-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add verify prod and refactor terraform check/deploy #197
Conversation
e2d6e26
to
3416d96
Compare
cfbf9d6
to
2fd0254
Compare
there is a couple of permission denied for the pull request service account
https://github.com/octo-sts/app/actions/runs/8469299780/job/23204323113?pr=197 |
I think that what we want is probably just to exclude readonly operations that happen as part of |
ref: #197 Signed-off-by: Matt Moore <[email protected]>
664341d
to
3121d67
Compare
Terraform checks for "./iac" Terraform Format and Style 🖌
|
This needs: chainguard-dev/terraform-infra-common#241 to avoid alerting. |
@mattmoor ready to go |
c051a06
to
21092cf
Compare
id: validate | ||
run: terraform validate -no-color | ||
|
||
- name: Terraform Plan |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you know of anything that we can run over this to check for injection vulnerabilities?
Skimming, the only one that stood out is inputs.working_directory
, and that's a reach, but would be good to sanity check things
I'm going to merge this, so that we can start using it (probably would have avoided mild outage yesterday). I'd love an answer for the shell check issue. |
Fixes #54
Need #196