Patrick de Ruiter 22d78bf85c
All checks were successful
Code Quality & Security Scan / TFLint (push) Successful in 24s
Code Quality & Security Scan / Tfsec Security Scan (push) Successful in 30s
Code Quality & Security Scan / Checkov Security Scan (push) Successful in 44s
Code Quality & Security Scan / Terraform Validate (push) Successful in 43s
Code Quality & Security Scan / SonarQube Trigger (push) Successful in 47s
Add ansible directory with vault_agent role and playbooks
- Remove ansible/ from .gitignore
- Add vault_agent role (copied from terraform-vsphere-infra)
- Add vault_agent-playbook.yml for deployment
- Include ansible collections (cloud.terraform, ansible.posix, etc.)
- Archive consul_template role as consul_template-legacy

The ansible directory contains the vault-agent deployment automation
that replaces the legacy consul-template approach.
2025-11-10 12:33:38 +01:00

48 lines
1.1 KiB
JSON

{
"collection_info": {
"namespace": "community",
"name": "crypto",
"version": "2.26.0",
"authors": [
"Ansible (github.com/ansible)"
],
"readme": "README.md",
"tags": [
"acme",
"certificate",
"community",
"crl",
"cryptography",
"csr",
"dhparam",
"entrust",
"letsencrypt",
"luks",
"openssl",
"openssh",
"pkcs12"
],
"description": "Provides modules and plugins for many cryptographic operations.",
"license": [
"GPL-3.0-or-later",
"Apache-2.0",
"BSD-2-Clause",
"BSD-3-Clause",
"PSF-2.0"
],
"license_file": null,
"dependencies": {},
"repository": "https://github.com/ansible-collections/community.crypto",
"documentation": "https://docs.ansible.com/ansible/latest/collections/community/crypto/",
"homepage": "https://github.com/ansible-collections/community.crypto",
"issues": "https://github.com/ansible-collections/community.crypto/issues"
},
"file_manifest_file": {
"name": "FILES.json",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "745480cbdff9fb2d2d2f47fb1f2f91838682cdde49c7b4e021fa3ce93baad357",
"format": 1
},
"format": 1
}