Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update TFLint plugin terraform-linters/tflint-ruleset-google to v0.30.0 #24

Closed

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented May 5, 2024

This PR contains the following updates:

Package Type Update Change
terraform-linters/tflint-ruleset-google plugin minor 0.26.0 -> 0.30.0

Release Notes

terraform-linters/tflint-ruleset-google (terraform-linters/tflint-ruleset-google)

v0.30.0

Compare Source

Enhancements
  • #​369: feat: add one more H100 machine-type a3-megagpu-8g to ruleset
  • #​371: Add C4, C3 metal, and X4 families as valid machine types
  • #​372: Update Magic Modules
Chores
  • #​362: Bump goreleaser/goreleaser-action from 5 to 6
  • #​364: Bump github.com/hashicorp/hcl/v2 from 2.20.1 to 2.21.0
  • #​370: Bump google.golang.org/api from 0.181.0 to 0.189.0
  • #​373: deps: Go 1.22.5

v0.29.0

Compare Source

Enhancements
  • #​357: add missing n4 instance types
  • #​358: Add C3D with local SSD, Z3, and custom N4 families
  • #​359: Update Magic Modules
Chores
  • #​353: release: Introduce Artifact Attestations
  • #​355: Bump google.golang.org/api from 0.177.0 to 0.181.0
  • #​356: Bump github.com/hashicorp/terraform-plugin-sdk/v2 from 2.33.0 to 2.34.0

v0.28.0

Compare Source

Enhancements
  • #​350: Bump github.com/terraform-linters/tflint-plugin-sdk from 0.18.0 to 0.20.0
    • This is required for provider-defined functions support
  • #​352: Update Magic Modules
Chores
  • #​337: Bump github.com/hashicorp/terraform-plugin-sdk/v2 from 2.32.0 to 2.33.0
  • #​349: Bump google.golang.org/api from 0.165.0 to 0.177.0
  • #​351: deps: Go 1.22.2

v0.27.1

Compare Source

Enhancements
  • #​335: feat: add H100 machine-type to ruleset
Chores
  • #​334: Bump google.golang.org/api from 0.163.0 to 0.165.0

v0.27.0

Compare Source

Breaking Changes
  • #​332: Update Magic Module
    • The following rules are renamed
      • google_big_query_routine_invalid_determinism_level -> google_bigquery_routine_invalid_determinism_level
      • google_big_query_routine_invalid_language -> google_bigquery_routine_invalid_language
      • google_big_query_routine_invalid_routine_type -> google_bigquery_routine_invalid_routine_type
      • google_cloud_build_trigger_invalid_include_build_logs -> google_cloudbuild_trigger_invalid_include_build_logs
      • google_security_center_organization_custom_module_invalid_enablement_state -> google_scc_event_threat_detection_custom_module_invalid_enablement_state
      • google_security_center_folder_custom_module -> google_scc_folder_custom_module_invalid_enablement_state
      • google_security_center_project_custom_module_invalid_enablement_state -> google_scc_project_custom_module_invalid_enablement_state
      • google_security_center_source_invalid_display_name -> google_scc_source_invalid_display_name
    • Removed google_compute_router_peer_invalid_advertise_mode rule
Chores
  • #​320: Bump actions/setup-go from 4 to 5
  • #​328: Bump github.com/hashicorp/terraform-plugin-sdk/v2 from 2.29.0 to 2.32.0
  • #​331: Bump google.golang.org/api from 0.150.0 to 0.163.0
  • #​333: deps: Go 1.22

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-actions github-actions bot added the size/xs Size XS label May 5, 2024
Copy link

github-actions bot commented May 5, 2024

Terraform Security Scan Failed

Show Output
Results #1-2 CRITICAL Firewall rule allows ingress traffic from multiple addresses on the public internet. (2 similar results)
────────────────────────────────────────────────────────────────────────────────
  firewall.tf:24-27
────────────────────────────────────────────────────────────────────────────────
   15    resource "google_compute_firewall" "this" {
   ..  
   24source_ranges = [
   25"35.191.0.0/16",
   26"130.211.0.0/22"
   27  └   ]
   ..  
   39    }
────────────────────────────────────────────────────────────────────────────────
  Individual Causes
  - firewall.tf:15-39 (google_compute_firewall.this) 2 instances
────────────────────────────────────────────────────────────────────────────────
          ID google-compute-no-public-ingress
      Impact The port is exposed for ingress from the internet
  Resolution Set a more restrictive cidr range

  More Information
  - https://aquasecurity.github.io/tfsec/latest/checks/google/compute/no-public-ingress/
  - https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_firewall#source_ranges
  - https://www.terraform.io/docs/providers/google/r/compute_firewall.html
────────────────────────────────────────────────────────────────────────────────


  timings
  ──────────────────────────────────────────
  disk i/o             111.799µs
  parsing              671.201µs
  adaptation           94.858µs
  checks               7.929311ms
  total                8.807169ms

  counts
  ──────────────────────────────────────────
  modules downloaded   0
  modules processed    1
  blocks processed     15
  files read           7

  results
  ──────────────────────────────────────────
  passed               0
  ignored              0
  critical             2
  high                 0
  medium               0
  low                  0

  2 potential problem(s) detected.

@renovate renovate bot changed the title Update TFLint plugin terraform-linters/tflint-ruleset-google to v0.28.0 Update TFLint plugin terraform-linters/tflint-ruleset-google to v0.29.0 May 25, 2024
@renovate renovate bot force-pushed the renovate/terraform-linters-tflint-ruleset-google-0.x branch from 260ad24 to 68dc41d Compare May 25, 2024 09:43
Copy link

Terraform Security Scan Failed

Show Output
Results #1-2 CRITICAL Firewall rule allows ingress traffic from multiple addresses on the public internet. (2 similar results)
────────────────────────────────────────────────────────────────────────────────
  firewall.tf:24-27
────────────────────────────────────────────────────────────────────────────────
   15    resource "google_compute_firewall" "this" {
   ..  
   24source_ranges = [
   25"35.191.0.0/16",
   26"130.211.0.0/22"
   27  └   ]
   ..  
   39    }
────────────────────────────────────────────────────────────────────────────────
  Individual Causes
  - firewall.tf:15-39 (google_compute_firewall.this) 2 instances
────────────────────────────────────────────────────────────────────────────────
          ID google-compute-no-public-ingress
      Impact The port is exposed for ingress from the internet
  Resolution Set a more restrictive cidr range

  More Information
  - https://aquasecurity.github.io/tfsec/latest/checks/google/compute/no-public-ingress/
  - https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_firewall#source_ranges
  - https://www.terraform.io/docs/providers/google/r/compute_firewall.html
────────────────────────────────────────────────────────────────────────────────


  timings
  ──────────────────────────────────────────
  disk i/o             167.082µs
  parsing              1.649369ms
  adaptation           146.152µs
  checks               4.41984ms
  total                6.382443ms

  counts
  ──────────────────────────────────────────
  modules downloaded   0
  modules processed    1
  blocks processed     15
  files read           7

  results
  ──────────────────────────────────────────
  passed               0
  ignored              0
  critical             2
  high                 0
  medium               0
  low                  0

  2 potential problem(s) detected.

Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate bot changed the title Update TFLint plugin terraform-linters/tflint-ruleset-google to v0.29.0 Update TFLint plugin terraform-linters/tflint-ruleset-google to v0.30.0 Jul 23, 2024
@renovate renovate bot force-pushed the renovate/terraform-linters-tflint-ruleset-google-0.x branch from 68dc41d to d763f7a Compare July 23, 2024 15:52
Copy link

Terraform Security Scan Failed

Show Output
Results #1-2 CRITICAL Firewall rule allows ingress traffic from multiple addresses on the public internet. (2 similar results)
────────────────────────────────────────────────────────────────────────────────
  firewall.tf:24-27
────────────────────────────────────────────────────────────────────────────────
   15    resource "google_compute_firewall" "this" {
   ..  
   24source_ranges = [
   25"35.191.0.0/16",
   26"130.211.0.0/22"
   27  └   ]
   ..  
   39    }
────────────────────────────────────────────────────────────────────────────────
  Individual Causes
  - firewall.tf:15-39 (google_compute_firewall.this) 2 instances
────────────────────────────────────────────────────────────────────────────────
          ID google-compute-no-public-ingress
      Impact The port is exposed for ingress from the internet
  Resolution Set a more restrictive cidr range

  More Information
  - https://aquasecurity.github.io/tfsec/latest/checks/google/compute/no-public-ingress/
  - https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_firewall#source_ranges
  - https://www.terraform.io/docs/providers/google/r/compute_firewall.html
────────────────────────────────────────────────────────────────────────────────


  timings
  ──────────────────────────────────────────
  disk i/o             113.622µs
  parsing              699.69µs
  adaptation           97.371µs
  checks               4.992597ms
  total                5.90328ms

  counts
  ──────────────────────────────────────────
  modules downloaded   0
  modules processed    1
  blocks processed     15
  files read           7

  results
  ──────────────────────────────────────────
  passed               0
  ignored              0
  critical             2
  high                 0
  medium               0
  low                  0

  2 potential problem(s) detected.

Copy link

stale bot commented Oct 30, 2024

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Oct 30, 2024
@stale stale bot closed this Dec 20, 2024
@renovate renovate bot deleted the renovate/terraform-linters-tflint-ruleset-google-0.x branch December 20, 2024 19:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. size/xs Size XS
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant