Codiga has joined Datadog!

Read the Blog·

Interested in our Static Analysis?

Sign up
← All posts
Julien Delange Thursday, May 20, 2021

Checking Your Infastructure Code with Codiga

Share

AUTHOR

Julien Delange, Founder and CEO

Julien is the CEO of Codiga. Before starting Codiga, Julien was a software engineer at Twitter and Amazon Web Services.

Julien has a PhD in computer science from Universite Pierre et Marie Curie in Paris, France.

See all articles

How to check docker and terraform files using Codiga

Infrastructure work

Codiga vision is to help developers write better code faster. We initially integrated static analysis tools for the most popular programming languages such as Javascript, Java, C, C++, and more.

However, code is not only about the services you implement but also how you deploy them. In order to deploy our software, developers use shell scripts (already supported by Codiga) and configuration files written in different languages. Popular languages for such configuration files are the docker file format, used to build containers, and terraform, a declarative language that helps you deploy software.

Until now, these languages were not analyzed by Codiga. We are happy to announce that now, all users of Codiga can check docker and terraform files. Codiga checks good practices as well as security and safety issues in all your terraform and docker files. For example, for docker files, a warning is produced if the program is executed under the root user (a good practice is to specify a user within your docker file).

There is nothing for you to do to enable these new languages, they are enabled for everybody by default. If you do not want to use these additional rules, you can disable them in your project preferences.

We hope you enjoy these additional verifications and help you to catch any issues in the code that helps you manage your infrastructure.

Are you interested in Datadog Static Analysis?

Sign up