[Resourcely Instance] Patrick test - Pineapple #32
resourcelybotdev / Resourcely Guardrails
required action
Nov 5, 2024 in 1m 18s
Guardrails checks: 1 violation(s)
Resourcely Guardrails violation(s) detected
Details
These changes violate your organization's guardrails. Either address the violations or get the PR approved by: patrick-siewe-resourcely
Warnings
⚠️ [IUHRHJ] Unable to determine whether the PR touches a Terraform config root defined in .resourcely.yaml: [VIUSHR] The repository scan is not yet available or no .resourcely.yaml file was found during the last scan of this repo - https://github.com/RoxKilly/scaffolding-github-actions
❗ Plan: (unknown config root)
[Storage] Cloud Storage Logging Required
Google Cloud Storage should have logging enabled
Guardrail details | |
---|---|
id | 4cb84c66-d432-4c29-b7b4-14b66ac12b83 |
Category | Best Practices |
Contact | Secops |
Status | Active |
Resourcely policy definition
GUARDRAIL "[Storage] GCP Cloud Storage Logging Required"
WHEN google_storage_bucket
REQUIRE logging
The following requirement...
bucket STARTSWITH "foo-clone-edit"
...was failed by resource(s):
aws_s3_bucket.resourcely_patrick_xfvxybJnMRN2NEYi.bucket
Plan: unknown/path
None of your guardrails applies to the Terraform changes in this plan.
Resourcely Guardrail Evaluation Report for commit hash 9c0e752e24d4e5b6983e5891875d5875aea3179f
from https://github.com/RoxKilly/scaffolding-github-actions/pull/32
Annotations
Check warning on line 2 in patrick.tf
resourcelybotdev / Resourcely Guardrails
Resourcely Guardrail
[Storage] Cloud Storage Logging Required
Requires: bucket STARTSWITH "foo-clone-edit"
Category: Best Practices
Contact: Secops
> unknown config root (unknown env)
Loading