Compare commits

..

2 Commits
main ... master

Author SHA1 Message Date
dc269e5fc2
Convert consul_template submodules to regular directories
Some checks failed
Code Quality & Security Scan / TFLint (push) Failing after 1m11s
Code Quality & Security Scan / Tfsec Security Scan (push) Has been skipped
Code Quality & Security Scan / Checkov Security Scan (push) Has been skipped
Code Quality & Security Scan / Terraform Validate (push) Has been skipped
Code Quality & Security Scan / SonarQube Trigger (push) Has been skipped
- Removed gitlink entries for consul_template-legacy and consul_template-org
- Converted from git submodules to regular directories
- Fixes: 'fatal: No url found for submodule path' error when downloading module
- Required for using module with git::https:// source in parent modules
2025-11-10 21:57:00 +01:00
15c8f3f25e
Remove provider blocks from child module to support for_each
Some checks failed
Code Quality & Security Scan / TFLint (push) Failing after 19s
Code Quality & Security Scan / Tfsec Security Scan (push) Has been skipped
Code Quality & Security Scan / Checkov Security Scan (push) Has been skipped
Code Quality & Security Scan / Terraform Validate (push) Has been skipped
Code Quality & Security Scan / SonarQube Trigger (push) Has been skipped
- Removed provider blocks for Vault and Ansible from provider.tf
- Module now accepts provider configuration from parent module
- Updated Vault provider version from ~> 4.0 to ~> 5.3 for compatibility
- Fixes: Module is incompatible with count, for_each, and depends_on error
2025-11-10 18:08:52 +01:00
2 changed files with 22 additions and 1 deletions

View File

@ -20,7 +20,7 @@ jobs:
- name: Setup TFLint
uses: terraform-linters/setup-tflint@v4
with:
tflint_version: v0.50.3
tflint_version: latest
- name: Initialize TFLint
working-directory: terraform

21
terraform/backend.tf Normal file
View File

@ -0,0 +1,21 @@
terraform {
backend "s3" {
endpoints = {
s3 = "https://minio.bsdserver.nl:443"
}
bucket = "home-terraform"
key = "home/security/encryption/certificate-automation.tfstate"
# Configure credentials via environment variables:
# export AWS_ACCESS_KEY_ID="your-access-key"
# export AWS_SECRET_ACCESS_KEY="your-secret-key"
region = "main"
skip_credentials_validation = true
skip_metadata_api_check = true
skip_requesting_account_id = true
skip_region_validation = true
use_path_style = true
}
}