You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -103,47 +101,8 @@ To run mypy on a specific file, follow the pattern `mypy <path_to_file>/<name_of
103
101
Example:
104
102
```shell
105
103
mypy src/writer_kafka.py
106
-
```
107
-
108
-
## Run TFLint Tool Locally
109
-
110
-
This project uses the [TFLint](https://github.com/terraform-linters/tflint) tool for static analysis of Terraform code.
111
-
We are forcing to eliminate **all** errors reported by TFLint. Any detected warnings and notices should be corrected as well as a best practice.
112
-
113
-
- Find possible errors (like invalid instance types) for Major Cloud providers (AWS/Azure/GCP).
114
-
- Warn about deprecated syntax, unused declarations.
115
-
- Enforce best practices, naming conventions.
116
-
117
-
> For installation instructions, please refer to the [following link.](https://github.com/terraform-linters/tflint)
118
-
119
-
### Run TFLint
120
-
121
-
For running TFLint you need to be in the `terraform/` directory. From the root file run the following commands:
122
-
```shell
123
-
cd terraform
124
-
tflint --init
125
-
tflint
126
-
cd ..
127
104
```
128
105
129
-
## Run Trivy Tool Locally
130
-
131
-
This project uses the [Trivy](https://trivy.dev/latest/) tool to scan changes for security issues and misconfigurations.
132
-
It is an open‑source security scanner maintained by Aqua Security (AquaSec).
133
-
134
-
> For installation instructions, please refer to the [following link.](https://trivy.dev/latest/getting-started/installation/)
135
-
136
-
### Run Trivy
137
-
138
-
For running Trivy tool locally you can execute one of following commands from the root file:
139
-
```shell
140
-
trivy fs . --scanners vuln,secret,misconfig,license > trivy_scan.txt # Scan the whole project with all available scans (all severities for the whole project)
141
-
trivy fs --severity MEDIUM,HIGH,CRITICAL terraform/ > trivy_scan.txt # Show only selected severities for terraform files
142
-
trivy config Dockerfile > trivy_scan.txt # Scan only Dockerfile
143
-
```
144
-
145
-
You can see the scan results in the `trivy_scan.txt` file located in the root directory.
146
-
147
106
## Running Unit Test
148
107
149
108
Unit tests are written using pytest. To run the tests, use the following command:
0 commit comments