pre-commit-opentofu/README.md

306 lines
14 KiB
Markdown
Raw Normal View History

2018-12-11 20:21:49 +01:00
# Collection of git hooks for Terraform to be used with [pre-commit framework](http://pre-commit.com/)
2016-09-27 19:47:26 +02:00
2021-09-09 12:38:43 +03:00
[![Github tag](https://img.shields.io/github/tag/antonbabenko/pre-commit-terraform.svg)](https://github.com/antonbabenko/pre-commit-terraform/releases) ![maintenance status](https://img.shields.io/maintenance/yes/2021.svg) [![Help Contribute to Open Source](https://www.codetriage.com/antonbabenko/pre-commit-terraform/badges/users.svg)](https://www.codetriage.com/antonbabenko/pre-commit-terraform)
* [How to install](#how-to-install)
* [1. Install dependencies](#1-install-dependencies)
* [MacOS](#macos)
* [Ubuntu 18.04](#ubuntu-1804)
* [Ubuntu 20.04](#ubuntu-2004)
* [2. Install the pre-commit hook globally](#2-install-the-pre-commit-hook-globally)
* [3. Add configs and hooks](#3-add-configs-and-hooks)
* [4. Run](#4-run)
* [Available Hooks](#available-hooks)
* [Hooks notes](#hooks-notes)
* [terraform_docs](#terraform_docs)
* [terraform_tflint](#terraform_tflint)
* [terraform_tfsec](#terraform_tfsec)
* [terraform_validate](#terraform_validate)
* [Notes for contributors](#notes-for-contributors)
* [Run and debug hooks locally](#run-and-debug-hooks-locally)
* [Authors](#authors)
* [License](#license)
2018-12-11 20:21:49 +01:00
## How to install
2018-01-24 15:46:37 +01:00
### 1. Install dependencies
2016-09-27 19:47:26 +02:00
* [`pre-commit`](https://pre-commit.com/#install)
* [`terraform-docs`](https://github.com/terraform-docs/terraform-docs) required for `terraform_docs` hooks. `GNU awk` is required if using `terraform-docs` older than 0.8.0 with Terraform 0.12.
* [`TFLint`](https://github.com/terraform-linters/tflint) required for `terraform_tflint` hook.
2020-04-23 09:56:33 -05:00
* [`TFSec`](https://github.com/liamg/tfsec) required for `terraform_tfsec` hook.
* [`coreutils`](https://formulae.brew.sh/formula/coreutils) required for `terraform_validate` hook on macOS (due to use of `realpath`).
2020-09-08 15:10:56 +02:00
* [`checkov`](https://github.com/bridgecrewio/checkov) required for `checkov` hook.
* [`terrascan`](https://github.com/accurics/terrascan) required for `terrascan` hook.
2021-03-12 15:35:21 +01:00
or build and use the Docker image locally as mentioned below in the `Run` section.
2021-09-09 12:38:43 +03:00
#### MacOS
```bash
brew install pre-commit gawk terraform-docs tflint tfsec coreutils checkov terrascan
```
2021-09-09 12:38:43 +03:00
#### Ubuntu 18.04
2018-12-11 20:21:49 +01:00
```bash
2021-03-12 10:32:41 +01:00
sudo apt update
sudo apt install -y gawk unzip software-properties-common
sudo add-apt-repository ppa:deadsnakes/ppa
sudo apt install -y python3.7 python3-pip
2021-09-09 12:38:43 +03:00
python3 -m pip install --upgrade pip
pip3 install pre-commit
curl -L "$(curl -s https://api.github.com/repos/terraform-docs/terraform-docs/releases/latest | grep -o -E "https://.+?-linux-amd64.tar.gz")" > terraform-docs.tgz && tar xzf terraform-docs.tgz && chmod +x terraform-docs && sudo mv terraform-docs /usr/bin/
curl -L "$(curl -s https://api.github.com/repos/terraform-linters/tflint/releases/latest | grep -o -E "https://.+?_linux_amd64.zip")" > tflint.zip && unzip tflint.zip && rm tflint.zip && sudo mv tflint /usr/bin/
2021-09-09 12:38:43 +03:00
curl -L "$(curl -s https://api.github.com/repos/aquasecurity/tfsec/releases/latest | grep -o -E "https://.+?tfsec-linux-amd64" | head -n 1)" > tfsec && chmod +x tfsec && sudo mv tfsec /usr/bin/
curl -L "$(curl -s https://api.github.com/repos/accurics/terrascan/releases/latest | grep -o -E "https://.+?_Linux_x86_64.tar.gz")" > terrascan.tar.gz && tar -xf terrascan.tar.gz terrascan && rm terrascan.tar.gz && sudo mv terrascan /usr/bin/
2021-03-24 21:12:24 +01:00
python3.7 -m pip install -U checkov
2018-12-11 20:21:49 +01:00
```
2021-09-09 12:38:43 +03:00
##### Ubuntu 20.04
```bash
sudo apt update
sudo apt install -y gawk unzip software-properties-common
sudo apt install -y python3 python3-pip
python3 -m pip install --upgrade pip
pip3 install pre-commit
curl -L "$(curl -s https://api.github.com/repos/terraform-docs/terraform-docs/releases/latest | grep -o -E "https://.+?-linux-amd64.tar.gz")" > terraform-docs.tgz && tar -xzf terraform-docs.tgz terraform-docs && chmod +x terraform-docs && sudo mv terraform-docs /usr/bin/
curl -L "$(curl -s https://api.github.com/repos/terraform-linters/tflint/releases/latest | grep -o -E "https://.+?_linux_amd64.zip")" > tflint.zip && unzip tflint.zip && rm tflint.zip && sudo mv tflint /usr/bin/
curl -L "$(curl -s https://api.github.com/repos/aquasecurity/tfsec/releases/latest | grep -o -E "https://.+?tfsec-linux-amd64" | head -n 1)" > tfsec && chmod +x tfsec && sudo mv tfsec /usr/bin/
curl -L "$(curl -s https://api.github.com/repos/accurics/terrascan/releases/latest | grep -o -E "https://.+?_Linux_x86_64.tar.gz")" > terrascan.tar.gz && tar -xf terrascan.tar.gz terrascan && rm terrascan.tar.gz && sudo mv terrascan /usr/bin/
pip3 install -U checkov
```
### 2. Install the pre-commit hook globally
2021-09-09 12:38:43 +03:00
2021-03-12 15:35:21 +01:00
Note: not needed if you use the Docker image
```bash
DIR=~/.git-template
git config --global init.templateDir ${DIR}
pre-commit init-templatedir -t pre-commit ${DIR}
```
### 3. Add configs and hooks
2018-12-11 20:21:49 +01:00
Step into the repository you want to have the pre-commit hooks installed and run:
2016-09-27 19:47:26 +02:00
2018-12-11 20:21:49 +01:00
```bash
git init
2018-12-11 20:21:49 +01:00
cat <<EOF > .pre-commit-config.yaml
repos:
- repo: git://github.com/antonbabenko/pre-commit-terraform
rev: <VERSION> # Get the latest from: https://github.com/antonbabenko/pre-commit-terraform/releases
hooks:
- id: terraform_fmt
- id: terraform_docs
2018-12-11 20:21:49 +01:00
EOF
```
### 4. Run
2018-12-11 20:21:49 +01:00
After pre-commit hook has been installed you can run it manually on all files in the repository
```bash
pre-commit run -a
2016-09-27 19:47:26 +02:00
```
2021-03-12 15:35:21 +01:00
or you can also build and use the provided Docker container, which wraps all dependencies by
2021-09-09 12:38:43 +03:00
2021-03-12 15:35:21 +01:00
```bash
# first building it
docker build -t pre-commit .
# and then running it in the folder
2021-03-12 15:35:21 +01:00
# with the terraform code you want to check by executing
docker run -v $(pwd):/lint -w /lint pre-commit run -a
2021-03-12 15:35:21 +01:00
```
2018-12-11 20:21:49 +01:00
## Available Hooks
There are several [pre-commit](https://pre-commit.com/) hooks to keep Terraform configurations (both `*.tf` and `*.tfvars`) and Terragrunt configurations (`*.hcl`) in a good shape:
2021-09-09 12:38:43 +03:00
| Hook name | Description |
| ------------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------ |
| `terraform_fmt` | Rewrites all Terraform configuration files to a canonical format. [Hook notes](#terraform_docs) |
| `terraform_validate` | Validates all Terraform configuration files. [Hook notes](#terraform_validate) |
| `terraform_docs` | Inserts input and output documentation into `README.md`. Recommended. |
| `terraform_docs_without_aggregate_type_defaults` | Inserts input and output documentation into `README.md` without aggregate type defaults. |
| `terraform_docs_replace` | Runs `terraform-docs` and pipes the output directly to README.md |
| `terraform_tflint` | Validates all Terraform configuration files with [TFLint](https://github.com/terraform-linters/tflint). [Hook notes](#terraform_tflint). |
| `terragrunt_fmt` | Rewrites all [Terragrunt](https://github.com/gruntwork-io/terragrunt) configuration files (`*.hcl`) to a canonical format. |
| `terragrunt_validate` | Validates all [Terragrunt](https://github.com/gruntwork-io/terragrunt) configuration files (`*.hcl`) |
| `terraform_tfsec` | [TFSec](https://github.com/liamg/tfsec) static analysis of terraform templates to spot potential security issues. [Hook notes](#terraform_tfsec) |
| `checkov` | [checkov](https://github.com/bridgecrewio/checkov) static analysis of terraform templates to spot potential security issues. |
| `terrascan` | [terrascan](https://github.com/accurics/terrascan) Detect compliance and security violations. |
2018-12-11 20:21:49 +01:00
Check the [source file](https://github.com/antonbabenko/pre-commit-terraform/blob/master/.pre-commit-hooks.yaml) to know arguments used for each hook.
2021-09-09 12:38:43 +03:00
## Hooks notes
### terraform_docs
2018-12-11 20:21:49 +01:00
1. `terraform_docs` and `terraform_docs_without_aggregate_type_defaults` will insert/update documentation generated by [terraform-docs](https://github.com/terraform-docs/terraform-docs) framed by markers:
2021-09-09 12:38:43 +03:00
```txt
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
```
if they are present in `README.md`.
2018-12-11 20:21:49 +01:00
2021-09-09 12:38:43 +03:00
2. `terraform_docs_replace` replaces the entire README.md rather than doing string replacement between markers. Put your additional documentation at the top of your `main.tf` for it to be pulled in. The optional `--dest` argument lets you change the name of the file that gets created/modified.
Example:
```yaml
hooks:
- id: terraform_docs_replace
args: ['--sort-by-required', '--dest=TEST.md']
```
2021-09-09 12:38:43 +03:00
3. It is possible to pass additional arguments to shell scripts when using `terraform_docs` and `terraform_docs_without_aggregate_type_defaults`. Send pull-request with the new hook if there is something missing.
2018-12-11 20:21:49 +01:00
2021-09-09 12:38:43 +03:00
### terraform_tflint
1. `terraform_tflint` supports custom arguments so you can enable module inspection, deep check mode etc.
2021-09-09 12:38:43 +03:00
Example:
```yaml
hooks:
- id: terraform_tflint
args: ['--args=--deep']
2020-03-02 14:48:53 +00:00
```
In order to pass multiple args, try the following:
2021-09-09 12:38:43 +03:00
2020-03-02 14:48:53 +00:00
```yaml
- id: terraform_tflint
args:
- '--args=--deep'
- '--args=--enable-rule=terraform_documented_variables'
```
2021-09-09 12:38:43 +03:00
3. When you have multiple directories and want to run `tflint` in all of them and share single config file it is impractical to hard-code the path to `.tflint.hcl` file. The solution is to use `__GIT_WORKING_DIR__` placeholder which will be replaced by `terraform_tflint` hooks with Git working directory (repo root) at run time. For example:
2021-09-09 12:38:43 +03:00
```yaml
hooks:
- id: terraform_tflint
args:
- '--args=--config=__GIT_WORKING_DIR__/.tflint.hcl'
```
2021-09-09 12:38:43 +03:00
### terraform_tfsec
2020-04-23 09:56:33 -05:00
1. `terraform_tfsec` will consume modified files that pre-commit
passes to it, so you can perform whitelisting of directories
or files to run against via [files](https://pre-commit.com/#config-files)
pre-commit flag
2021-09-09 12:38:43 +03:00
Example:
```yaml
hooks:
- id: terraform_tfsec
files: ^prd-infra/
```
The above will tell pre-commit to pass down files from the `prd-infra/` folder
only such that the underlying `tfsec` tool can run against changed files in this
directory, ignoring any other folders at the root level
2021-09-09 12:38:43 +03:00
2. To ignore specific warnings, follow the convention from the
2020-04-23 09:56:33 -05:00
[documentation](https://github.com/liamg/tfsec#ignoring-warnings).
2021-09-09 12:38:43 +03:00
Example:
2020-04-23 09:56:33 -05:00
```hcl
resource "aws_security_group_rule" "my-rule" {
type = "ingress"
cidr_blocks = ["0.0.0.0/0"] #tfsec:ignore:AWS006
}
```
2021-09-09 12:38:43 +03:00
### terraform_validate
1. `terraform_validate` supports custom arguments so you can pass supported no-color or json flags.
2021-09-09 12:38:43 +03:00
Example:
```yaml
hooks:
- id: terraform_validate
args: ['--args=-json']
```
In order to pass multiple args, try the following:
2021-09-09 12:38:43 +03:00
```yaml
- id: terraform_validate
args:
- '--args=-json'
- '--args=-no-color'
```
2021-09-09 12:38:43 +03:00
2. `terraform_validate` also supports custom environment variables passed to the pre-commit runtime
Example:
```yaml
hooks:
- id: terraform_validate
args: ['--envs=AWS_DEFAULT_REGION="us-west-2"']
```
In order to pass multiple args, try the following:
2021-09-09 12:38:43 +03:00
```yaml
- id: terraform_validate
args:
- '--envs=AWS_DEFAULT_REGION="us-west-2"'
- '--envs=AWS_ACCESS_KEY_ID="anaccesskey"'
- '--envs=AWS_SECRET_ACCESS_KEY="asecretkey"'
```
2020-04-23 09:56:33 -05:00
2021-09-09 12:38:43 +03:00
3. It may happen that Terraform working directory (`.terraform`) already exists but not in the best condition (eg, not initialized modules, wrong version of Terraform, etc). To solve this problem you can find and delete all `.terraform` directories in your repository using this command:
```shell
find . -type d -name ".terraform" -print0 | xargs -0 rm -r
```
`terraform_validate` hook will try to reinitialize them before running `terraform validate` command.
2021-09-09 12:38:43 +03:00
## Notes for contributors
2018-12-14 16:16:42 -05:00
1. Python hooks are supported now too. All you have to do is:
2019-06-19 06:10:21 -04:00
1. add a line to the `console_scripts` array in `entry_points` in `setup.py`
2021-09-09 12:38:43 +03:00
2. Put your python script in the `pre_commit_hooks` folder
2018-12-14 16:16:42 -05:00
Enjoy the clean, valid, and documented code!
2018-12-11 20:21:49 +01:00
2021-09-09 12:38:43 +03:00
### Run and debug hooks locally
```bash
pre-commit try-repo {-a} /path/to/local/pre-commit-terraform/repo {hook_name}
```
I.e.
```bash
pre-commit try-repo /mnt/c/Users/tf/pre-commit-terraform terraform_fmt # Run only `terraform_fmt` check
pre-commit try-repo -a ~/pre-commit-terraform # run all existing checks from repo
```
Running `pre-commit` with `try-repo` ignores all arguments specified in `.pre-commit-config.yaml`.
2018-12-11 20:21:49 +01:00
## Authors
This repository is managed by [Anton Babenko](https://github.com/antonbabenko) with help from [these awesome contributors](https://github.com/antonbabenko/pre-commit-terraform/graphs/contributors).
## License
MIT licensed. See LICENSE for full details.