You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
test/unit-test
*****************************
Running tflint in test/unit-test
Excluding the following checks: terraform_unused_declarations
3issue(s) found:
Warning: Missing version constraint for provider "http" in `required_providers` (terraform_required_providers)
on test/unit-test/locals.tf line 7:7:data"http""environments_file" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.md
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on test/unit-test/main.tf line 147:147:"${module.s3-bucket.bucket.arn}"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_deprecated_interpolation.md
Warning: Missing version constraint for provider "archive" in `required_providers` (terraform_required_providers)
on test/unit-test/main.tf line 226:226:data"archive_file""lambda-zip" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
test/unit-test
*****************************
Running Trivy in test/unit-test
2024-10-02T20:05:48Z INFO [db] Need to update DB
2024-10-02T20:05:48Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-10-02T20:05:50Z INFO [vuln] Vulnerability scanning is enabled
2024-10-02T20:05:50Z INFO [misconfig] Misconfiguration scanning is enabled
2024-10-02T20:05:50Z INFO Need to update the built-in policies
2024-10-02T20:05:50Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-10-02T20:05:50Z INFO [secret] Secret scanning is enabled
2024-10-02T20:05:50Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-10-02T20:05:50Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-10-02T20:05:50Z INFO [terraformscanner] Scanning root module file_path="."2024-10-02T20:05:50Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="networking"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-02T20:05:51Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:97-99"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:133"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:97-99"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:133"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-bucket-encryption"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc1/main.tf:8-19"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-versioning"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc1/main.tf:170"2024-10-02T20:05:51Z INFO [terraformexecutor] Ignore finding rule="aws-s3-encryption-customer-key"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc1/main.tf:157-165"2024-10-02T20:05:51Z INFO Number of language-specific files num=02024-10-02T20:05:51Z INFO Detected config files num=4trivy_exitcode=0
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
test/unit-test
*****************************
Running tflint in test/unit-test
Excluding the following checks: terraform_unused_declarations
3issue(s) found:
Warning: Missing version constraint for provider "http" in `required_providers` (terraform_required_providers)
on test/unit-test/locals.tf line 7:7:data"http""environments_file" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.md
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on test/unit-test/main.tf line 147:147:"${module.s3-bucket.bucket.arn}"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_deprecated_interpolation.md
Warning: Missing version constraint for provider "archive" in `required_providers` (terraform_required_providers)
on test/unit-test/main.tf line 226:226:data"archive_file""lambda-zip" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
test/unit-test
*****************************
Running Trivy in test/unit-test
2024-10-02T20:07:42Z INFO [db] Need to update DB
2024-10-02T20:07:42Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-10-02T20:07:44Z INFO [vuln] Vulnerability scanning is enabled
2024-10-02T20:07:44Z INFO [misconfig] Misconfiguration scanning is enabled
2024-10-02T20:07:44Z INFO Need to update the built-in policies
2024-10-02T20:07:44Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-10-02T20:07:44Z INFO [secret] Secret scanning is enabled
2024-10-02T20:07:44Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-10-02T20:07:44Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-10-02T20:07:45Z INFO [terraformscanner] Scanning root module file_path="."2024-10-02T20:07:45Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="networking"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-02T20:07:45Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:97-99"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:133"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:97-99"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:133"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-bucket-encryption"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc1/main.tf:8-19"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-versioning"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc1/main.tf:170"2024-10-02T20:07:45Z INFO [terraformexecutor] Ignore finding rule="aws-s3-encryption-customer-key"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc1/main.tf:157-165"2024-10-02T20:07:45Z INFO Number of language-specific files num=02024-10-02T20:07:45Z INFO Detected config files num=4trivy_exitcode=0
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
test/unit-test
*****************************
Running tflint in test/unit-test
Excluding the following checks: terraform_unused_declarations
3issue(s) found:
Warning: Missing version constraint for provider "http" in `required_providers` (terraform_required_providers)
on test/unit-test/locals.tf line 7:7:data"http""environments_file" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.md
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on test/unit-test/main.tf line 147:147:"${module.s3-bucket.bucket.arn}"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_deprecated_interpolation.md
Warning: Missing version constraint for provider "archive" in `required_providers` (terraform_required_providers)
on test/unit-test/main.tf line 226:226:data"archive_file""lambda-zip" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
test/unit-test
*****************************
Running Trivy in test/unit-test
2024-10-02T20:17:13Z INFO [db] Need to update DB
2024-10-02T20:17:13Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-10-02T20:17:15Z INFO [vuln] Vulnerability scanning is enabled
2024-10-02T20:17:15Z INFO [misconfig] Misconfiguration scanning is enabled
2024-10-02T20:17:15Z INFO Need to update the built-in policies
2024-10-02T20:17:15Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-10-02T20:17:16Z INFO [secret] Secret scanning is enabled
2024-10-02T20:17:16Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-10-02T20:17:16Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-10-02T20:17:16Z INFO [terraformscanner] Scanning root module file_path="."2024-10-02T20:17:16Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="networking"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-02T20:17:17Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:97-99"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:133"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:97-99"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:133"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-bucket-encryption"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc1/main.tf:8-19"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-versioning"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc1/main.tf:170"2024-10-02T20:17:17Z INFO [terraformexecutor] Ignore finding rule="aws-s3-encryption-customer-key"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=8688bc1/main.tf:157-165"2024-10-02T20:17:17Z INFO Number of language-specific files num=02024-10-02T20:17:17Z INFO Detected config files num=4trivy_exitcode=0
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
test/unit-test
*****************************
Running tflint in test/unit-test
Excluding the following checks: terraform_unused_declarations
3issue(s) found:
Warning: Missing version constraint for provider "http" in `required_providers` (terraform_required_providers)
on test/unit-test/locals.tf line 7:7:data"http""environments_file" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.md
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on test/unit-test/main.tf line 147:147:"${module.s3-bucket.bucket.arn}"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_deprecated_interpolation.md
Warning: Missing version constraint for provider "archive" in `required_providers` (terraform_required_providers)
on test/unit-test/main.tf line 226:226:data"archive_file""lambda-zip" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
test/unit-test
*****************************
Running Trivy in test/unit-test
2024-10-02T20:35:35Z INFO [db] Need to update DB
2024-10-02T20:35:35Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-10-02T20:35:37Z INFO [vuln] Vulnerability scanning is enabled
2024-10-02T20:35:37Z INFO [misconfig] Misconfiguration scanning is enabled
2024-10-02T20:35:37Z INFO Need to update the built-in policies
2024-10-02T20:35:37Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-10-02T20:35:37Z INFO [secret] Secret scanning is enabled
2024-10-02T20:35:37Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-10-02T20:35:37Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-10-02T20:35:38Z INFO [terraformscanner] Scanning root module file_path="."2024-10-02T20:35:38Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="networking"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-02T20:35:38Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:97-99"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:133"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:97-99"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:133"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-bucket-encryption"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=52a40b0dd18aaef0d7c5565d93cc8997aad79636/main.tf:16-27"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-versioning"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=52a40b0dd18aaef0d7c5565d93cc8997aad79636/main.tf:202"2024-10-02T20:35:38Z INFO [terraformexecutor] Ignore finding rule="aws-s3-encryption-customer-key"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=52a40b0dd18aaef0d7c5565d93cc8997aad79636/main.tf:187-197"2024-10-02T20:35:38Z INFO Number of language-specific files num=02024-10-02T20:35:38Z INFO Detected config files num=4trivy_exitcode=0
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
test/unit-test
*****************************
Running tflint in test/unit-test
Excluding the following checks: terraform_unused_declarations
3issue(s) found:
Warning: Missing version constraint for provider "http" in `required_providers` (terraform_required_providers)
on test/unit-test/locals.tf line 7:7:data"http""environments_file" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.md
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on test/unit-test/main.tf line 147:147:"${module.s3-bucket.bucket.arn}"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_deprecated_interpolation.md
Warning: Missing version constraint for provider "archive" in `required_providers` (terraform_required_providers)
on test/unit-test/main.tf line 226:226:data"archive_file""lambda-zip" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
test/unit-test
*****************************
Running Trivy in test/unit-test
2024-10-02T21:31:38Z INFO [db] Need to update DB
2024-10-02T21:31:38Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-10-02T21:31:40Z INFO [vuln] Vulnerability scanning is enabled
2024-10-02T21:31:40Z INFO [misconfig] Misconfiguration scanning is enabled
2024-10-02T21:31:40Z INFO Need to update the built-in policies
2024-10-02T21:31:40Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-10-02T21:31:41Z INFO [secret] Secret scanning is enabled
2024-10-02T21:31:41Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-10-02T21:31:41Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-10-02T21:31:41Z INFO [terraformscanner] Scanning root module file_path="."2024-10-02T21:31:41Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="networking"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-02T21:31:42Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-bucket-encryption"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=52a40b0dd18aaef0d7c5565d93cc8997aad79636/main.tf:16-27"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-versioning"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=52a40b0dd18aaef0d7c5565d93cc8997aad79636/main.tf:202"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-s3-encryption-customer-key"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=52a40b0dd18aaef0d7c5565d93cc8997aad79636/main.tf:187-197"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:97-99"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:133"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:97-99"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:133"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-iam-no-policy-wildcards"range="main.tf:68-150"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-02T21:31:42Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-02T21:31:42Z INFO Number of language-specific files num=02024-10-02T21:31:42Z INFO Detected config files num=4trivy_exitcode=0
Trivy will check the following folders:
test/unit-test
Running Trivy in test/unit-test
2024-10-03T12:25:32Z INFO [vulndb] Need to update DB
2024-10-03T12:25:32Z INFO [vulndb] Downloading vulnerability DB...
2024-10-03T12:25:32Z INFO [vulndb] Downloading artifact... repo="ghcr.io/aquasecurity/trivy-db:2"
2024-10-03T12:25:34Z INFO [vulndb] Artifact successfully downloaded repo="ghcr.io/aquasecurity/trivy-db:2"
2024-10-03T12:25:34Z INFO [vuln] Vulnerability scanning is enabled
2024-10-03T12:25:34Z INFO [misconfig] Misconfiguration scanning is enabled
2024-10-03T12:25:34Z INFO [misconfig] Need to update the built-in checks
2024-10-03T12:25:34Z INFO [misconfig] Downloading the built-in checks...
156.02 KiB / 156.02 KiB [---------------------------------------------------------] 100.00% ? p/s 0s2024-10-03T12:25:34Z INFO [secret] Secret scanning is enabled
2024-10-03T12:25:34Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-10-03T12:25:34Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.56/docs/scanner/secret#recommendation for faster secret detection
2024-10-03T12:25:35Z INFO [terraform scanner] Scanning root module file_path="."
2024-10-03T12:25:35Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="networking"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.expiration" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.transition" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.noncurrent_version_expiration" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.noncurrent_version_transition" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.principals" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.condition" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.expiration" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.transition" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.noncurrent_version_expiration" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.noncurrent_version_transition" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.principals" value="cty.NilVal"
2024-10-03T12:25:36Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="module.s3-bucket.dynamic.condition" value="cty.NilVal"
2024-10-03T12:25:36Z INFO [terraform executor] Ignore finding rule="aws-lambda-enable-tracing" range="../../main.tf:59-96"
2024-10-03T12:25:36Z INFO [terraform executor] Ignore finding rule="aws-s3-enable-versioning" range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=52a40b0dd18aaef0d7c5565d93cc8997aad79636/main.tf:202"
2024-10-03T12:25:36Z INFO [terraform executor] Ignore finding rule="aws-s3-encryption-customer-key" range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=52a40b0dd18aaef0d7c5565d93cc8997aad79636/main.tf:187-197"
2024-10-03T12:25:36Z INFO Number of language-specific files num=0
2024-10-03T12:25:36Z INFO Detected config files num=3
trivy_exitcode=0
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
test/unit-test
*****************************
Running tflint in test/unit-test
Excluding the following checks: terraform_unused_declarations
3issue(s) found:
Warning: Missing version constraint for provider "http" in `required_providers` (terraform_required_providers)
on test/unit-test/locals.tf line 7:7:data"http""environments_file" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.md
Warning: [Fixable] Interpolation-only expressions are deprecated in Terraform v0.12.14 (terraform_deprecated_interpolation)
on test/unit-test/main.tf line 147:147:"${module.s3-bucket.bucket.arn}"
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_deprecated_interpolation.md
Warning: Missing version constraint for provider "archive" in `required_providers` (terraform_required_providers)
on test/unit-test/main.tf line 226:226:data"archive_file""lambda-zip" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.9.1/docs/rules/terraform_required_providers.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
test/unit-test
*****************************
Running Trivy in test/unit-test
2024-10-03T12:25:32Z INFO [vulndb] Need to update DB
2024-10-03T12:25:32Z INFO [vulndb] Downloading vulnerability DB...2024-10-03T12:25:32Z INFO [vulndb] Downloading artifact...repo="ghcr.io/aquasecurity/trivy-db:2"2024-10-03T12:25:34Z INFO [vulndb] Artifact successfully downloaded repo="ghcr.io/aquasecurity/trivy-db:2"2024-10-03T12:25:34Z INFO [vuln] Vulnerability scanning is enabled
2024-10-03T12:25:34Z INFO [misconfig] Misconfiguration scanning is enabled
2024-10-03T12:25:34Z INFO [misconfig] Need to update the built-in checks
2024-10-03T12:25:34Z INFO [misconfig] Downloading the built-in checks...156.02 KiB /156.02 KiB [---------------------------------------------------------] 100.00%? p/s 0s2024-10-03T12:25:34Z INFO [secret] Secret scanning is enabled
2024-10-03T12:25:34Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-10-03T12:25:34Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.56/docs/scanner/secret#recommendation for faster secret detection2024-10-03T12:25:35Z INFO [terraformscanner] Scanning root module file_path="."2024-10-03T12:25:35Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="networking"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.expiration"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.transition"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_expiration"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.noncurrent_version_transition"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.principals"value="cty.NilVal"2024-10-03T12:25:36Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="module.s3-bucket.dynamic.condition"value="cty.NilVal"2024-10-03T12:25:36Z INFO [terraformexecutor] Ignore finding rule="aws-lambda-enable-tracing"range="../../main.tf:59-96"2024-10-03T12:25:36Z INFO [terraformexecutor] Ignore finding rule="aws-s3-enable-versioning"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=52a40b0dd18aaef0d7c5565d93cc8997aad79636/main.tf:202"2024-10-03T12:25:36Z INFO [terraformexecutor] Ignore finding rule="aws-s3-encryption-customer-key"range="github.com/ministryofjustice/modernisation-platform-terraform-s3-bucket?ref=52a40b0dd18aaef0d7c5565d93cc8997aad79636/main.tf:187-197"2024-10-03T12:25:36Z INFO Number of language-specific files num=02024-10-03T12:25:36Z INFO Detected config files num=3trivy_exitcode=0
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
wip