Runs terraform plan on your project and posts a comment with the changes on a Pull Request (PR). It runs the following commands:
terraform init
terraform validate
terraform fmt -check
terraform plan -out=plan.tfplan
terraform show -json plan.tfplan This action does not install Terraform, Terragrunt or TF Summarize, but these can be installed using the CDS Terraform tools setup action. You can see how it's used in the pr-test.yaml workflow.
Use the following settings to control the action:
| Setting | Description | Default |
|---|---|---|
allow-failure |
Allow the action to fail | false |
comment |
Add comment with changes to the PR | true |
comment-delete |
Delete previous comments made by the bot on the PR | false |
comment-title |
The title to give the PR comment | Plan changes |
conftest-character-limit |
Character limit for Conftest output | 2000 |
conftest-checks |
Location of custom conftest check definitions | git::https://github.com/cds-snc/opa_checks.git//aws_terraform |
directory |
Directory with the *.tf files to validate |
. |
github-token |
GitHub Token used to add comment to PR (required to add comments). | |
plan-character-limit |
Character limit for Terraform plan output | 30000 |
terraform-init |
Custom Terraform init args | |
terraform-plan |
Custom Terraform plan args | |
terragrunt-plan |
Custom Terragrunt plan args | |
terragrunt |
Use Terragrunt instead of Terraform | false |
open-tofu |
Use OpenTofu instead of Terraform | false |
secret-scan |
Scan Terraform plan with TruffleHog for secrets | false |
secret-config |
Path to TruffleHog config file for secret scanning | |
skip-conftest |
Skip the Conftest step | false |
skip-fmt |
Skip the Terraform format check | false |
skip-plan |
Skip the Terraform plan for projects without a remote state | false |
init-run-all |
Run init across all modules (only applicable for terragrunt). | false |
enable-drift-output |
Emit drift-output as action output (JSON) |
true |
When secret-scan is enabled, the action scans the Terraform plan for secrets before adding it as a comment to the PR. Scanning is performed by Trufflehog which you will need to install before the action runs.
By default, the action uses the secrets.yml config file located in the action's dist/ directory. You can provide a custom TruffleHog config file by setting the secret-config parameter to the path of your config file.
# Prep
# Setup Terraform, Terragrunt, TF Sumamry and Conftest
- name: Setup terraform tools
uses: cds-snc/terraform-tools-setup@v1
# Example 1
# Run Terraform plan and add a comment with changes on the PR
- name: Terraform plan
uses: cds-snc/terraform-plan
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
# Example 2
# Use Terragrunt, allow failure and set a custom PR comment title
- name: Terraform plan
uses: cds-snc/terraform-plan
with:
allow-failure: true
comment-title: Custom comment title
github-token: ${{ secrets.GITHUB_TOKEN }}
terragrunt: true
# Example 3
# Run on a sub project folder, deleting previous PR comments made by the action
- name: Terraform plan
uses: cds-snc/terraform-plan
with:
directory: ./infra
comment-delete: true
github-token: ${{ secrets.GITHUB_TOKEN }}
# Example 4
# Run Terraform plan with no PR comment
# Plan will still availabe in the workflow logs
- name: Terraform plan
uses: cds-snc/terraform-plan
with:
add-comment: false
# Example 5
# Run Terraform plan custom Terraform init args
- name: Terraform plan
uses: cds-snc/terraform-plan
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
terraform-init: |
-backend-config="bucket=your-state-bucket-name"
-backend-config="region=ca-central-1"
# Example 6
# Run Terraform plan custom Terraform plan args
- name: Terraform plan with variable file
uses: cds-snc/terraform-plan
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
terraform-plan: |
-var-file="path/to/terraform.tfvars"
# Example 7
# Run Terragrunt plan with custom Terragrunt plan args
- name: Terragrunt plan with variable file
uses: cds-snc/terraform-plan
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
terragrunt: true
terragrunt-plan: |
--provider-cache
# Example 8
# Run Terraform plan with secret scanning enabled
# Requires trufflehog to be available in the runner environment
- name: Install trufflehog
run: |
curl -sSfL https://raw.githubusercontent.com/trufflesecurity/trufflehog/main/scripts/install.sh | sh -s -- -b /usr/local/bin
- name: Terraform plan with secret scanning
uses: cds-snc/terraform-plan
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
secret-scan: true
# Example 9
# Run Terraform plan with secret scanning using a custom config file
- name: Install trufflehog
run: |
curl -sSfL https://raw.githubusercontent.com/trufflesecurity/trufflehog/main/scripts/install.sh | sh -s -- -b /usr/local/bin
- name: Terraform plan with custom secret scanning config
uses: cds-snc/terraform-plan
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
secret-scan: true
secret-config: path/to/custom-trufflehog-config.ymlTo setup your local dev environment:
npm install
npm run prepareHusky provides a pre-commit hook that builds the dist/index.js used by the action. To test locally, nektos/act works well.
Open Policy Agent is used to check the terraform plan for changes. Policies are written in Rego and then compiled into a WebAssembly module using npm run policy.
This action can be used for drift detection by running it on a schedule (or other non-PR workflows) and checking whether the Terraform/OpenTofu plan includes changes.
Example workflow: examples/drift-detection.yml
When enable-drift-output is enabled (default), the action emits a drift-output output containing a JSON summary with:
status:no_changes,has_changes, orfailedhasChanges: booleanresources.created|updated|deleted: arrays of resource identifiers
This is intended to make it easier to:
- Alert when drift is detected
- Create evidence showing when drift checks ran and what changed
Drift detection is not, by itself, sufficient to fully implement configuration management controls; it can support control satisfaction by providing automated monitoring and evidence.
| ITSG-33 control | How drift detection helps support it |
|---|---|
| CM-2 (Baseline Configuration) | Helps detect deviations between the declared baseline (IaC) and the current environment by highlighting unexpected plan changes. |
| CM-3 (Configuration Change Control) | Supports change control by surfacing changes that appear outside of the normal PR-based workflow (e.g., manual console edits), enabling investigation and remediation. |
| CM-6 (Configuration Settings) | Helps identify changes to configuration settings captured in Terraform/OpenTofu (variables, resource arguments, policies) by reporting planned updates/deletes/creates. |
NIST SP 800-53 includes a Configuration Management (CM) control family. See: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final (PDF: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf).
The control identifiers below align with the same CM control names used in NIST SP 800-53 Rev. 5:
| NIST SP 800-53 (Rev. 5) control | How drift detection helps support it |
|---|---|
| CM-2 (Baseline Configuration) | Supports detection of deviations from an approved baseline by flagging planned changes relative to the baseline defined in Terraform/OpenTofu code. |
| CM-3 (Configuration Change Control) | Supports identification of changes that bypass normal change control (e.g., manual changes), enabling response, rollback, or bringing the environment back into compliance via code. |
| CM-6 (Configuration Settings) | Supports ongoing monitoring of configuration settings managed as code by surfacing planned changes to resource arguments/settings as creates/updates/deletes. |