nlamirault / terraform-google-traffic-director

Terraform module for Google Traffic Director
0 stars 2 forks source link

Update TFLint plugin terraform-linters/tflint-ruleset-google to v0.26.0 #20

Closed renovate[bot] closed 1 year ago

renovate[bot] commented 1 year ago

Mend Renovate logo banner

This PR contains the following updates:

Package Type Update Change
terraform-linters/tflint-ruleset-google plugin minor 0.25.0 -> 0.26.0

Release Notes

terraform-linters/tflint-ruleset-google (terraform-linters/tflint-ruleset-google) ### [`v0.26.0`](https://togithub.com/terraform-linters/tflint-ruleset-google/blob/HEAD/CHANGELOG.md#0260-2023-11-13) [Compare Source](https://togithub.com/terraform-linters/tflint-ruleset-google/compare/v0.25.0...v0.26.0) ##### Breaking Changes - [#​315](https://togithub.com/terraform-linters/tflint-ruleset-google/pull/315): Update Magic Modules - Removed `google_cloudiot_registry_invalid_log_level` rule - Removed `google_cloud_iot_device_invalid_log_level` rule ##### Enhancements - [#​313](https://togithub.com/terraform-linters/tflint-ruleset-google/pull/313): update machine types ##### Chores - [#​298](https://togithub.com/terraform-linters/tflint-ruleset-google/pull/298): Bump goreleaser/goreleaser-action from 4 to 5 - [#​304](https://togithub.com/terraform-linters/tflint-ruleset-google/pull/304): Bump golang.org/x/net from 0.14.0 to 0.17.0 - [#​306](https://togithub.com/terraform-linters/tflint-ruleset-google/pull/306): Bump github.com/google/go-cmp from 0.5.9 to 0.6.0 - [#​308](https://togithub.com/terraform-linters/tflint-ruleset-google/pull/308): Bump github.com/dave/dst from 0.27.2 to 0.27.3 - [#​309](https://togithub.com/terraform-linters/tflint-ruleset-google/pull/309): Bump github.com/hashicorp/hcl/v2 from 2.18.0 to 2.19.1 - [#​311](https://togithub.com/terraform-linters/tflint-ruleset-google/pull/311): Bump google.golang.org/grpc from 1.57.0 to 1.57.1 - [#​314](https://togithub.com/terraform-linters/tflint-ruleset-google/pull/314): Bump google.golang.org/api from 0.139.0 to 0.150.0

Configuration

πŸ“… Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

β™» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

πŸ”• Ignore: Close this PR and you won't be reminded about this update again.



This PR has been generated by Mend Renovate. View repository job log here.

github-actions[bot] commented 1 year ago

Terraform Security Scan Failed

Show Output ```hcl Results #1-2 CRITICAL Firewall rule allows ingress traffic from multiple addresses on the public internet. (2 similar results) ──────────────────────────────────────────────────────────────────────────────── firewall.tf:24-27 ──────────────────────────────────────────────────────────────────────────────── 15 resource "google_compute_firewall" "this" { .. 24 β”Œ source_ranges = [ 25 β”‚ "35.191.0.0/16", 26 β”‚ "130.211.0.0/22" 27 β”” ] .. 39 } ──────────────────────────────────────────────────────────────────────────────── Individual Causes - firewall.tf:15-39 (google_compute_firewall.this) 2 instances ──────────────────────────────────────────────────────────────────────────────── ID google-compute-no-public-ingress Impact The port is exposed for ingress from the internet Resolution Set a more restrictive cidr range More Information - https://aquasecurity.github.io/tfsec/latest/checks/google/compute/no-public-ingress/ - https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_firewall#source_ranges - https://www.terraform.io/docs/providers/google/r/compute_firewall.html ──────────────────────────────────────────────────────────────────────────────── timings ────────────────────────────────────────── disk i/o 113.1Β΅s parsing 939.3Β΅s adaptation 139.8Β΅s checks 7.415304ms total 8.607504ms counts ────────────────────────────────────────── modules downloaded 0 modules processed 1 blocks processed 15 files read 7 results ────────────────────────────────────────── passed 0 ignored 0 critical 2 high 0 medium 0 low 0 2 potential problem(s) detected. ```