Skip to content
#

Terraform

terraform logo

Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.

It uses configuration files to describe the components necessary to run a single application or your entire datacenter.

It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.

The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.

Here are 11,915 public repositories matching this topic...

zraider7
zraider7 commented Dec 6, 2021

Currently, terragrunt hclfmt will tell you if there are errors with your hcl file, but not display what they are if you are using --terragrunt-check flag. Example:
terragrunt hclfmt --terragrunt-check --terragrunt-log-level error

terraform fmt has this functionality with the -diff switch to show you what changes it would end up doing, which is great for CI and the end-user feedback l

infracost
sinabakh
sinabakh commented Jan 18, 2022

Here are the steps to migrate a resource:

  1. Pull latest changes from my refactor-migration-t1 branch.
  2. Set the var SINGLE_RESOURCE_NAME in cmd/migrator/main.go to the resource filename.
  3. Run go run cmd/migrator/main.go, the resource file would be edited and a new resource file will be created in internal/resources/aws
  4. All things that the script was unable to migrate are chang
tfsec
drewmullen
drewmullen commented Jan 27, 2022

Is your feature request related to a problem? Please describe.

Provide a feature to validate your custom checks work as expected. If we have custom checks in a central location, it would be good to have a way to validate those checks work as we expect.

Describe the solution you'd like
we provide HCL that passes and HCL that fails, tfsec would have a test cmd that would validate

terraform-cdk
hsalluri259
hsalluri259 commented Jan 20, 2022

The example shown here (https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/data-sources/key_vault_secrets) has a for_each on the data source. I used it for one of my use cases, but it throws the below error.

data "azurerm_key_vault" "cpe_akv" {
name = "cpe"
resource_group_name = "cpe-secrets"
}

data "azurerm_key_vault_secrets" "secrets" {
key_vaul

terrascan
adegoodyer
adegoodyer commented Aug 11, 2021
  • terrascan version: 1.9.0
  • terraform version: 1.0.1

Enhancement Request

Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.

Extremely useful when running the tool without halting a pipeline for example.

I currently use a workaround, but something more concrete would be very desira

Created by Mitchell Hashimoto, HashiCorp

Released July 28, 2014

Latest release 11 days ago

Repository
hashicorp/terraform
Website
www.terraform.io
Wikipedia
Wikipedia

Related Topics

hashicorp infrastructure infrastructure-as-code