chore: cleanup unused config data
- remove token_policies from roles config data, this comes from policies.hcl inputs - remove policies from ldap groups - remove backend data from roles, this comes from config.hcl inputs
This commit is contained in:
parent
1c9e063310
commit
f6d06cb319
@ -1,5 +1,3 @@
|
||||
token_policies:
|
||||
- "pki_int/certmanager"
|
||||
token_ttl: 30
|
||||
token_max_ttl: 30
|
||||
bind_secret_id: false
|
||||
|
||||
@ -1,6 +1,3 @@
|
||||
token_policies:
|
||||
- "default_access"
|
||||
- "kv/service/incus/incus-cluster-join-tokens"
|
||||
token_ttl: 60
|
||||
token_max_ttl: 120
|
||||
bind_secret_id: false
|
||||
|
||||
@ -1,6 +1,3 @@
|
||||
token_policies:
|
||||
- "default_access"
|
||||
- "kv/service/packer/packer_builder"
|
||||
token_ttl: 300
|
||||
token_max_ttl: 600
|
||||
bind_secret_id: false
|
||||
|
||||
@ -1,5 +1,3 @@
|
||||
token_policies:
|
||||
- "kv/service/puppetapi/puppetapi_read_tokens"
|
||||
token_ttl: 30
|
||||
token_max_ttl: 30
|
||||
bind_secret_id: false
|
||||
|
||||
@ -1,6 +1,3 @@
|
||||
token_policies:
|
||||
- "kv/service/github/neoloc/tokens/read-only-token/read"
|
||||
- "kv/service/gitea/unkinben/tokens/read-only-packages/read"
|
||||
token_ttl: 30
|
||||
token_max_ttl: 30
|
||||
bind_secret_id: false
|
||||
|
||||
@ -1,5 +1,3 @@
|
||||
token_policies:
|
||||
- "rundeck/rundeck"
|
||||
token_ttl: 3600
|
||||
token_max_ttl: 14400
|
||||
bind_secret_id: true
|
||||
|
||||
@ -1,6 +1,3 @@
|
||||
token_policies:
|
||||
- "ssh-host-signer/sshsigner"
|
||||
- "sshca_signhost"
|
||||
token_ttl: 30
|
||||
token_max_ttl: 30
|
||||
bind_secret_id: false
|
||||
|
||||
@ -1,7 +1,3 @@
|
||||
token_policies:
|
||||
- "default_access"
|
||||
- "kv/service/terraform/incus"
|
||||
- "kv/service/puppet/certificates/terraform_puppet_cert"
|
||||
token_ttl: 60
|
||||
token_max_ttl: 120
|
||||
bind_secret_id: false
|
||||
|
||||
@ -1,6 +1,3 @@
|
||||
token_policies:
|
||||
- "default_access"
|
||||
- "kv/service/terraform/nomad"
|
||||
token_ttl: 60
|
||||
token_max_ttl: 120
|
||||
bind_secret_id: false
|
||||
|
||||
@ -1,7 +1,3 @@
|
||||
token_policies:
|
||||
- "default_access"
|
||||
- "kv/service/repoflow/unkinadmin/tokens/terraform/read"
|
||||
- "kv/service/terraform/repoflow"
|
||||
token_ttl: 60
|
||||
token_max_ttl: 120
|
||||
bind_secret_id: false
|
||||
|
||||
@ -1,27 +1,3 @@
|
||||
token_policies:
|
||||
- "default_access"
|
||||
- "approle_token_create"
|
||||
- "auth/approle/approle_role_admin"
|
||||
- "auth/approle/approle_role_login"
|
||||
- "auth/kubernetes/k8s_auth_admin"
|
||||
- "auth/ldap/ldap_admin"
|
||||
- "auth/token/auth_token_create"
|
||||
- "auth/token/auth_token_self"
|
||||
- "auth/token/auth_token_roles_admin"
|
||||
- "kubernetes/au/config_admin"
|
||||
- "kubernetes/au/roles_admin"
|
||||
- "kv/service/glauth/services/svc_vault_read"
|
||||
- "kv/service/kubernetes/au/syd1/token_reviewer_jwt/read"
|
||||
- "kv/service/kubernetes/au/syd1/service_account_jwt/read"
|
||||
- "kv/service/vault/auth_backends_read"
|
||||
- "pki_int/pki_int_roles_admin"
|
||||
- "pki_root/pki_root_roles_admin"
|
||||
- "ssh-host-signer/ssh-host-signer_roles_admin"
|
||||
- "sshca/sshca_roles_admin"
|
||||
- "sys/sys_auth_admin"
|
||||
- "sys/sys_mounts_admin"
|
||||
- "sys/sys_policy_admin"
|
||||
- "transit/keys/admin"
|
||||
token_ttl: 60
|
||||
token_max_ttl: 120
|
||||
bind_secret_id: false
|
||||
|
||||
@ -5,7 +5,4 @@ bound_service_account_namespaces:
|
||||
- csi-cephrbd
|
||||
- csi-cephfs
|
||||
token_ttl: 60
|
||||
token_policies:
|
||||
- kv/service/kubernetes/au/syd1/csi/ceph-rbd-secret/read
|
||||
- kv/service/kubernetes/au/syd1/csi/ceph-cephfs-secret/read
|
||||
audience: vault
|
||||
|
||||
@ -3,7 +3,4 @@ bound_service_account_names:
|
||||
bound_service_account_namespaces:
|
||||
- cert-manager
|
||||
token_ttl: 60
|
||||
token_policies:
|
||||
- pki_int/sign/servers_default
|
||||
- pki_int/issue/servers_default
|
||||
audience: vault
|
||||
|
||||
@ -3,6 +3,4 @@ bound_service_account_names:
|
||||
bound_service_account_namespaces:
|
||||
- externaldns
|
||||
token_ttl: 60
|
||||
token_policies:
|
||||
- kv/service/kubernetes/au/syd1/externaldns/tsig/read
|
||||
audience: vault
|
||||
|
||||
@ -3,7 +3,4 @@ bound_service_account_names:
|
||||
bound_service_account_namespaces:
|
||||
- huntarr
|
||||
token_ttl: 60
|
||||
token_policies:
|
||||
- pki_int/sign/servers_default
|
||||
- pki_int/issue/servers_default
|
||||
audience: vault
|
||||
|
||||
@ -3,7 +3,4 @@ bound_service_account_names:
|
||||
bound_service_account_namespaces:
|
||||
- media-apps
|
||||
token_ttl: 60
|
||||
token_policies:
|
||||
- kv/service/media-apps/radarr/read
|
||||
- kv/service/media-apps/sonarr/read
|
||||
audience: vault
|
||||
|
||||
@ -3,10 +3,4 @@ bound_service_account_names:
|
||||
bound_service_account_namespaces:
|
||||
- repoflow
|
||||
token_ttl: 60
|
||||
token_policies:
|
||||
- kv/service/repoflow/au/syd1/ceph-s3/read
|
||||
- kv/service/repoflow/au/syd1/elasticsearch/read
|
||||
- kv/service/repoflow/au/syd1/hasura/read
|
||||
- kv/service/repoflow/au/syd1/postgres/read
|
||||
- kv/service/repoflow/au/syd1/repoflow-server/read
|
||||
audience: vault
|
||||
|
||||
@ -1,2 +0,0 @@
|
||||
policies:
|
||||
- "default_access"
|
||||
@ -1,3 +1,3 @@
|
||||
policies:
|
||||
- "default_access"
|
||||
- "global-admin"
|
||||
---
|
||||
# this file doesnt need anything in it, so this data is just to make sure yamlencode reads some yaml data
|
||||
description: foo
|
||||
|
||||
@ -1,4 +1,3 @@
|
||||
backend: "kubernetes/au/syd1"
|
||||
allowed_kubernetes_namespaces:
|
||||
- "*"
|
||||
kubernetes_role_type: "ClusterRole"
|
||||
|
||||
@ -1,4 +1,3 @@
|
||||
backend: "kubernetes/au/syd1"
|
||||
allowed_kubernetes_namespaces:
|
||||
- "*"
|
||||
kubernetes_role_type: "ClusterRole"
|
||||
|
||||
@ -1,4 +1,3 @@
|
||||
backend: "kubernetes/au/syd1"
|
||||
allowed_kubernetes_namespaces:
|
||||
- "*"
|
||||
kubernetes_role_type: "ClusterRole"
|
||||
|
||||
@ -1,4 +1,3 @@
|
||||
backend: "kubernetes/au/syd1"
|
||||
allowed_kubernetes_namespaces:
|
||||
- "media-apps"
|
||||
kubernetes_role_type: "Role"
|
||||
|
||||
@ -1,4 +1,3 @@
|
||||
backend: "pki/au/syd1"
|
||||
allow_ip_sans: true
|
||||
allowed_domains:
|
||||
- "unkin.net"
|
||||
|
||||
@ -1,4 +1,3 @@
|
||||
backend: "pki_int"
|
||||
allow_ip_sans: true
|
||||
allowed_domains:
|
||||
- "unkin.net"
|
||||
|
||||
@ -1,4 +1,3 @@
|
||||
backend: "pki_root"
|
||||
allow_ip_sans: true
|
||||
allowed_domains:
|
||||
- "unkin.net"
|
||||
|
||||
@ -61,7 +61,7 @@ module "auth_ldap_group" {
|
||||
|
||||
groupname = each.value.groupname
|
||||
backend = each.value.backend
|
||||
policies = each.value.policies
|
||||
policies = var.policy_auth_map[each.value.backend][each.value.groupname]
|
||||
|
||||
depends_on = [module.auth_ldap_backend]
|
||||
}
|
||||
|
||||
@ -58,7 +58,6 @@ variable "auth_ldap_group" {
|
||||
type = map(object({
|
||||
groupname = string
|
||||
backend = string
|
||||
policies = list(string)
|
||||
}))
|
||||
default = {}
|
||||
}
|
||||
@ -287,4 +286,4 @@ variable "policy_rules_map" {
|
||||
capabilities = list(string)
|
||||
})))
|
||||
default = {}
|
||||
}
|
||||
}
|
||||
|
||||
Loading…
Reference in New Issue
Block a user