From cc6ab67e25a73745860829c0a6e298e1651f5a42 Mon Sep 17 00:00:00 2001 From: Sam Weaver Date: Mon, 9 Sep 2024 15:36:17 -0400 Subject: [PATCH 1/2] Mark tads as abandoned --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 28c4f4d5..f65086d6 100644 --- a/README.md +++ b/README.md @@ -363,7 +363,7 @@ For more Community Modules not listed here please see the [Terraform Module Regi - [Shisho](https://github.com/flatt-security/shisho) - Lightweight static analyzer for Terraform. - [stacks](https://github.com/cisco-open/stacks) - Stacks, the Terraform code pre-processor - [Styra Declarative Authorization Service (DAS)](https://www.styra.com/terraform-cloud-config-management-with-styra-das-and-open-policy-agent) - Provides a managed [Open Policy Agent (OPA)](https://www.openpolicyagent.org) platform for Application and Infrastructure use cases, including Terraform, Terraform Cloud, and Kubernetes. Enforce policy guardrails during development, in CI/CD pipelines, and at deploy time. Styra DAS Free provides multiple systems and users, policy impact analysis, decision logging and replay, and access to Styra's Terraform policy library. -- [tads-boilerplate](https://github.com/Thomvaill/tads-boilerplate) - The power of Ansible and Terraform + the simplicity of Docker Swarm = Infrastructure as Code and DevOps best practices. +- [tads-boilerplate](https://github.com/Thomvaill/tads-boilerplate) - The power of Ansible and Terraform + the simplicity of Docker Swarm = Infrastructure as Code and DevOps best practices. :skull: - [tau](https://github.com/avinor/tau) - Tau is a thin wrapper on top of terraform to manage multiple deployments, dependencies, and secrets. - [terraboard](https://github.com/camptocamp/terraboard) - Web dashboard to inspect Terraform States. - [terraboot](https://github.com/MastodonC/terraboot) - DSL to generate a terraform configuration and run it. From 1376862eaaae196bd89ff56f15e155fab570507f Mon Sep 17 00:00:00 2001 From: Sam Weaver Date: Mon, 9 Sep 2024 15:37:20 -0400 Subject: [PATCH 2/2] Correction: mark tau as abandoned --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index f65086d6..b4d20c76 100644 --- a/README.md +++ b/README.md @@ -363,8 +363,8 @@ For more Community Modules not listed here please see the [Terraform Module Regi - [Shisho](https://github.com/flatt-security/shisho) - Lightweight static analyzer for Terraform. - [stacks](https://github.com/cisco-open/stacks) - Stacks, the Terraform code pre-processor - [Styra Declarative Authorization Service (DAS)](https://www.styra.com/terraform-cloud-config-management-with-styra-das-and-open-policy-agent) - Provides a managed [Open Policy Agent (OPA)](https://www.openpolicyagent.org) platform for Application and Infrastructure use cases, including Terraform, Terraform Cloud, and Kubernetes. Enforce policy guardrails during development, in CI/CD pipelines, and at deploy time. Styra DAS Free provides multiple systems and users, policy impact analysis, decision logging and replay, and access to Styra's Terraform policy library. -- [tads-boilerplate](https://github.com/Thomvaill/tads-boilerplate) - The power of Ansible and Terraform + the simplicity of Docker Swarm = Infrastructure as Code and DevOps best practices. :skull: -- [tau](https://github.com/avinor/tau) - Tau is a thin wrapper on top of terraform to manage multiple deployments, dependencies, and secrets. +- [tads-boilerplate](https://github.com/Thomvaill/tads-boilerplate) - The power of Ansible and Terraform + the simplicity of Docker Swarm = Infrastructure as Code and DevOps best practices. +- [tau](https://github.com/avinor/tau) - Tau is a thin wrapper on top of terraform to manage multiple deployments, dependencies, and secrets. :skull: - [terraboard](https://github.com/camptocamp/terraboard) - Web dashboard to inspect Terraform States. - [terraboot](https://github.com/MastodonC/terraboot) - DSL to generate a terraform configuration and run it. - [terracognita](https://github.com/cycloidio/terracognita) - Reads from existing Cloud Providers (reverse Terraform) and generates your infrastructure as code on Terraform configuration.