Skip to content
This repository has been archived by the owner on Dec 20, 2024. It is now read-only.

allow to execute sql script #232

allow to execute sql script

allow to execute sql script #232

Triggered via pull request November 19, 2024 11:10
Status Failure
Total duration 33s
Artifacts

terraform-quality.yml

on: pull_request
encryption  /  terraform-lint
8s
encryption / terraform-lint
encryption  /  terraform-security
14s
encryption / terraform-security
mysql  /  terraform-lint
9s
mysql / terraform-lint
mysql  /  terraform-security
23s
mysql / terraform-security
postgresql  /  terraform-lint
10s
postgresql / terraform-lint
postgresql  /  terraform-security
24s
postgresql / terraform-security
secrets  /  terraform-lint
11s
secrets / terraform-lint
secrets  /  terraform-security
19s
secrets / terraform-security
sql-exporter  /  terraform-lint
8s
sql-exporter / terraform-lint
sql-exporter  /  terraform-security
20s
sql-exporter / terraform-security
Fit to window
Zoom out
Zoom in

Annotations

4 errors
sql-exporter / terraform-security
CKV_GCP_124: "Ensure GCP Cloud Function is not configured with overly permissive Ingress setting"
sql-exporter / terraform-security
CKV_GCP_42: "Ensure that Service Account has no Admin privileges"
mysql / terraform-security
CKV_GCP_62: "Bucket should log access"
postgresql / terraform-security
CKV_GCP_62: "Bucket should log access"