All checks were successful
Code Quality & Security Scan / TFLint (push) Successful in 24s
Code Quality & Security Scan / Tfsec Security Scan (push) Successful in 30s
Code Quality & Security Scan / Checkov Security Scan (push) Successful in 44s
Code Quality & Security Scan / Terraform Validate (push) Successful in 43s
Code Quality & Security Scan / SonarQube Trigger (push) Successful in 47s
- Remove ansible/ from .gitignore - Add vault_agent role (copied from terraform-vsphere-infra) - Add vault_agent-playbook.yml for deployment - Include ansible collections (cloud.terraform, ansible.posix, etc.) - Archive consul_template role as consul_template-legacy The ansible directory contains the vault-agent deployment automation that replaces the legacy consul-template approach.
33 lines
846 B
JSON
33 lines
846 B
JSON
{
|
|
"collection_info": {
|
|
"namespace": "cloud",
|
|
"name": "terraform",
|
|
"version": "3.0.0",
|
|
"authors": [
|
|
"Ansible (https://github.com/ansible)"
|
|
],
|
|
"readme": "README.md",
|
|
"tags": [
|
|
"terraform",
|
|
"cloud",
|
|
"infrastructure",
|
|
"cluster"
|
|
],
|
|
"description": "Terraform collection for Ansible.",
|
|
"license": [],
|
|
"license_file": "LICENSE",
|
|
"dependencies": {},
|
|
"repository": "https://github.com/ansible-collections/cloud.terraform",
|
|
"documentation": null,
|
|
"homepage": "https://github.com/ansible-collections/cloud.terraform",
|
|
"issues": "https://github.com/ansible-collections/cloud.terraform/issues"
|
|
},
|
|
"file_manifest_file": {
|
|
"name": "FILES.json",
|
|
"ftype": "file",
|
|
"chksum_type": "sha256",
|
|
"chksum_sha256": "67698c452c907a36715f6dd61b0814f4e45ccae7567b1abb926c4631f515602b",
|
|
"format": 1
|
|
},
|
|
"format": 1
|
|
} |