Skip to content

Commit

Permalink
Fix variable type (#7)
Browse files Browse the repository at this point in the history
  • Loading branch information
niroz89 authored Feb 2, 2024
1 parent bb44b81 commit 654cd68
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 7 deletions.
6 changes: 3 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,14 +33,14 @@ No modules.
|------|-------------|------|---------|:--------:|
| <a name="input_auth_description"></a> [auth\_description](#input\_auth\_description) | Description of the JWT Auth Backend | `string` | `"Terraform Cloud"` | no |
| <a name="input_auth_token_issuer"></a> [auth\_token\_issuer](#input\_auth\_token\_issuer) | Token issuer of JWT token | `string` | `"https://app.terraform.io"` | no |
| <a name="input_auth_tune"></a> [auth\_tune](#input\_auth\_tune) | Auth mount tune settings | <pre>object({<br> default_lease_ttl = optional(string)<br> max_lease_ttl = optional(string)<br> audit_non_hmac_response_keys = optional(string)<br> audit_non_hmac_request_keys = optional(string)<br> listing_visibility = optional(string)<br> passthrough_request_headers = optional(string)<br> allowed_response_headers = optional(string)<br> token_type = optional(string)<br> })</pre> | `null` | no |
| <a name="input_auth_tune"></a> [auth\_tune](#input\_auth\_tune) | Auth mount tune settings | <pre>object({<br> default_lease_ttl = optional(string)<br> max_lease_ttl = optional(string)<br> audit_non_hmac_response_keys = optional(list(string))<br> audit_non_hmac_request_keys = optional(list(string))<br> listing_visibility = optional(string)<br> passthrough_request_headers = optional(list(string))<br> allowed_response_headers = optional(list(string))<br> token_type = optional(string)<br> })</pre> | `null` | no |
| <a name="input_bound_audiences"></a> [bound\_audiences](#input\_bound\_audiences) | List of audiences to be allowed for JWT auth roles | `list(string)` | <pre>[<br> "tfc.workload.identity"<br>]</pre> | no |
| <a name="input_claim_mappings"></a> [claim\_mappings](#input\_claim\_mappings) | Mapping of claims to metadata | `map(string)` | <pre>{<br> "terraform_full_workspace": "terraform_full_workspace",<br> "terraform_organization_id": "terraform_organization_id",<br> "terraform_organization_name": "terraform_organization_name",<br> "terraform_run_id": "terraform_run_id",<br> "terraform_run_phase": "terraform_run_phase",<br> "terraform_workspace_id": "terraform_workspace_id"<br>}</pre> | no |
| <a name="input_enable_identity_management"></a> [enable\_identity\_management](#input\_enable\_identity\_management) | Enable Identity Entity management. This only works if workspace names contains no wildcard | `bool` | `true` | no |
| <a name="input_identity_name_format"></a> [identity\_name\_format](#input\_identity\_name\_format) | Identity name format string. The first parameter is the organization, second parameter is the Project, and the third is the workspace name | `string` | `"tfc-%[1]s-%[2]s-%[3]s"` | no |
| <a name="input_identity_name_format"></a> [identity\_name\_format](#input\_identity\_name\_format) | Identity name format string. The first parameter is the organization, and the second is the workspace name | `string` | `"tfc-%[1]s-%[2]s-%[3]s"` | no |
| <a name="input_namespace"></a> [namespace](#input\_namespace) | Namespace relative to the provider namespace. Vault Enterprise only | `string` | `null` | no |
| <a name="input_path"></a> [path](#input\_path) | Path to mount the JWT Auth backend | `string` | `"jwt"` | no |
| <a name="input_role_name_format"></a> [role\_name\_format](#input\_role\_name\_format) | Format string to generate role namess. The first parameter is the organization, second parameter is the Project, and the third is the workspace name | `string` | `"%[1]s-%[2]s-%[3]s"` | no |
| <a name="input_role_name_format"></a> [role\_name\_format](#input\_role\_name\_format) | Format string to generate role namess. The first parameter is the organization, and the second is the workspace name | `string` | `"%[1]s-%[2]s-%[3]s"` | no |
| <a name="input_tfc_default_project"></a> [tfc\_default\_project](#input\_tfc\_default\_project) | Name of TFC Default Project | `string` | `"Default Project"` | no |
| <a name="input_tfc_project_support_match"></a> [tfc\_project\_support\_match](#input\_tfc\_project\_support\_match) | The key to use for Terraform Cloud Project matching in the subject key. This is to work around the module not support projects. You should set this to 'Default Project' or '*' | `string` | `"*"` | no |
| <a name="input_token_explicit_max_ttl"></a> [token\_explicit\_max\_ttl](#input\_token\_explicit\_max\_ttl) | If set, will encode an explicit max TTL onto the token in number of seconds. This is a hard cap even if token\_ttl and token\_max\_ttl would otherwise allow a renewal. | `number` | `600` | no |
Expand Down
8 changes: 4 additions & 4 deletions variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -39,11 +39,11 @@ variable "auth_tune" {
type = object({
default_lease_ttl = optional(string)
max_lease_ttl = optional(string)
audit_non_hmac_response_keys = optional(string)
audit_non_hmac_request_keys = optional(string)
audit_non_hmac_response_keys = optional(list(string))
audit_non_hmac_request_keys = optional(list(string))
listing_visibility = optional(string)
passthrough_request_headers = optional(string)
allowed_response_headers = optional(string)
passthrough_request_headers = optional(list(string))
allowed_response_headers = optional(list(string))
token_type = optional(string)
})
default = null
Expand Down

0 comments on commit 654cd68

Please sign in to comment.