-
Notifications
You must be signed in to change notification settings - Fork 14
/
galaxy.yml
91 lines (76 loc) · 3.27 KB
/
galaxy.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
---
### REQUIRED
# The namespace of the collection. This can be a company/brand/organization or product namespace under which all
# content lives. May only contain alphanumeric lowercase characters and underscores. Namespaces cannot start with
# underscores or numbers and cannot contain consecutive underscores
namespace: ansible_lockdown
# The name of the collection. Has the same character restrictions as 'namespace'
name: stig_benchmarks
# The version of the collection. Must be compatible with semantic versioning
version: 0.0.1
# The path to the Markdown (.md) readme file. This path is relative to the root of the collection
readme: README.md
# A list of the collection's content authors. Can be just the name or in the format 'Full Name <email> (url)
# @nicks:irc/im.site#channel'
authors:
- uk-bolly @uk-bolly
### OPTIONAL but strongly recommended
# A short summary description of the collection
description: A Collection of STIG baselines roles for Linux Systems
# Either a single license or a list of licenses for content inside of a collection. Ansible Galaxy currently only
# accepts L(SPDX,https://spdx.org/licenses/) licenses. This key is mutually exclusive with 'license_file'
license:
- MIT
# A list of tags you want to associate with the collection for indexing/searching. A tag name has the same character
# requirements as 'namespace' and 'name'
tags:
- ansible-lockdown
- mindpointgroup
- stig
- disa
- devsecops
- rhel7
- rhel7-stig
- rhel8
- rhel8-stig
- ubuntu18
- ubuntu18-stig
- ubuntu20
- ubuntu20-stig
- security,benchmark
- compliance-as-code
- rhel
- benchmark-framework
- redhat
- ubuntu-server
- security-hardening
- security-audit
- goss
- audit
- linux
- system-hardening
- hardening
# Collections that this collection requires to be installed for it to be usable. The key of the dict is the
# collection label 'namespace.name'. The value is a version range
# L(specifiers,https://python-semanticversion.readthedocs.io/en/latest/#requirement-specification). Multiple version
# range specifiers can be set and are separated by ','
dependencies: {}
# The URL of the originating SCM repository
repository: http://github.com/ansible-lockdown/stig_collection
# The URL to any online docs
documentation: https://ansible-lockdown.readthedocs.io/en/latest/
# The URL to the homepage of the collection/project
homepage: http://github.com/ansible-lockdown
# The URL to the collection issue tracker
issues: http://github.com/ansible-lockdown/stig_collection/issues
# A list of file glob-like patterns used to filter any files or directories that should not be included in the build
# artifact. A pattern is matched from the relative path of the file or directory of the collection directory. This
# uses 'fnmatch' to match the files or directories. Some directories and files like 'galaxy.yml', '*.pyc', '*.retry',
# and '.git' are always filtered. Mutually exclusive with 'manifest'
build_ignore: []
# A dict controlling use of manifest directives used in building the collection artifact. The key 'directives' is a
# list of MANIFEST.in style
# L(directives,https://packaging.python.org/en/latest/guides/using-manifest-in/#manifest-in-commands). The key
# 'omit_default_directives' is a boolean that controls whether the default directives are used. Mutually exclusive
# with 'build_ignore'
# manifest: null