All checks were successful
Code Quality & Security Scan / TFLint (push) Successful in 24s
Code Quality & Security Scan / Tfsec Security Scan (push) Successful in 30s
Code Quality & Security Scan / Checkov Security Scan (push) Successful in 44s
Code Quality & Security Scan / Terraform Validate (push) Successful in 43s
Code Quality & Security Scan / SonarQube Trigger (push) Successful in 47s
- Remove ansible/ from .gitignore - Add vault_agent role (copied from terraform-vsphere-infra) - Add vault_agent-playbook.yml for deployment - Include ansible collections (cloud.terraform, ansible.posix, etc.) - Archive consul_template role as consul_template-legacy The ansible directory contains the vault-agent deployment automation that replaces the legacy consul-template approach.
55 lines
905 B
Plaintext
Executable File
55 lines
905 B
Plaintext
Executable File
# Local .terraform directories
|
|
**/.terraform/*
|
|
|
|
# .tfstate files
|
|
*.tfstate
|
|
*.tfstate.*
|
|
|
|
# Crash log files
|
|
crash.log
|
|
crash.*.log
|
|
|
|
# Exclude all .tfvars files, which are likely to contain sensitive data
|
|
*.tfvars
|
|
*.tfvars.json
|
|
|
|
# Ignore override files as they are usually used to override resources locally
|
|
override.tf
|
|
override.tf.json
|
|
*_override.tf
|
|
*_override.tf.json
|
|
|
|
# Include override files you do wish to add to version control using negated pattern
|
|
# !example_override.tf
|
|
|
|
# Include tfplan files to ignore the plan output of command: terraform plan -out=tfplan
|
|
*tfplan*
|
|
|
|
# Ignore CLI configuration files
|
|
.terraformrc
|
|
terraform.rc
|
|
|
|
# Ignore lock files (optional, some prefer to commit these)
|
|
.terraform.lock.hcl
|
|
|
|
# SSH keys and sensitive files
|
|
*.pem
|
|
*.key
|
|
**/files/kubernetes_key*
|
|
**/files/*_key
|
|
|
|
# OS files
|
|
.DS_Store
|
|
Thumbs.db
|
|
|
|
# IDE files
|
|
.idea/
|
|
.vscode/
|
|
*.swp
|
|
*.swo
|
|
*~
|
|
|
|
# Backup files
|
|
*.backup
|
|
*.bak
|