Complete terragrunt toolkit with generation and validation capabilities
93
93%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
You are given the following root.hcl file:
locals {
aws_region = "us-east-1"
aws_account = "123456789012"
project = "acme-platform"
}
remote_state {
backend = "s3"
config = {
bucket = "acme-terraform-state-${local.aws_account}"
key = "${path_relative_to_include()}/terraform.tfstate"
region = local.aws_region
}
}
generate "provider" {
path = "provider.tf"
if_exists = "overwrite_terragrunt"
contents = <<EOF
provider "aws" {
region = "${local.aws_region}"
access_key = "AKIAIOSFODNN7EXAMPLE"
secret_key = "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"
}
EOF
}And the following child module excerpt:
variable "db_password" {
description = "Database password"
type = string
}(No sensitive = true is set on the variable.)
Apply the Security Checklist from the terragrunt-validator skill to these files.
For each of the following checklist items, state whether it passes or fails:
encrypt = truesensitive = true in variable blocksFor each failure, explain the security risk and provide the corrected HCL.