cli
tflint-ruleset-terraform
cli | tflint-ruleset-terraform | |
---|---|---|
7 | 2 | |
1,326 | 48 | |
0.6% | - | |
5.3 | 7.6 | |
about 1 month ago | 6 days ago | |
Python | Go | |
MIT License | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cli
- terraform-compliance
-
Looking for a tool to enforce policies on terraform files names/content
You could also look at terraform compliance
- Alternative to Terraform Sentinel
-
tf-free: A project to create free resources on all cloud-providers
+1 for tfsec. Another cool tool is terraform-compliance, although I can't say I've used it recently so I'm not sure how it compares to tfsec.
-
Azure terraform-compliance examples?
If you mean this https://terraform-compliance.com/#supporting--requirements then yes, it doesn't support modules if you use Terraform 0.11.x (or lower).
-
Terraforming in 2021 – new features, testing and compliance
A direct open source comparable alternative would be using terraform-compliance. It follows BDD directives so that you can specify in an easy human readable way your expectations, using:
tflint-ruleset-terraform
-
Looking for a tool to enforce policies on terraform files names/content
It’s got a few included rulesets that can be used to enforce things like what you describe.
-
Help with tf file re-use
2 issue(s) found: Warning: terraform "required_version" attribute is required (terraform_required_version) on line 0: (source code not available) Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.1.1/docs/rules/terraform_required_version.md Warning: Missing version constraint for provider "aws" in "required_providers" (terraform_required_providers) on mytffile.tf line 56: 56: resource "aws_acm_certificate_validation" "myorg_dev_cert_validation" { Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.1.1/docs/rules/terraform_required_providers.md
What are some alternatives?
tfsec - Security scanner for your Terraform code
tflint - A Pluggable Terraform Linter
terratest - Terratest is a Go library that makes it easier to write automated tests for your infrastructure code.
tflint-ruleset-aws - TFLint ruleset for terraform-provider-aws
tfsec - Security scanner for your Terraform code [Moved to: https://github.com/aquasecurity/tfsec]
terraform - Terraform enables you to safely and predictably create, change, and improve infrastructure. It is a source-available tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.
checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
conftest - Write tests against structured configuration data using the Open Policy Agent Rego query language
awspec - RSpec tests for your AWS resources.
compliance-trestle - An opinionated tooling platform for managing compliance as code, using continuous integration and NIST's OSCAL standard.