You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase will rebase this PR
@dependabot recreate will recreate this PR, overwriting any edits that have been made to it
@dependabot merge will merge this PR after your CI passes on it
@dependabot squash and merge will squash and merge this PR after your CI passes on it
@dependabot cancel merge will cancel a previously requested merge and block automerging
@dependabot reopen will reopen this PR if it is closed
@dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
@dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
@dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
@dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
@dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
*****************************
TFSEC will check the following folders:.*****************************
Running TFSEC in .
Excluding the following checks: AWS089, AWS099, AWS009, AWS097, AWS018
timings
──────────────────────────────────────────
disk i/o 217.397µs
parsing 1.58851637s
adaptation 275.998µs
checks 10.413439ms
total 1.599423204s
counts
──────────────────────────────────────────
modules downloaded 1
modules processed 2
blocks processed 74
files read 8
results
──────────────────────────────────────────
passed 12
ignored 5
critical 0
high 0
medium 0
low 0
No problems detected!tfsec_exitcode=0
Checkov Scan Failed
Show Output
*****************************
Checkov will check the following folders:.*****************************
Running Checkov in .
Excluding the following checks: CKV_GIT_1
terraform scan results:
Passed checks:29, Failed checks:1, Skipped checks:2
Check: CKV_TF_1:"Ensure Terraform module sources use a commit hash"
FAILED for resource: module.lb_access_logs_enabled.s3-bucket
File:/main.tf:9-63
Calling File:/test/unit-test/main.tf:60-79
Code lines for this resource are too many. Please use IDE of your choice to review the file.
github_actions scan results:
Passed checks:175, Failed checks:1, Skipped checks:0
Check: CKV2_GHA_1:"Ensure top-level permissions are not set to write-all"
FAILED for resource:on(Generate Terraform README docs)
File:/.github/workflows/documentation.yml:0-1checkov_exitcode=1
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing `terraform` plugin...
Installed `terraform` (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.2.1)
tflint will check the following folders:.*****************************
Running tflint in .tflint_exitcode=0
OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version. You can also ignore all major, minor, or patch releases for a dependency by adding an ignore condition with the desired update_types to your config file.
If you change your mind, just re-open this PR and I'll resolve any conflicts on it.
*****************************
TFSEC will check the following folders:.*****************************
Running TFSEC in .
Excluding the following checks: AWS089, AWS099, AWS009, AWS097, AWS018
======================================================
tfsec is joining the Trivy family
tfsec will continue to remain available
for the time being, although our engineering
attention will be directed at Trivy going forward.
You can read more here:
https://github.com/aquasecurity/tfsec/discussions/1994======================================================
timings
──────────────────────────────────────────
disk i/o 396.021µs
parsing 362.830177ms
adaptation 330.117µs
checks 9.232191ms
total 372.788506ms
counts
──────────────────────────────────────────
modules downloaded 1
modules processed 2
blocks processed 74
files read 8
results
──────────────────────────────────────────
passed 10
ignored 5
critical 0
high 0
medium 0
low 0
No problems detected!tfsec_exitcode=0
Checkov Scan Failed
Show Output
*****************************
Checkov will check the following folders:.*****************************
Running Checkov in .
Excluding the following checks: CKV_GIT_1
2023-09-0808:33:44,271 [MainThread ] [WARNI] Failed to download module github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=v7.0.0:None (for external modules, the --download-external-modules flag is required)
terraform scan results:
Passed checks:29, Failed checks:1, Skipped checks:2
Check: CKV_TF_1:"Ensure Terraform module sources use a commit hash"
FAILED for resource: module.lb_access_logs_enabled.s3-bucket
File:/main.tf:9-63
Calling File:/test/unit-test/main.tf:60-79
Code lines for this resource are too many. Please use IDE of your choice to review the file.
github_actions scan results:
Passed checks:175, Failed checks:1, Skipped checks:0
Check: CKV2_GHA_1:"Ensure top-level permissions are not set to write-all"
FAILED for resource:on(Generate Terraform README docs)
File:/.github/workflows/documentation.yml:0-1checkov_exitcode=1
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing `terraform` plugin...
Installed `terraform` (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.2.1)
tflint will check the following folders:.*****************************
Running tflint in .tflint_exitcode=0
*****************************
TFSEC will check the following folders:.*****************************
Running TFSEC in .
Excluding the following checks: AWS089, AWS099, AWS009, AWS097, AWS018
======================================================
tfsec is joining the Trivy family
tfsec will continue to remain available
for the time being, although our engineering
attention will be directed at Trivy going forward.
You can read more here:
https://github.com/aquasecurity/tfsec/discussions/1994======================================================
timings
──────────────────────────────────────────
disk i/o 236.398µs
parsing 541.857352ms
adaptation 291.796µs
checks 7.668306ms
total 550.053852ms
counts
──────────────────────────────────────────
modules downloaded 1
modules processed 2
blocks processed 74
files read 8
results
──────────────────────────────────────────
passed 10
ignored 5
critical 0
high 0
medium 0
low 0
No problems detected!tfsec_exitcode=0
Checkov Scan Failed
Show Output
*****************************
Checkov will check the following folders:.*****************************
Running Checkov in .
Excluding the following checks: CKV_GIT_1
2023-09-0808:35:55,323 [MainThread ] [WARNI] Failed to download module github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=v7.0.0:None (for external modules, the --download-external-modules flag is required)
terraform scan results:
Passed checks:29, Failed checks:1, Skipped checks:2
Check: CKV_TF_1:"Ensure Terraform module sources use a commit hash"
FAILED for resource: module.lb_access_logs_enabled.s3-bucket
File:/main.tf:9-63
Calling File:/test/unit-test/main.tf:60-79
Code lines for this resource are too many. Please use IDE of your choice to review the file.
github_actions scan results:
Passed checks:175, Failed checks:1, Skipped checks:0
Check: CKV2_GHA_1:"Ensure top-level permissions are not set to write-all"
FAILED for resource:on(Generate Terraform README docs)
File:/.github/workflows/documentation.yml:0-1checkov_exitcode=1
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing `terraform` plugin...
Installed `terraform` (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.2.1)
tflint will check the following folders:.*****************************
Running tflint in .tflint_exitcode=0
*****************************
TFSEC will check the following folders:.*****************************
Running TFSEC in .
Excluding the following checks: AWS089, AWS099, AWS009, AWS097, AWS018
======================================================
tfsec is joining the Trivy family
tfsec will continue to remain available
for the time being, although our engineering
attention will be directed at Trivy going forward.
You can read more here:
https://github.com/aquasecurity/tfsec/discussions/1994======================================================
timings
──────────────────────────────────────────
disk i/o 299.015µs
parsing 375.509024ms
adaptation 435.221µs
checks 11.098842ms
total 387.342102ms
counts
──────────────────────────────────────────
modules downloaded 1
modules processed 2
blocks processed 74
files read 8
results
──────────────────────────────────────────
passed 10
ignored 5
critical 0
high 0
medium 0
low 0
No problems detected!tfsec_exitcode=0
Checkov Scan Failed
Show Output
*****************************
Checkov will check the following folders:.*****************************
Running Checkov in .
Excluding the following checks: CKV_GIT_1
2023-09-0814:16:31,509 [MainThread ] [WARNI] Failed to download module github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=v7.0.0:None (for external modules, the --download-external-modules flag is required)
terraform scan results:
Passed checks:29, Failed checks:1, Skipped checks:2
Check: CKV_TF_1:"Ensure Terraform module sources use a commit hash"
FAILED for resource: module.lb_access_logs_enabled.s3-bucket
File:/main.tf:9-63
Calling File:/test/unit-test/main.tf:60-79
Code lines for this resource are too many. Please use IDE of your choice to review the file.
github_actions scan results:
Passed checks:175, Failed checks:1, Skipped checks:0
Check: CKV2_GHA_1:"Ensure top-level permissions are not set to write-all"
FAILED for resource:on(Generate Terraform README docs)
File:/.github/workflows/documentation.yml:0-1checkov_exitcode=1
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing `terraform` plugin...
Installed `terraform` (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.2.1)
tflint will check the following folders:.*****************************
Running tflint in .tflint_exitcode=0
*****************************
TFSEC will check the following folders:.*****************************
Running TFSEC in .
Excluding the following checks: AWS089, AWS099, AWS009, AWS097, AWS018
======================================================
tfsec is joining the Trivy family
tfsec will continue to remain available
for the time being, although our engineering
attention will be directed at Trivy going forward.
You can read more here:
https://github.com/aquasecurity/tfsec/discussions/1994======================================================
timings
──────────────────────────────────────────
disk i/o 237.605µs
parsing 347.642671ms
adaptation 298.708µs
checks 8.175316ms
total 356.3543ms
counts
──────────────────────────────────────────
modules downloaded 1
modules processed 2
blocks processed 74
files read 8
results
──────────────────────────────────────────
passed 10
ignored 5
critical 0
high 0
medium 0
low 0
No problems detected!tfsec_exitcode=0
Checkov Scan Failed
Show Output
*****************************
Checkov will check the following folders:.*****************************
Running Checkov in .
Excluding the following checks: CKV_GIT_1
2023-09-0814:18:15,081 [MainThread ] [WARNI] Failed to download module github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=v7.0.0:None (for external modules, the --download-external-modules flag is required)
terraform scan results:
Passed checks:29, Failed checks:1, Skipped checks:2
Check: CKV_TF_1:"Ensure Terraform module sources use a commit hash"
FAILED for resource: module.lb_access_logs_enabled.s3-bucket
File:/main.tf:9-63
Calling File:/test/unit-test/main.tf:60-79
Code lines for this resource are too many. Please use IDE of your choice to review the file.
github_actions scan results:
Passed checks:175, Failed checks:1, Skipped checks:0
Check: CKV2_GHA_1:"Ensure top-level permissions are not set to write-all"
FAILED for resource:on(Generate Terraform README docs)
File:/.github/workflows/documentation.yml:0-1checkov_exitcode=1
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing `terraform` plugin...
Installed `terraform` (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.2.1)
tflint will check the following folders:.*****************************
Running tflint in .tflint_exitcode=0
*****************************
TFSEC will check the following folders:.*****************************
Running TFSEC in .
Excluding the following checks: AWS089, AWS099, AWS009, AWS097, AWS018
======================================================
tfsec is joining the Trivy family
tfsec will continue to remain available
for the time being, although our engineering
attention will be directed at Trivy going forward.
You can read more here:
https://github.com/aquasecurity/tfsec/discussions/1994======================================================
timings
──────────────────────────────────────────
disk i/o 261.203µs
parsing 409.647932ms
adaptation 394.605µs
checks 11.39946ms
total 421.7032ms
counts
──────────────────────────────────────────
modules downloaded 1
modules processed 2
blocks processed 74
files read 8
results
──────────────────────────────────────────
passed 10
ignored 5
critical 0
high 0
medium 0
low 0
No problems detected!tfsec_exitcode=0
Checkov Scan Failed
Show Output
*****************************
Checkov will check the following folders:.*****************************
Running Checkov in .
Excluding the following checks: CKV_GIT_1
2023-09-0814:47:21,405 [MainThread ] [WARNI] Failed to download module github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc15a08fbf5a4f4eef9b7433c5a417df8df1:None (for external modules, the --download-external-modules flag is required)
terraform scan results:
Passed checks:30, Failed checks:0, Skipped checks:2
github_actions scan results:
Passed checks:175, Failed checks:1, Skipped checks:0
Check: CKV2_GHA_1:"Ensure top-level permissions are not set to write-all"
FAILED for resource:on(Generate Terraform README docs)
File:/.github/workflows/documentation.yml:0-1checkov_exitcode=1
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing `terraform` plugin...
Installed `terraform` (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.2.1)
tflint will check the following folders:.*****************************
Running tflint in .tflint_exitcode=0
*****************************
TFSEC will check the following folders:.*****************************
Running TFSEC in .
Excluding the following checks: AWS089, AWS099, AWS009, AWS097, AWS018
======================================================
tfsec is joining the Trivy family
tfsec will continue to remain available
for the time being, although our engineering
attention will be directed at Trivy going forward.
You can read more here:
https://github.com/aquasecurity/tfsec/discussions/1994======================================================
timings
──────────────────────────────────────────
disk i/o 265.104µs
parsing 627.010293ms
adaptation 316.304µs
checks 8.41401ms
total 636.005711ms
counts
──────────────────────────────────────────
modules downloaded 1
modules processed 2
blocks processed 74
files read 8
results
──────────────────────────────────────────
passed 10
ignored 5
critical 0
high 0
medium 0
low 0
No problems detected!tfsec_exitcode=0
Checkov Scan Failed
Show Output
*****************************
Checkov will check the following folders:.*****************************
Running Checkov in .
Excluding the following checks: CKV_GIT_1
2023-09-0814:48:53,091 [MainThread ] [WARNI] Failed to download module github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc15a08fbf5a4f4eef9b7433c5a417df8df1:None (for external modules, the --download-external-modules flag is required)
terraform scan results:
Passed checks:30, Failed checks:0, Skipped checks:2
github_actions scan results:
Passed checks:175, Failed checks:1, Skipped checks:0
Check: CKV2_GHA_1:"Ensure top-level permissions are not set to write-all"
FAILED for resource:on(Generate Terraform README docs)
File:/.github/workflows/documentation.yml:0-1checkov_exitcode=1
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing `terraform` plugin...
Installed `terraform` (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.2.1)
tflint will check the following folders:.*****************************
Running tflint in .tflint_exitcode=0
dependenciesPull requests that update a dependency filegithub_actionsPull requests that update GitHub Actions code
3 participants
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bumps actions/checkout from 3.6.0 to 4.0.0.
Release notes
Sourced from actions/checkout's releases.
Changelog
Sourced from actions/checkout's changelog.
... (truncated)
Commits
3df4ab1
Release 4.0.0 (#1447)8b5e8b7
Support fetching without the --progress option (#1067)97a652b
Update default runtime to node20 (#1436)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)