vars.tf 1.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
  1. #Thanks to https://github.com/onetwopunch/terraform-vault-okta/blob/master/main.tf for the code.
  2. variable "roles" {
  3. type = map
  4. default = {}
  5. description = <<EOF
  6. Map of Vault role names to their bound groups and token policies. Structure looks like this:
  7. ```
  8. roles = {
  9. okta_admin = {
  10. token_policies = ["admin"]
  11. bound_groups = ["vault_admins"]
  12. },
  13. okta_devs = {
  14. token_policies = ["devs"]
  15. bound_groups = ["vault_devs"]
  16. }
  17. }
  18. ```
  19. EOF
  20. }
  21. variable "okta_oidc_client_id" {
  22. type = string
  23. description = "Okta Vault OIDC app client ID"
  24. }
  25. variable "okta_oidc_client_secret" {
  26. type = string
  27. description = "Okta Vault OIDC app client secret"
  28. validation {
  29. condition = var.okta_oidc_client_secret != "<place secret here>"
  30. error_message = "Please update the okta_oidc_client_secret in terragrunt.hcl!"
  31. }
  32. }
  33. variable "okta_api_token" {
  34. type = string
  35. description = "Okta Vault api secret"
  36. validation {
  37. condition = var.okta_api_token != "<place secret here>"
  38. error_message = "Please update the okta_api_token in terragrunt.hcl!"
  39. }
  40. }
  41. variable "dns_info" { type = map }
  42. variable "environment" { type = string }
  43. variable "aws_region" { type = string }
  44. variable "aws_partition" { type = string }
  45. variable "aws_partition_alias" { type = string }
  46. variable "aws_account_id" { type = string }