Skip to content

Commit ffb0ccb

Browse files
terraform-docs: automated action
1 parent 7401e81 commit ffb0ccb

File tree

1 file changed

+15
-6
lines changed

1 file changed

+15
-6
lines changed

README.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,13 @@ vault_configurations = {
2626
}
2727
```
2828

29+
### policy\_names
30+
31+
| policy\_name | description |
32+
|-------------|--------------------------------------|
33+
| reader | read all secrets |
34+
| editor | read/write/delete/update all secrets |
35+
2936
## Requirements
3037

3138
| Name | Version |
@@ -47,23 +54,25 @@ No modules.
4754
| Name | Type |
4855
|------|------|
4956
| [vault_auth_backend.kubernetes](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/auth_backend) | resource |
50-
| [vault_github_auth_backend.default](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/github_auth_backend) | resource |
51-
| [vault_github_team.default](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/github_team) | resource |
57+
| [vault_jwt_auth_backend.default](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/jwt_auth_backend) | resource |
58+
| [vault_jwt_auth_backend_role.default](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/jwt_auth_backend_role) | resource |
5259
| [vault_kubernetes_auth_backend_config.config](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/kubernetes_auth_backend_config) | resource |
5360
| [vault_kubernetes_auth_backend_role.env_roles](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/kubernetes_auth_backend_role) | resource |
5461
| [vault_kubernetes_auth_backend_role.vault_backup](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/kubernetes_auth_backend_role) | resource |
5562
| [vault_mount.secrets_kvv2](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/mount) | resource |
5663
| [vault_policy.admin](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy) | resource |
57-
| [vault_policy.default](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy) | resource |
58-
| [vault_policy.read_all_env_specific_secrets](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy) | resource |
64+
| [vault_policy.editor](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy) | resource |
65+
| [vault_policy.reader](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy) | resource |
66+
| [vault_policy.super_admin](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy) | resource |
5967
| [vault_policy.vault_backup](https://registry.terraform.io/providers/hashicorp/vault/3.14.0/docs/resources/policy) | resource |
6068

6169
## Inputs
6270

6371
| Name | Description | Type | Default | Required |
6472
|------|-------------|------|---------|:--------:|
65-
| <a name="input_backends"></a> [backends](#input\_backends) | n/a | <pre>list(object({<br> github_organization = string<br> auth_mount_path = string<br> tune = list(object({<br> allowed_response_headers = list(string)<br> audit_non_hmac_request_keys = list(string)<br> audit_non_hmac_response_keys = list(string)<br> default_lease_ttl = string<br> listing_visibility = string<br> max_lease_ttl = string<br> passthrough_request_headers = list(string)<br> token_type = string<br> }))<br> }))</pre> | n/a | yes |
66-
| <a name="input_org_team_policy_mapping"></a> [org\_team\_policy\_mapping](#input\_org\_team\_policy\_mapping) | n/a | <pre>list(object({<br> auth_mount_path = string<br> github_team = string<br> policy = string<br> }))</pre> | n/a | yes |
73+
| <a name="input_captain_domain"></a> [captain\_domain](#input\_captain\_domain) | OIDC Discovery URL | `string` | n/a | yes |
74+
| <a name="input_oidc_client_secret"></a> [oidc\_client\_secret](#input\_oidc\_client\_secret) | OIDC client secret | `string` | n/a | yes |
75+
| <a name="input_org_team_policy_mappings"></a> [org\_team\_policy\_mappings](#input\_org\_team\_policy\_mappings) | n/a | <pre>list(object({<br> policy_name = string<br> oidc_groups = list(string)<br> }))</pre> | n/a | yes |
6776

6877
## Outputs
6978

0 commit comments

Comments
 (0)