TFLint is a Terraform linter focused on possible errors, best practices, and so on.
Terraform is a great tool for Infrastructure as Code. However, many of these tools don't validate provider-specific issues. For example, see the following configuration file:
resource "aws_instance" "web" {
ami = "ami-b73b63a0"
instance_type = "t1.2xlarge" # invalid type!
tags {
Name = "HelloWorld"
}
}
Since t1.2xlarge
is a nonexistent instance type, an error will occur when you run terraform apply
. But terraform plan
and terraform validate
cannot find this possible error beforehand. That's because it's an AWS provider-specific issue and it's valid as a Terraform configuration.
TFLint finds such errors in advance:
$ tflint
template.tf
ERROR:3 instance_type is not a valid value (aws_instance_invalid_type)
Result: 2 issues (1 errors , 0 warnings , 1 notices)
You can download the binary built for your architecture from the latest release. The following is an example of installation on macOS:
$ wget https://github.com/wata727/tflint/releases/download/v0.8.3/tflint_darwin_amd64.zip
$ unzip tflint_darwin_amd64.zip
Archive: tflint_darwin_amd64.zip
inflating: tflint
$ mkdir -p /usr/local/tflint/bin
$ export PATH=/usr/local/tflint/bin:$PATH
$ install tflint /usr/local/tflint/bin
$ tflint -v
For Linux based OS, you can use the install_linux.sh
to automate the installation process.
macOS users can also use Homebrew to install TFLint:
$ brew tap wata727/tflint
$ brew install tflint
You can also use TFLint via Docker.
$ docker run --rm -v $(pwd):/data -t wata727/tflint
See Rules.
TFLint currently only inspect Terraform-specific issues and AWS issues.
Also, load configurations in the same way as Terraform v0.12. This means that it cannot inspect configurations that cannot be parsed on Terraform v0.12.
Named values are supported only for input variables and workspaces. Expressions that contain anything else are excluded from the inspection. Built-in Functions are fully supported.
TFLint inspects all configurations under the current directory by default. You can also change the behavior with the following options:
$ tflint --help
Usage:
tflint [OPTIONS] [FILE or DIR...]
Application Options:
-v, --version Print TFLint version
-f, --format=[default|json|checkstyle] Output format (default: default)
-c, --config=FILE Config file name (default: .tflint.hcl)
--ignore-module=SOURCE1,SOURCE2... Ignore module sources
--ignore-rule=RULE1,RULE2... Ignore rule names
--var-file=FILE1,FILE2... Terraform variable file names
--var='foo=bar' Set a Terraform variable
--module Inspect modules
--deep Enable deep check mode
--aws-access-key=ACCESS_KEY AWS access key used in deep check mode
--aws-secret-key=SECRET_KEY AWS secret key used in deep check mode
--aws-profile=PROFILE AWS shared credential profile name used in deep check mode
--aws-region=REGION AWS region used in deep check mode
--force Return zero exit status even if issues found
-q, --quiet Do not output any message when no issues are found (default format only)
Help Options:
-h, --help Show this help message
By default, TFLint looks up .tflint.hcl
according to the following priority:
- Current directory (
./.tflint.hcl
) - Home directory (
~/.tflint.hcl
)
The config file is written in HCL, and you can use this file instead of passing command line options.
config {
module = true
deep_check = true
force = false
aws_credentials = {
access_key = "AWS_ACCESS_KEY"
secret_key = "AWS_SECRET_KEY"
region = "us-east-1"
}
ignore_module = {
"github.com/wata727/example-module" = true
}
varfile = ["example1.tfvars", "example2.tfvars"]
variables = ["foo=bar", "bar=[\"baz\"]"]
}
rule "aws_instance_invalid_type" {
enabled = false
}
rule "aws_instance_previous_type" {
enabled = false
}
You can also use another file as a config file with the --config
option.
$ tflint --config other_config.hcl
You can make settings for each rule in the rule
block. Currently, it can set only enabled
option. If you set enabled = false
, TFLint doesn't inspect configuration files by this rule.
rule "aws_instance_previous_type" {
enabled = false
}
You can also disable rules with the --ignore-rule
option.
$ tflint --ignore-rule=aws_instance_invalid_type,aws_instance_previous_type
Also, annotation comments can disable rules on specific lines:
resource "aws_instance" "foo" {
# tflint-ignore: aws_instance_invalid_type
instance_type = "t1.2xlarge"
}
The annotation works only for the same line or the line below it. You can also use tflint-ignore: all
if you want to ignore all the rules.
See also list of available rules.
When deep checking is enabled, TFLint invokes the provider's API to do a more detailed inspection. For example, find a non-existent IAM profile name etc. You can enable it with the --deep
option.
$ tflint --deep
template.tf
ERROR:3 instance_type is not a valid value (aws_instance_invalid_type)
ERROR:4 "invalid_profile" is invalid IAM profile name. (aws_instance_invalid_iam_profile)
Result: 2 issues (2 errors , 0 warnings , 0 notices)
In order to enable deep checking, credentials are needed.
TFLint supports various credential providers. It is used with the following priority:
- Static credentials
- Shared credentials
- Environment credentials
- Default shared credentials
If you have an access key and a secret key, you can pass these keys.
$ tflint --aws-access-key AWS_ACCESS_KEY --aws-secret-key AWS_SECRET_KEY --aws-region us-east-1
config {
aws_credentials = {
access_key = "AWS_ACCESS_KEY"
secret_key = "AWS_SECRET_KEY"
region = "us-east-1"
}
}
If you have shared credentials, you can pass the profile name. However, only ~/.aws/credentials
is supported as a credential location.
$ tflint --aws-profile AWS_PROFILE --aws-region us-east-1
config {
aws_credentials = {
profile = "AWS_PROFILE"
region = "us-east-1"
}
}
TFLint looks up AWS_ACCESS_KEY_ID
and AWS_SECRET_ACCESS_KEY
, AWS_REGION
environment variables. This is useful when you don't want to explicitly pass credentials.
$ export AWS_ACCESS_KEY_ID=AWS_ACCESS_KEY
$ export AWS_SECRET_ACCESS_KEY=AWS_SECRET_KEY
TFLint can also inspect modules. In this case, it checks based on the input variables passed to the calling module.
module "aws_instance" {
source = "./module"
ami = "ami-b73b63a0"
instance_type = "t1.2xlarge"
}
$ tflint --module
aws_instance/main.tf
ERROR:6 instance_type is not a valid value (aws_instance_invalid_type)
Result: 1 issues (1 errors , 0 warnings , 0 notices)
Module inspection is disabled by default. Inspection is enabled by running with the --module
option. Note that you need to run terraform init
first because of TFLint loads modules in the same way as Terraform.
You can use the --ignore-module
option if you want to skip inspection for a particular module. Note that you need to pass module sources rather than module ids for backward compatibility.
$ tflint --ignore-module=./module
If you want to inspect only a specific configuration file, not all files, you can pass a file as an argument.
$ tflint main.tf
TFLint returns the following exit statuses on exit:
- 0: No issues found
- 1: Errors occurred
- 2: No errors occurred, but issues found
If you don't get the expected behavior, you can see the detailed logs when running with TFLINT_LOG
environment variable.
$ TFLINT_LOG=debug tflint
See Developer Guides.