feat: add pre-commit check in ci
Some checks failed
ci/woodpecker/pr/pre-commit Pipeline failed

- add a ci workflow to verify pre-commit passes
- fix pre-commit errors/warnings:
  - missing required_version
  - missing required_providers
  - fixed terraform_deprecated_interpolation
  - removed terraform_unused_declarations
This commit is contained in:
Ben Vincent 2026-02-28 18:05:42 +11:00
parent 9e6de4dc32
commit b3f70d121e
28 changed files with 198 additions and 24 deletions

View File

@ -0,0 +1,9 @@
when:
- event: pull_request
steps:
- name: pre-commit
image: git.unkin.net/unkin/almalinux9-base:latest
commands:
- dnf install uv opentofu terragrunt tflint -y
- uvx pre-commit run --all-files

View File

@ -3,8 +3,6 @@ module "auth_approle_backend" {
for_each = var.auth_approle_backend for_each = var.auth_approle_backend
country = var.country
region = var.region
path = each.key path = each.key
listing_visibility = each.value.listing_visibility listing_visibility = each.value.listing_visibility
default_lease_ttl = each.value.default_lease_ttl default_lease_ttl = each.value.default_lease_ttl
@ -186,7 +184,6 @@ module "pki_secret_backend" {
crl_distribution_points = each.value.crl_distribution_points crl_distribution_points = each.value.crl_distribution_points
ocsp_servers = each.value.ocsp_servers ocsp_servers = each.value.ocsp_servers
enable_templating = each.value.enable_templating enable_templating = each.value.enable_templating
default_issuer_ref = each.value.default_issuer_ref
default_follows_latest_issuer = each.value.default_follows_latest_issuer default_follows_latest_issuer = each.value.default_follows_latest_issuer
crl_expiry = each.value.crl_expiry crl_expiry = each.value.crl_expiry
crl_disable = each.value.crl_disable crl_disable = each.value.crl_disable

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -1,13 +1,3 @@
variable "country" {
description = "Country identifier"
type = string
}
variable "region" {
description = "Region identifier"
type = string
}
variable "path" { variable "path" {
description = "Mount path of the AppRole auth backend" description = "Mount path of the AppRole auth backend"
type = string type = string

View File

@ -16,7 +16,7 @@ data "vault_kv_secret_v2" "role_config" {
locals { locals {
salt = data.vault_kv_secret_v2.salt_config.data["salt"] salt = data.vault_kv_secret_v2.salt_config.data["salt"]
role_id_input = "${local.salt}-${var.approle_name}-${var.mount_path}" role_id_input = "${local.salt}-${var.approle_name}-${var.mount_path}"
deterministic_role_id = uuidv5("dns", "${local.role_id_input}") deterministic_role_id = uuidv5("dns", local.role_id_input)
# Use deterministic role-id by default, or read from KV if specified # Use deterministic role-id by default, or read from KV if specified
role_id = var.use_deterministic_role_id ? local.deterministic_role_id : data.vault_kv_secret_v2.role_config[0].data["role_id"] role_id = var.use_deterministic_role_id ? local.deterministic_role_id : data.vault_kv_secret_v2.role_config[0].data["role_id"]

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,13 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
consul = {
source = "hashicorp/consul"
version = "2.23.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -5,11 +5,6 @@ resource "vault_mount" "pki" {
max_lease_ttl_seconds = var.max_lease_ttl_seconds max_lease_ttl_seconds = var.max_lease_ttl_seconds
} }
data "vault_pki_secret_backend_issuer" "issuer" {
backend = vault_mount.pki.path
issuer_ref = var.issuer_ref
}
resource "vault_pki_secret_backend_config_urls" "config_urls" { resource "vault_pki_secret_backend_config_urls" "config_urls" {
backend = vault_mount.pki.path backend = vault_mount.pki.path

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -0,0 +1,9 @@
terraform {
required_version = ">= 1.10"
required_providers {
vault = {
source = "hashicorp/vault"
version = "5.6.0"
}
}
}

View File

@ -166,7 +166,6 @@ variable "pki_secret_backend" {
crl_distribution_points = optional(list(string), []) crl_distribution_points = optional(list(string), [])
ocsp_servers = optional(list(string), []) ocsp_servers = optional(list(string), [])
enable_templating = optional(bool, false) enable_templating = optional(bool, false)
default_issuer_ref = optional(string)
default_follows_latest_issuer = optional(bool, false) default_follows_latest_issuer = optional(bool, false)
crl_expiry = optional(string, "72h") crl_expiry = optional(string, "72h")
crl_disable = optional(bool, false) crl_disable = optional(bool, false)