Compare commits

..

No commits in common. "66ee6430fa8bd6fc9774cbac54879c75e90c009b" and "f8f1185b42b785462296c57ccb24a7179f43529f" have entirely different histories.

12 changed files with 0 additions and 159 deletions

View File

@ -1,14 +0,0 @@
# Allow access to configure consul secret backend
---
rules:
- path: "consul_root/au/syd1/config/*"
capabilities:
- create
- update
- delete
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,14 +0,0 @@
# Allow access to manage consul secret backend roles
---
rules:
- path: "consul_root/au/syd1/roles/*"
capabilities:
- create
- update
- delete
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,14 +0,0 @@
# Allow access to configure KV secret backend
---
rules:
- path: "kv/config"
capabilities:
- create
- update
- delete
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,14 +0,0 @@
# Allow access to configure pki/au/syd1 secret backend
---
rules:
- path: "pki/au/syd1/config/*"
capabilities:
- create
- update
- delete
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,11 +0,0 @@
# Allow access to read pki/au/syd1 issuers
---
rules:
- path: "pki/au/syd1/issuer/*"
capabilities:
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,14 +0,0 @@
# Allow access to configure pki_int secret backend
---
rules:
- path: "pki_int/config/*"
capabilities:
- create
- update
- delete
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,11 +0,0 @@
# Allow access to read pki_int issuers
---
rules:
- path: "pki_int/issuer/*"
capabilities:
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,14 +0,0 @@
# Allow access to configure pki_root secret backend
---
rules:
- path: "pki_root/config/*"
capabilities:
- create
- update
- delete
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,11 +0,0 @@
# Allow access to read pki_root issuers
---
rules:
- path: "pki_root/issuer/*"
capabilities:
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,14 +0,0 @@
# Allow access to manage pki_root secret backend roles
---
rules:
- path: "pki_root/roles/*"
capabilities:
- create
- update
- delete
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,14 +0,0 @@
# Allow access to configure rundeck KV secret backend
---
rules:
- path: "rundeck/config"
capabilities:
- create
- update
- delete
- read
- list
auth:
approle:
- tf_vault

View File

@ -1,14 +0,0 @@
# Allow access to configure SSH CA secret backend
---
rules:
- path: "sshca/config/*"
capabilities:
- create
- update
- delete
- read
- list
auth:
approle:
- tf_vault