mirror of
https://github.com/tofuutils/pre-commit-opentofu.git
synced 2025-10-15 17:38:54 +02:00
feat: Adds support for Terrascan (#195)
This commit is contained in:
parent
96346e74d9
commit
fee2387b6c
3 changed files with 85 additions and 3 deletions
|
|
@ -82,3 +82,9 @@
|
||||||
files: \.tf$
|
files: \.tf$
|
||||||
exclude: \.+.terraform\/.*$
|
exclude: \.+.terraform\/.*$
|
||||||
require_serial: true
|
require_serial: true
|
||||||
|
|
||||||
|
- id: terrascan
|
||||||
|
name: terrascan
|
||||||
|
description: Runs terrascan on Terraform templates.
|
||||||
|
language: script
|
||||||
|
entry: terrascan.sh
|
||||||
|
|
|
||||||
|
|
@ -12,13 +12,14 @@
|
||||||
* [`TFSec`](https://github.com/liamg/tfsec) required for `terraform_tfsec` hook.
|
* [`TFSec`](https://github.com/liamg/tfsec) required for `terraform_tfsec` hook.
|
||||||
* [`coreutils`](https://formulae.brew.sh/formula/coreutils) required for `terraform_validate` hook on macOS (due to use of `realpath`).
|
* [`coreutils`](https://formulae.brew.sh/formula/coreutils) required for `terraform_validate` hook on macOS (due to use of `realpath`).
|
||||||
* [`checkov`](https://github.com/bridgecrewio/checkov) required for `checkov` hook.
|
* [`checkov`](https://github.com/bridgecrewio/checkov) required for `checkov` hook.
|
||||||
|
* [`terrascan`](https://github.com/accurics/terrascan) required for `terrascan` hook.
|
||||||
|
|
||||||
or build and use the Docker image locally as mentioned below in the `Run` section.
|
or build and use the Docker image locally as mentioned below in the `Run` section.
|
||||||
|
|
||||||
##### MacOS
|
##### MacOS
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
brew install pre-commit gawk terraform-docs tflint tfsec coreutils checkov
|
brew install pre-commit gawk terraform-docs tflint tfsec coreutils checkov terrascan
|
||||||
```
|
```
|
||||||
|
|
||||||
##### Ubuntu 18.04
|
##### Ubuntu 18.04
|
||||||
|
|
@ -32,6 +33,7 @@ pip3 install pre-commit
|
||||||
curl -L "$(curl -s https://api.github.com/repos/terraform-docs/terraform-docs/releases/latest | grep -o -E "https://.+?-linux-amd64.tar.gz")" > terraform-docs.tgz && tar xzf terraform-docs.tgz && chmod +x terraform-docs && sudo mv terraform-docs /usr/bin/
|
curl -L "$(curl -s https://api.github.com/repos/terraform-docs/terraform-docs/releases/latest | grep -o -E "https://.+?-linux-amd64.tar.gz")" > terraform-docs.tgz && tar xzf terraform-docs.tgz && chmod +x terraform-docs && sudo mv terraform-docs /usr/bin/
|
||||||
curl -L "$(curl -s https://api.github.com/repos/terraform-linters/tflint/releases/latest | grep -o -E "https://.+?_linux_amd64.zip")" > tflint.zip && unzip tflint.zip && rm tflint.zip && sudo mv tflint /usr/bin/
|
curl -L "$(curl -s https://api.github.com/repos/terraform-linters/tflint/releases/latest | grep -o -E "https://.+?_linux_amd64.zip")" > tflint.zip && unzip tflint.zip && rm tflint.zip && sudo mv tflint /usr/bin/
|
||||||
curl -L "$(curl -s https://api.github.com/repos/tfsec/tfsec/releases/latest | grep -o -E "https://.+?tfsec-linux-amd64")" > tfsec && chmod +x tfsec && mv tfsec /usr/bin/
|
curl -L "$(curl -s https://api.github.com/repos/tfsec/tfsec/releases/latest | grep -o -E "https://.+?tfsec-linux-amd64")" > tfsec && chmod +x tfsec && mv tfsec /usr/bin/
|
||||||
|
curl -L "$(curl -s https://api.github.com/repos/accurics/terrascan/releases/latest | grep -o -E "https://.+?_Linux_x86_64.tar.gz")" > terrascan.tar.gz && tar -xf terrascan.tar.gz terrascan && rm terrascan.tar.gz && sudo mv terrascan /usr/bin/
|
||||||
python3.7 -m pip install -U checkov
|
python3.7 -m pip install -U checkov
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
@ -72,9 +74,9 @@ or you can also build and use the provided Docker container, which wraps all dep
|
||||||
```bash
|
```bash
|
||||||
# first building it
|
# first building it
|
||||||
docker build -t pre-commit .
|
docker build -t pre-commit .
|
||||||
# and then running it in the folder
|
# and then running it in the folder
|
||||||
# with the terraform code you want to check by executing
|
# with the terraform code you want to check by executing
|
||||||
docker run -v $(pwd):/lint -w /lint pre-commit run -a
|
docker run -v $(pwd):/lint -w /lint pre-commit run -a
|
||||||
```
|
```
|
||||||
|
|
||||||
## Available Hooks
|
## Available Hooks
|
||||||
|
|
@ -93,6 +95,7 @@ There are several [pre-commit](https://pre-commit.com/) hooks to keep Terraform
|
||||||
| `terragrunt_validate` | Validates all [Terragrunt](https://github.com/gruntwork-io/terragrunt) configuration files (`*.hcl`) |
|
| `terragrunt_validate` | Validates all [Terragrunt](https://github.com/gruntwork-io/terragrunt) configuration files (`*.hcl`) |
|
||||||
| `terraform_tfsec` | [TFSec](https://github.com/liamg/tfsec) static analysis of terraform templates to spot potential security issues. |
|
| `terraform_tfsec` | [TFSec](https://github.com/liamg/tfsec) static analysis of terraform templates to spot potential security issues. |
|
||||||
| `checkov` | [checkov](https://github.com/bridgecrewio/checkov) static analysis of terraform templates to spot potential security issues. |
|
| `checkov` | [checkov](https://github.com/bridgecrewio/checkov) static analysis of terraform templates to spot potential security issues. |
|
||||||
|
| `terrascan` | [terrascan](https://github.com/accurics/terrascan) Detect compliance and security violations. |
|
||||||
|
|
||||||
Check the [source file](https://github.com/antonbabenko/pre-commit-terraform/blob/master/.pre-commit-hooks.yaml) to know arguments used for each hook.
|
Check the [source file](https://github.com/antonbabenko/pre-commit-terraform/blob/master/.pre-commit-hooks.yaml) to know arguments used for each hook.
|
||||||
|
|
||||||
|
|
|
||||||
73
terrascan.sh
Executable file
73
terrascan.sh
Executable file
|
|
@ -0,0 +1,73 @@
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
set -eo pipefail
|
||||||
|
|
||||||
|
main() {
|
||||||
|
initialize_
|
||||||
|
parse_cmdline_ "$@"
|
||||||
|
|
||||||
|
# propagate $FILES to custom function
|
||||||
|
terrascan_ "$ARGS" "$FILES"
|
||||||
|
}
|
||||||
|
|
||||||
|
terrascan_() {
|
||||||
|
# consume modified files passed from pre-commit so that
|
||||||
|
# terrascan runs against only those relevant directories
|
||||||
|
for file_with_path in $FILES; do
|
||||||
|
file_with_path="${file_with_path// /__REPLACED__SPACE__}"
|
||||||
|
paths[index]=$(dirname "$file_with_path")
|
||||||
|
|
||||||
|
let "index+=1"
|
||||||
|
done
|
||||||
|
|
||||||
|
for path_uniq in $(echo "${paths[*]}" | tr ' ' '\n' | sort -u); do
|
||||||
|
path_uniq="${path_uniq//__REPLACED__SPACE__/ }"
|
||||||
|
pushd "$path_uniq" > /dev/null
|
||||||
|
terrascan scan -i terraform $ARGS
|
||||||
|
popd > /dev/null
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
initialize_() {
|
||||||
|
# get directory containing this script
|
||||||
|
local dir
|
||||||
|
local source
|
||||||
|
source="${BASH_SOURCE[0]}"
|
||||||
|
while [[ -L $source ]]; do # resolve $source until the file is no longer a symlink
|
||||||
|
dir="$(cd -P "$(dirname "$source")" > /dev/null && pwd)"
|
||||||
|
source="$(readlink "$source")"
|
||||||
|
# if $source was a relative symlink, we need to resolve it relative to the path where the symlink file was located
|
||||||
|
[[ $source != /* ]] && source="$dir/$source"
|
||||||
|
done
|
||||||
|
_SCRIPT_DIR="$(dirname "$source")"
|
||||||
|
|
||||||
|
# source getopt function
|
||||||
|
# shellcheck source=lib_getopt
|
||||||
|
. "$_SCRIPT_DIR/lib_getopt"
|
||||||
|
}
|
||||||
|
|
||||||
|
parse_cmdline_() {
|
||||||
|
declare argv
|
||||||
|
argv=$(getopt -o a: --long args: -- "$@") || return
|
||||||
|
eval "set -- $argv"
|
||||||
|
|
||||||
|
for argv; do
|
||||||
|
case $argv in
|
||||||
|
-a | --args)
|
||||||
|
shift
|
||||||
|
ARGS+=("$1")
|
||||||
|
shift
|
||||||
|
;;
|
||||||
|
--)
|
||||||
|
shift
|
||||||
|
FILES+=("$@")
|
||||||
|
break
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
# global arrays
|
||||||
|
declare -a ARGS=()
|
||||||
|
declare -a FILES=()
|
||||||
|
|
||||||
|
[[ ${BASH_SOURCE[0]} != "$0" ]] || main "$@"
|
||||||
Loading…
Add table
Add a link
Reference in a new issue