Skip to content

remove secret_version from being TF managed #763

remove secret_version from being TF managed

remove secret_version from being TF managed #763

Workflow file for this run

name: Terraform Checks
on:
workflow_dispatch:
pull_request:
paths:
- 'terraform/**'
push:
branches:
- main
paths:
- 'terraform/**'
permissions:
contents: read
jobs:
terraform-fmt:
name: 'Terraform fmt'
runs-on: ubuntu-latest
steps:
- name: 'Checkout'
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v2.0.0
with:
# TODO: extract terraform from the tf file when we have pinned
terraform_version: 1.9.4
- name: Terraform fmt
id: fmt
run: terraform fmt -check -recursive -diff .
terraform-validate:
name: 'Terraform validate'
runs-on: ubuntu-latest
defaults:
run:
working-directory: ./terraform/gcp/modules/sigstore
steps:
- name: 'Checkout'
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v2.0.0
with:
# TODO: extract terraform from the tf file when we have pinned
terraform_version: 1.9.4
- name: Terraform init
id: init
run: terraform init
- name: Terraform validate
id: validate
run: terraform validate
terraform-tfsec:
name: 'Terraform tfsec'
runs-on: ubuntu-latest
permissions:
# required for all workflows
security-events: write
# only required for workflows in private repositories
actions: read
contents: read
steps:
- name: 'Checkout'
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: tfsec
uses: tfsec/tfsec-sarif-action@21ded20e8ca120cd9d3d6ab04ef746477542a608 # v0.1.0
with:
sarif_file: tfsec.sarif
working_directory: '.'
tfsec_args: --force-all-dirs --verbose
- name: Upload SARIF file
uses: github/codeql-action/upload-sarif@8214744c546c1e5c8f03dde8fab3a7353211988d # v3.26.7
with:
# Path to SARIF file relative to the root of the repository
sarif_file: tfsec.sarif