fix: automation account - Regen json files to comply with bicep versi… #1
Annotations
10 errors
Run PSRule validation with [tests/e2e/waf-aligned/main.test.bicep]
AZR-000316: /home/runner/work/bicep-registry-modules/bicep-registry-modules/avm/ptn/aca-lza/hosting-environment/tests/e2e/waf-aligned/main.test.bicep failed Azure.Deployment.SecureValue. A secret property set from a non-secure value may leak the secret into deployment history or logs.
|
Run PSRule validation with [tests/e2e/waf-aligned/main.test.bicep]
AZR-000316: 864e505983a1f-test-acawaf failed Azure.Deployment.SecureValue. A secret property set from a non-secure value may leak the secret into deployment history or logs.
|
Run PSRule validation with [tests/e2e/waf-aligned/main.test.bicep]
AZR-000137: nsg-agw-acawaf-dev-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
|
Run PSRule validation with [tests/e2e/waf-aligned/main.test.bicep]
AZR-000139: nsg-agw-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run PSRule validation with [tests/e2e/waf-aligned/main.test.bicep]
AZR-000139: nsg-cae-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run PSRule validation with [tests/e2e/waf-aligned/main.test.bicep]
AZR-000263: vnet-acawaf-dev-eus-spoke failed Azure.VNET.UseNSGs. Virtual network (VNET) subnets should have Network Security Groups (NSGs) assigned.
|
Run PSRule validation with [tests/e2e/waf-aligned/main.test.bicep]
AZR-000139: nsg-vm-acawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run PSRule validation with [tests/e2e/waf-aligned/main.test.bicep]
AZR-000316: applicationGateway-864e505983a1f-test-acawaf-deployment failed Azure.Deployment.SecureValue. A secret property set from a non-secure value may leak the secret into deployment history or logs.
|
Run PSRule validation with [tests/e2e/waf-aligned/main.test.bicep]
AZR-000304: agw-acawaf-dev-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
|
Run PSRule validation with [tests/e2e/waf-aligned/main.test.bicep]
AZR-000059: agw-acawaf-dev-eus failed Azure.AppGw.UseHTTPS. Application Gateways should only expose frontend HTTP endpoints over HTTPS.
|
Loading