Skip to content

ci: adding GitHub Actions pipeline for Terraform, Ansible, and shell lint#8

Open
TrishaG189 wants to merge 3 commits intoc2siorg:mainfrom
TrishaG189:ci/github-actions-pipeline
Open

ci: adding GitHub Actions pipeline for Terraform, Ansible, and shell lint#8
TrishaG189 wants to merge 3 commits intoc2siorg:mainfrom
TrishaG189:ci/github-actions-pipeline

Conversation

@TrishaG189
Copy link
Copy Markdown

@TrishaG189 TrishaG189 commented Mar 18, 2026

Summary

Introduces a multi-job CI pipeline that runs automatically on every push and pull request targeting main. This ensures infrastructure code quality and security posture are validated before any merge.

What this adds

  • Terraform fmt + validate — catches formatting drift and syntax errors early
  • tflint — Terraform best-practice linting (unused vars, deprecated syntax, provider rules)
  • Checkov — static security analysis of Terraform configs (IAM policies, open security groups, unencrypted storage, etc.)
  • ansible-lint — enforces Ansible best practices across all playbooks
  • shellcheck — lints deployment shell scripts for common bugs and portability issues
  • Security gate job — a final aggregation job that only passes when all prior jobs succeed; this makes it easy to set as a required status check on branch protection rules

Why this matters

Right now there is no automated quality gate on the repository. As the honeynet scales to multi-region and multi-cloud, a single misconfigured security group or IAM role could expose the honeynet management plane. This pipeline catches those issues in code review before they reach cloud infrastructure.
(Note: Pipeline was made fault-tolerant to gracefully skip checks for directories that do not exist yet).
#9

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant