Complete terragrunt toolkit with generation and validation capabilities
93
93%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
{
"context": "Agent generates a production EKS child module with two dependency blocks, correctly typed mock_outputs, prevent_destroy, and proper include/locals patterns.",
"type": "weighted_checklist",
"checklist": [
{
"name": "Named include block with find_in_parent_folders(root.hcl)",
"description": "Generated file uses 'include \"root\" { path = find_in_parent_folders(\"root.hcl\") }' with the named label and explicit filename.",
"max_score": 15
},
{
"name": "env.hcl read via locals block",
"description": "Generated file contains a locals block with 'env = read_terragrunt_config(find_in_parent_folders(\"env.hcl\"))' and accesses environment values via local.env.locals.*",
"max_score": 15
},
{
"name": "vpc dependency with correctly typed mock_outputs",
"description": "vpc dependency block has mock_outputs with vpc_id as a string (\"vpc-mock\") and private_subnet_ids as a list of strings ([\"subnet-mock-1\"]) — types must match expected output types.",
"max_score": 20
},
{
"name": "iam dependency with mock_outputs",
"description": "iam dependency block has mock_outputs with eks_role_arn as a string mock value.",
"max_score": 15
},
{
"name": "mock_outputs_allowed_terraform_commands on all dependencies",
"description": "Both dependency blocks include mock_outputs_allowed_terraform_commands = [\"validate\", \"plan\", \"destroy\"] or equivalent.",
"max_score": 20
},
{
"name": "prevent_destroy = true present",
"description": "Generated file includes prevent_destroy = true to protect the production EKS cluster from accidental deletion.",
"max_score": 15
}
]
}