Introduce Terrascan
This commit is contained in:
parent
8119bf6760
commit
8732f9af91
@ -2383,6 +2383,7 @@ See also [Infrastructure](#infrastructure)
|
||||
> * Dependencies between modules
|
||||
> * Fast, concurrent executions of Terraform operations
|
||||
> * Safe Terraform upgrades and state file migrations
|
||||
* [cesar-rodriguez/terrascan](https://github.com/cesar-rodriguez/terrascan) - Collection of security and best practice test for static code analysis of terraform templates
|
||||
|
||||
## Travis CI
|
||||
* [Tavis CI Docs](https://docs.travis-ci.com/user/common-build-problems/#Troubleshooting-Locally-in-a-Docker-Image) - Troubleshooting Locally in a Docker Image, useful if you have troubles with travis CI
|
||||
@ -6874,6 +6875,7 @@ See also [Dotfiles / Aliases](#dotfiles--aliases)
|
||||
* [gruntwork-io/terratest](https://github.com/gruntwork-io/terratest) - Terratest is a Go library that makes it easier to write automated tests for your infrastructure code. **See also** [Official Website](https://terratest.gruntwork.io/)
|
||||
* [Emre Erkunt](https://medium.com/@emre.erkunt/terraform-mono-repo-and-compliance-as-code-109395659c3a) - (2020) terraform, mono-repo and compliance as code
|
||||
* [elmundio87/terraform_validate](https://github.com/elmundio87/terraform_validate) - Terraform Validate is a python package that allows users to define Policy as Code for Terraform configurations | Assists in the enforcement of user-defined standards in Terraform
|
||||
* [cesar-rodriguez/terrascan](https://github.com/cesar-rodriguez/terrascan) - Collection of security and best practice test for static code analysis of terraform templates
|
||||
|
||||
# Transportation :train2: :oncoming_automobile:
|
||||
> Learn
|
||||
|
Loading…
Reference in New Issue
Block a user