Skip to content

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

OPA example

This folder contains a Terraform configuration that deploys an EC2 instance in an Amazon Web Services (AWS) account. The idea is to test this module against the OPA policy in enforce_tagging.rego, which will pass if this module sets the proper tags, and fail otherwise.

For more info, please see Chapter 9, "How to test Terraform code", of Terraform: Up and Running.

Pre-requisites

Please note that this code was written for Terraform 1.x.

Quick start

Please note that this example will deploy real resources into your AWS account. We have made every effort to ensure all the resources qualify for the AWS Free Tier, but we are not responsible for any charges you may incur.

Configure your AWS access keys as environment variables:

export AWS_ACCESS_KEY_ID=(your access key id)
export AWS_SECRET_ACCESS_KEY=(your secret access key)

Run terraform plan and save the output to a file:

terraform plan -out tfplan.binary

Convert the plan file to JSON:

terraform show -json tfplan.binary > tfplan.json

Run the JSON plan file against the enforce_tagging.rego OPA policy:

opa eval \
  --data enforce_tagging.rego \
  --input tfplan.json \
  --format pretty \
  data.terraform.allow

If the module set the required ManagedBy tag, the output will be:

true

If the module is missing that required tag, the output will be:

undefined