Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FEATURE: add github action for ci cd pipeline #6

Merged
merged 1 commit into from Aug 26, 2023

Conversation

chechiachang
Copy link
Owner

No description provided.

@chechiachang chechiachang self-assigned this Sep 25, 2022
@github-actions
Copy link

@github-actions
Copy link

Terraform Security Scan Failed

Show Output
Result #1 MEDIUM Password policy allows reuse of recent passwords. 
────────────────────────────────────────────────────────────────────────────────
  aws/modules/account-baseline-root/aws_iam_account_password_policy.tf:12
────────────────────────────────────────────────────────────────────────────────
    3    resource "aws_iam_account_password_policy" "strict" {
    4      allow_users_to_change_password = true
    5      minimum_password_length        = var.minimum_password_length
    6      hard_expiry                    = true
    7      max_password_age               = var.max_password_age
    8      require_lowercase_characters   = true
    9      require_numbers                = true
   10      require_uppercase_characters   = true
   11      require_symbols                = true
   ..  
────────────────────────────────────────────────────────────────────────────────
          ID aws-iam-no-password-reuse
      Impact Password reuse increase the risk of compromised passwords being abused
  Resolution Prevent password reuse in the policy

  More Information
  - https://aquasecurity.github.io/tfsec/latest/checks/aws/iam/no-password-reuse/
  - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_account_password_policy
────────────────────────────────────────────────────────────────────────────────


  timings
  ──────────────────────────────────────────
  disk i/o             129.1µs
  parsing              95.762322ms
  adaptation           105.602µs
  checks               66.951693ms
  total                162.948717ms

  counts
  ──────────────────────────────────────────
  modules downloaded   0
  modules processed    1
  blocks processed     15
  files read           8

  results
  ──────────────────────────────────────────
  passed               6
  ignored              0
  critical             0
  high                 0
  medium               1
  low                  0

  6 passed, 1 potential problem(s) detected.

@chechiachang chechiachang force-pushed the feature/add-github-action-ci-cd-pipeline branch from 10f7b5c to 6eef7fd Compare September 25, 2022 13:36
@github-actions
Copy link

@github-actions
Copy link

Terraform Security Scan Failed

Show Output
Result #1 MEDIUM Password policy allows reuse of recent passwords. 
────────────────────────────────────────────────────────────────────────────────
  aws/modules/account-baseline-root/aws_iam_account_password_policy.tf:12
────────────────────────────────────────────────────────────────────────────────
    3    resource "aws_iam_account_password_policy" "strict" {
    4      allow_users_to_change_password = true
    5      minimum_password_length        = var.minimum_password_length
    6      hard_expiry                    = true
    7      max_password_age               = var.max_password_age
    8      require_lowercase_characters   = true
    9      require_numbers                = true
   10      require_uppercase_characters   = true
   11      require_symbols                = true
   ..  
────────────────────────────────────────────────────────────────────────────────
          ID aws-iam-no-password-reuse
      Impact Password reuse increase the risk of compromised passwords being abused
  Resolution Prevent password reuse in the policy

  More Information
  - https://aquasecurity.github.io/tfsec/latest/checks/aws/iam/no-password-reuse/
  - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_account_password_policy
────────────────────────────────────────────────────────────────────────────────


  timings
  ──────────────────────────────────────────
  disk i/o             98.599µs
  parsing              186.856642ms
  adaptation           86.999µs
  checks               57.638674ms
  total                244.680914ms

  counts
  ──────────────────────────────────────────
  modules downloaded   0
  modules processed    1
  blocks processed     15
  files read           8

  results
  ──────────────────────────────────────────
  passed               6
  ignored              0
  critical             0
  high                 0
  medium               1
  low                  0

  6 passed, 1 potential problem(s) detected.

@chechiachang chechiachang force-pushed the feature/add-github-action-ci-cd-pipeline branch from 6eef7fd to 0165f89 Compare August 26, 2023 16:24
@github-actions
Copy link

@github-actions
Copy link

Terraform Security Scan Failed

Show Output
Result #1 MEDIUM Password policy allows reuse of recent passwords. 
────────────────────────────────────────────────────────────────────────────────
  aws/modules/account-baseline-root/aws_iam_account_password_policy.tf:12
────────────────────────────────────────────────────────────────────────────────
    3    resource "aws_iam_account_password_policy" "strict" {
    4      allow_users_to_change_password = true
    5      minimum_password_length        = var.minimum_password_length
    6      hard_expiry                    = true
    7      max_password_age               = var.max_password_age
    8      require_lowercase_characters   = true
    9      require_numbers                = true
   10      require_uppercase_characters   = true
   11      require_symbols                = true
   ..  
────────────────────────────────────────────────────────────────────────────────
          ID aws-iam-no-password-reuse
      Impact Password reuse increase the risk of compromised passwords being abused
  Resolution Prevent password reuse in the policy

  More Information
  - https://aquasecurity.github.io/tfsec/latest/checks/aws/iam/no-password-reuse/
  - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_account_password_policy
────────────────────────────────────────────────────────────────────────────────


  timings
  ──────────────────────────────────────────
  disk i/o             151.603µs
  parsing              143.958157ms
  adaptation           184.105µs
  checks               25.782191ms
  total                170.076056ms

  counts
  ──────────────────────────────────────────
  modules downloaded   0
  modules processed    2
  blocks processed     17
  files read           9

  results
  ──────────────────────────────────────────
  passed               10
  ignored              0
  critical             0
  high                 0
  medium               1
  low                  0

  10 passed, 1 potential problem(s) detected.

@chechiachang chechiachang merged commit 7707952 into main Aug 26, 2023
4 of 5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant