Conftest
Conftest is a utility to help you write tests against structured configuration data. For instance, you could write tests for your Kubernetes configurations, Tekton pipeline definitions, Terraform code, Serverless configs or any other structured data.
Conftest relies on the Rego language from Open Policy Agent for writing policies. If you're unsure what exactly a policy is, or unfamiliar with the Rego policy language, the Policy Language documentation provided by the Open Policy Agent documentation site is a great resource to read.
Usage
Evaluating Policies
Policies by default should be placed in a directory called policy, but this
can be overridden with the --policy flag.
For instance, save the following as policy/deployment.rego:
package main
deny contains msg if {
input.kind == "Deployment"
not input.spec.template.spec.securityContext.runAsNonRoot
msg := "Containers must not run as root"
}
deny contains msg if {
input.kind == "Deployment"
not input.spec.selector.matchLabels.app
msg := "Containers must provide app label for pod selectors"
}
Conftest looks for deny, violation, and warn rules. Rules can optionally
be suffixed with an underscore and an identifier, for example deny_myrule.
violation rules evaluates the same as deny rules, except they support
returning structured data errors instead of just strings. See
this issue.
By default, Conftest looks for these rules in the main namespace, but this can
be overriden with the --namespace flag or provided in the configuration file.
To look in all namespaces, use the --all-namespaces flag.
Assuming you have a Kubernetes deployment in deployment.yaml you can run
Conftest like so:
$ conftest test deployment.yaml
FAIL - deployment.yaml - Containers must not run as root
FAIL - deployment.yaml - Containers must provide app label for pod selectors
2 tests, 0 passed, 0 warnings, 2 failures, 0 exceptions
Conftest can also be used with stdin:
$ cat deployment.yaml | conftest test -
FAIL - Containers must not run as root
FAIL - Containers must provide app label for pod selectors
2 tests, 0 passed, 0 warnings, 2 failures, 0 exceptions
Conftest supplies a default document with additional contextual information at
the data.conftest location that can be used in policy evaluation. Currently,
the following information is provided:
data.conftest.file.name- The name of the file being evaluateddata.conftest.file.dir- The full directory path of the file being evaluated
Note that Conftest isn't specific to Kubernetes. It will happily let you write tests for any configuration files.
As of today Conftest supports:
- CUE
- CycloneDX
- Dockerfile
- EDN
- Environment files (.env)
- HCL and HCL2
- HOCON
- Ignore files (.gitignore, .dockerignore)
- INI
- JSON
- Jsonnet
- Property files (.properties)
- SPDX
- TextProto (Protocol Buffers)
- TOML
- VCL
- XML
- YAML
Metadata
In addition to the msg, Rego policies written for conftest can surface
additional metadata. To do so, return an object from the Rego rule. The object
must at a minimum contain a field called msg. All other fields are considered
metadata. For example:
# policy.json
package main
deny contains violation if {
# ... other logic
violation := {
"msg": "Violation for some reason.",
"metadata_abc": 123,
"metadata_xyz": true,
}
}
This produces the following output. Note that the metadata is not surfaced by most outputters, and using the JSON output is recommended if you need to access the metadata produced during the policy evaluation.
Running the above policy against an empty JSON document yields the following result.
$ echo "{}" | conftest test -p policy.rego --output json -
[
{
"filename": "",
"namespace": "main",
"successes": 0,
"failures": [
{
"msg": "Violation for some reason.",
"metadata": {
"metadata_abc": 123,
"metadata_xyz": true,
"query": "data.main.deny"
}
}
]
}
]
Well-known metadata
Query
All results include the query that produced the result. This is added without
any changes required to the Rego policy.
Location
NOTE: Location parsing was added in Conftest v0.64
Rego policies can optionally include a _loc (location) metadata which is used
to identify the exact source of the violation. This must be an object that
specifies a file, and optionally a line. The file does not need to be in
the same file as the one that was tested, which can be useful for pointing to
the origin config file for generated resources.
Supported outputters for _loc: json, github.
Continuing the previous example:
# policy.rego
package main
deny contains violation if {
# ... other logic
violation := {
"msg": "Violation for some reason.",
"metadata_abc": 123,
"metadata_xyz": true,
"_loc": {
"file": "foo.txt",
"line": 99999,
},
}
}
$ echo "{}" | conftest test -p policy.rego --output json -
[
{
"filename": "",
"namespace": "main",
"successes": 0,
"failures": [
{
"msg": "Violation for some reason.",
"loc": {
"file": "foo.txt",
"line": 99999
},
"metadata": {
"metadata_abc": 123,
"metadata_xyz": true,
"query": "data.main.deny"
}
}
]
}
]
We can see that the _loc field was extracted and pulled into a loc field
outside of the metadata. Running with the github outputter, we can see that it
uses the syntax required for GitHub Actions to annotate the source files on the
lines indicated by the policy.
$ echo "{}" | conftest test -p /tmp/policy.rego --output github -
::group::Testing "-" against 1 policies in namespace "main"
::error file=foo.txt,line=99999::Violation for some reason.
::error file=-,line=1::(ORIGINATING FROM foo.txt L99999) Violation for some reason.
::notice file=-,line=1::Number of successful checks: 0
::endgroup::
1 test, 0 passed, 0 warnings, 1 failure, 0 exceptions
Testing/Verifying Policies
When authoring policies, it is helpful to test them. Consult the Rego testing documentation for details on testing syntax and approach.
Following the example above, with a policy file in policy/deployment.rego, you
would create your tests in policy/deployment_test.rego by convention. You can
then use conftest verify to execute them and report on the results.
conftest verify --policy ./policy
Further documentation can be found using conftest verify -h
Writing Unit Tests
When writing unit tests, it is common to use the with keyword to override the
input and data documents. For example:
test_foo if {
input := {
"abc": 123,
"foo": ["bar", "baz"],
}
deny with input as input
}
However, it can be burdensome to craft the input values by hand when the
configurations you are testing are of different formats, especially when they
can be dynamic and their source does not closely align to key-value objects like
Rego requires. A common example is Hashicorp Configuration Language (HCL) used
by Terraform and other products.
To alleviate this issue, conftest provides a builtin function parse_config
which takes the parser type and configuration as arguments and parses the
configuration for use in Rego policies. This is the same logic that conftest
uses when testing configurations, only exposed as a Rego function. The example
below shows how to use this to parse an AWS Terraform configuration and use it
in a unit test.
TIP: It is recommended to use the
--show-builtin-errorsflag when using theparse_config,parse_config_file, andparse_combined_config_filesfunctions. This way errors encountered during parsing will be raised. This flag will be enabled by default in a future release.
deny.rego
deny contains msg if {
some name
some lb in input.resource.aws_alb_listener[name]
lb.protocol == "HTTP"
msg = sprintf("ALB `%v` is using HTTP rather than HTTPS", [name])
}
deny_test.rego
# "not deny" doesn't work because deny is a set.
# Instead we need to define "no_violations" to be true when `deny` is empty.
empty(value) if {
count(value) == 0
}
no_violations if {
empty(deny)
}
# Now the actual tests start
test_fails_with_http_alb if {
cfg := parse_config("hcl2", `
resource "aws_alb_listener" "name" {
protocol = "HTTP"
}
`)
deny["ALB `name` is using HTTP rather than HTTPS"] with input as cfg
}
test_allow_with_alb_https if {
cfg := parse_config("hcl2", `
resource "aws_alb_listener" "lb_with_https" {
protocol = "HTTPS"
}
`)
no_violations with input as cfg
}
test_deny_alb_protocol_unspecified if {
cfg := parse_config("hcl2", `
resource "aws_alb_listener" "lb_with_unspecified_protocol" {
foo = "bar"
}
`)
no_violations with input as cfg
}
For the full list of supported parsers and their names, please refer to the constants defined in the parser package.
If you prefer to have your configuration snippets outside of the Rego unit test
(for syntax highlighting, etc.) you can use the parse_config_file builtin. It
accepts the path to the config file as its only parameter and returns the parsed
configuration as a Rego object. The example below shows denying Azure disks with
encryption disabled.
NOTE: The file path argument is relative to the location of the Rego unit test file.
NOTE: Using this function performs disk I/O which can significantly slow down tests.
deny.rego
deny contains msg if {
disk = input.resource.azurerm_managed_disk[name]
has_field(disk, "encryption_settings")
disk.encryption_settings.enabled != true
msg = sprintf("Azure disk `%v` is not encrypted", [name])
}
deny_test.rego
test_unencrypted_azure_disk if {
cfg := parse_config_file("unencrypted_azure_disk.tf")
deny with input as cfg
}
unencrypted_azure_disk.tf
resource "azurerm_managed_disk" "sample" {
encryption_settings {
enabled = false
}
}
Using deny_ as a prefix to simplify testing
You may have noticed earlier the weird looking test:
# Now the actual tests start
test_fails_with_http_alb if {
cfg := parse_config("hcl2", `
resource "aws_alb_listener" "name" {
protocol = "HTTP"
}
`)
deny["ALB `name` is using HTTP rather than HTTPS"] with input as cfg
}
Specifically, the deny["ALB ``name`` is using HTTP rather than HTTPS"]
looks a bit strange. The reason we need to do this is we can't just check that
any deny occurred, we are trying to test that specifically our alb protocol
test is working as expected, so we had to match on it's msg to make sure we
were testing the right rule.
There is an alternative to this, which is to use deny_ as a prefix, instead of
overloading deny. For example, we could have instead done:
deny_v2.rego
deny_alb_http contains msg if {
some name
some lb in input.resource.aws_alb_listener[name]
lb.protocol == "HTTP"
msg = sprintf("ALB `%v` is using HTTP rather than HTTPS", [name])
}
And then we can test specifically that rule with
deny_v2_test.rego
test_fails_with_http_alb if {
cfg := parse_config("hcl2", `
resource "aws_alb_listener" "name" {
protocol = "HTTP"
}
`)
deny_alb_http with input as cfg
}
This is much more elegant if you have lots of tests and are unit-testing them.
Unfortunately you need to do a bit more book-keeping with the no_violations
rule, but a future feature may make that easier to implement.