-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathvariables.tf
95 lines (88 loc) · 3.85 KB
/
variables.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
variable "component" {
description = "The component for which this approle exists."
type = string
}
variable "deployment_identifier" {
type = string
description = "An identifier for this instantiation."
}
variable "backend" {
type = string
description = "The path of the backend for the approle. Uses the default approle backend by default."
default = null
}
variable "role_name" {
type = string
description = "The name of the approle. Takes precedence over the default role name generation and `role_name_prefix`."
default = null
}
variable "role_name_prefix" {
type = string
description = "The name prefix of the approle. When provided, used to prefix the default role name generation."
default = null
}
variable "bind_secret_id" {
type = bool
description = "Whether or not to require secret_id to be presented when logging in using this AppRole. Defaults to true."
default = null
}
variable "secret_id_bound_cidrs" {
type = list(string)
description = "If set, specifies blocks of IP addresses which can perform the login operation."
default = null
}
variable "secret_id_num_uses" {
type = number
description = "The number of times any particular SecretID can be used to fetch a token from this AppRole, after which the SecretID will expire. A value of zero will allow unlimited uses."
default = null
}
variable "secret_id_ttl" {
type = number
description = "The number of seconds after which any SecretID expires."
default = null
}
variable "token_ttl" {
type = number
description = "The incremental lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time."
default = null
}
variable "token_max_ttl" {
type = number
description = "The maximum lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time."
default = null
}
variable "token_period" {
type = number
description = "If set, indicates that the token generated using this role should never expire. The token should be renewed within the duration specified by this value. At each renewal, the token's TTL will be set to the value of this field. Specified in seconds."
default = null
}
variable "token_policies" {
type = list(string)
description = "List of policies to encode onto generated tokens. Depending on the auth method, this list may be supplemented by user/group/other values."
default = null
}
variable "token_bound_cidrs" {
type = list(string)
description = "List of CIDR blocks; if set, specifies blocks of IP addresses which can authenticate successfully, and ties the resulting token to these blocks as well."
default = null
}
variable "token_explicit_max_ttl" {
type = number
description = "If set, will encode an explicit max TTL onto the token in number of seconds. This is a hard cap even if token_ttl and token_max_ttl would otherwise allow a renewal."
default = null
}
variable "token_num_uses" {
type = number
description = "The maximum number of times a generated token may be used (within its lifetime); 0 means unlimited."
default = null
}
variable "token_type" {
type = string
description = "The type of token that should be generated. Can be service, batch, or default to use the mount's tuned default (which unless changed will be service tokens). For token store roles, there are two additional possibilities: default-service and default-batch which specify the type to return unless the client requests a different type at generation time."
default = null
}
variable "default_secret_id_cidr_list" {
type = list(string)
description = "If set, specifies blocks of IP addresses which can perform the login operation using the default SecretID."
default = null
}