@@ -26,6 +26,13 @@ vault_configurations = {
2626}
2727```
2828
29+ ### policy\_ names
30+
31+ | policy\_ name | description |
32+ | -------------| --------------------------------------|
33+ | reader | read all secrets |
34+ | editor | read/write/delete/update all secrets |
35+
2936## Requirements
3037
3138| Name | Version |
@@ -47,23 +54,25 @@ No modules.
4754| Name | Type |
4855| ------| ------|
4956| [ vault_auth_backend.kubernetes] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/auth_backend ) | resource |
50- | [ vault_github_auth_backend .default] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/github_auth_backend ) | resource |
51- | [ vault_github_team .default] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/github_team ) | resource |
57+ | [ vault_jwt_auth_backend .default] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/jwt_auth_backend ) | resource |
58+ | [ vault_jwt_auth_backend_role .default] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/jwt_auth_backend_role ) | resource |
5259| [ vault_kubernetes_auth_backend_config.config] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/kubernetes_auth_backend_config ) | resource |
5360| [ vault_kubernetes_auth_backend_role.env_roles] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/kubernetes_auth_backend_role ) | resource |
5461| [ vault_kubernetes_auth_backend_role.vault_backup] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/kubernetes_auth_backend_role ) | resource |
5562| [ vault_mount.secrets_kvv2] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/mount ) | resource |
5663| [ vault_policy.admin] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy ) | resource |
57- | [ vault_policy.default] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy ) | resource |
58- | [ vault_policy.read_all_env_specific_secrets] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy ) | resource |
64+ | [ vault_policy.editor] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy ) | resource |
65+ | [ vault_policy.reader] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy ) | resource |
66+ | [ vault_policy.super_admin] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy ) | resource |
5967| [ vault_policy.vault_backup] ( https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy ) | resource |
6068
6169## Inputs
6270
6371| Name | Description | Type | Default | Required |
6472| ------| -------------| ------| ---------| :--------:|
65- | <a name =" input_backends " ></a > [ backends] ( #input\_ backends ) | n/a | <pre >list(object({<br > github_organization = string<br > auth_mount_path = string<br > tune = list(object({<br > allowed_response_headers = list(string)<br > audit_non_hmac_request_keys = list(string)<br > audit_non_hmac_response_keys = list(string)<br > default_lease_ttl = string<br > listing_visibility = string<br > max_lease_ttl = string<br > passthrough_request_headers = list(string)<br > token_type = string<br > }))<br > }))</pre > | n/a | yes |
66- | <a name =" input_org_team_policy_mapping " ></a > [ org\_ team\_ policy\_ mapping] ( #input\_ org\_ team\_ policy\_ mapping ) | n/a | <pre >list(object({<br > auth_mount_path = string<br > github_team = string<br > policy = string<br > }))</pre > | n/a | yes |
73+ | <a name =" input_captain_domain " ></a > [ captain\_ domain] ( #input\_ captain\_ domain ) | OIDC Discovery URL | ` string ` | n/a | yes |
74+ | <a name =" input_oidc_client_secret " ></a > [ oidc\_ client\_ secret] ( #input\_ oidc\_ client\_ secret ) | OIDC client secret | ` string ` | n/a | yes |
75+ | <a name =" input_org_team_policy_mappings " ></a > [ org\_ team\_ policy\_ mappings] ( #input\_ org\_ team\_ policy\_ mappings ) | n/a | <pre >list(object({<br > policy_name = string<br > oidc_groups = list(string)<br > }))</pre > | n/a | yes |
6776
6877## Outputs
6978
0 commit comments