Skip to content

enable os patch runs nightly for bastion images #709

enable os patch runs nightly for bastion images

enable os patch runs nightly for bastion images #709

Workflow file for this run

name: Terraform Checks
on:
workflow_dispatch:
pull_request:
paths:
- 'terraform/**'
push:
branches:
- main
paths:
- 'terraform/**'
permissions:
contents: read
jobs:
terraform-fmt:
name: 'Terraform fmt'
runs-on: ubuntu-latest
steps:
- name: 'Checkout'
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8 # v2.0.0
with:
# TODO: extract terraform from the tf file when we have pinned
terraform_version: 1.8.5
- name: Terraform fmt
id: fmt
run: terraform fmt -check -recursive -diff .
terraform-validate:
name: 'Terraform validate'
runs-on: ubuntu-latest
defaults:
run:
working-directory: ./terraform/gcp/modules/sigstore
steps:
- name: 'Checkout'
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8 # v2.0.0
with:
# TODO: extract terraform from the tf file when we have pinned
terraform_version: 1.8.5
- name: Terraform init
id: init
run: terraform init
- name: Terraform validate
id: validate
run: terraform validate
terraform-tfsec:
name: 'Terraform tfsec'
runs-on: ubuntu-latest
permissions:
# required for all workflows
security-events: write
# only required for workflows in private repositories
actions: read
contents: read
steps:
- name: 'Checkout'
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: tfsec
uses: tfsec/tfsec-sarif-action@21ded20e8ca120cd9d3d6ab04ef746477542a608 # v0.1.0
with:
sarif_file: tfsec.sarif
working_directory: '.'
tfsec_args: --force-all-dirs --verbose
- name: Upload SARIF file
uses: github/codeql-action/upload-sarif@b611370bb5703a7efb587f9d136a52ea24c5c38c # v3.25.11
with:
# Path to SARIF file relative to the root of the repository
sarif_file: tfsec.sarif