Skip to content

fix: automation account - Regen json files to comply with bicep versi… #1

fix: automation account - Regen json files to comply with bicep versi…

fix: automation account - Regen json files to comply with bicep versi… #1

Triggered via push December 16, 2024 03:17
Status Failure
Total duration 19m 56s
Artifacts
Initialize pipeline
25s
Initialize pipeline
Run  /  Static validation
1m 32s
Run / Static validation
Matrix: Run / job_psrule_test_waf_reliability
Matrix: Run / job_psrule_test_waf_security_cb
Matrix: Run / job_psrule_test
Matrix: Run / job_psrule_test_waf_security
Matrix: Run / job_module_deploy_validation
Run  /  Publishing
0s
Run / Publishing
Fit to window
Zoom out
Zoom in

Annotations

18 errors and 4 warnings
Run / Static validation
[-] [finops-toolkit/finops-hub] The [main.json] ARM template should be based on the current [main.bicep] Bicep template. 5.91s (5.91s|4ms)
Run / Static validation
[-] [finops-toolkit/finops-hub] All required parameters & UDTs in template file should have description that start with "(Required|Conditional).". 8ms (8ms|1ms)
Run / Static validation
Process completed with exit code 1.
Run / PSRule - WAF Security - AVM Custom Baseline [defaults]
AZR-000202: finopshubrf6a790923e08ce failed Azure.Storage.Firewall. Storage Accounts should only accept explicitly allowed traffic.
Run / PSRule - WAF Security - AVM Custom Baseline [defaults]
One or more assertions failed. One or more rules reported failure.
Run / PSRule - WAF Security - AVM Custom Baseline [defaults]
Process completed with exit code 1.
Run / PSRule - WAF Security [defaults]
AZR-000202: finopshubrf6a790923e08ce failed Azure.Storage.Firewall. Storage Accounts should only accept explicitly allowed traffic.
Run / PSRule - WAF Security [defaults]
AZR-000408: 2ab6d17544562-keyvault failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
Run / PSRule - WAF Security [defaults]
AZR-000119: finops-hub-6a790923e08ce failed Azure.KeyVault.Logs. Ensure audit diagnostics logs are enabled to audit Key Vault access.
Run / PSRule - WAF Security [defaults]
AZR-000355: finops-hub-6a790923e08ce failed Azure.KeyVault.Firewall. Key Vault should only accept explicitly allowed traffic.
Run / PSRule - WAF Security [defaults]
One or more assertions failed. One or more rules reported failure.
Run / PSRule - WAF Security [defaults]
Process completed with exit code 1.
Run / PSRule [defaults]
AZR-000202: finopshubrf6a790923e08ce failed Azure.Storage.Firewall. Storage Accounts should only accept explicitly allowed traffic.
Run / PSRule [defaults]
AZR-000408: 2ab6d17544562-keyvault failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
Run / PSRule [defaults]
AZR-000119: finops-hub-6a790923e08ce failed Azure.KeyVault.Logs. Ensure audit diagnostics logs are enabled to audit Key Vault access.
Run / PSRule [defaults]
AZR-000355: finops-hub-6a790923e08ce failed Azure.KeyVault.Firewall. Key Vault should only accept explicitly allowed traffic.
Run / PSRule [defaults]
One or more assertions failed. One or more rules reported failure.
Run / PSRule [defaults]
Process completed with exit code 1.
Initialize pipeline
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Run / PSRule - WAF Reliability [defaults]
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
Run / PSRule - WAF Security [defaults]
AZR-000388: finops-hub-6a790923e08ce failed Azure.KeyVault.RBAC. Key Vaults should use Azure RBAC as the authorization system for the data plane.
Run / PSRule [defaults]
AZR-000388: finops-hub-6a790923e08ce failed Azure.KeyVault.RBAC. Key Vaults should use Azure RBAC as the authorization system for the data plane.