fix: Small fix for both the post-removal logic & secret-passthru with… #1
Initialize pipeline
15s
Matrix: Run / job_psrule_test_waf_reliability
Matrix: Run / job_psrule_test
Matrix: Run / job_module_deploy_validation
Run
/
Publishing
0s
Annotations
21 errors and 6 warnings
Run / PSRule [defaults]
AZR-000316: /home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/ptn/aca-lza/hosting-environment/tests/e2e/defaults/main.test.bicep failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
|
Run / PSRule [defaults]
AZR-000316: 864e505983a1f-test-acalzamin failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
|
Run / PSRule [defaults]
AZR-000137: nsg-agw-acalzamin-test-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
|
Run / PSRule [defaults]
AZR-000139: nsg-agw-acalzamin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [defaults]
AZR-000139: nsg-cae-acalzamin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [defaults]
AZR-000139: nsg-pep-acalzamin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [defaults]
AZR-000263: vnet-acalzamin-test-eus-spoke failed Azure.VNET.UseNSGs. Virtual network (VNET) subnets should have Network Security Groups (NSGs) assigned.
|
Run / PSRule [defaults]
AZR-000139: nsg-vm-acalzamin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [defaults]
AZR-000316: applicationGateway-864e505983a1f-test-acalzamin-deployment failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
|
Run / PSRule [defaults]
AZR-000304: agw-acalzamin-test-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
|
Run / PSRule [waf-aligned]
AZR-000316: /home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/ptn/aca-lza/hosting-environment/tests/e2e/waf-aligned/main.test.bicep failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
|
Run / PSRule [waf-aligned]
AZR-000316: 864e505983a1f-test-acawaf failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
|
Run / PSRule [waf-aligned]
AZR-000137: nsg-agw-acawaf-dev-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
|
Run / PSRule [waf-aligned]
AZR-000139: nsg-agw-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [waf-aligned]
AZR-000139: nsg-cae-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [waf-aligned]
AZR-000139: nsg-pep-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [waf-aligned]
AZR-000263: vnet-acawaf-dev-eus-spoke failed Azure.VNET.UseNSGs. Virtual network (VNET) subnets should have Network Security Groups (NSGs) assigned.
|
Run / PSRule [waf-aligned]
AZR-000139: nsg-vm-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [waf-aligned]
AZR-000316: applicationGateway-864e505983a1f-test-acawaf-deployment failed Azure.Deployment.SecureValue. Use secure parameters for setting properties of resources that contain sensitive information.
|
Run / PSRule [waf-aligned]
AZR-000304: agw-acawaf-dev-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
|
Run / Deploy [hub-spoke]
The run was canceled by @pankajagrawal16.
|
Run / Deploy [waf-aligned]
`pre` execution is not supported for local action from './.github/actions/templates/avm-validateModuleDeployment'
|
Run / Deploy [waf-aligned]
`pre` execution is not supported for local action from './.github/actions/templates/avm-validateModuleDeployment'
|
Run / Deploy [defaults]
`pre` execution is not supported for local action from './.github/actions/templates/avm-validateModuleDeployment'
|
Run / Deploy [defaults]
`pre` execution is not supported for local action from './.github/actions/templates/avm-validateModuleDeployment'
|
Run / Deploy [hub-spoke]
`pre` execution is not supported for local action from './.github/actions/templates/avm-validateModuleDeployment'
|
Run / Deploy [hub-spoke]
`pre` execution is not supported for local action from './.github/actions/templates/avm-validateModuleDeployment'
|