The Wayback Machine - http://web.archive.org/web/20211227143752/https://github.com/topics/infrastructure-as-code
Skip to content
#

infrastructure-as-code

Here are 1,336 public repositories matching this topic...

hideme4u
hideme4u commented Nov 1, 2021

Description

we have NPM7 generated package-lock.json with lockFileVersion = 2. Now when we scan Node.js project using Trivy filesystem scan, Trivy does not find out packages from package-lock.json.
It is working with lockFileVersion = 1

What did you expect to happen?

It should find out packages in package-lock.json

What happened instead?

It did not find out packages from pack

infracost
jgreaves91
jgreaves91 commented Dec 7, 2021

CKV_AWS_174 is being triggered in our terraform code even though we have the viewer certificate set to use TLSv.1.2. Snippet of our code here:

viewer_certificate {
acm_certificate_arn = aws_acm_certificate.cert.arn
ssl_support_method = "sni-only"
minimum_protocol_version = "TLSv1.2_2019"
}

Steps to reproduce the behavior:
Running checkov on our terraform code

**Expe

terrascan
adegoodyer
adegoodyer commented Aug 11, 2021
  • terrascan version: 1.9.0
  • terraform version: 1.0.1

Enhancement Request

Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.

Extremely useful when running the tool without halting a pipeline for example.

I currently use a workaround, but something more concrete would be very desira

Improve this page

Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."

Learn more