Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OPA (Open Policy Access) within SF executions #29

Open
5 tasks
marshall7m opened this issue Oct 16, 2022 · 0 comments
Open
5 tasks

OPA (Open Policy Access) within SF executions #29

marshall7m opened this issue Oct 16, 2022 · 0 comments
Labels
enhancement New feature or request

Comments

@marshall7m
Copy link
Owner

marshall7m commented Oct 16, 2022

Implement OSS OPA project into the Step Function execution flow. This allows users to define guardrails around Terraform plan/apply results and the SF execution input data.

  • install opa within ECS task docker image
  • Add ECS task logic to run opa after terraform plan/apply operations (For the love of Python, the Python OPA client can be used to parse OPA output)
  • Add ECS task logic to run opa before plan operation using Step Function execution input data
  • Add Terraform module input for defining opa policies at the account-level and organization-level (possibly TF config level?)
  • Store policies within AWS SSM parameter store or AWS S3 bucket associated with tf state files?

OR

For the love of Python and Pydantic, use tftest to parse the terraform plan/apply output and pass the output to custom Pydantic models that can validate the results

OR

For the love of Python, allow users to define policies via terraform-compliance

@marshall7m marshall7m added the enhancement New feature or request label Nov 25, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant