/load_balancing.tf line 1:1: resource "random_id""suffix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_required_providers.md
tflint_exitcode=5
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T16:08:51Z INFO [db] Need to update DB
2024-08-19T16:08:51Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-19T16:08:53Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:08:53Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:08:53Z INFO Need to update the built-in policies
2024-08-19T16:08:53Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-19T16:08:53Z INFO [secret] Secret scanning is enabled
2024-08-19T16:08:53Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:08:53Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:08:54Z INFO Number of language-specific files num=02024-08-19T16:08:54Z INFO Detected config files num=10
sg.tf (terraform)
=================
Tests:10 (SUCCESSES:9, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource"aws_security_group_rule""allow_all_egress" {
12description="Allow all outbound traffic to any IPv4 address"13type="egress"14from_port=015to_port=016protocol="-1"17 [ cidr_blocks = ["0.0.0.0/0"]
18security_group_id = aws_security_group.ldap.id19 }
────────────────────────────────────────
trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/components/oracle_db_instance2024-08-19T16:08:55Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T16:08:55Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T16:08:55Z INFO [secret] Secretscanningisenabled2024-08-19T16:08:55Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T16:08:55Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:08:56Z INFONumberoflanguage-specificfilesnum=02024-08-19T16:08:56Z INFODetectedconfigfilesnum=2trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/helpers/delius_microservice2024-08-19T16:08:56Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T16:08:56Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T16:08:56Z INFO [secret] Secretscanningisenabled2024-08-19T16:08:56Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T16:08:56Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:08:57Z INFONumberoflanguage-specificfilesnum=02024-08-19T16:08:57Z INFODetectedconfigfilesnum=5sg.tf (terraform)
=================
Tests:3 (SUCCESSES:2, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL:Securitygroupruleallowsegresstomultiplepublicinternetaddresses.
════════════════════════════════════════
Openingupportstoconnectouttothepublicinternetisgenerallytobeavoided.YoushouldrestrictaccesstoIPaddressesorrangesthatareexplicitlyrequiredwherepossible.Seehttps://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47viasg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41resource"aws_security_group_rule""ecs_service_tls_egress" {
42 description ="Allow all outbound traffic to any IPv4 address on 443"43 type ="egress"44 from_port =44345 to_port =44346 protocol ="tcp"47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
trivy_exitcode=2
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T16:13:46Z INFO [db] Need to update DB
2024-08-19T16:13:46Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-19T16:13:48Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:13:48Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:13:48Z INFO Need to update the built-in policies
2024-08-19T16:13:48Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-19T16:13:48Z INFO [secret] Secret scanning is enabled
2024-08-19T16:13:48Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:13:48Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:13:49Z INFO Number of language-specific files num=0
2024-08-19T16:13:49Z INFO Detected config files num=10
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource "aws_security_group_rule" "allow_all_egress" {
12 description = "Allow all outbound traffic to any IPv4 address"
13 type = "egress"
14 from_port = 0
15 to_port = 0
16 protocol = "-1"
17 [ cidr_blocks = ["0.0.0.0/0"]
18 security_group_id = aws_security_group.ldap.id
19 }
────────────────────────────────────────
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/components/oracle_db_instance
2024-08-19T16:13:50Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:13:50Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:13:50Z INFO [secret] Secret scanning is enabled
2024-08-19T16:13:50Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:13:50Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:13:51Z INFO Number of language-specific files num=0
2024-08-19T16:13:51Z INFO Detected config files num=2
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/helpers/delius_microservice
2024-08-19T16:13:51Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:13:51Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:13:51Z INFO [secret] Secret scanning is enabled
2024-08-19T16:13:51Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:13:51Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:13:52Z INFO Number of language-specific files num=0
2024-08-19T16:13:52Z INFO Detected config files num=5
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47
via sg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41 resource "aws_security_group_rule" "ecs_service_tls_egress" {
42 description = "Allow all outbound traffic to any IPv4 address on 443"
43 type = "egress"
44 from_port = 443
45 to_port = 443
46 protocol = "tcp"
47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running tflint in terraform/environments/delius-core/modules/components/ldap
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/environments/delius-core/modules/components/ldap/datasync.tf line 97:97:"${module.s3_bucket_ldap_data_refresh.bucket.arn}",
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2*****************************
Running tflint in terraform/environments/delius-core/modules/components/oracle_db_instance
Excluding the following checks: terraform_unused_declarations
3issue(s) found:
Warning: Module source "github.com/ministryofjustice/modernisation-platform-terraform-ec2-instance" is not pinned (terraform_module_pinned_source)
on terraform/environments/delius-core/modules/components/oracle_db_instance/instance.tf line 24:24:source="github.com/ministryofjustice/modernisation-platform-terraform-ec2-instance"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_module_pinned_source.md
Warning: `server_type_tag` variable has no type (terraform_typed_variables)
on terraform/environments/delius-core/modules/components/oracle_db_instance/variables.tf line 36:36:variable"server_type_tag" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_typed_variables.md
Warning: `database_tag_prefix` variable has no type (terraform_typed_variables)
on terraform/environments/delius-core/modules/components/oracle_db_instance/variables.tf line 41:41:variable"database_tag_prefix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_typed_variables.mdtflint_exitcode=4*****************************
Running tflint in terraform/environments/delius-core/modules/helpers/delius_microservice
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: Missing version constraint for provider "random" in `required_providers` (terraform_required_providers)
on terraform/environments/delius-core/modules/helpers/delius_microservice/rds.tf line 1:1:resource"random_id""rds_suffix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_required_providers.mdtflint_exitcode=6
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T16:13:46Z INFO [db] Need to update DB
2024-08-19T16:13:46Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-19T16:13:48Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:13:48Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:13:48Z INFO Need to update the built-in policies
2024-08-19T16:13:48Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-19T16:13:48Z INFO [secret] Secret scanning is enabled
2024-08-19T16:13:48Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:13:48Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:13:49Z INFO Number of language-specific files num=02024-08-19T16:13:49Z INFO Detected config files num=10
sg.tf (terraform)
=================
Tests:10 (SUCCESSES:9, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource"aws_security_group_rule""allow_all_egress" {
12description="Allow all outbound traffic to any IPv4 address"13type="egress"14from_port=015to_port=016protocol="-1"17 [ cidr_blocks = ["0.0.0.0/0"]
18security_group_id = aws_security_group.ldap.id19 }
────────────────────────────────────────
trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/components/oracle_db_instance2024-08-19T16:13:50Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T16:13:50Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T16:13:50Z INFO [secret] Secretscanningisenabled2024-08-19T16:13:50Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T16:13:50Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:13:51Z INFONumberoflanguage-specificfilesnum=02024-08-19T16:13:51Z INFODetectedconfigfilesnum=2trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/helpers/delius_microservice2024-08-19T16:13:51Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T16:13:51Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T16:13:51Z INFO [secret] Secretscanningisenabled2024-08-19T16:13:51Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T16:13:51Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:13:52Z INFONumberoflanguage-specificfilesnum=02024-08-19T16:13:52Z INFODetectedconfigfilesnum=5sg.tf (terraform)
=================
Tests:3 (SUCCESSES:2, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL:Securitygroupruleallowsegresstomultiplepublicinternetaddresses.
════════════════════════════════════════
Openingupportstoconnectouttothepublicinternetisgenerallytobeavoided.YoushouldrestrictaccesstoIPaddressesorrangesthatareexplicitlyrequiredwherepossible.Seehttps://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47viasg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41resource"aws_security_group_rule""ecs_service_tls_egress" {
42 description ="Allow all outbound traffic to any IPv4 address on 443"43 type ="egress"44 from_port =44345 to_port =44346 protocol ="tcp"47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
trivy_exitcode=2
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T16:24:00Z INFO [db] Need to update DB
2024-08-19T16:24:00Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-19T16:24:02Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:24:02Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:24:02Z INFO Need to update the built-in policies
2024-08-19T16:24:02Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-19T16:24:03Z INFO [secret] Secret scanning is enabled
2024-08-19T16:24:03Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:24:03Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:24:04Z INFO Number of language-specific files num=0
2024-08-19T16:24:04Z INFO Detected config files num=10
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource "aws_security_group_rule" "allow_all_egress" {
12 description = "Allow all outbound traffic to any IPv4 address"
13 type = "egress"
14 from_port = 0
15 to_port = 0
16 protocol = "-1"
17 [ cidr_blocks = ["0.0.0.0/0"]
18 security_group_id = aws_security_group.ldap.id
19 }
────────────────────────────────────────
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/components/oracle_db_instance
2024-08-19T16:24:05Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:24:05Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:24:05Z INFO [secret] Secret scanning is enabled
2024-08-19T16:24:05Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:24:05Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:24:06Z INFO Number of language-specific files num=0
2024-08-19T16:24:06Z INFO Detected config files num=2
trivy_exitcode=1
Running Trivy in terraform/environments/delius-core/modules/helpers/delius_microservice
2024-08-19T16:24:07Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:24:07Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:24:07Z INFO [secret] Secret scanning is enabled
2024-08-19T16:24:07Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:24:07Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-19T16:24:08Z INFO Number of language-specific files num=0
2024-08-19T16:24:08Z INFO Detected config files num=5
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47
via sg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41 resource "aws_security_group_rule" "ecs_service_tls_egress" {
42 description = "Allow all outbound traffic to any IPv4 address on 443"
43 type = "egress"
44 from_port = 443
45 to_port = 443
46 protocol = "tcp"
47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running tflint in terraform/environments/delius-core/modules/components/ldap
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on terraform/environments/delius-core/modules/components/ldap/datasync.tf line 97:97:"${module.s3_bucket_ldap_data_refresh.bucket.arn}",
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_deprecated_interpolation.mdtflint_exitcode=2*****************************
Running tflint in terraform/environments/delius-core/modules/components/oracle_db_instance
Excluding the following checks: terraform_unused_declarations
3issue(s) found:
Warning: Module source "github.com/ministryofjustice/modernisation-platform-terraform-ec2-instance" is not pinned (terraform_module_pinned_source)
on terraform/environments/delius-core/modules/components/oracle_db_instance/instance.tf line 24:24:source="github.com/ministryofjustice/modernisation-platform-terraform-ec2-instance"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_module_pinned_source.md
Warning: `server_type_tag` variable has no type (terraform_typed_variables)
on terraform/environments/delius-core/modules/components/oracle_db_instance/variables.tf line 36:36:variable"server_type_tag" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_typed_variables.md
Warning: `database_tag_prefix` variable has no type (terraform_typed_variables)
on terraform/environments/delius-core/modules/components/oracle_db_instance/variables.tf line 41:41:variable"database_tag_prefix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_typed_variables.mdtflint_exitcode=4*****************************
Running tflint in terraform/environments/delius-core/modules/helpers/delius_microservice
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: Missing version constraint for provider "random" in `required_providers` (terraform_required_providers)
on terraform/environments/delius-core/modules/helpers/delius_microservice/load_balancing.tf line 1:1:resource"random_id""suffix" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_required_providers.mdtflint_exitcode=6
Trivy Scan Failed
Show Output
*****************************
Trivy will check the following folders:
terraform/environments/delius-core/modules/components/ldap
terraform/environments/delius-core/modules/components/oracle_db_instance
terraform/environments/delius-core/modules/helpers/delius_microservice
*****************************
Running Trivy in terraform/environments/delius-core/modules/components/ldap
2024-08-19T16:24:00Z INFO [db] Need to update DB
2024-08-19T16:24:00Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-19T16:24:02Z INFO [vuln] Vulnerability scanning is enabled
2024-08-19T16:24:02Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-19T16:24:02Z INFO Need to update the built-in policies
2024-08-19T16:24:02Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-19T16:24:03Z INFO [secret] Secret scanning is enabled
2024-08-19T16:24:03Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-19T16:24:03Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:24:04Z INFO Number of language-specific files num=02024-08-19T16:24:04Z INFO Detected config files num=10
sg.tf (terraform)
=================
Tests:10 (SUCCESSES:9, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL: Security group rule allows egress to multiple public internet addresses.
════════════════════════════════════════
Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.
See https://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:17
via sg.tf:11-19 (aws_security_group_rule.allow_all_egress)
────────────────────────────────────────
11 resource"aws_security_group_rule""allow_all_egress" {
12description="Allow all outbound traffic to any IPv4 address"13type="egress"14from_port=015to_port=016protocol="-1"17 [ cidr_blocks = ["0.0.0.0/0"]
18security_group_id = aws_security_group.ldap.id19 }
────────────────────────────────────────
trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/components/oracle_db_instance2024-08-19T16:24:05Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T16:24:05Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T16:24:05Z INFO [secret] Secretscanningisenabled2024-08-19T16:24:05Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T16:24:05Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:24:06Z INFONumberoflanguage-specificfilesnum=02024-08-19T16:24:06Z INFODetectedconfigfilesnum=2trivy_exitcode=1*****************************RunningTrivyinterraform/environments/delius-core/modules/helpers/delius_microservice2024-08-19T16:24:07Z INFO [vuln] Vulnerabilityscanningisenabled2024-08-19T16:24:07Z INFO [misconfig] Misconfigurationscanningisenabled2024-08-19T16:24:07Z INFO [secret] Secretscanningisenabled2024-08-19T16:24:07Z INFO [secret] Ifyourscanningisslow, pleasetry '--scannersvuln' todisablesecretscanning2024-08-19T16:24:07Z INFO [secret] Pleaseseealsohttps://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-19T16:24:08Z INFONumberoflanguage-specificfilesnum=02024-08-19T16:24:08Z INFODetectedconfigfilesnum=5sg.tf (terraform)
=================
Tests:3 (SUCCESSES:2, FAILURES:1, EXCEPTIONS:0)
Failures:1 (HIGH:0, CRITICAL:1)
CRITICAL:Securitygroupruleallowsegresstomultiplepublicinternetaddresses.
════════════════════════════════════════
Openingupportstoconnectouttothepublicinternetisgenerallytobeavoided.YoushouldrestrictaccesstoIPaddressesorrangesthatareexplicitlyrequiredwherepossible.Seehttps://avd.aquasec.com/misconfig/avd-aws-0104
────────────────────────────────────────
sg.tf:47viasg.tf:41-49 (aws_security_group_rule.ecs_service_tls_egress)
────────────────────────────────────────
41resource"aws_security_group_rule""ecs_service_tls_egress" {
42 description ="Allow all outbound traffic to any IPv4 address on 443"43 type ="egress"44 from_port =44345 to_port =44346 protocol ="tcp"47 [ cidr_blocks = ["0.0.0.0/0"]
48 security_group_id = aws_security_group.ecs_service.id
49 }
────────────────────────────────────────
trivy_exitcode=2
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.