remove duplicates from real world corpus

This commit is contained in:
mhoffm
2021-06-25 15:17:25 +02:00
parent 7182e1745c
commit 77b51d1b78
123 changed files with 0 additions and 2780 deletions

View File

@@ -1,36 +0,0 @@
# This file is generated by Consul Terraform Sync.
#
# The HCL blocks, arguments, variables, and values are derived from the
# operator configuration for Sync. Any manual changes to this file
# may not be preserved and could be overwritten by a subsequent update.
#
# Task: boundary
# Description:
terraform {
required_version = ">= 0.13.0, < 0.15"
required_providers {
boundary = {
source = "hashicorp/boundary"
version = "1.0.2"
}
}
backend "consul" {
address = "localhost:8500"
gzip = true
path = "consul-terraform-sync/terraform"
}
}
provider "boundary" {
addr = var.boundary.addr
recovery_kms_hcl = var.boundary.recovery_kms_hcl
}
provider "http" {
}
module "boundary" {
source = "./boundary"
services = var.services
}

View File

@@ -1,9 +0,0 @@
terraform {
required_version = ">= 0.14"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 3.38"
}
}
}

View File

@@ -1,13 +0,0 @@
terraform {
required_version = ">= 0.14"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 3.38"
}
random = {
source = "hashicorp/random"
version = "~> 3.1"
}
}
}

View File

@@ -1,9 +0,0 @@
terraform {
required_version = ">= 0.14"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 3.38"
}
}
}

View File

@@ -1,9 +0,0 @@
terraform {
required_version = ">= 0.14"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 3.38"
}
}
}

View File

@@ -1,9 +0,0 @@
terraform {
required_version = ">= 0.14"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 3.38"
}
}
}

View File

@@ -1,9 +0,0 @@
terraform {
required_version = ">= 0.14"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 3.38"
}
}
}

View File

@@ -1,9 +0,0 @@
terraform {
required_version = ">= 0.14"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 3.38"
}
}
}

View File

@@ -1,9 +0,0 @@
terraform {
required_version = ">= 0.14"
required_providers {
aws = {
source = "hashicorp/aws"
version = "~> 3.38"
}
}
}

View File

@@ -1,21 +0,0 @@
# Application
# -----------
output "tfe_application_url" {
value = module.tfe.tfe_application_url
description = "Terraform Enterprise Application URL"
}
output "login_url" {
value = module.tfe.login_url
description = "Login URL to setup the TFE instance once it is initialized"
}
# SSH
# ---
output "instance_user_name" {
value = module.tfe.instance_user_name
}
output "instance_private_key" {
value = module.tfe.instance_private_key
}

View File

@@ -1,57 +0,0 @@
# General
# -------
variable "friendly_name_prefix" {
type = string
description = "(Required) Name prefix used for resources"
}
variable "domain_name" {
default = ""
type = string
description = "Domain to create Terraform Enterprise subdomain within"
}
variable "tfe_subdomain" {
default = ""
type = string
description = "Subdomain for TFE"
}
# Provider
# --------
variable "location" {
default = "East US"
type = string
description = "Azure location name e.g. East US"
}
variable "resource_group_name" {
default = ""
type = string
description = "Azure resource group name"
}
variable "resource_group_name_dns" {
default = ""
type = string
description = "Name of resource group which contains desired DNS zone"
}
variable "key_vault_name" {
default = ""
type = string
description = "(recommended) Azure Key Vault name containing required certificate"
}
variable "certificate_name" {
default = ""
type = string
description = "(recommended) Azure Key Vault Certificate name for Application Gateway"
}
# Tagging
variable "tags" {
default = {}
type = map(string)
description = "Map of tags for resource"
}

View File

@@ -1,21 +0,0 @@
# Application
# -----------
output "tfe_application_url" {
value = module.tfe.tfe_application_url
description = "Terraform Enterprise Application URL"
}
output "login_url" {
value = module.tfe.login_url
description = "Login URL to setup the TFE instance once it is initialized"
}
# SSH
# ---
output "instance_user_name" {
value = module.tfe.instance_user_name
}
output "instance_private_key" {
value = module.tfe.instance_private_key
}

View File

@@ -1,21 +0,0 @@
# Application
# -----------
output "tfe_application_url" {
value = module.tfe.tfe_application_url
description = "Terraform Enterprise Application URL"
}
output "login_url" {
value = module.tfe.login_url
description = "Login URL to setup the TFE instance once it is initialized"
}
# SSH
# ---
output "instance_user_name" {
value = module.tfe.instance_user_name
}
output "instance_private_key" {
value = module.tfe.instance_private_key
}

View File

@@ -1,21 +0,0 @@
# Application
# -----------
output "tfe_application_url" {
value = module.tfe.tfe_application_url
description = "Terraform Enterprise Application URL"
}
output "login_url" {
value = module.tfe.login_url
description = "Login URL to setup the TFE instance once it is initialized"
}
# SSH
# ---
output "instance_user_name" {
value = module.tfe.instance_user_name
}
output "instance_private_key" {
value = module.tfe.instance_private_key
}

View File

@@ -1,21 +0,0 @@
# Application
# -----------
output "tfe_application_url" {
value = module.tfe.tfe_application_url
description = "Terraform Enterprise Application URL"
}
output "login_url" {
value = module.tfe.login_url
description = "Login URL to setup the TFE instance once it is initialized"
}
# SSH
# ---
output "instance_user_name" {
value = module.tfe.instance_user_name
}
output "instance_private_key" {
value = module.tfe.instance_private_key
}

View File

@@ -1,21 +0,0 @@
# Application
# -----------
output "tfe_application_url" {
value = module.tfe.tfe_application_url
description = "Terraform Enterprise Application URL"
}
output "login_url" {
value = module.tfe.login_url
description = "Login URL to setup the TFE instance once it is initialized"
}
# SSH
# ---
output "instance_user_name" {
value = module.tfe.instance_user_name
}
output "instance_private_key" {
value = module.tfe.instance_private_key
}

View File

@@ -1,21 +0,0 @@
# Application
# -----------
output "tfe_application_url" {
value = module.tfe.tfe_application_url
description = "Terraform Enterprise Application URL"
}
output "login_url" {
value = module.tfe.login_url
description = "Login URL to setup the TFE instance once it is initialized"
}
# SSH
# ---
output "instance_user_name" {
value = module.tfe.instance_user_name
}
output "instance_private_key" {
value = module.tfe.instance_private_key
}

View File

@@ -1,9 +0,0 @@
output "lb_address" {
value = module.tfe.lb_address
description = "Load Balancer Address"
}
output "login_url" {
value = module.tfe.login_url
description = "Login URL to setup the TFE instance once it is initialized"
}

View File

@@ -1,90 +0,0 @@
provider "google" {
credentials = file(var.credentials_file)
project = var.project
region = var.region
}
provider "google-beta" {
credentials = file(var.credentials_file)
project = var.project
region = var.region
}
resource "tls_locally_signed_cert" "main" {
cert_request_pem = tls_cert_request.main.cert_request_pem
ca_key_algorithm = tls_private_key.ca.algorithm
ca_private_key_pem = tls_private_key.ca.private_key_pem
ca_cert_pem = tls_self_signed_cert.ca.cert_pem
validity_period_hours = 24 * 30 * 6
allowed_uses = [
"key_encipherment",
"digital_signature",
]
}
resource "tls_cert_request" "main" {
key_algorithm = tls_private_key.main.algorithm
private_key_pem = tls_private_key.main.private_key_pem
subject {
common_name = var.fqdn
organization = "Terraform Enterprise Private Certificate"
}
dns_names = [var.fqdn]
}
resource "tls_private_key" "ca" {
algorithm = "RSA"
}
resource "tls_self_signed_cert" "ca" {
key_algorithm = tls_private_key.ca.algorithm
private_key_pem = tls_private_key.ca.private_key_pem
validity_period_hours = 24 * 30 * 6
subject {
organization = "HashiCorp (NonTrusted)"
common_name = "HashiCorp (NonTrusted) Private Certificate Authority"
country = "US"
}
is_ca_certificate = true
allowed_uses = [
"cert_signing",
"key_encipherment",
"digital_signature"
]
}
resource "tls_private_key" "main" {
algorithm = "RSA"
}
resource "google_compute_region_ssl_certificate" "main" {
certificate = "${tls_locally_signed_cert.main.cert_pem}\n${tls_self_signed_cert.ca.cert_pem}"
private_key = tls_private_key.main.private_key_pem
description = "The regional SSL certificate of the private load balancer for TFE."
name_prefix = "ptfe-"
lifecycle {
create_before_destroy = true
}
}
module "tfe" {
source = "../../"
namespace = var.namespace
node_count = var.node_count
tfe_license_path = var.tfe_license_path
tfe_license_name = var.tfe_license_name
fqdn = var.fqdn
ssl_certificate_name = google_compute_region_ssl_certificate.main.name
network = var.network
subnetwork = var.subnetwork
dns_zone_name = var.dns_zone_name
}

View File

@@ -1,14 +0,0 @@
output "replicated_console_password" {
value = module.tfe.replicated_console_password
description = "Generated password for replicated dashboard"
}
output "lb_address" {
value = module.tfe.lb_address
description = "Load Balancer Address"
}
output "login_url" {
value = module.tfe.login_url
description = "Login URL to setup the TFE instance once it is initialized"
}

View File

@@ -1,4 +0,0 @@
variable "dns_zone_name" {}
variable "fqdn" {}
variable "namespace" {}
variable "tfe_license_path" {}

View File

@@ -1,9 +0,0 @@
output "lb_address" {
value = module.tfe.lb_address
description = "Load Balancer Address"
}
output "login_url" {
value = module.tfe.login_url
description = "Login URL to setup the TFE instance once it is initialized"
}

View File

@@ -1,3 +0,0 @@
output "address" {
value = google_compute_address.internal.address
}

View File

@@ -1,7 +0,0 @@
variable "namespace" {}
variable "fqdn" {}
variable "instance_group" {}
variable "ssl_certificate_name" {}
variable "dns_zone_name" {}
variable "subnet" {}
variable "dns_create_record" {}

View File

@@ -1,7 +0,0 @@
module "child_c" {
# In the unit test where this fixture is used, we treat the source strings
# as relative paths from the fixture directory rather than as source
# addresses as we would in a real module walker.
source = "./child_c"
}

View File

@@ -1,9 +0,0 @@
module "child" {
source = "./child"
}
resource "aws_instance" "a" {
ami = "parent"
depends_on = ["module.child"]
}

View File

@@ -1,7 +0,0 @@
resource "aws_instance" "foo" {
num = "2"
}
resource "aws_instance" "bar" {
num = "2"
}

View File

@@ -1,7 +0,0 @@
variable "key" {}
provider "test" {
test_string = "${var.key}"
}
resource "test_object" "foo" {}

View File

@@ -1,8 +0,0 @@
variable "foo" {
default = "3"
}
module "child" {
source = "./child"
value = "${var.foo}"
}

View File

@@ -1,5 +0,0 @@
variable "value" {}
resource "aws_instance" "foo" {
count = "${var.value}"
}

View File

@@ -1,5 +0,0 @@
variable "input" {}
resource "aws_instance" "foo" {
foo = "${var.input}"
}

View File

@@ -1,5 +0,0 @@
variable "input" {}
resource "aws_instance" "foo" {
foo = "${var.input}"
}

View File

@@ -1,11 +0,0 @@
module "child" {
source = "./child"
}
provider "aws" {
from = "root"
}
resource "aws_instance" "foo" {
from = "root"
}

View File

@@ -1,8 +0,0 @@
provider "aws" {
from = "child"
to = "child"
}
resource "aws_instance" "foo" {
from = "child"
}

View File

@@ -1,7 +0,0 @@
resource "test_resource" "for_output" {
required = "val"
}
output "object" {
value = test_resource.for_output
}

View File

@@ -1,7 +0,0 @@
variable "key" {}
provider "null" {
key = "${var.key}"
}
resource "null_resource" "foo" {}

View File

@@ -1,5 +0,0 @@
variable "value" {}
output "result" {
value = "${var.value}"
}

View File

@@ -1,11 +0,0 @@
terraform {
required_providers {
my-aws = {
source = "hashicorp/aws"
}
}
}
resource "aws_instance" "web" {
provider = "my-aws"
}

View File

@@ -1,11 +0,0 @@
provider "aws" {
alias = "foo"
value = "config"
}
module "child" {
source = "./child"
providers = {
aws.bar = aws.foo
}
}