From 770400aec20927e623c458d153692ac711ff4635 Mon Sep 17 00:00:00 2001 From: niroz89 Date: Tue, 23 Jan 2024 17:16:19 +0800 Subject: [PATCH] fix other types too --- README.md | 2 +- variables.tf | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index d11ea37..3a51137 100644 --- a/README.md +++ b/README.md @@ -33,7 +33,7 @@ No modules. |------|-------------|------|---------|:--------:| | [auth\_description](#input\_auth\_description) | Description of the JWT Auth Backend | `string` | `"Terraform Cloud"` | no | | [auth\_token\_issuer](#input\_auth\_token\_issuer) | Token issuer of JWT token | `string` | `"https://app.terraform.io"` | no | -| [auth\_tune](#input\_auth\_tune) | Auth mount tune settings |
object({
default_lease_ttl = optional(string)
max_lease_ttl = optional(string)
audit_non_hmac_response_keys = optional(list(string))
audit_non_hmac_request_keys = optional(list(string))
listing_visibility = optional(string)
passthrough_request_headers = optional(string)
allowed_response_headers = optional(string)
token_type = optional(string)
})
| `null` | no | +| [auth\_tune](#input\_auth\_tune) | Auth mount tune settings |
object({
default_lease_ttl = optional(string)
max_lease_ttl = optional(string)
audit_non_hmac_response_keys = optional(list(string))
audit_non_hmac_request_keys = optional(list(string))
listing_visibility = optional(string)
passthrough_request_headers = optional(list(string))
allowed_response_headers = optional(list(string))
token_type = optional(string)
})
| `null` | no | | [bound\_audiences](#input\_bound\_audiences) | List of audiences to be allowed for JWT auth roles | `list(string)` |
[
"tfc.workload.identity"
]
| no | | [claim\_mappings](#input\_claim\_mappings) | Mapping of claims to metadata | `map(string)` |
{
"terraform_full_workspace": "terraform_full_workspace",
"terraform_organization_id": "terraform_organization_id",
"terraform_organization_name": "terraform_organization_name",
"terraform_run_id": "terraform_run_id",
"terraform_run_phase": "terraform_run_phase",
"terraform_workspace_id": "terraform_workspace_id"
}
| no | | [enable\_identity\_management](#input\_enable\_identity\_management) | Enable Identity Entity management. This only works if workspace names contains no wildcard | `bool` | `true` | no | diff --git a/variables.tf b/variables.tf index a113b4c..37639e2 100644 --- a/variables.tf +++ b/variables.tf @@ -42,8 +42,8 @@ variable "auth_tune" { audit_non_hmac_response_keys = optional(list(string)) audit_non_hmac_request_keys = optional(list(string)) listing_visibility = optional(string) - passthrough_request_headers = optional(string) - allowed_response_headers = optional(string) + passthrough_request_headers = optional(list(string)) + allowed_response_headers = optional(list(string)) token_type = optional(string) }) default = null