Skip to content

Instantly share code, notes, and snippets.

@rvdouderaa
Last active November 21, 2023 20:51
Show Gist options
  • Save rvdouderaa/40821f63aa1407279a3e29292f34ce0c to your computer and use it in GitHub Desktop.
Save rvdouderaa/40821f63aa1407279a3e29292f34ce0c to your computer and use it in GitHub Desktop.
tfsec_ftlint xml files
<?xml version="1.0" encoding="UTF-8"?>
<testsuites>
<testsuite tests="1" failures="1" time="0" name="">
<properties></properties>
<testcase classname="src/variables.tf" name="terraform_typed_variables" time="0">
<failure message="src/variables.tf:1,1-16: `name` variable has no type" type="Warning">Warning: `name` variable has no type&#xA;Rule: terraform_typed_variables&#xA;Range: src/variables.tf:1,1-16</failure>
</testcase>
</testsuite>
</testsuites>
<?xml version="1.0" encoding="UTF-8"?>
<testsuites>
<testsuite tests="2" failures="2" time="0" name="">
<properties></properties>
<testcase classname="src/variables.tf" name="terraform_typed_variables" time="0">
<failure message="src/variables.tf:1,1-16: `name` variable has no type" type="Warning">Warning: `name` variable has no type&#xA;Rule: terraform_typed_variables&#xA;Range: src/variables.tf:1,1-16</failure>
</testcase>
<testcase classname="src/variables.tf" name="terraform_typed_variables" time="0">
<failure message="src/variables.tf:16,1-31: `resource_group_name` variable has no type" type="Warning">Warning: `resource_group_name` variable has no type&#xA;Rule: terraform_typed_variables&#xA;Range: src/variables.tf:16,1-31</failure>
</testcase>
</testsuite>
</testsuites>
<?xml version="1.0" encoding="UTF-8"?>
<testsuite name="tfsec" failures="1" tests="2">
<testcase classname="key_vault.tf" name="[azure-keyvault-specify-network-acl][CRITICAL] - Vault network ACL does not block access by default." time="0">
<failure message="Vault network ACL does not block access by default." type="">key_vault.tf:9-45&#xA;&#xA;resource &#34;azurerm_key_vault&#34; &#34;main&#34; {&#xA; name = var.name&#xA; resource_group_name = var.resource_group_name&#xA; location = data.azurerm_resource_group.main.location&#xA;&#xA; enable_rbac_authorization = true&#xA;&#xA; sku_name = &#34;standard&#34;&#xA; tenant_id = var.tenant_id&#xA;&#xA;&#xA;See https://aquasecurity.github.io/tfsec/v1.28.4/checks/azure/keyvault/specify-network-acl/</failure>
</testcase>
</testsuite>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment