You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
vulnerability scanning. To install, follow the [installation instructions](https://aquasecurity.github.io/trivy/v0.29.2/getting-started/installation/).
145
155
146
156
To run the vulnerability scanning, on the code-base, run the following command:
147
157
@@ -172,6 +182,6 @@ Before submitting large changes, please open an issue on GitHub outlining:
172
182
- Alternative solutions or approaches if applicable.
173
183
174
184
Use your judgement about what constitutes a large change. If you aren't sure,
175
-
send a message in
176
-
[#contributors](https://openpolicyagent.slack.com/archives/C02L1TLPN59) on Slack
185
+
send a message in
186
+
[#contributors](https://openpolicyagent.slack.com/archives/C02L1TLPN59) on Slack
177
187
or submit [an issue on GitHub](https://github.com/open-policy-agent/opa/issues).
If as suggested in the previous step, you want to modify your policy to make an authorization decision
593
614
based on both the user and the Terraform plan, the input you would give to OPA would take the form
594
615
`{"user": <user>, "plan": <plan>}`, and your policy would reference the user with `input.user` and
595
-
the plan with `input.plan`. You could even go so far as to provide the Terraform state file and the AWS
616
+
the plan with `input.plan`. You could even go so far as to provide the Terraform state file and the AWS
596
617
EC2 data to OPA and write policy using all of that context.
597
618
598
619
### 5. Create a Large Terraform plan and Evaluate it
@@ -697,7 +718,7 @@ You learned a number of things about Terraform Testing with OPA:
697
718
* OPA gives you fine-grained policy control over Terraform plans.
698
719
* You can use data other than the plan itself (e.g. the user) when writing authorization policies.
699
720
700
-
Keep in mind that it's up to you to decide how to use OPA's Terraform tests and authorization decision. Here are some ideas.
721
+
Keep in mind that it's up to you to decide how to use OPA's Terraform tests and authorization decision. Here are some ideas.
701
722
702
723
* Add it as part of your Terraform wrapper to implement unit tests on Terraform plans
703
724
* Use it to automatically approve run-of-the-mill Terraform changes to reduce the burden of peer-review
@@ -712,7 +733,9 @@ If you'd like to explore an additional example that uses terraform modules pleas
712
733
### 1. Create and save Terraform module plan
713
734
714
735
Create a new Terraform file that includes a
715
-
security group and security group from a module. (This example uses the module from https://github.com/terraform-aws-modules/terraform-aws-security-group)
0 commit comments