Skip to content

Commit

Permalink
Merge branch 'bridgecrewio:main' into patch-1
Browse files Browse the repository at this point in the history
  • Loading branch information
InputUsername authored Jul 18, 2024
2 parents 3148947 + 76041d8 commit 8ab2d85
Show file tree
Hide file tree
Showing 7 changed files with 2,251 additions and 2,231 deletions.
2 changes: 1 addition & 1 deletion checkov/version.py
Original file line number Diff line number Diff line change
@@ -1 +1 @@
version = '3.2.193'
version = '3.2.194'
4,114 changes: 2,062 additions & 2,052 deletions docs/5.Policy Index/all.md

Large diffs are not rendered by default.

179 changes: 92 additions & 87 deletions docs/5.Policy Index/arm.md

Large diffs are not rendered by default.

175 changes: 90 additions & 85 deletions docs/5.Policy Index/bicep.md

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion docs/5.Policy Index/terraform.md
Original file line number Diff line number Diff line change
Expand Up @@ -1525,7 +1525,7 @@ nav_order: 1
| 1514 | CKV_AZURE_235 | resource | azurerm_container_group | Ensure that Azure container environment variables are configured with secure values only | Terraform | [AzureContainerInstanceEnvVarSecureValueType.py](https://github.com/bridgecrewio/checkov/blob/main/checkov/terraform/checks/resource/azure/AzureContainerInstanceEnvVarSecureValueType.py) |
| 1515 | CKV_AZURE_236 | resource | azurerm_cognitive_account | Ensure that Cognitive Services accounts disable local authentication | Terraform | [CognitiveServicesEnableLocalAuth.py](https://github.com/bridgecrewio/checkov/blob/main/checkov/terraform/checks/resource/azure/CognitiveServicesEnableLocalAuth.py) |
| 1516 | CKV_AZURE_237 | resource | azurerm_container_registry | Ensure dedicated data endpoints are enabled. | Terraform | [ACRDedicatedDataEndpointEnabled.py](https://github.com/bridgecrewio/checkov/blob/main/checkov/terraform/checks/resource/azure/ACRDedicatedDataEndpointEnabled.py) |
| 1517 | CKV_AZURE_238 | resource | azurerm_cognitive_account | Ensure that Cognitive Services account is not configured with managed identity | Terraform | [CognitiveServicesConfigureIdentity.py](https://github.com/bridgecrewio/checkov/blob/main/checkov/terraform/checks/resource/azure/CognitiveServicesConfigureIdentity.py) |
| 1517 | CKV_AZURE_238 | resource | azurerm_cognitive_account | Ensure that all Azure Cognitive Services accounts are configured with a managed identity | Terraform | [CognitiveServicesConfigureIdentity.py](https://github.com/bridgecrewio/checkov/blob/main/checkov/terraform/checks/resource/azure/CognitiveServicesConfigureIdentity.py) |
| 1518 | CKV_AZURE_239 | resource | azurerm_synapse_workspace | Ensure Azure Synapse Workspace administrator login password is not exposed | Terraform | [SynapseWorkspaceAdministratorLoginPasswordHidden.py](https://github.com/bridgecrewio/checkov/blob/main/checkov/terraform/checks/resource/azure/SynapseWorkspaceAdministratorLoginPasswordHidden.py) |
| 1519 | CKV_AZURE_240 | resource | azurerm_synapse_workspace | Ensure Azure Synapse Workspace is encrypted with a CMK | Terraform | [SynapseWorkspaceCMKEncryption.py](https://github.com/bridgecrewio/checkov/blob/main/checkov/terraform/checks/resource/azure/SynapseWorkspaceCMKEncryption.py) |
| 1520 | CKV_AZURE_241 | resource | azurerm_synapse_sql_pool | Ensure Synapse SQL pools are encrypted | Terraform | [SynapseSQLPoolDataEncryption.py](https://github.com/bridgecrewio/checkov/blob/main/checkov/terraform/checks/resource/azure/SynapseSQLPoolDataEncryption.py) |
Expand Down
2 changes: 1 addition & 1 deletion kubernetes/requirements.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
checkov==3.2.193
checkov==3.2.194
8 changes: 4 additions & 4 deletions tests/arm/checks/resource/test_SkipJsonRegexPattern.py
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ def test_skip_specific_check(self):
summary = report.get_summary()

self.assertEqual(summary['passed'], 4)
self.assertEqual(summary['failed'], 36) # Updated expected value
self.assertEqual(summary['failed'], 40) # Updated expected value
self.assertEqual(summary['skipped'], 0)
self.assertEqual(summary['parsing_errors'], 0)

Expand All @@ -54,7 +54,7 @@ def test_skip_specific_check_for_folder(self):
summary = report.get_summary()

self.assertEqual(summary['passed'], 4)
self.assertEqual(summary['failed'], 38) # Updated expected value
self.assertEqual(summary['failed'], 42) # Updated expected value
self.assertEqual(summary['skipped'], 0)
self.assertEqual(summary['parsing_errors'], 0)

Expand All @@ -71,7 +71,7 @@ def test_skip_specific_check_specific_file(self):
summary = report.get_summary()

self.assertEqual(summary['passed'], 4)
self.assertEqual(summary['failed'], 38) # Updated expected value
self.assertEqual(summary['failed'], 42) # Updated expected value
self.assertEqual(summary['skipped'], 0)
self.assertEqual(summary['parsing_errors'], 0)

Expand All @@ -88,7 +88,7 @@ def test_no_skip(self):
summary = report.get_summary()

self.assertEqual(summary['passed'], 4)
self.assertEqual(summary['failed'], 40) # Updated expected value
self.assertEqual(summary['failed'], 44) # Updated expected value
self.assertEqual(summary['skipped'], 0)
self.assertEqual(summary['parsing_errors'], 0)

Expand Down

0 comments on commit 8ab2d85

Please sign in to comment.