Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New files for terraform/environments #9461

Merged
merged 2 commits into from
Mar 4, 2025
Merged

New files for terraform/environments #9461

merged 2 commits into from
Mar 4, 2025

Conversation

github-actions[bot]
Copy link
Contributor

@github-actions github-actions bot commented Mar 4, 2025

This PR was automatically created via a GitHub action workflow 🤖

This PR commits new files under terraform/environments.

@github-actions github-actions bot requested a review from a team as a code owner March 4, 2025 13:03
@sukeshreddyg sukeshreddyg reopened this Mar 4, 2025
Copy link
Contributor Author

github-actions bot commented Mar 4, 2025

Terraform Plan Summary

core-vpc-test
No changes. Your infrastructure matches the configuration.

Copy link
Contributor Author

github-actions bot commented Mar 4, 2025

Terraform Plan Summary

core-vpc-development
No changes. Your infrastructure matches the configuration.

Copy link
Contributor Author

github-actions bot commented Mar 4, 2025

Terraform Plan Summary

core-vpc-production
No changes. Your infrastructure matches the configuration.

Copy link
Contributor Author

github-actions bot commented Mar 4, 2025

Terraform Plan Summary

core-vpc-preproduction
No changes. Your infrastructure matches the configuration.

Copy link
Contributor Author

github-actions bot commented Mar 4, 2025

Trivy Scan Success

Show Output ```hcl

Trivy will check the following folders:
terraform/environments/bacway


Running Trivy in terraform/environments/bacway
2025-03-04T15:04:46Z INFO [vulndb] Need to update DB
2025-03-04T15:04:46Z INFO [vulndb] Downloading vulnerability DB...
2025-03-04T15:04:46Z INFO [vulndb] Downloading artifact... repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-03-04T15:04:48Z INFO [vulndb] Artifact successfully downloaded repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-03-04T15:04:48Z INFO [vuln] Vulnerability scanning is enabled
2025-03-04T15:04:48Z INFO [misconfig] Misconfiguration scanning is enabled
2025-03-04T15:04:48Z INFO [misconfig] Need to update the built-in checks
2025-03-04T15:04:48Z INFO [misconfig] Downloading the built-in checks...
163.77 KiB / 163.77 KiB [---------------------------------------------------------] 100.00% ? p/s 0s2025-03-04T15:04:49Z INFO [secret] Secret scanning is enabled
2025-03-04T15:04:49Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2025-03-04T15:04:49Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2025-03-04T15:04:50Z INFO [terraform scanner] Scanning root module file_path="."
2025-03-04T15:04:50Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="networking"
2025-03-04T15:04:50Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.ram-ec2-retagging[0].data.aws_subnet.host" value="cty.NilVal"
2025-03-04T15:04:50Z INFO Number of language-specific files num=0
2025-03-04T15:04:50Z INFO Detected config files num=1
trivy_exitcode=0

</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>

```hcl

*****************************

Checkov will check the following folders:
terraform/environments/bacway

*****************************

Running Checkov in terraform/environments/bacway
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:

Passed checks: 5, Failed checks: 0, Skipped checks: 0


checkov_exitcode=0

CTFLint Scan Success

Show Output
*****************************

Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version: 0.9.1)
tflint will check the following folders:
terraform/environments/bacway

*****************************

Running tflint in terraform/environments/bacway
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0

Trivy Scan Success

Show Output
*****************************

Trivy will check the following folders:
terraform/environments/bacway

*****************************

Running Trivy in terraform/environments/bacway
2025-03-04T15:04:46Z	INFO	[vulndb] Need to update DB
2025-03-04T15:04:46Z	INFO	[vulndb] Downloading vulnerability DB...
2025-03-04T15:04:46Z	INFO	[vulndb] Downloading artifact...	repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-03-04T15:04:48Z	INFO	[vulndb] Artifact successfully downloaded	repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-03-04T15:04:48Z	INFO	[vuln] Vulnerability scanning is enabled
2025-03-04T15:04:48Z	INFO	[misconfig] Misconfiguration scanning is enabled
2025-03-04T15:04:48Z	INFO	[misconfig] Need to update the built-in checks
2025-03-04T15:04:48Z	INFO	[misconfig] Downloading the built-in checks...
163.77 KiB / 163.77 KiB [---------------------------------------------------------] 100.00% ? p/s 0s2025-03-04T15:04:49Z	INFO	[secret] Secret scanning is enabled
2025-03-04T15:04:49Z	INFO	[secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2025-03-04T15:04:49Z	INFO	[secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2025-03-04T15:04:50Z	INFO	[terraform scanner] Scanning root module	file_path="."
2025-03-04T15:04:50Z	WARN	[terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.	module="root" variables="networking"
2025-03-04T15:04:50Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.ram-ec2-retagging[0].data.aws_subnet.host" value="cty.NilVal"
2025-03-04T15:04:50Z	INFO	Number of language-specific files	num=0
2025-03-04T15:04:50Z	INFO	Detected config files	num=1
trivy_exitcode=0

Copy link
Contributor Author

github-actions bot commented Mar 4, 2025

Trivy Scan Success

Show Output ```hcl

Trivy will check the following folders:
terraform/environments/bacway


Running Trivy in terraform/environments/bacway
2025-03-04T15:04:52Z INFO [vulndb] Need to update DB
2025-03-04T15:04:52Z INFO [vulndb] Downloading vulnerability DB...
2025-03-04T15:04:52Z INFO [vulndb] Downloading artifact... repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-03-04T15:04:55Z INFO [vulndb] Artifact successfully downloaded repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-03-04T15:04:55Z INFO [vuln] Vulnerability scanning is enabled
2025-03-04T15:04:55Z INFO [misconfig] Misconfiguration scanning is enabled
2025-03-04T15:04:55Z INFO [misconfig] Need to update the built-in checks
2025-03-04T15:04:55Z INFO [misconfig] Downloading the built-in checks...
163.77 KiB / 163.77 KiB [------------------------------------------------------] 100.00% ? p/s 100ms2025-03-04T15:04:55Z INFO [secret] Secret scanning is enabled
2025-03-04T15:04:55Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2025-03-04T15:04:55Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2025-03-04T15:04:56Z INFO [terraform scanner] Scanning root module file_path="."
2025-03-04T15:04:56Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="networking"
2025-03-04T15:04:56Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.ram-ec2-retagging[0].data.aws_subnet.host" value="cty.NilVal"
2025-03-04T15:04:56Z INFO Number of language-specific files num=0
2025-03-04T15:04:56Z INFO Detected config files num=1
trivy_exitcode=0

</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>

```hcl

*****************************

Checkov will check the following folders:
terraform/environments/bacway

*****************************

Running Checkov in terraform/environments/bacway
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:

Passed checks: 5, Failed checks: 0, Skipped checks: 0


checkov_exitcode=0

CTFLint Scan Success

Show Output
*****************************

Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version: 0.9.1)
tflint will check the following folders:
terraform/environments/bacway

*****************************

Running tflint in terraform/environments/bacway
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0

Trivy Scan Success

Show Output
*****************************

Trivy will check the following folders:
terraform/environments/bacway

*****************************

Running Trivy in terraform/environments/bacway
2025-03-04T15:04:52Z	INFO	[vulndb] Need to update DB
2025-03-04T15:04:52Z	INFO	[vulndb] Downloading vulnerability DB...
2025-03-04T15:04:52Z	INFO	[vulndb] Downloading artifact...	repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-03-04T15:04:55Z	INFO	[vulndb] Artifact successfully downloaded	repo="public.ecr.aws/aquasecurity/trivy-db:2"
2025-03-04T15:04:55Z	INFO	[vuln] Vulnerability scanning is enabled
2025-03-04T15:04:55Z	INFO	[misconfig] Misconfiguration scanning is enabled
2025-03-04T15:04:55Z	INFO	[misconfig] Need to update the built-in checks
2025-03-04T15:04:55Z	INFO	[misconfig] Downloading the built-in checks...
163.77 KiB / 163.77 KiB [------------------------------------------------------] 100.00% ? p/s 100ms2025-03-04T15:04:55Z	INFO	[secret] Secret scanning is enabled
2025-03-04T15:04:55Z	INFO	[secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2025-03-04T15:04:55Z	INFO	[secret] Please see also https://aquasecurity.github.io/trivy/v0.57/docs/scanner/secret#recommendation for faster secret detection
2025-03-04T15:04:56Z	INFO	[terraform scanner] Scanning root module	file_path="."
2025-03-04T15:04:56Z	WARN	[terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.	module="root" variables="networking"
2025-03-04T15:04:56Z	ERROR	[terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.	block="module.ram-ec2-retagging[0].data.aws_subnet.host" value="cty.NilVal"
2025-03-04T15:04:56Z	INFO	Number of language-specific files	num=0
2025-03-04T15:04:56Z	INFO	Detected config files	num=1
trivy_exitcode=0

Copy link
Contributor Author

github-actions bot commented Mar 4, 2025

Terraform Plan Summary

core-vpc-development
No changes. Your infrastructure matches the configuration.

Copy link
Contributor Author

github-actions bot commented Mar 4, 2025

Terraform Plan Summary

core-vpc-preproduction
No changes. Your infrastructure matches the configuration.

Copy link
Contributor Author

github-actions bot commented Mar 4, 2025

Terraform Plan Summary

core-vpc-production
No changes. Your infrastructure matches the configuration.

Copy link
Contributor Author

github-actions bot commented Mar 4, 2025

Terraform Plan Summary

core-vpc-test
No changes. Your infrastructure matches the configuration.

@sukeshreddyg sukeshreddyg added this pull request to the merge queue Mar 4, 2025
Merged via the queue into main with commit 41d20bd Mar 4, 2025
17 checks passed
@sukeshreddyg sukeshreddyg deleted the date-1741093399 branch March 4, 2025 15:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants