Terraform
Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
Here are 13,249 public repositories matching this topic...
Add basic CI
We already have some scripts in the scripts directory. It would be good to run them for every PR.
This is also a great task for beginners.
## Python/Regex fix
-
Updated
May 16, 2022 - Shell
-
Updated
May 16, 2022 - Go
Community Note
- Please vote on this issue by adding a
👍 reaction to the original issue to help the community and maintainers prioritize this request - Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do
Add estimation support for azurerm_iothub resources, e.g. from here: https://azure.microsoft.com/en-us/pricing/details/iot-hub/
Each SKU has a defined limit of messages per day per hub unit - so estimating this resource based solely on hub unit capacity should be sufficient - this is what the Azure pricing calculator does.
Cost details
Paid resources:
azurerm_iothub
General Availability (GA) for docker compose v2 is "Almost There". With GA we could consider upgrading docker compose examples (sample project and [test](https://github.com/
-
Updated
May 17, 2022 - Go
-
Updated
May 13, 2022 - Go
Describe the issue
On GCP if you apply a role via a policy that is applied none of the checks are performed. The example below should pass CKV_GCP_48 and fail CKV_GCP_44 (with my variables) but when checkov is run, no checks are run, pass or fail.
Examples\
data "google_iam_policy" "folder" {
binding {
role = "roles/owner"
members = var.a
-
Updated
May 16, 2022 - HTML
-
Updated
May 16, 2022 - TypeScript
-
Updated
May 17, 2022
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
May 16, 2022 - HCL
-
Updated
May 15, 2022 - Go
-
Updated
May 17, 2022 - Ruby
-
Updated
Apr 10, 2022 - Go
-
Updated
Apr 6, 2022
Description
Add GCE support for google_project_iam_custom_role (TF)
Sources
-
Updated
Apr 20, 2022 - Go
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 28 days ago
- Repository
- hashicorp/terraform
- Website
- www.terraform.io
- Wikipedia
- Wikipedia