This commit message captures the major architectural change of implementing Consul ACL management with proper provider aliasing, along with the supporting configuration files and policy definitions for various terraform services. - add consul_acl_management module to manage consul acl policies and roles - add consul backend roles and policies for terraform services (incus, k8s, nomad, repoflow, vault) - add consul provider configuration to root.hcl - add policies to generate credentials for each role - simplify consul_secret_backend_role module to reference acl-managed roles - switch to opentofu for provider foreach support - update terragrunt configuration to support consul backend aliases - update pre-commit hooks to use opentofu instead of terraform - configure tflint exceptions for consul acl management module
8 lines
208 B
YAML
8 lines
208 B
YAML
description: "consul secret engine for au-syd1 cluster"
|
|
default_lease_ttl_seconds: 600
|
|
max_lease_ttl_seconds: 86400
|
|
address: "consul.service.au-syd1.consul"
|
|
scheme: https
|
|
bootstrap: false
|
|
datacenter: au-syd1
|