-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comment not relevant error when scanning specific folders #13
Comments
Hey @williamfalconeruk - this is an odd one. The error is informational, it's telling you that you don't have logging on the bucket yes, but it is dropping it on the floor because this PR isn't to blame for it. The odd bit is that it is even raising an AWS002 when the ignore is in place. Let me take a proper look and come back to you. |
I was completely misreading this - the ignores are being removed not added 🤦 The pr-commenter is not as sophisticated as you maybe hope, it can't recognise that the resource block is now failing and should be stopped - it can only tell you issues with lines that are specifically changed in the PR. One option you have, with this being a public repo, is to use the In the meantime, I'll look at if we can make it more intelligent under #14 |
Owen,
Thanks for taking a look at this, really appreciated!
I'll add the tfsec-sarif-action for now, keep me posted on any developments
on the commenter.
William Falconer
…On Sat, 17 Jul 2021 at 09:11, Owen Rumney ***@***.***> wrote:
I was completely misreading this - the ignores are being removed not added
🤦
The pr-commenter is not as sophisticated as you maybe hope, it can't
recognise that the resource block is now failing and should be stopped - it
can only tell you issues with lines that are specifically changed in the PR.
One option you have, with this being a public repo, is to use the
tfsec-sarif-action <https://github.com/aquasecurity/tfsec-sarif-action>
which will report all issues across the branch of the PR and put them in
the security scan block
https://github.com/ministryofjustice/opg-lpa/security. As they do
different tasks, I think both together would work around this.
In the meantime, I'll look at if we can make it more intelligent under #14
<#14>
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#13 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABDV6MXRJFHWDNI7ITMNFD3TYE3KVANCNFSM5AI5J4OA>
.
|
I too have run into this issue. I don't get the issue though with this tfsec action though so I'm continuing to use it (in private repos) until this gets sorted. |
I am having this issue as well. I've followed what @heathsnow mentioned, but I'd really like to be able to use the comment functionality that this action offers. |
Update on the above - I switched to https://github.com/reviewdog/action-tfsec and commenting works great. |
Hi, |
Is there any update on this issue ? |
Hi,
I have a PR open here: ministryofjustice/opg-lpa#541
which has an action with multiple tfsec scans on different specific folders. the action is based on the example in the readme, but with a matrix for the
terraform_path
.On a violation I am seeing errors similar to the following.
The commit to remove the ignore is also in this PR branch. can you advise why this might be happening?
Please see example here in a run:
https://github.com/ministryofjustice/opg-lpa/pull/541/checks?check_run_id=3056251557#step:4:13
Any advice will be greatly appreciated.
The text was updated successfully, but these errors were encountered: