All Projects → antonbabenko → Pre Commit Terraform

antonbabenko / Pre Commit Terraform

Licence: mit
pre-commit git hooks to take care of Terraform configurations

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Pre Commit Terraform

Tensor
Tensor - Comprehensive web-based automation framework and Centralized infrastructure management platform
Stars: ✭ 136 (-84.92%)
Mutual labels:  automation, terraform
husky-elixir
🐶 Git hooks made easy
Stars: ✭ 47 (-94.79%)
Mutual labels:  hooks, git-hooks
Terrahub
Terraform Automation and Orchestration Tool (Open Source)
Stars: ✭ 148 (-83.59%)
Mutual labels:  automation, terraform
Terraform
Terraform automation for Cloud
Stars: ✭ 121 (-86.59%)
Mutual labels:  automation, terraform
Release It
🚀 Automate versioning and package publishing
Stars: ✭ 4,773 (+429.16%)
Mutual labels:  automation, hooks
Terraform Aws Spotgpu
Fully automated provisioning of AWS EC2 Spot Instances for Deep Learning workloads using Terraform.
Stars: ✭ 127 (-85.92%)
Mutual labels:  automation, terraform
Pywinauto
Windows GUI Automation with Python (based on text properties)
Stars: ✭ 3,175 (+252%)
Mutual labels:  automation, hooks
Infra Personal
Terraform for setting up my personal infrastructure
Stars: ✭ 45 (-95.01%)
Mutual labels:  automation, terraform
Provisioning
Kubernetes cluster provisioning using Terraform.
Stars: ✭ 277 (-69.29%)
Mutual labels:  automation, terraform
Electriceye
Continuously monitor your AWS services for configurations that can lead to degradation of confidentiality, integrity or availability. All results will be sent to Security Hub for further aggregation and analysis.
Stars: ✭ 255 (-71.73%)
Mutual labels:  automation, terraform
Terraform Import Github Organization
Script to fully automate Terraform import of Github Org (teams, users, and repos)
Stars: ✭ 95 (-89.47%)
Mutual labels:  automation, terraform
Awesome Git Hooks
⚓️ A curated list of awesome git hooks
Stars: ✭ 661 (-26.72%)
Mutual labels:  automation, hooks
Terraform
Terraform - Beginners | Intermediate | Advanced
Stars: ✭ 77 (-91.46%)
Mutual labels:  automation, terraform
Git Clone Init
Automatic setup of user identity (user.email / user.name) on git clone
Stars: ✭ 130 (-85.59%)
Mutual labels:  automation, git-hooks
Terraform Provider Aiven
Terraform Aiven provider
Stars: ✭ 68 (-92.46%)
Mutual labels:  automation, terraform
Terrible
An Ansible playbook that apply the principle of the Infrastructure as Code on a QEMU/KVM environment.
Stars: ✭ 161 (-82.15%)
Mutual labels:  automation, terraform
Pivotal Flow
Automate your pivotal workflow
Stars: ✭ 29 (-96.78%)
Mutual labels:  automation, git-hooks
Ebs bckup
Stars: ✭ 32 (-96.45%)
Mutual labels:  automation, terraform
rusty-hook
git hook manager, geared toward Rust projects
Stars: ✭ 93 (-89.69%)
Mutual labels:  hooks, git-hooks
Guide
Kubernetes clusters for the hobbyist.
Stars: ✭ 5,150 (+470.95%)
Mutual labels:  automation, terraform

Collection of git hooks for Terraform to be used with pre-commit framework

Github tag Help Contribute to Open Source

How to install

1. Install dependencies

  • pre-commit
  • terraform-docs required for terraform_docs hooks. GNU awk is required if using terraform-docs older than 0.8.0 with Terraform 0.12.
  • TFLint required for terraform_tflint hook.
  • TFSec required for terraform_tfsec hook.
  • coreutils required for terraform_validate hook on macOS (due to use of realpath).
  • checkov required for checkov hook.

or build and use the Docker image locally as mentioned below in the Run section.

MacOS
brew install pre-commit gawk terraform-docs tflint tfsec coreutils checkov
Ubuntu 18.04
sudo apt update
sudo apt install -y gawk unzip software-properties-common
sudo add-apt-repository ppa:deadsnakes/ppa
sudo apt install -y python3.7 python3-pip
pip3 install pre-commit
curl -L "$(curl -s https://api.github.com/repos/terraform-docs/terraform-docs/releases/latest | grep -o -E "https://.+?-linux-amd64.tar.gz")" > terraform-docs.tgz && tar xzf terraform-docs.tgz && chmod +x terraform-docs && sudo mv terraform-docs /usr/bin/
curl -L "$(curl -s https://api.github.com/repos/terraform-linters/tflint/releases/latest | grep -o -E "https://.+?_linux_amd64.zip")" > tflint.zip && unzip tflint.zip && rm tflint.zip && sudo mv tflint /usr/bin/
env GO111MODULE=on go get -u github.com/tfsec/tfsec/cmd/tfsec
python3.7 -m pip install -U checkovpython3.7 -m pip install -U checkov

2. Install the pre-commit hook globally

Note: not needed if you use the Docker image

DIR=~/.git-template
git config --global init.templateDir ${DIR}
pre-commit init-templatedir -t pre-commit ${DIR}

3. Add configs and hooks

Step into the repository you want to have the pre-commit hooks installed and run:

git init
cat <<EOF > .pre-commit-config.yaml
repos:
- repo: git://github.com/antonbabenko/pre-commit-terraform
  rev: <VERSION> # Get the latest from: https://github.com/antonbabenko/pre-commit-terraform/releases
  hooks:
    - id: terraform_fmt
    - id: terraform_docs
EOF

4. Run

After pre-commit hook has been installed you can run it manually on all files in the repository

pre-commit run -a

or you can also build and use the provided Docker container, which wraps all dependencies by

# first building it
docker build -t pre-commit .
# and then running it in the folder 
# with the terraform code you want to check by executing
docker run -v $(pwd):/lint -w /lint pre-commit run -a 

Available Hooks

There are several pre-commit hooks to keep Terraform configurations (both *.tf and *.tfvars) and Terragrunt configurations (*.hcl) in a good shape:

Hook name Description
terraform_fmt Rewrites all Terraform configuration files to a canonical format.
terraform_validate Validates all Terraform configuration files.
terraform_docs Inserts input and output documentation into README.md. Recommended.
terraform_docs_without_aggregate_type_defaults Inserts input and output documentation into README.md without aggregate type defaults.
terraform_docs_replace Runs terraform-docs and pipes the output directly to README.md (requires terraform-docs v0.10.0 or later)
terraform_tflint Validates all Terraform configuration files with TFLint.
terragrunt_fmt Rewrites all Terragrunt configuration files (*.hcl) to a canonical format.
terragrunt_validate Validates all Terragrunt configuration files (*.hcl)
terraform_tfsec TFSec static analysis of terraform templates to spot potential security issues.
checkov checkov static analysis of terraform templates to spot potential security issues.

Check the source file to know arguments used for each hook.

Notes about terraform_docs hooks

  1. terraform_docs and terraform_docs_without_aggregate_type_defaults will insert/update documentation generated by terraform-docs framed by markers:
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->

<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->

if they are present in README.md.

  1. terraform_docs_replace replaces the entire README.md rather than doing string replacement between markers. Put your additional documentation at the top of your main.tf for it to be pulled in. The optional --dest argument lets you change the name of the file that gets created/modified. This hook requires terraform-docs v0.10.0 or later.

    1. Example:
    hooks:
      - id: terraform_docs_replace
        args: ['--sort-by-required', '--dest=TEST.md']
    
  2. It is possible to pass additional arguments to shell scripts when using terraform_docs and terraform_docs_without_aggregate_type_defaults. Send pull-request with the new hook if there is something missing.

Notes about terraform_tflint hooks

  1. terraform_tflint supports custom arguments so you can enable module inspection, deep check mode etc.

    1. Example:
    hooks:
      - id: terraform_tflint
        args: ['--args=--deep']
    

    In order to pass multiple args, try the following:

     - id: terraform_tflint
       args:
          - '--args=--deep'
          - '--args=--enable-rule=terraform_documented_variables'
    
  2. When you have multiple directories and want to run tflint in all of them and share single config file it is impractical to hard-code the path to .tflint.hcl file. The solution is to use __GIT_WORKING_DIR__ placeholder which will be replaced by terraform_tflint hooks with Git working directory (repo root) at run time. For example:

    hooks:
      - id: terraform_tflint
        args:
          - '--args=--config=__GIT_WORKING_DIR__/.tflint.hcl'
    

Notes about terraform_tfsec hooks

  1. terraform_tfsec will consume modified files that pre-commit passes to it, so you can perform whitelisting of directories or files to run against via files pre-commit flag

    1. Example:
    hooks:
      - id: terraform_tfsec
        files: ^prd-infra/
    

    The above will tell pre-commit to pass down files from the prd-infra/ folder only such that the underlying tfsec tool can run against changed files in this directory, ignoring any other folders at the root level

  2. To ignore specific warnings, follow the convention from the documentation.

    1. Example:
    resource "aws_security_group_rule" "my-rule" {
        type = "ingress"
        cidr_blocks = ["0.0.0.0/0"] #tfsec:ignore:AWS006
    }
    

Notes about terraform_validate hooks

  1. terraform_validate supports custom arguments so you can pass supported no-color or json flags.

    1. Example:
    hooks:
      - id: terraform_validate
        args: ['--args=-json']
    

    In order to pass multiple args, try the following:

     - id: terraform_validate
       args:
          - '--args=-json'
          - '--args=-no-color'
    
  2. terraform_validate also supports custom environment variables passed to the pre-commit runtime

    1. Example:
    hooks:
      - id: terraform_validate
        args: ['--envs=AWS_DEFAULT_REGION="us-west-2"']
    

    In order to pass multiple args, try the following:

     - id: terraform_validate
       args:
          - '--envs=AWS_DEFAULT_REGION="us-west-2"'
          - '--envs=AWS_ACCESS_KEY_ID="anaccesskey"'
          - '--envs=AWS_SECRET_ACCESS_KEY="asecretkey"'
    
  3. It may happen that Terraform working directory (.terraform) already exists but not in the best condition (eg, not initialized modules, wrong version of Terraform, etc). To solve this problem you can find and delete all .terraform directories in your repository using this command:

    find . -type d -name ".terraform" -print0 | xargs -0 rm -r
    

    terraform_validate hook will try to reinitialize them before running terraform validate command.

Notes for developers

  1. Python hooks are supported now too. All you have to do is:
    1. add a line to the console_scripts array in entry_points in setup.py
    2. Put your python script in the pre_commit_hooks folder

Enjoy the clean, valid, and documented code!

Authors

This repository is managed by Anton Babenko with help from these awesome contributors.

License

MIT licensed. See LICENSE for full details.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].