Skip to content

Bump hashicorp/aws from 5.68.0 to 5.69.0 in /src #35

Bump hashicorp/aws from 5.68.0 to 5.69.0 in /src

Bump hashicorp/aws from 5.68.0 to 5.69.0 in /src #35

Workflow file for this run

name: 'Terraform'
on:
push:
branches: [ "main" ]
pull_request:
permissions:
contents: read
jobs:
terraform:
name: 'Terraform'
runs-on: ubuntu-latest
environment: production
# Use the Bash shell regardless whether the GitHub Actions runner is ubuntu-latest, macos-latest, or windows-latest
defaults:
run:
shell: bash
working-directory: src
steps:
# Checkout the repository to the GitHub Actions runner
- name: Checkout
uses: actions/checkout@v3
# Install the latest version of Terraform CLI and configure the Terraform CLI configuration file
- name: Setup Terraform
uses: hashicorp/setup-terraform@v1
# Initialize a new or existing Terraform working directory by creating initial files, loading any remote state, downloading modules, etc.
- name: Terraform Init
run: terraform init
# Checks that all Terraform configuration files adhere to a canonical format
- name: Terraform Format
run: terraform fmt -check
# Setup, init and run TFLint linter
- uses: terraform-linters/setup-tflint@v3
name: Setup TFLint
- name: Init TFLint
run: tflint --init
- name: Run TFLint
run: tflint -f compact
# Generates an execution plan for Terraform
# - name: Terraform Plan
# run: terraform plan -input=false
# On push to "main", build or change infrastructure according to Terraform configuration files
# Note: It is recommended to set up a required "strict" status check in your repository for "Terraform Cloud". See the documentation on "strict" required status checks for more information: https://help.github.com/en/github/administering-a-repository/types-of-required-status-checks
# - name: Terraform Apply
# if: github.ref == 'refs/heads/"main"' && github.event_name == 'push'
# run: terraform apply -auto-approve -input=false