Patrick de Ruiter 22d78bf85c
All checks were successful
Code Quality & Security Scan / TFLint (push) Successful in 24s
Code Quality & Security Scan / Tfsec Security Scan (push) Successful in 30s
Code Quality & Security Scan / Checkov Security Scan (push) Successful in 44s
Code Quality & Security Scan / Terraform Validate (push) Successful in 43s
Code Quality & Security Scan / SonarQube Trigger (push) Successful in 47s
Add ansible directory with vault_agent role and playbooks
- Remove ansible/ from .gitignore
- Add vault_agent role (copied from terraform-vsphere-infra)
- Add vault_agent-playbook.yml for deployment
- Include ansible collections (cloud.terraform, ansible.posix, etc.)
- Archive consul_template role as consul_template-legacy

The ansible directory contains the vault-agent deployment automation
that replaces the legacy consul-template approach.
2025-11-10 12:33:38 +01:00

34 lines
974 B
JSON

{
"collection_info": {
"namespace": "dsglaser",
"name": "cis_security",
"version": "1.5.4",
"authors": [
"David Glaser <dsglaser@gmail.com>"
],
"readme": "README.md",
"tags": [
"system",
"security"
],
"description": "A collection to implement Center for Internet Security (CIS) controls for RHEL (7-9) and RHEL clones\n(Oracle, CentOS), SLES 15, Ubuntu [18,20,22].04 LTS, Microsoft Windows Server 2019, and Microsoft Windows 10.\n",
"license": [],
"license_file": "LICENSE",
"dependencies": {
"community.general": "*",
"community.windows": "*"
},
"repository": "https://github.com/dsglaser/cis-security",
"documentation": null,
"homepage": null,
"issues": "https://github.com/dsglaser/cis-security/issues"
},
"file_manifest_file": {
"name": "FILES.json",
"ftype": "file",
"chksum_type": "sha256",
"chksum_sha256": "e93594d4dc3e6a315af170a1a1e2caa80b4c59193500ec44053b1b5925011856",
"format": 1
},
"format": 1
}