* Use alternate self-sufficient shellcheck precommit This pre-commit does not require prerequisite on the host, making it easier to run in CI workflows. * Switch to upstream ansible-lint pre-commit hook This way, the hook is self contained and does not depend on a previous virtualenv installation. * pre-commit: fix hooks dependencies - ansible-syntax-check - tox-inventory-builder - jinja-syntax-check * Fix ci-matrix pre-commit hook - Remove dependency of pydblite which fails to setup on recent pythons - Discard shell script and put everything into pre-commit * pre-commit: apply autofixes hooks and fix the rest manually - markdownlint (manual fix) - end-of-file-fixer - requirements-txt-fixer - trailing-whitespace * Convert check_typo to pre-commit + use maintained version client9/misspell is unmaintained, and has been forked by the golangci team, see https://github.com/client9/misspell/issues/197#issuecomment-1596318684. They haven't yet added a pre-commit config, so use my fork with the pre-commit hook config until the pull request is merged. * collection-build-install convert to pre-commit * Run pre-commit hooks in dynamic pipeline Use gitlab dynamic child pipelines feature to have one source of truth for the pre-commit jobs, the pre-commit config file. Use one cache per pre-commit. This should reduce the "fetching cache" time steps in gitlab-ci, since each job will have a separate cache with only its hook installed. * Remove gitlab-ci job done in pre-commit * pre-commit: adjust mardownlint default, md fixes Use a style file as recommended by upstream. This makes for only one source of truth. Conserve previous upstream default for MD007 (upstream default changed here https://github.com/markdownlint/markdownlint/pull/373) * Update pre-commit hooks --------- Co-authored-by: Max Gautier <mg@max.gautier.name>
110 lines
1.8 KiB
HCL
110 lines
1.8 KiB
HCL
variable "prefix" {
|
|
type = string
|
|
}
|
|
|
|
variable "zone" {
|
|
type = string
|
|
}
|
|
|
|
variable "template_name" {}
|
|
|
|
variable "username" {}
|
|
|
|
variable "private_network_cidr" {}
|
|
|
|
variable "machines" {
|
|
description = "Cluster machines"
|
|
type = map(object({
|
|
node_type = string
|
|
plan = string
|
|
cpu = string
|
|
mem = string
|
|
disk_size = number
|
|
additional_disks = map(object({
|
|
size = number
|
|
tier = string
|
|
}))
|
|
}))
|
|
}
|
|
|
|
variable "ssh_public_keys" {
|
|
type = list(string)
|
|
}
|
|
|
|
variable "firewall_enabled" {
|
|
type = bool
|
|
}
|
|
|
|
variable "master_allowed_remote_ips" {
|
|
type = list(object({
|
|
start_address = string
|
|
end_address = string
|
|
}))
|
|
}
|
|
|
|
variable "k8s_allowed_remote_ips" {
|
|
type = list(object({
|
|
start_address = string
|
|
end_address = string
|
|
}))
|
|
}
|
|
|
|
variable "master_allowed_ports" {
|
|
type = list(object({
|
|
protocol = string
|
|
port_range_min = number
|
|
port_range_max = number
|
|
start_address = string
|
|
end_address = string
|
|
}))
|
|
}
|
|
|
|
variable "worker_allowed_ports" {
|
|
type = list(object({
|
|
protocol = string
|
|
port_range_min = number
|
|
port_range_max = number
|
|
start_address = string
|
|
end_address = string
|
|
}))
|
|
}
|
|
|
|
variable "firewall_default_deny_in" {
|
|
type = bool
|
|
}
|
|
|
|
variable "firewall_default_deny_out" {
|
|
type = bool
|
|
}
|
|
|
|
variable "loadbalancer_enabled" {
|
|
type = bool
|
|
}
|
|
|
|
variable "loadbalancer_plan" {
|
|
type = string
|
|
}
|
|
|
|
variable "loadbalancer_outbound_proxy_protocol" {
|
|
type = string
|
|
}
|
|
|
|
variable "loadbalancers" {
|
|
description = "Load balancers"
|
|
|
|
type = map(object({
|
|
port = number
|
|
target_port = number
|
|
backend_servers = list(string)
|
|
}))
|
|
}
|
|
|
|
variable "server_groups" {
|
|
description = "Server groups"
|
|
|
|
type = map(object({
|
|
anti_affinity_policy = string
|
|
servers = list(string)
|
|
}))
|
|
}
|