Skip to content

Bump bridgecrewio/checkov-action from 12.3014.0 to 12.3032.0 #494

Bump bridgecrewio/checkov-action from 12.3014.0 to 12.3032.0

Bump bridgecrewio/checkov-action from 12.3014.0 to 12.3032.0 #494

Workflow file for this run

name: 'Terraform Unit Tests'
on:
push:
permissions:
contents: read
jobs:
terraform-unit-tests:
name: 'Terraform Unit Tests'
runs-on: ubuntu-latest
permissions:
security-events: write
contents: read
actions: read
steps:
# Checkout the repository to the GitHub Actions runner
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0
with:
egress-policy: audit
- name: Checkout
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
# Install the latest version of Terraform CLI and configure the Terraform CLI configuration file with a Terraform Cloud user API token
- name: Setup Terraform
uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd # v3.1.2
# Initialize a new or existing Terraform working directory by creating initial files, loading any remote state, downloading modules, etc.
- name: Terraform Init
run: terraform init -backend=false
# Validate terraform files
- name: Terraform Validate
run: terraform validate
# Checks that all Terraform configuration files adhere to a canonical format
- name: Terraform Format
run: terraform fmt -recursive
# Perform a security scan of the terraform code using checkov
- name: Run Checkov action
id: checkov
uses: bridgecrewio/checkov-action@a56708f128cd2585d16f86fc984698f09f18e6d6 # master
with:
framework: terraform
# Upload results to GitHub Advanced Security
- name: Upload SARIF file
if: success() || failure()
uses: github/codeql-action/upload-sarif@60168efe1c415ce0f5521ea06d5c2062adbeed1b # v3.28.17
with:
sarif_file: results.sarif
category: checkov