terraform/authentik.old/dashy.tf

48 lines
1.2 KiB
Terraform
Raw Normal View History

2024-09-13 10:12:28 +02:00
resource "random_id" "dashy_client_id" {
byte_length = 16
}
resource "authentik_provider_oauth2" "dashy" {
name = "Dashy"
# Required. You can use the output of:
# $ openssl rand -hex 16
2025-02-19 10:59:18 +00:00
client_id = random_id.dashy_client_id.id
2024-09-13 10:12:28 +02:00
authentication_flow = data.authentik_flow.default-authentication-flow.id
2025-02-19 10:59:18 +00:00
authorization_flow = data.authentik_flow.default-provider-authorization-implicit-consent.id
invalidation_flow = data.authentik_flow.default-invalidation-flow.id
2024-09-13 10:12:28 +02:00
client_type = "public"
2025-02-19 10:59:18 +00:00
allowed_redirect_uris = [
{
matched_mode = "strict",
url = "https://dash.lab.cowley.tech/",
},
{
matched_mode = "regex",
url = ".*"
}
2024-09-13 10:12:28 +02:00
]
sub_mode = "user_email"
property_mappings = [
data.authentik_property_mapping_provider_scope.scope-email.id,
data.authentik_property_mapping_provider_scope.scope-profile.id,
data.authentik_property_mapping_provider_scope.scope-openid.id,
]
lifecycle {
ignore_changes = [
signing_key,
authentication_flow,
]
}
}
resource "authentik_application" "dashy" {
name = "Dashy"
slug = "dashy"
protocol_provider = authentik_provider_oauth2.dashy.id
2025-02-19 10:59:18 +00:00
open_in_new_tab = true
2024-09-13 10:12:28 +02:00
}