feat: add tf_vault required policies
move management of Vault back to tf_vault approle. for this, we need to create a number of policies that are missing. - add policies to manage consul secret engines - add policies to manage pki secret engines - add policies to manage kv secret engines - add policies to manage ssh secret engines
This commit is contained in:
parent
f8f1185b42
commit
fd03727ec2
14
policies/consul_root/au/syd1/config/admin.yaml
Normal file
14
policies/consul_root/au/syd1/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
# Allow access to configure consul secret backend
|
||||
---
|
||||
rules:
|
||||
- path: "consul_root/au/syd1/config/*"
|
||||
capabilities:
|
||||
- create
|
||||
- update
|
||||
- delete
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
14
policies/consul_root/au/syd1/roles/admin.yaml
Normal file
14
policies/consul_root/au/syd1/roles/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
# Allow access to manage consul secret backend roles
|
||||
---
|
||||
rules:
|
||||
- path: "consul_root/au/syd1/roles/*"
|
||||
capabilities:
|
||||
- create
|
||||
- update
|
||||
- delete
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
14
policies/kv/config/admin.yaml
Normal file
14
policies/kv/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
# Allow access to configure KV secret backend
|
||||
---
|
||||
rules:
|
||||
- path: "kv/config"
|
||||
capabilities:
|
||||
- create
|
||||
- update
|
||||
- delete
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
14
policies/pki/au/syd1/config/admin.yaml
Normal file
14
policies/pki/au/syd1/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
# Allow access to configure pki/au/syd1 secret backend
|
||||
---
|
||||
rules:
|
||||
- path: "pki/au/syd1/config/*"
|
||||
capabilities:
|
||||
- create
|
||||
- update
|
||||
- delete
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
11
policies/pki/au/syd1/issuer/admin.yaml
Normal file
11
policies/pki/au/syd1/issuer/admin.yaml
Normal file
@ -0,0 +1,11 @@
|
||||
# Allow access to read pki/au/syd1 issuers
|
||||
---
|
||||
rules:
|
||||
- path: "pki/au/syd1/issuer/*"
|
||||
capabilities:
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
14
policies/pki_int/config/admin.yaml
Normal file
14
policies/pki_int/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
# Allow access to configure pki_int secret backend
|
||||
---
|
||||
rules:
|
||||
- path: "pki_int/config/*"
|
||||
capabilities:
|
||||
- create
|
||||
- update
|
||||
- delete
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
11
policies/pki_int/issuer/admin.yaml
Normal file
11
policies/pki_int/issuer/admin.yaml
Normal file
@ -0,0 +1,11 @@
|
||||
# Allow access to read pki_int issuers
|
||||
---
|
||||
rules:
|
||||
- path: "pki_int/issuer/*"
|
||||
capabilities:
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
14
policies/pki_root/config/admin.yaml
Normal file
14
policies/pki_root/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
# Allow access to configure pki_root secret backend
|
||||
---
|
||||
rules:
|
||||
- path: "pki_root/config/*"
|
||||
capabilities:
|
||||
- create
|
||||
- update
|
||||
- delete
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
11
policies/pki_root/issuer/admin.yaml
Normal file
11
policies/pki_root/issuer/admin.yaml
Normal file
@ -0,0 +1,11 @@
|
||||
# Allow access to read pki_root issuers
|
||||
---
|
||||
rules:
|
||||
- path: "pki_root/issuer/*"
|
||||
capabilities:
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
14
policies/pki_root/roles/admin.yaml
Normal file
14
policies/pki_root/roles/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
# Allow access to manage pki_root secret backend roles
|
||||
---
|
||||
rules:
|
||||
- path: "pki_root/roles/*"
|
||||
capabilities:
|
||||
- create
|
||||
- update
|
||||
- delete
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
14
policies/rundeck/config/admin.yaml
Normal file
14
policies/rundeck/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
# Allow access to configure rundeck KV secret backend
|
||||
---
|
||||
rules:
|
||||
- path: "rundeck/config"
|
||||
capabilities:
|
||||
- create
|
||||
- update
|
||||
- delete
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
14
policies/sshca/config/admin.yaml
Normal file
14
policies/sshca/config/admin.yaml
Normal file
@ -0,0 +1,14 @@
|
||||
# Allow access to configure SSH CA secret backend
|
||||
---
|
||||
rules:
|
||||
- path: "sshca/config/*"
|
||||
capabilities:
|
||||
- create
|
||||
- update
|
||||
- delete
|
||||
- read
|
||||
- list
|
||||
|
||||
auth:
|
||||
approle:
|
||||
- tf_vault
|
||||
Loading…
Reference in New Issue
Block a user