Skip to content

allow to execute sql script #215

allow to execute sql script

allow to execute sql script #215

Triggered via pull request November 14, 2024 10:47
Status Failure
Total duration 34s
Artifacts

terraform-quality.yml

on: pull_request
encryption  /  terraform-lint
8s
encryption / terraform-lint
encryption  /  terraform-security
20s
encryption / terraform-security
mysql  /  terraform-lint
10s
mysql / terraform-lint
mysql  /  terraform-security
18s
mysql / terraform-security
postgresql  /  terraform-lint
10s
postgresql / terraform-lint
postgresql  /  terraform-security
16s
postgresql / terraform-security
secrets  /  terraform-lint
9s
secrets / terraform-lint
secrets  /  terraform-security
16s
secrets / terraform-security
sql-exporter  /  terraform-lint
10s
sql-exporter / terraform-lint
sql-exporter  /  terraform-security
21s
sql-exporter / terraform-security
Fit to window
Zoom out
Zoom in

Annotations

11 errors
mysql / terraform-lint
Process completed with exit code 1.
postgresql / terraform-security
CKV_GCP_29: "Ensure that Cloud Storage buckets have uniform bucket-level access enabled"
postgresql / terraform-security
CKV_GCP_62: "Bucket should log access"
postgresql / terraform-security
CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
postgresql / terraform-security
CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
mysql / terraform-security
CKV_GCP_29: "Ensure that Cloud Storage buckets have uniform bucket-level access enabled"
mysql / terraform-security
CKV_GCP_62: "Bucket should log access"
mysql / terraform-security
CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
mysql / terraform-security
CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
sql-exporter / terraform-security
CKV_GCP_124: "Ensure GCP Cloud Function is not configured with overly permissive Ingress setting"
sql-exporter / terraform-security
CKV_GCP_42: "Ensure that Service Account has no Admin privileges"