All checks were successful
Code Quality & Security Scan / TFLint (push) Successful in 24s
Code Quality & Security Scan / Tfsec Security Scan (push) Successful in 30s
Code Quality & Security Scan / Checkov Security Scan (push) Successful in 44s
Code Quality & Security Scan / Terraform Validate (push) Successful in 43s
Code Quality & Security Scan / SonarQube Trigger (push) Successful in 47s
- Remove ansible/ from .gitignore - Add vault_agent role (copied from terraform-vsphere-infra) - Add vault_agent-playbook.yml for deployment - Include ansible collections (cloud.terraform, ansible.posix, etc.) - Archive consul_template role as consul_template-legacy The ansible directory contains the vault-agent deployment automation that replaces the legacy consul-template approach.
34 lines
974 B
JSON
34 lines
974 B
JSON
{
|
|
"collection_info": {
|
|
"namespace": "dsglaser",
|
|
"name": "cis_security",
|
|
"version": "1.5.4",
|
|
"authors": [
|
|
"David Glaser <dsglaser@gmail.com>"
|
|
],
|
|
"readme": "README.md",
|
|
"tags": [
|
|
"system",
|
|
"security"
|
|
],
|
|
"description": "A collection to implement Center for Internet Security (CIS) controls for RHEL (7-9) and RHEL clones\n(Oracle, CentOS), SLES 15, Ubuntu [18,20,22].04 LTS, Microsoft Windows Server 2019, and Microsoft Windows 10.\n",
|
|
"license": [],
|
|
"license_file": "LICENSE",
|
|
"dependencies": {
|
|
"community.general": "*",
|
|
"community.windows": "*"
|
|
},
|
|
"repository": "https://github.com/dsglaser/cis-security",
|
|
"documentation": null,
|
|
"homepage": null,
|
|
"issues": "https://github.com/dsglaser/cis-security/issues"
|
|
},
|
|
"file_manifest_file": {
|
|
"name": "FILES.json",
|
|
"ftype": "file",
|
|
"chksum_type": "sha256",
|
|
"chksum_sha256": "e93594d4dc3e6a315af170a1a1e2caa80b4c59193500ec44053b1b5925011856",
|
|
"format": 1
|
|
},
|
|
"format": 1
|
|
} |