chore(deps): update terraform terraform-aws-modules/sns/aws to v6.1.2 #184
terraform.yml
on: pull_request
Module Validation
/
Commitlint
12s
Module Validation
/
Terraform Format
4s
Module Validation
/
Terraform Lint
15s
Module Validation
/
Terraform Unit Tests
18s
Module Validation
/
Terraform Init
16s
Module Validation
/
Terraform Validate
18s
Module Validation
/
Static Security Analysis
25s
Module Validation
/
Static Security Analysis - Checkov
38s
Module Validation
/
Terraform Validate Examples
1m 22s
Module Validation
/
Terraform Docs
8s
Module Validation
/
Get Cost Estimate
0s
Module Validation
/
Update PR
4s
Annotations
10 errors and 11 warnings
Module Validation / Static Security Analysis - Checkov:
data.tf#L12
CKV_AWS_356: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
|
Module Validation / Static Security Analysis - Checkov:
data.tf#L12
CKV_AWS_111: "Ensure IAM policies does not allow write access without constraints"
|
Module Validation / Static Security Analysis - Checkov:
data.tf#L12
CKV_AWS_356: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
|
Module Validation / Static Security Analysis - Checkov:
data.tf#L12
CKV_AWS_111: "Ensure IAM policies does not allow write access without constraints"
|
Module Validation / Static Security Analysis - Checkov:
data.tf#L12
CKV_AWS_356: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
|
Module Validation / Static Security Analysis - Checkov:
data.tf#L12
CKV_AWS_111: "Ensure IAM policies does not allow write access without constraints"
|
Module Validation / Static Security Analysis - Checkov:
main.tf#L4
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
Module Validation / Static Security Analysis - Checkov:
main.tf#L4
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
Module Validation / Static Security Analysis - Checkov:
main.tf#L4
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
Module Validation / Static Security Analysis - Checkov:
main.tf#L4
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
Module Validation / Terraform Format
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Module Validation / Terraform Docs
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Module Validation / Commitlint
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Module Validation / Terraform Lint
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Module Validation / Terraform Init
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Module Validation / Terraform Unit Tests
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Module Validation / Terraform Validate
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Module Validation / Static Security Analysis
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Module Validation / Static Security Analysis - Checkov
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Module Validation / Terraform Validate Examples
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
Module Validation / Update PR
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|