Bump bridgecrewio/checkov-action from 12.2539.0 to 12.2602.0 #401
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Plan | |
on: | |
push: | |
branches: ["main"] | |
tags-ignore: ["**"] | |
workflow_dispatch: | |
env: | |
TF_VAR_billing_account_id: ${{ secrets.BILLING_ACCOUNT_ID }} | |
TF_VAR_seed_sa_email: ${{ secrets.SEED_SA_EMAIL_ADDRESS }} | |
TF_VAR_github_admin_token: ${{ secrets.ADMIN_GITHUB_TOKEN }} | |
TF_VAR_github_api_label_token: ${{ secrets.GH_TOKEN_FOR_LABELING }} | |
TF_VAR_project_postfix: ${{ secrets.GCP_PROJECT_POSTFIX }} | |
TF_VAR_workload_identity_provider_name: ${{ secrets.WORKLOAD_IDENTITY_PROVIDER }} | |
TF_VAR_workload_identity_pool_id: ${{ secrets.WORKLOAD_IDENTITY_POOL_ID }} | |
TF_VAR_codacy_api_token: ${{ secrets.CODACY_API_TOKEN }} | |
TF_VAR_docker_registry_username: ${{ secrets.DOCKER_REGISTRY_USERNAME }} | |
TF_VAR_docker_registry_token: ${{ secrets.DOCKER_REGISTRY_TOKEN }} | |
TF_IN_AUTOMATION: true | |
TF_INPUT: false | |
GITHUB_TOKEN: ${{ secrets.ADMIN_GITHUB_TOKEN }} | |
CLOUDSDK_CORE_PROJECT: ${{ secrets.GCP_PROJECT_ID }} | |
permissions: | |
id-token: write | |
jobs: | |
compliance-scan: | |
runs-on: ubuntu-20.04 | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v4 | |
- name: Run Checkov action | |
id: checkov | |
uses: bridgecrewio/[email protected] | |
with: | |
framework: terraform | |
# we are fine with Google's Keys | |
# we are fine with basic roles (no org), we are fine with our own module | |
skip_check: CKV_GCP_84,CKV_GIT_4,CKV_GCP_117,CKV_TF_1 | |
output_format: cli | |
download_external_modules: true | |
security-scan: | |
runs-on: ubuntu-20.04 | |
steps: | |
- uses: actions/checkout@v4 | |
- run: docker run -v ${PWD}:/src aquasec/tfsec:v1.8 /src | |
lint: | |
runs-on: ubuntu-20.04 | |
steps: | |
- uses: actions/checkout@v4 | |
- uses: terraform-linters/setup-tflint@v4 | |
name: Setting up TFLint | |
with: | |
tflint_version: v0.29.0 | |
- name: Initializing TFLint | |
run: tflint --init | |
- name: Linting | |
run: tflint -f compact --disable-rule=terraform_module_pinned_source | |
qa: | |
runs-on: ubuntu-20.04 | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v4 | |
- name: Authenticating | |
uses: google-github-actions/[email protected] | |
with: | |
workload_identity_provider: ${{ secrets.WORKLOAD_IDENTITY_PROVIDER }} | |
service_account: ${{ secrets.SEED_SA_EMAIL_ADDRESS }} | |
- name: Setting up GCP environment | |
uses: google-github-actions/[email protected] | |
- run: gcloud projects list | |
- name: Setup Terraform | |
uses: hashicorp/setup-terraform@v2 | |
- name: Terraform Init | |
run: terraform init -backend-config="bucket=${{ secrets.TERRAFORM_STATE_BUCKET }}" | |
- name: Terraform Format | |
run: terraform fmt -check -recursive | |
- name: Terraform Validate | |
run: terraform validate -no-color | |
plan: | |
runs-on: ubuntu-20.04 | |
needs: | |
- qa | |
- lint | |
- security-scan | |
- compliance-scan | |
steps: | |
- name: Checkout | |
uses: actions/checkout@v4 | |
- name: Authenticating | |
uses: google-github-actions/[email protected] | |
with: | |
workload_identity_provider: ${{ secrets.WORKLOAD_IDENTITY_PROVIDER }} | |
service_account: ${{ secrets.SEED_SA_EMAIL_ADDRESS }} | |
- name: Setting up GCP environment | |
uses: google-github-actions/[email protected] | |
- name: Setup Terraform | |
uses: hashicorp/setup-terraform@v2 | |
- name: Init | |
run: terraform init -backend-config="bucket=${{ secrets.TERRAFORM_STATE_BUCKET }}" | |
- name: Plan | |
run: terraform plan -no-color |