Skip to content

fix(build): add granular grype-soft-fail for PR validation #470

fix(build): add granular grype-soft-fail for PR validation

fix(build): add granular grype-soft-fail for PR validation #470

Triggered via pull request April 1, 2026 15:35
Status Success
Total duration 16m 25s
Artifacts 11

pr-validation.yml

on: pull_request
Documentation Automation  /  🔍 Validate Frontmatter
1m 23s
Documentation Automation / 🔍 Validate Frontmatter
Dependency Scan
9s
Dependency Scan
Shell Lint  /  Shell Lint
22s
Shell Lint / Shell Lint
Terraform Lint  /  Terraform Lint
17s
Terraform Lint / Terraform Lint
Bicep Lint  /  Bicep Lint
9m 27s
Bicep Lint / Bicep Lint
Documentation Lint  /  Docs Lint
42s
Documentation Lint / Docs Lint
Code Quality Lint  /  Code Quality Lint
23s
Code Quality Lint / Code Quality Lint
PowerShell Lint  /  PowerShell Lint
46s
PowerShell Lint / PowerShell Lint
Security Scan  /  Security Scan
1m 37s
Security Scan / Security Scan
YAML Lint  /  YAML Lint
12s
YAML Lint / YAML Lint
Terraform Documentation Check  /  Terraform Documentation Compliance Check
25s
Terraform Documentation Check / Terraform Documentation Compliance Check
Bicep Documentation Check  /  Bicep Documentation Compliance Check
28s
Bicep Documentation Check / Bicep Documentation Compliance Check
AIO Version Check  /  Check AIO Component Versions
32s
AIO Version Check / Check AIO Component Versions
Rust Clippy Lint Check  /  Rust Clippy Lint Check
3m 1s
Rust Clippy Lint Check / Rust Clippy Lint Check
PowerShell Provider Tests  /  PowerShell Resource Provider Tests
15s
PowerShell Provider Tests / PowerShell Resource Provider Tests
Matrix: CodeQL Analysis
Documentation Automation  /  🔗 Validate Documentation Links
1m 18s
Documentation Automation / 🔗 Validate Documentation Links
Detect Matrix Changes  /  detect-changes
6s
Detect Matrix Changes / detect-changes
Detect Matrix Changes  /  map-outputs
3s
Detect Matrix Changes / map-outputs
Application Matrix Builds  /  parse-configuration
Application Matrix Builds / parse-configuration
Terraform Variable Compliance  /  Check Terraform Variable Consistency
14s
Terraform Variable Compliance / Check Terraform Variable Consistency
Matrix: Terraform Module Tests
Waiting for pending jobs
Application Matrix Builds  /  prepare-builds
Application Matrix Builds / prepare-builds
Matrix: Application Matrix Builds / build-applications
Waiting for pending jobs
Application Matrix Builds  /  summarize-builds
Application Matrix Builds / summarize-builds
Fit to window
Zoom out
Zoom in

Annotations

1 error and 25 warnings
Documentation Automation / 🔗 Validate Documentation Links
Process completed with exit code 123.
Code Quality Lint / Code Quality Lint
Code quality lint violations found (soft-fail enabled)
Dependency Scan
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/dependency-review-action@2031cfc080254a8a887f58cffee85186f0e49e48. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
CodeQL Analysis (python)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.
CodeQL Analysis (python)
2 issues were detected with this workflow: CodeQL language 'javascript' is referenced by more than one entry in the 'language' matrix parameter for job 'codeql-analysis'. This may result in duplicate alerts. Please edit the 'language' matrix parameter to keep only one of the following: 'javascript', 'typescript'. Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.
CodeQL Analysis (typescript)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.
CodeQL Analysis (typescript)
2 issues were detected with this workflow: CodeQL language 'javascript' is referenced by more than one entry in the 'language' matrix parameter for job 'codeql-analysis'. This may result in duplicate alerts. Please edit the 'language' matrix parameter to keep only one of the following: 'javascript', 'typescript'. Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.
CodeQL Analysis (javascript)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.
CodeQL Analysis (javascript)
2 issues were detected with this workflow: CodeQL language 'javascript' is referenced by more than one entry in the 'language' matrix parameter for job 'codeql-analysis'. This may result in duplicate alerts. Please edit the 'language' matrix parameter to keep only one of the following: 'javascript', 'typescript'. Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.
AIO Version Check / Check AIO Component Versions: ./src/100-edge/110-iot-ops/bicep/types.bicep#L0
AIO component version/train mismatch for azure-iot-operations in bicep file: ./src/100-edge/110-iot-ops/bicep/types.bicep
AIO Version Check / Check AIO Component Versions: ./src/100-edge/110-iot-ops/bicep/types.bicep#L0
AIO component version/train mismatch for secret_sync_controller in bicep file: ./src/100-edge/110-iot-ops/bicep/types.bicep
CodeQL Analysis (csharp)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.
CodeQL Analysis (csharp)
2 issues were detected with this workflow: CodeQL language 'javascript' is referenced by more than one entry in the 'language' matrix parameter for job 'codeql-analysis'. This may result in duplicate alerts. Please edit the 'language' matrix parameter to keep only one of the following: 'javascript', 'typescript'. Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.
Terraform Variable Compliance / Check Terraform Variable Consistency
No files were found with the provided path: **/terraform-docs-output*.json **/variable-compliance-results*.json. No artifacts will be uploaded.
Terraform Variable Compliance / Check Terraform Variable Consistency
"Additional node pools for the AKS cluster. Map key is used as the node pool name."
Terraform Variable Compliance / Check Terraform Variable Consistency
"Additional node pools for the AKS cluster; map key is used as the node pool name",
Terraform Variable Compliance / Check Terraform Variable Consistency
"Configuration for additional node pool subnets; map key is used as the node pool name",
Terraform Variable Compliance / Check Terraform Variable Consistency
"Additional node pools for the AKS cluster. Map key is used as the node pool name",
CodeQL Analysis (rust)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.
CodeQL Analysis (rust)
2 issues were detected with this workflow: CodeQL language 'javascript' is referenced by more than one entry in the 'language' matrix parameter for job 'codeql-analysis'. This may result in duplicate alerts. Please edit the 'language' matrix parameter to keep only one of the following: 'javascript', 'typescript'. Please specify an on.push hook to analyze and see code scanning alerts from the default branch on the Security tab.

Artifacts

Produced during runtime
Name Size Digest
bicep-lint-results-23856909515
217 Bytes
sha256:7b26bdcd8fe0686821ed60d8e8b009ef048a97621d226127cc285bcc1b7df5db
code-quality-lint-results
7.8 KB
sha256:5ed793a1fbd231584cfd9a539e4dcd13d523fae46acce247a870220c85ab5582
docs-lint-results-23856909515
537 Bytes
sha256:73535cbec61f7977b5f4c7a4f444f09095e4b87bbf1f9e951f78d3876152bf68
docs-validation-results-23856909515 Expired
714 Bytes
sha256:6cd6db6020b467eac73ca003d1daccc96f80c4da069feab7bb5c7a2a3a6eca7e
documentation-health-report
638 Bytes
sha256:6951d1d634d812aa53c2b69956e6f1accc2ccc4af590143cba20e9ef422e1221
pester-test-results
1.01 KB
sha256:1fdbafc497d44374285c6b3727148fa9560f83ca6641397681a2ab2525f65da5
powershell-lint-results
210 Bytes
sha256:0af50400b91be702229f41b22fca04197d342004d12dd0928cd7e961876aed55
security-scan-results
7.3 KB
sha256:075d9012770063da37f36310850413c19a3118ce910b54460e7258d13cc274e9
shell-lint-results
3.53 KB
sha256:148017ba9a90d9f49aec3b2773daa867255ee5e6ab6b056ff0b3cba1c8e12831
terraform-lint-results
1.95 KB
sha256:a32d870f205693854368d348382767ea048ce22cc39e5f5095196fdac2d5e8d1
yaml-lint-results
960 Bytes
sha256:2059a9fb0f3bc3192c6fbdeacc9789e6101ff11589c04c265f557cf567520310