This repository demonstrates how to use InSpec helps you to verify your cloud setups in AWS, Azure or GCP. Recent additions in InSpec 3 also help you to extend InSpec to test your custom in-house applications.
I wrote a couple of articles about InSpec's ability to help you implement test-driven infrastructure with Terraform:
- Google Cloud Platform support for InSpec
- Getting started with InSpec for AWS. Testing for the cloud!
- InSpec for provisioning testing: Verify Terraform setups with InSpec
This repository demonstrates how to use InSpec with provisioning tools. Recent additions to InSpec 2.0 allow us to verify not only machines, but also any infrastructure provisioned in AWS or Azure cloud. This repository is providing guidance on the use of provising tools in conjunction with InSpec.
The following example will provision a two-tier terraform architecture on AWS. It assumes that you have AWS credentials properly configured.
cd aws-terraform
# run terraform
terraform init
terraform apply -var 'key_name=terraform' -var 'public_key_path=/Users/chris/.ssh/id_rsa.pub'
# use terraform variables with InSpec
terraform output --json > test/verify/files/terraform.json
inspec exec test/verify -t aws://
cd gcp-example-profile
# authenticate to gpc
gcloud auth application-default login
# check that inspec can connect to gpc
inspec detect -t gcp://
# run the profile
inspec exec . -t gcp:// --attrs attributes.yml
Author: | Christoph Hartmann (chris@lollyrock.com) |
Author: | Dominik Richter (dominik.richter@gmail.com) |
Copyright: | Christoph Hartmann (chris@lollyrock.com) |
Copyright: | Dominik Richter (dominik.richter@gmail.com) |
License: | Mozilla Public License Version 2.0 |
The terraform aws example is based on their two-tier example which is also MPL-2.0 licensed.