@@ -108,26 +108,10 @@ resource "jwt_signed_token" "vault" {
108
108
iss = "https://code.example.com"
109
109
sub = "${data.coder_workspace.me.id}"
110
110
aud = "https://vault.example.com"
111
- iat = provider::time::rfc3339_parse(plantimestamp()) .unix
111
+ iat = time_static.now .unix
112
112
# Uncomment to set an expiry on the JWT token(default 3600 seconds).
113
113
# workspace will need to be restarted to generate a new token if it expires
114
- #exp = provider::time::rfc3339_parse(timeadd(timestamp(), 3600)).unix agent = coder_agent.main.id
115
- provisioner = data.coder_provisioner.main.id
116
- provisioner_arch = data.coder_provisioner.main.arch
117
- provisioner_os = data.coder_provisioner.main.os
118
-
119
- workspace = data.coder_workspace.me.id
120
- workspace_url = data.coder_workspace.me.access_url
121
- workspace_port = data.coder_workspace.me.access_port
122
- workspace_name = data.coder_workspace.me.name
123
- template = data.coder_workspace.me.template_id
124
- template_name = data.coder_workspace.me.template_name
125
- template_version = data.coder_workspace.me.template_version
126
- owner = data.coder_workspace_owner.me.id
127
- owner_name = data.coder_workspace_owner.me.name
128
- owner_email = data.coder_workspace_owner.me.email
129
- owner_login_type = data.coder_workspace_owner.me.login_type
130
- owner_groups = data.coder_workspace_owner.me.groups
114
+ #exp = time_static.expiry.unix
131
115
})
132
116
}
133
117
0 commit comments