Open bcsgh opened 3 years ago
Marking this issue as stale due to inactivity. This helps our maintainers find and focus on the active issues. If this issue receives no comments in the next 30 days it will automatically be closed. Maintainers can also remove the stale label.
If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thank you!
FWIW, I still think this is a good idea and don't think it should be closed.
(I also don't think a lack of activity on an issue is a sound reason for assuming the maintainers should decide to avoid doing something. Furthermore, closing issues as "not important enough" seems like a bad idea to me. That's what the lowest priority setting should be used for.)
Community Note
Description
Please include more client side validation for all rules where it can be done hermetically.
For example, wit
aws_security_group
there are some interactions between theingress
port and protocol parameter that can be checked locally.In general, for any error that can be found without interacting with external resources, there is significant practical utility in reporting it during
terraform plan
or before updates are attempted byterraform apply
rather than deferring that reporting to the point where someone is actually trying to modify the live state.(That said, things should err on the side of lenience to avoid blocking things that AWS it self would allow. Or maybe make those case warnings?)
New or Affected Resource(s)
Potential Terraform Configuration