hashivault∕jwt‒auth‒backend - dicomgrid/pt-modules GitHub Wiki

Usage

To use this module in your Terraform, refer to the below module example:

module "hashivault_jwt_auth_backend" {
  source = "git::https://github.com/dicomgrid/pt-modules.git?ref=null"

  # See inputs below for additional required parameters
}

Attributes

Requirements

Name Version
terraform ~> 1.0
aws >= 5.0.0
vault 3.21.0

Providers

Name Version
vault 3.21.0

Modules

Name Source Version
role ../jwt-auth-backend-role n/a

Resources

Name Type
vault_jwt_auth_backend.main resource

Inputs

Name Description Type Default Required
namespace n/a any n/a yes
path n/a any n/a yes
allowed_response_headers n/a any null no
audit_non_hmac_request_keys n/a any null no
audit_non_hmac_response_keys n/a any null no
bound_issuer n/a any null no
default_lease_ttl n/a string "1h" no
default_role n/a any null no
description n/a any null no
disable_remount n/a any null no
jwks_ca_pem n/a any null no
jwks_url n/a any null no
jwt_supported_algs n/a list [] no
jwt_validation_pubkeys n/a any null no
listing_visibility n/a any null no
local n/a any null no
max_lease_ttl n/a string "4h" no
namespace_in_state n/a any null no
oidc_client_id n/a any null no
oidc_client_secret n/a any null no
oidc_discovery_ca_pem n/a any null no
oidc_discovery_url n/a any null no
oidc_response_mode n/a any null no
oidc_response_types n/a list [] no
passthrough_request_headers n/a any null no
provider_config n/a map {} no
roles n/a map {} no
token_type n/a string "default-service" no
type n/a any null no

Outputs

Name Description
accessor n/a
backend output "allowed_response_headers" { value = vault_jwt_auth_backend.main.allowed_response_headers } output "audit_non_hmac_request_keys" { value = vault_jwt_auth_backend.main.audit_non_hmac_request_keys } output "audit_non_hmac_response_keys" { value = vault_jwt_auth_backend.main.audit_non_hmac_response_keys }
bound_issuer n/a
default_role output "default_lease_ttl" { value = vault_jwt_auth_backend.main.default_lease_ttl }
description n/a
disable_remount n/a
jwks_ca_pem n/a
jwks_url n/a
jwt_supported_algs n/a
jwt_validation_pubkeys n/a
local output "listing_visibility" { value = vault_jwt_auth_backend.main.listing_visibility }
namespace n/a
namespace_in_state output "max_lease_ttl" { value = vault_jwt_auth_backend.main.max_lease_ttl }
oidc_client_id n/a
oidc_client_secret n/a
oidc_discovery_ca_pem n/a
oidc_discovery_url n/a
oidc_response_mode n/a
path output "passthrough_request_headers" { value = vault_jwt_auth_backend.main.passthrough_request_headers }
provider_config n/a
role n/a
type output "token_type" { value = vault_jwt_auth_backend.main.token_type }

Changelog