hashivault∕jwt‒auth‒backend - dicomgrid/pt-modules GitHub Wiki
Usage
To use this module in your Terraform, refer to the below module example:
module "hashivault_jwt_auth_backend" {
source = "git::https://github.com/dicomgrid/pt-modules.git?ref=null"
# See inputs below for additional required parameters
}
Attributes
Requirements
Name | Version |
---|---|
terraform | ~> 1.0 |
aws | >= 5.0.0 |
vault | 3.21.0 |
Providers
Name | Version |
---|---|
vault | 3.21.0 |
Modules
Name | Source | Version |
---|---|---|
role | ../jwt-auth-backend-role | n/a |
Resources
Name | Type |
---|---|
vault_jwt_auth_backend.main | resource |
Inputs
Name | Description | Type | Default | Required |
---|---|---|---|---|
namespace | n/a | any |
n/a | yes |
path | n/a | any |
n/a | yes |
allowed_response_headers | n/a | any |
null |
no |
audit_non_hmac_request_keys | n/a | any |
null |
no |
audit_non_hmac_response_keys | n/a | any |
null |
no |
bound_issuer | n/a | any |
null |
no |
default_lease_ttl | n/a | string |
"1h" |
no |
default_role | n/a | any |
null |
no |
description | n/a | any |
null |
no |
disable_remount | n/a | any |
null |
no |
jwks_ca_pem | n/a | any |
null |
no |
jwks_url | n/a | any |
null |
no |
jwt_supported_algs | n/a | list |
[] |
no |
jwt_validation_pubkeys | n/a | any |
null |
no |
listing_visibility | n/a | any |
null |
no |
local | n/a | any |
null |
no |
max_lease_ttl | n/a | string |
"4h" |
no |
namespace_in_state | n/a | any |
null |
no |
oidc_client_id | n/a | any |
null |
no |
oidc_client_secret | n/a | any |
null |
no |
oidc_discovery_ca_pem | n/a | any |
null |
no |
oidc_discovery_url | n/a | any |
null |
no |
oidc_response_mode | n/a | any |
null |
no |
oidc_response_types | n/a | list |
[] |
no |
passthrough_request_headers | n/a | any |
null |
no |
provider_config | n/a | map |
{} |
no |
roles | n/a | map |
{} |
no |
token_type | n/a | string |
"default-service" |
no |
type | n/a | any |
null |
no |
Outputs
Name | Description |
---|---|
accessor | n/a |
backend | output "allowed_response_headers" { value = vault_jwt_auth_backend.main.allowed_response_headers } output "audit_non_hmac_request_keys" { value = vault_jwt_auth_backend.main.audit_non_hmac_request_keys } output "audit_non_hmac_response_keys" { value = vault_jwt_auth_backend.main.audit_non_hmac_response_keys } |
bound_issuer | n/a |
default_role | output "default_lease_ttl" { value = vault_jwt_auth_backend.main.default_lease_ttl } |
description | n/a |
disable_remount | n/a |
jwks_ca_pem | n/a |
jwks_url | n/a |
jwt_supported_algs | n/a |
jwt_validation_pubkeys | n/a |
local | output "listing_visibility" { value = vault_jwt_auth_backend.main.listing_visibility } |
namespace | n/a |
namespace_in_state | output "max_lease_ttl" { value = vault_jwt_auth_backend.main.max_lease_ttl } |
oidc_client_id | n/a |
oidc_client_secret | n/a |
oidc_discovery_ca_pem | n/a |
oidc_discovery_url | n/a |
oidc_response_mode | n/a |
path | output "passthrough_request_headers" { value = vault_jwt_auth_backend.main.passthrough_request_headers } |
provider_config | n/a |
role | n/a |
type | output "token_type" { value = vault_jwt_auth_backend.main.token_type } |