Skip to content

Commit 08132a3

Browse files
Copilotfelickz
andcommitted
Fix expected test results line numbers
Co-authored-by: felickz <1760475+felickz@users.noreply.github.com>
1 parent fac9944 commit 08132a3

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed
Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
| app.bicep:13:1:23:2 | This role assignment grants excessive privileges: Contributor role assigned at subscription scope. Consider using a more restrictive role or narrowing the scope to specific resources. |
2-
| app.bicep:26:1:36:2 | This role assignment grants excessive privileges: Owner role assigned at subscription scope. Consider using a more restrictive role or narrowing the scope to specific resources. |
3-
| app.bicep:39:1:49:2 | This role assignment grants excessive privileges: Contributor role assigned at resource group scope. Consider using a more restrictive role or narrowing the scope to specific resources. |
4-
| app.bicep:52:1:62:2 | This role assignment grants excessive privileges: User Access Administrator role assigned at resource group scope. Consider using a more restrictive role or narrowing the scope to specific resources. |
1+
| app.bicep:16:1:24:2 | This role assignment grants excessive privileges: Contributor role assigned at subscription scope. Consider using a more restrictive role or narrowing the scope to specific resources. |
2+
| app.bicep:27:1:35:2 | This role assignment grants excessive privileges: Owner role assigned at subscription scope. Consider using a more restrictive role or narrowing the scope to specific resources. |
3+
| app.bicep:38:1:46:2 | This role assignment grants excessive privileges: Contributor role assigned at resource group scope. Consider using a more restrictive role or narrowing the scope to specific resources. |
4+
| app.bicep:49:1:57:2 | This role assignment grants excessive privileges: User Access Administrator role assigned at resource group scope. Consider using a more restrictive role or narrowing the scope to specific resources. |

0 commit comments

Comments
 (0)