remove duplicates from real world corpus
This commit is contained in:
@@ -1,36 +0,0 @@
|
||||
# This file is generated by Consul Terraform Sync.
|
||||
#
|
||||
# The HCL blocks, arguments, variables, and values are derived from the
|
||||
# operator configuration for Sync. Any manual changes to this file
|
||||
# may not be preserved and could be overwritten by a subsequent update.
|
||||
#
|
||||
# Task: boundary
|
||||
# Description:
|
||||
|
||||
terraform {
|
||||
required_version = ">= 0.13.0, < 0.15"
|
||||
required_providers {
|
||||
boundary = {
|
||||
source = "hashicorp/boundary"
|
||||
version = "1.0.2"
|
||||
}
|
||||
}
|
||||
backend "consul" {
|
||||
address = "localhost:8500"
|
||||
gzip = true
|
||||
path = "consul-terraform-sync/terraform"
|
||||
}
|
||||
}
|
||||
|
||||
provider "boundary" {
|
||||
addr = var.boundary.addr
|
||||
recovery_kms_hcl = var.boundary.recovery_kms_hcl
|
||||
}
|
||||
|
||||
provider "http" {
|
||||
}
|
||||
|
||||
module "boundary" {
|
||||
source = "./boundary"
|
||||
services = var.services
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
terraform {
|
||||
required_version = ">= 0.14"
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
terraform {
|
||||
required_version = ">= 0.14"
|
||||
}
|
||||
@@ -1,9 +0,0 @@
|
||||
terraform {
|
||||
required_version = ">= 0.14"
|
||||
required_providers {
|
||||
aws = {
|
||||
source = "hashicorp/aws"
|
||||
version = "~> 3.38"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,13 +0,0 @@
|
||||
terraform {
|
||||
required_version = ">= 0.14"
|
||||
required_providers {
|
||||
aws = {
|
||||
source = "hashicorp/aws"
|
||||
version = "~> 3.38"
|
||||
}
|
||||
random = {
|
||||
source = "hashicorp/random"
|
||||
version = "~> 3.1"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,9 +0,0 @@
|
||||
terraform {
|
||||
required_version = ">= 0.14"
|
||||
required_providers {
|
||||
aws = {
|
||||
source = "hashicorp/aws"
|
||||
version = "~> 3.38"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,9 +0,0 @@
|
||||
terraform {
|
||||
required_version = ">= 0.14"
|
||||
required_providers {
|
||||
aws = {
|
||||
source = "hashicorp/aws"
|
||||
version = "~> 3.38"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,9 +0,0 @@
|
||||
terraform {
|
||||
required_version = ">= 0.14"
|
||||
required_providers {
|
||||
aws = {
|
||||
source = "hashicorp/aws"
|
||||
version = "~> 3.38"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,9 +0,0 @@
|
||||
terraform {
|
||||
required_version = ">= 0.14"
|
||||
required_providers {
|
||||
aws = {
|
||||
source = "hashicorp/aws"
|
||||
version = "~> 3.38"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,9 +0,0 @@
|
||||
terraform {
|
||||
required_version = ">= 0.14"
|
||||
required_providers {
|
||||
aws = {
|
||||
source = "hashicorp/aws"
|
||||
version = "~> 3.38"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,9 +0,0 @@
|
||||
terraform {
|
||||
required_version = ">= 0.14"
|
||||
required_providers {
|
||||
aws = {
|
||||
source = "hashicorp/aws"
|
||||
version = "~> 3.38"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,21 +0,0 @@
|
||||
# Application
|
||||
# -----------
|
||||
output "tfe_application_url" {
|
||||
value = module.tfe.tfe_application_url
|
||||
description = "Terraform Enterprise Application URL"
|
||||
}
|
||||
|
||||
output "login_url" {
|
||||
value = module.tfe.login_url
|
||||
description = "Login URL to setup the TFE instance once it is initialized"
|
||||
}
|
||||
|
||||
# SSH
|
||||
# ---
|
||||
output "instance_user_name" {
|
||||
value = module.tfe.instance_user_name
|
||||
}
|
||||
|
||||
output "instance_private_key" {
|
||||
value = module.tfe.instance_private_key
|
||||
}
|
||||
@@ -1,57 +0,0 @@
|
||||
# General
|
||||
# -------
|
||||
variable "friendly_name_prefix" {
|
||||
type = string
|
||||
description = "(Required) Name prefix used for resources"
|
||||
}
|
||||
|
||||
variable "domain_name" {
|
||||
default = ""
|
||||
type = string
|
||||
description = "Domain to create Terraform Enterprise subdomain within"
|
||||
}
|
||||
|
||||
variable "tfe_subdomain" {
|
||||
default = ""
|
||||
type = string
|
||||
description = "Subdomain for TFE"
|
||||
}
|
||||
|
||||
# Provider
|
||||
# --------
|
||||
variable "location" {
|
||||
default = "East US"
|
||||
type = string
|
||||
description = "Azure location name e.g. East US"
|
||||
}
|
||||
|
||||
variable "resource_group_name" {
|
||||
default = ""
|
||||
type = string
|
||||
description = "Azure resource group name"
|
||||
}
|
||||
|
||||
variable "resource_group_name_dns" {
|
||||
default = ""
|
||||
type = string
|
||||
description = "Name of resource group which contains desired DNS zone"
|
||||
}
|
||||
|
||||
variable "key_vault_name" {
|
||||
default = ""
|
||||
type = string
|
||||
description = "(recommended) Azure Key Vault name containing required certificate"
|
||||
}
|
||||
|
||||
variable "certificate_name" {
|
||||
default = ""
|
||||
type = string
|
||||
description = "(recommended) Azure Key Vault Certificate name for Application Gateway"
|
||||
}
|
||||
|
||||
# Tagging
|
||||
variable "tags" {
|
||||
default = {}
|
||||
type = map(string)
|
||||
description = "Map of tags for resource"
|
||||
}
|
||||
@@ -1,21 +0,0 @@
|
||||
# Application
|
||||
# -----------
|
||||
output "tfe_application_url" {
|
||||
value = module.tfe.tfe_application_url
|
||||
description = "Terraform Enterprise Application URL"
|
||||
}
|
||||
|
||||
output "login_url" {
|
||||
value = module.tfe.login_url
|
||||
description = "Login URL to setup the TFE instance once it is initialized"
|
||||
}
|
||||
|
||||
# SSH
|
||||
# ---
|
||||
output "instance_user_name" {
|
||||
value = module.tfe.instance_user_name
|
||||
}
|
||||
|
||||
output "instance_private_key" {
|
||||
value = module.tfe.instance_private_key
|
||||
}
|
||||
@@ -1,21 +0,0 @@
|
||||
# Application
|
||||
# -----------
|
||||
output "tfe_application_url" {
|
||||
value = module.tfe.tfe_application_url
|
||||
description = "Terraform Enterprise Application URL"
|
||||
}
|
||||
|
||||
output "login_url" {
|
||||
value = module.tfe.login_url
|
||||
description = "Login URL to setup the TFE instance once it is initialized"
|
||||
}
|
||||
|
||||
# SSH
|
||||
# ---
|
||||
output "instance_user_name" {
|
||||
value = module.tfe.instance_user_name
|
||||
}
|
||||
|
||||
output "instance_private_key" {
|
||||
value = module.tfe.instance_private_key
|
||||
}
|
||||
@@ -1,21 +0,0 @@
|
||||
# Application
|
||||
# -----------
|
||||
output "tfe_application_url" {
|
||||
value = module.tfe.tfe_application_url
|
||||
description = "Terraform Enterprise Application URL"
|
||||
}
|
||||
|
||||
output "login_url" {
|
||||
value = module.tfe.login_url
|
||||
description = "Login URL to setup the TFE instance once it is initialized"
|
||||
}
|
||||
|
||||
# SSH
|
||||
# ---
|
||||
output "instance_user_name" {
|
||||
value = module.tfe.instance_user_name
|
||||
}
|
||||
|
||||
output "instance_private_key" {
|
||||
value = module.tfe.instance_private_key
|
||||
}
|
||||
@@ -1,21 +0,0 @@
|
||||
# Application
|
||||
# -----------
|
||||
output "tfe_application_url" {
|
||||
value = module.tfe.tfe_application_url
|
||||
description = "Terraform Enterprise Application URL"
|
||||
}
|
||||
|
||||
output "login_url" {
|
||||
value = module.tfe.login_url
|
||||
description = "Login URL to setup the TFE instance once it is initialized"
|
||||
}
|
||||
|
||||
# SSH
|
||||
# ---
|
||||
output "instance_user_name" {
|
||||
value = module.tfe.instance_user_name
|
||||
}
|
||||
|
||||
output "instance_private_key" {
|
||||
value = module.tfe.instance_private_key
|
||||
}
|
||||
@@ -1,21 +0,0 @@
|
||||
# Application
|
||||
# -----------
|
||||
output "tfe_application_url" {
|
||||
value = module.tfe.tfe_application_url
|
||||
description = "Terraform Enterprise Application URL"
|
||||
}
|
||||
|
||||
output "login_url" {
|
||||
value = module.tfe.login_url
|
||||
description = "Login URL to setup the TFE instance once it is initialized"
|
||||
}
|
||||
|
||||
# SSH
|
||||
# ---
|
||||
output "instance_user_name" {
|
||||
value = module.tfe.instance_user_name
|
||||
}
|
||||
|
||||
output "instance_private_key" {
|
||||
value = module.tfe.instance_private_key
|
||||
}
|
||||
@@ -1,21 +0,0 @@
|
||||
# Application
|
||||
# -----------
|
||||
output "tfe_application_url" {
|
||||
value = module.tfe.tfe_application_url
|
||||
description = "Terraform Enterprise Application URL"
|
||||
}
|
||||
|
||||
output "login_url" {
|
||||
value = module.tfe.login_url
|
||||
description = "Login URL to setup the TFE instance once it is initialized"
|
||||
}
|
||||
|
||||
# SSH
|
||||
# ---
|
||||
output "instance_user_name" {
|
||||
value = module.tfe.instance_user_name
|
||||
}
|
||||
|
||||
output "instance_private_key" {
|
||||
value = module.tfe.instance_private_key
|
||||
}
|
||||
@@ -1,9 +0,0 @@
|
||||
output "lb_address" {
|
||||
value = module.tfe.lb_address
|
||||
description = "Load Balancer Address"
|
||||
}
|
||||
|
||||
output "login_url" {
|
||||
value = module.tfe.login_url
|
||||
description = "Login URL to setup the TFE instance once it is initialized"
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
output "tfe" {
|
||||
value = module.tfe
|
||||
}
|
||||
@@ -1,90 +0,0 @@
|
||||
provider "google" {
|
||||
credentials = file(var.credentials_file)
|
||||
project = var.project
|
||||
region = var.region
|
||||
}
|
||||
|
||||
provider "google-beta" {
|
||||
credentials = file(var.credentials_file)
|
||||
project = var.project
|
||||
region = var.region
|
||||
}
|
||||
|
||||
resource "tls_locally_signed_cert" "main" {
|
||||
cert_request_pem = tls_cert_request.main.cert_request_pem
|
||||
ca_key_algorithm = tls_private_key.ca.algorithm
|
||||
ca_private_key_pem = tls_private_key.ca.private_key_pem
|
||||
ca_cert_pem = tls_self_signed_cert.ca.cert_pem
|
||||
validity_period_hours = 24 * 30 * 6
|
||||
|
||||
allowed_uses = [
|
||||
"key_encipherment",
|
||||
"digital_signature",
|
||||
]
|
||||
}
|
||||
|
||||
resource "tls_cert_request" "main" {
|
||||
key_algorithm = tls_private_key.main.algorithm
|
||||
private_key_pem = tls_private_key.main.private_key_pem
|
||||
|
||||
subject {
|
||||
common_name = var.fqdn
|
||||
organization = "Terraform Enterprise Private Certificate"
|
||||
}
|
||||
|
||||
dns_names = [var.fqdn]
|
||||
}
|
||||
|
||||
resource "tls_private_key" "ca" {
|
||||
algorithm = "RSA"
|
||||
}
|
||||
|
||||
resource "tls_self_signed_cert" "ca" {
|
||||
key_algorithm = tls_private_key.ca.algorithm
|
||||
private_key_pem = tls_private_key.ca.private_key_pem
|
||||
validity_period_hours = 24 * 30 * 6
|
||||
|
||||
subject {
|
||||
organization = "HashiCorp (NonTrusted)"
|
||||
common_name = "HashiCorp (NonTrusted) Private Certificate Authority"
|
||||
country = "US"
|
||||
}
|
||||
|
||||
is_ca_certificate = true
|
||||
|
||||
allowed_uses = [
|
||||
"cert_signing",
|
||||
"key_encipherment",
|
||||
"digital_signature"
|
||||
]
|
||||
}
|
||||
|
||||
resource "tls_private_key" "main" {
|
||||
algorithm = "RSA"
|
||||
}
|
||||
|
||||
resource "google_compute_region_ssl_certificate" "main" {
|
||||
certificate = "${tls_locally_signed_cert.main.cert_pem}\n${tls_self_signed_cert.ca.cert_pem}"
|
||||
private_key = tls_private_key.main.private_key_pem
|
||||
|
||||
description = "The regional SSL certificate of the private load balancer for TFE."
|
||||
name_prefix = "ptfe-"
|
||||
|
||||
lifecycle {
|
||||
create_before_destroy = true
|
||||
}
|
||||
}
|
||||
|
||||
module "tfe" {
|
||||
source = "../../"
|
||||
|
||||
namespace = var.namespace
|
||||
node_count = var.node_count
|
||||
tfe_license_path = var.tfe_license_path
|
||||
tfe_license_name = var.tfe_license_name
|
||||
fqdn = var.fqdn
|
||||
ssl_certificate_name = google_compute_region_ssl_certificate.main.name
|
||||
network = var.network
|
||||
subnetwork = var.subnetwork
|
||||
dns_zone_name = var.dns_zone_name
|
||||
}
|
||||
@@ -1,14 +0,0 @@
|
||||
output "replicated_console_password" {
|
||||
value = module.tfe.replicated_console_password
|
||||
description = "Generated password for replicated dashboard"
|
||||
}
|
||||
|
||||
output "lb_address" {
|
||||
value = module.tfe.lb_address
|
||||
description = "Load Balancer Address"
|
||||
}
|
||||
|
||||
output "login_url" {
|
||||
value = module.tfe.login_url
|
||||
description = "Login URL to setup the TFE instance once it is initialized"
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
output "tfe" {
|
||||
value = module.tfe
|
||||
}
|
||||
@@ -1,4 +0,0 @@
|
||||
variable "dns_zone_name" {}
|
||||
variable "fqdn" {}
|
||||
variable "namespace" {}
|
||||
variable "tfe_license_path" {}
|
||||
@@ -1,9 +0,0 @@
|
||||
output "lb_address" {
|
||||
value = module.tfe.lb_address
|
||||
description = "Load Balancer Address"
|
||||
}
|
||||
|
||||
output "login_url" {
|
||||
value = module.tfe.login_url
|
||||
description = "Login URL to setup the TFE instance once it is initialized"
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
output "address" {
|
||||
value = google_compute_address.internal.address
|
||||
}
|
||||
@@ -1,7 +0,0 @@
|
||||
variable "namespace" {}
|
||||
variable "fqdn" {}
|
||||
variable "instance_group" {}
|
||||
variable "ssl_certificate_name" {}
|
||||
variable "dns_zone_name" {}
|
||||
variable "subnet" {}
|
||||
variable "dns_create_record" {}
|
||||
@@ -1,7 +0,0 @@
|
||||
|
||||
module "child_c" {
|
||||
# In the unit test where this fixture is used, we treat the source strings
|
||||
# as relative paths from the fixture directory rather than as source
|
||||
# addresses as we would in a real module walker.
|
||||
source = "./child_c"
|
||||
}
|
||||
@@ -1,9 +0,0 @@
|
||||
module "child" {
|
||||
source = "./child"
|
||||
}
|
||||
|
||||
resource "aws_instance" "a" {
|
||||
ami = "parent"
|
||||
|
||||
depends_on = ["module.child"]
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
resource "aws_instance" "c" {
|
||||
ami = "grandchild"
|
||||
}
|
||||
@@ -1,7 +0,0 @@
|
||||
resource "aws_instance" "foo" {
|
||||
num = "2"
|
||||
}
|
||||
|
||||
resource "aws_instance" "bar" {
|
||||
num = "2"
|
||||
}
|
||||
@@ -1,7 +0,0 @@
|
||||
variable "key" {}
|
||||
|
||||
provider "test" {
|
||||
test_string = "${var.key}"
|
||||
}
|
||||
|
||||
resource "test_object" "foo" {}
|
||||
@@ -1,8 +0,0 @@
|
||||
variable "foo" {
|
||||
default = "3"
|
||||
}
|
||||
|
||||
module "child" {
|
||||
source = "./child"
|
||||
value = "${var.foo}"
|
||||
}
|
||||
@@ -1,5 +0,0 @@
|
||||
variable "value" {}
|
||||
|
||||
resource "aws_instance" "foo" {
|
||||
count = "${var.value}"
|
||||
}
|
||||
@@ -1,5 +0,0 @@
|
||||
variable "input" {}
|
||||
|
||||
resource "aws_instance" "foo" {
|
||||
foo = "${var.input}"
|
||||
}
|
||||
@@ -1,5 +0,0 @@
|
||||
variable "input" {}
|
||||
|
||||
resource "aws_instance" "foo" {
|
||||
foo = "${var.input}"
|
||||
}
|
||||
@@ -1,11 +0,0 @@
|
||||
module "child" {
|
||||
source = "./child"
|
||||
}
|
||||
|
||||
provider "aws" {
|
||||
from = "root"
|
||||
}
|
||||
|
||||
resource "aws_instance" "foo" {
|
||||
from = "root"
|
||||
}
|
||||
@@ -1,8 +0,0 @@
|
||||
provider "aws" {
|
||||
from = "child"
|
||||
to = "child"
|
||||
}
|
||||
|
||||
resource "aws_instance" "foo" {
|
||||
from = "child"
|
||||
}
|
||||
@@ -1,7 +0,0 @@
|
||||
resource "test_resource" "for_output" {
|
||||
required = "val"
|
||||
}
|
||||
|
||||
output "object" {
|
||||
value = test_resource.for_output
|
||||
}
|
||||
@@ -1,7 +0,0 @@
|
||||
variable "key" {}
|
||||
|
||||
provider "null" {
|
||||
key = "${var.key}"
|
||||
}
|
||||
|
||||
resource "null_resource" "foo" {}
|
||||
@@ -1 +0,0 @@
|
||||
resource "aws_instance" "web" {}
|
||||
@@ -1,5 +0,0 @@
|
||||
variable "value" {}
|
||||
|
||||
output "result" {
|
||||
value = "${var.value}"
|
||||
}
|
||||
@@ -1 +0,0 @@
|
||||
resource "aws_instance" "web" {}
|
||||
@@ -1,11 +0,0 @@
|
||||
terraform {
|
||||
required_providers {
|
||||
my-aws = {
|
||||
source = "hashicorp/aws"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_instance" "web" {
|
||||
provider = "my-aws"
|
||||
}
|
||||
@@ -1,11 +0,0 @@
|
||||
provider "aws" {
|
||||
alias = "foo"
|
||||
value = "config"
|
||||
}
|
||||
|
||||
module "child" {
|
||||
source = "./child"
|
||||
providers = {
|
||||
aws.bar = aws.foo
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user