Merge pull request 'feat: add tf_vault required policies' (#47) from benvin/tf-vault-policy-updates into master
Reviewed-on: #47
This commit is contained in:
commit
66ee6430fa
14
policies/consul_root/au/syd1/config/admin.yaml
Normal file
14
policies/consul_root/au/syd1/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Allow access to configure consul secret backend
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "consul_root/au/syd1/config/*"
|
||||||
|
capabilities:
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- delete
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
14
policies/consul_root/au/syd1/roles/admin.yaml
Normal file
14
policies/consul_root/au/syd1/roles/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Allow access to manage consul secret backend roles
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "consul_root/au/syd1/roles/*"
|
||||||
|
capabilities:
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- delete
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
14
policies/kv/config/admin.yaml
Normal file
14
policies/kv/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Allow access to configure KV secret backend
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "kv/config"
|
||||||
|
capabilities:
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- delete
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
14
policies/pki/au/syd1/config/admin.yaml
Normal file
14
policies/pki/au/syd1/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Allow access to configure pki/au/syd1 secret backend
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "pki/au/syd1/config/*"
|
||||||
|
capabilities:
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- delete
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
11
policies/pki/au/syd1/issuer/admin.yaml
Normal file
11
policies/pki/au/syd1/issuer/admin.yaml
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# Allow access to read pki/au/syd1 issuers
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "pki/au/syd1/issuer/*"
|
||||||
|
capabilities:
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
14
policies/pki_int/config/admin.yaml
Normal file
14
policies/pki_int/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Allow access to configure pki_int secret backend
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "pki_int/config/*"
|
||||||
|
capabilities:
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- delete
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
11
policies/pki_int/issuer/admin.yaml
Normal file
11
policies/pki_int/issuer/admin.yaml
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# Allow access to read pki_int issuers
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "pki_int/issuer/*"
|
||||||
|
capabilities:
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
14
policies/pki_root/config/admin.yaml
Normal file
14
policies/pki_root/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Allow access to configure pki_root secret backend
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "pki_root/config/*"
|
||||||
|
capabilities:
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- delete
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
11
policies/pki_root/issuer/admin.yaml
Normal file
11
policies/pki_root/issuer/admin.yaml
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# Allow access to read pki_root issuers
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "pki_root/issuer/*"
|
||||||
|
capabilities:
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
14
policies/pki_root/roles/admin.yaml
Normal file
14
policies/pki_root/roles/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Allow access to manage pki_root secret backend roles
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "pki_root/roles/*"
|
||||||
|
capabilities:
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- delete
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
14
policies/rundeck/config/admin.yaml
Normal file
14
policies/rundeck/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Allow access to configure rundeck KV secret backend
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "rundeck/config"
|
||||||
|
capabilities:
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- delete
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
14
policies/sshca/config/admin.yaml
Normal file
14
policies/sshca/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
# Allow access to configure SSH CA secret backend
|
||||||
|
---
|
||||||
|
rules:
|
||||||
|
- path: "sshca/config/*"
|
||||||
|
capabilities:
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- delete
|
||||||
|
- read
|
||||||
|
- list
|
||||||
|
|
||||||
|
auth:
|
||||||
|
approle:
|
||||||
|
- tf_vault
|
||||||
Loading…
Reference in New Issue
Block a user