File tree Expand file tree Collapse file tree 4 files changed +37
-29
lines changed Expand file tree Collapse file tree 4 files changed +37
-29
lines changed Original file line number Diff line number Diff line change 1+ name : lint
2+
3+ on :
4+ push :
5+ branches :
6+ - master
7+ pull_request :
8+ branches :
9+ - master
10+
11+ jobs :
12+ checks :
13+ runs-on : ubuntu-latest
14+ steps :
15+ - name : Checkout
16+ uses : actions/checkout@v4
17+ - name : Set up Go
18+ uses : actions/setup-go@v5
19+ with :
20+ go-version-file : ' go.mod'
21+ - name : Run linters
22+ run : |
23+ export PATH=$PATH:$(go env GOPATH)/bin
24+ make tools lint
Original file line number Diff line number Diff line change @@ -18,24 +18,21 @@ jobs:
1818 steps :
1919 - name : Checkout
2020 uses : actions/checkout@v4
21+ with :
22+ fetch-depth : 0
2123 - name : Set up Go
2224 uses : actions/setup-go@v5
2325 with :
2426 go-version-file : ' go.mod'
25- - name : Import GPG key
26- id : import_gpg
27- uses : crazy-max/ghaction-import-gpg@v6
28- with :
29- gpg_private_key : ${{ secrets.GPG_PRIVATE_KEY }}
30- passphrase : ${{ secrets.PASSPHRASE }}
27+ - name : Install Cosign
28+ uses : sigstore/cosign-installer@v3
3129 - name : Run GoReleaser
3230 uses : goreleaser/goreleaser-action@v6
3331 with :
34- version : latest
32+ version : v1.12.3
3533 args : release --rm-dist
3634 env :
3735 GITHUB_TOKEN : ${{ secrets.GITHUB_TOKEN }}
38- GPG_FINGERPRINT : ${{ steps.import_gpg.outputs.fingerprint }}
3936 - uses : actions/attest-build-provenance@v1
4037 with :
41- subject-path : ' dist/checksums.txt'
38+ subject-path : ' dist/checksums.txt'
Original file line number Diff line number Diff line change @@ -13,19 +13,11 @@ This is a repository for an azurerm tflint rule set to enforce security best pr
1313You can install the plugin with ` tflint --init ` . Declare a config in ` .tflint.hcl ` as follows:
1414
1515``` hcl
16- plugin "template " {
16+ plugin "azurerm-security " {
1717 enabled = true
1818
19- version = "0.1.0 "
19+ version = "0.1.2 "
2020 source = "github.com/pregress/tflint-ruleset-azurerm-security"
21-
22- signing_key = <<-KEY
23- -----BEGIN PGP PUBLIC KEY BLOCK-----
24- mQINBGCqS2YBEADJ7gHktSV5NgUe08hD/uWWPwY07d5WZ1+F9I9SoiK/mtcNGz4P
25- JLrYAIUTMBvrxk3I+kuwhp7MCk7CD/tRVkPRIklONgtKsp8jCke7FB3PuFlP/ptL
26- SlbaXx53FCZSOzCJo9puZajVWydoGfnZi5apddd11Zw1FuJma3YElHZ1A1D2YvrF
27- ...
28- KEY
2921}
3022```
3123
@@ -54,13 +46,8 @@ You can easily install the built plugin with the following:
5446$ make install
5547```
5648
57- You can run the built plugin like the following :
49+ Note that if you install the plugin with make install, you must omit the version and source attributes in .tflint.hcl :
5850
59- ```
60- $ cat << EOS > .tflint.hcl
61- plugin "template" {
62- enabled = true
63- }
64- EOS
65- $ tflint
66- ```
51+ plugin "azurerm-security" {
52+ enabled = true
53+ }
Original file line number Diff line number Diff line change @@ -10,7 +10,7 @@ func main() {
1010 plugin .Serve (& plugin.ServeOpts {
1111 RuleSet : & tflint.BuiltinRuleSet {
1212 Name : "azurerm-security" ,
13- Version : "0.1.1 " ,
13+ Version : "0.1.2 " ,
1414 Rules : []tflint.Rule {
1515 rules .NewAzurermLinuxWebAppFtpsState (),
1616 rules .NewAzurermLinuxWebAppMinimumTlsVersion (),
You can’t perform that action at this time.
0 commit comments