@@ -14,7 +14,7 @@ This module lets you authenticate with [Hashicorp Vault](https://www.vaultprojec
1414module "vault" {
1515 count = data.coder_workspace.me.start_count
1616 source = "registry.coder.com/coder/vault-jwt/coder"
17- version = "1.1.1 "
17+ version = "1.2.0 "
1818 agent_id = coder_agent.example.id
1919 vault_addr = "https://vault.example.com"
2020 vault_jwt_role = "coder" # The Vault role to use for authentication
@@ -42,7 +42,7 @@ curl -H "X-Vault-Token: ${VAULT_TOKEN}" -X GET "${VAULT_ADDR}/v1/coder/secrets/d
4242module "vault" {
4343 count = data.coder_workspace.me.start_count
4444 source = "registry.coder.com/coder/vault-jwt/coder"
45- version = "1.1.1 "
45+ version = "1.2.0 "
4646 agent_id = coder_agent.example.id
4747 vault_addr = "https://vault.example.com"
4848 vault_jwt_auth_path = "oidc"
@@ -58,7 +58,7 @@ data "coder_workspace_owner" "me" {}
5858module "vault" {
5959 count = data.coder_workspace.me.start_count
6060 source = "registry.coder.com/coder/vault-jwt/coder"
61- version = "1.1.1 "
61+ version = "1.2.0 "
6262 agent_id = coder_agent.example.id
6363 vault_addr = "https://vault.example.com"
6464 vault_jwt_role = data.coder_workspace_owner.me.groups[0]
@@ -71,7 +71,7 @@ module "vault" {
7171module "vault" {
7272 count = data.coder_workspace.me.start_count
7373 source = "registry.coder.com/coder/vault-jwt/coder"
74- version = "1.1.1 "
74+ version = "1.2.0 "
7575 agent_id = coder_agent.example.id
7676 vault_addr = "https://vault.example.com"
7777 vault_jwt_role = "coder" # The Vault role to use for authentication
@@ -132,7 +132,7 @@ resource "jwt_signed_token" "vault" {
132132module "vault" {
133133 count = data.coder_workspace.me.start_count
134134 source = "registry.coder.com/coder/vault-jwt/coder"
135- version = "1.1.1 "
135+ version = "1.2.0 "
136136 agent_id = coder_agent.example.id
137137 vault_addr = "https://vault.example.com"
138138 vault_jwt_role = "coder" # The Vault role to use for authentication
0 commit comments