Conversation
| id: delete_artefacts | ||
| shell: bash | ||
| run: | | ||
| export WORKSPACE=${{inputs.workspace}} |
Check failure
Code scanning / SonarCloud
GitHub Actions should not be vulnerable to script injections High
| shell: bash | ||
| run: | | ||
| export WORKSPACE=${{inputs.workspace}} | ||
| export ARTEFACT_BUCKET_NAME=${{inputs.artefact_bucket_name}} |
Check failure
Code scanning / SonarCloud
GitHub Actions should not be vulnerable to script injections High
| id: delete_tf_state | ||
| shell: bash | ||
| run: | | ||
| export WORKSPACE=${{inputs.workspace}} |
Check failure
Code scanning / SonarCloud
GitHub Actions should not be vulnerable to script injections High
| shell: bash | ||
| run: | | ||
| export WORKSPACE=${{inputs.workspace}} | ||
| export ENVIRONMENT=${{inputs.environment}} |
Check failure
Code scanning / SonarCloud
GitHub Actions should not be vulnerable to script injections High
| export TRIGGER=${{ github.ref_type }} | ||
| export TRIGGER_ACTION=${{ github.event_name }} | ||
| export TRIGGER_REFERENCE=${{ github.ref_name }} | ||
| export TRIGGER_HEAD_REFERENCE=${{ github.head_ref }} |
Check failure
Code scanning / SonarCloud
GitHub Actions should not be vulnerable to script injections High
| echo "working_directory=services/${{ inputs.name }}" >> $GITHUB_OUTPUT | ||
| echo "build_directory=build/services/${{ inputs.name }}" >> $GITHUB_OUTPUT | ||
| elif [[ "${{ inputs.build_type }}" == "package" ]]; then | ||
| echo "working_directory=application/packages/${{ inputs.name }}" >> $GITHUB_OUTPUT |
Check failure
Code scanning / SonarCloud
GitHub Actions should not be vulnerable to script injections High
| echo "build_directory=build/services/${{ inputs.name }}" >> $GITHUB_OUTPUT | ||
| elif [[ "${{ inputs.build_type }}" == "package" ]]; then | ||
| echo "working_directory=application/packages/${{ inputs.name }}" >> $GITHUB_OUTPUT | ||
| echo "build_directory=build/packages/${{ inputs.name }}" >> $GITHUB_OUTPUT |
Check failure
Code scanning / SonarCloud
GitHub Actions should not be vulnerable to script injections High
| echo "working_directory=application/packages/${{ inputs.name }}" >> $GITHUB_OUTPUT | ||
| echo "build_directory=build/packages/${{ inputs.name }}" >> $GITHUB_OUTPUT | ||
| else | ||
| echo "Invalid build type: ${{ inputs.build_type }}" |
Check failure
Code scanning / SonarCloud
GitHub Actions should not be vulnerable to script injections High
| name: Cleardown Infrastructure | ||
|
|
||
| permissions: | ||
| id-token: write |
Check notice
Code scanning / SonarCloud
Write permissions should be defined at the job level Low
|
|
||
| permissions: | ||
| id-token: write | ||
| contents: read |
Check notice
Code scanning / SonarCloud
Read permissions should be defined at the job level Low
b7ab804 to
eb543db
Compare
|




Description
Context
Type of changes
Checklist
Sensitive Information Declaration
To ensure the utmost confidentiality and protect your and others privacy, we kindly ask you to NOT including PII (Personal Identifiable Information) / PID (Personal Identifiable Data) or any other sensitive data in this PR (Pull Request) and the codebase changes. We will remove any PR that do contain any sensitive information. We really appreciate your cooperation in this matter.