Replies: 3 comments 2 replies
-
Oh man, +1M -- if this was possible it would save me so much time going through failed applies because someone forgot part of a statement. |
Beta Was this translation helpful? Give feedback.
-
I notice there is a UPDATE. Looks as though that rule doesn't check that |
Beta Was this translation helpful? Give feedback.
-
The In general I'd say most users should be using the policy document data source to reduce errors: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document If someone wanted to contribute a rule that further validates the policy document, we could accept that. That said, it would probably need to rely on something from the AWS Go SDK and not try to implement validation from scratch. |
Beta Was this translation helpful? Give feedback.
-
I just had
terraform apply
fail on me and the root cause was that a statement in aaws_iam_policy
resource didn't containEffect
. The error wasRather annoyingly I could only get this error message from the AWS console. All I got from
terraform apply
wasIf tflint could warn me about such a thing then it would have saved me oodles of lost time here.
Beta Was this translation helpful? Give feedback.
All reactions