Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .idea/.name

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

6 changes: 6 additions & 0 deletions .idea/misc.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

8 changes: 8 additions & 0 deletions .idea/modules.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

9 changes: 9 additions & 0 deletions .idea/starter-workflows.iml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

6 changes: 6 additions & 0 deletions .idea/vcs.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

55 changes: 55 additions & 0 deletions .idea/workspace.xml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

58 changes: 58 additions & 0 deletions code-scanning/checkov.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# Checkov is a static code analysis tool for infrastructure as code (IaC).
# It scans Terraform, CloudFormation, Kubernetes, Helm, ARM templates,
# Bicep, Dockerfiles, and more for security and compliance misconfigurations.
#
# Documentation: https://www.checkov.io/
# Getting started: https://www.checkov.io/1.Welcome/Quick%20Start.html

name: Checkov

on:
push:
branches: [ $default-branch, $protected-branches ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ $default-branch ]
schedule:
- cron: $cron-weekly

permissions:
contents: read

jobs:
checkov:
name: Scan
runs-on: ubuntu-latest
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status

steps:
- name: Checkout repository
uses: actions/checkout@v4

- name: Run Checkov
uses: bridgecrewio/checkov-action@4048c972aae68d0b983a48bb3479aab2d877b898
with:
# Scan the entire repository. Narrow this down to a specific
# directory if your IaC files live in a subdirectory, e.g.:
# directory: terraform/
directory: .
# Emit results in SARIF format for upload to the Security tab.
output_format: sarif
output_file_path: checkov-results.sarif
# Prevent the step from failing the workflow so that SARIF results
# are always uploaded, even when issues are found.
soft_fail: true

- name: Upload Checkov scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
if: always()
with:
sarif_file: checkov-results.sarif
7 changes: 7 additions & 0 deletions code-scanning/properties/checkov.properties.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
{
"name": "Checkov",
"creator": "Bridgecrew",
"description": "Scan infrastructure as code (Terraform, CloudFormation, Kubernetes, Helm, Dockerfiles, and more) for security and compliance misconfigurations.",
"iconName": "checkov",
"categories": ["Code Scanning", "terraform", "kubernetes", "dockerfile", "cloudformation", "helm"]
}
Loading