Skip to content

chore(deps): update step-security/harden-runner digest to f0db2aa #201

chore(deps): update step-security/harden-runner digest to f0db2aa

chore(deps): update step-security/harden-runner digest to f0db2aa #201

Workflow file for this run

name: Code Review
on: [pull_request]
jobs:
# -- LINT -------------------------------------------------------------------
tflint:
name: TFLint
runs-on: ubuntu-latest
env:
TF_VAR_tenancy_ocid: ${{secrets.OCI_TENANCY_OCID}}
TF_VAR_compartment_ocid: ${{secrets.OCI_COMPARTMENT_OCID}}
TF_VAR_user_ocid: ${{secrets.OCI_USER_OCID}}
TF_VAR_fingerprint: ${{secrets.OCI_FINGERPRINT}}
TF_VAR_private_key: ${{secrets.OCI_PRIVATE_KEY}}
TF_VAR_region: ${{secrets.OCI_REGION}}
TF_VAR_cf_api_token: ${{secrets.CLOUDFLARE_API_TOKEN}}
steps:
- name: Harden GitHub Actions Runner
uses: step-security/harden-runner@f0db2aa8a570959027d6be2a227028ad19fd9e8f
with:
egress-policy: audit
- name: Checkout
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744 # v3.6.0
- name: Setup Terraform
uses: hashicorp/setup-terraform@633666f66e0061ca3b725c73b2ec20cd13a8fdd1 # v2.0.3
# Run init to get module code to be able to use `--module`
- name: Terraform init
run: terraform init
working-directory: ./terraform
# Run TFLint
- name: Run TFlint with reviewdog output on the PR
uses: reviewdog/action-tflint@ed9fc532031da01c06455483e57ef4ba8573ad61 # v1.23.0
# -- SECURITY ---------------------------------------------------------------
tfsec:
name: TFSec
runs-on: ubuntu-latest
env:
TF_VAR_tenancy_ocid: ${{secrets.OCI_TENANCY_OCID}}
TF_VAR_compartment_ocid: ${{secrets.OCI_COMPARTMENT_OCID}}
TF_VAR_user_ocid: ${{secrets.OCI_USER_OCID}}
TF_VAR_fingerprint: ${{secrets.OCI_FINGERPRINT}}
TF_VAR_private_key: ${{secrets.OCI_PRIVATE_KEY}}
TF_VAR_region: ${{secrets.OCI_REGION}}
TF_VAR_cf_account_id: ${{secrets.CLOUDFLARE_ACCOUNT_ID}}
CLOUDFLARE_API_TOKEN: ${{secrets.CLOUDFLARE_API_TOKEN}}
steps:
- name: Harden GitHub Actions Runner
uses: step-security/harden-runner@f0db2aa8a570959027d6be2a227028ad19fd9e8f
with:
egress-policy: audit
- name: Checkout
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744 # v3.6.0
# Run TFSec
- name: Run TFsec with reviewdog output on the PR
uses: reviewdog/action-tfsec@ec137d566af7d9a7ec675e64b23cbc6ca9434bae # v1.27.0