terraform-vault/policies
Ben Vincent 6624f7aed1 feat: add kubernetes secrets engine with RBAC roles for au-syd1 cluster
- Add Kubernetes secrets engine at kubernetes/au/syd1 path
  - Create four RBAC roles with external YAML configuration:
    * media-apps-operator: namespaced role for media-apps with selective permissions
    * cluster-operator: cluster-wide read-only access to specific API groups
    * cluster-admin: cluster-wide full access to specific API groups
    * cluster-root: cluster-wide superuser access to all resources
  - Add Vault policies for credential generation for each role
  - Add admin policies for kubernetes auth backend configuration and role management
  - Refactor kubernetes auth backend to use shared locals for CA certificate
  - Update terraform-vault approle with required kubernetes policies
2025-11-27 23:22:13 +11:00
..
auth chore: format policy files 2025-11-16 13:35:10 +11:00
kubernetes/au feat: add kubernetes secrets engine with RBAC roles for au-syd1 cluster 2025-11-27 23:22:13 +11:00
kv/service feat: add kubernetes secrets engine with RBAC roles for au-syd1 cluster 2025-11-27 23:22:13 +11:00
pki_int feat: manage k8s auth role integration 2025-11-22 23:21:43 +11:00
pki_root feat: manage terraform access to vault 2024-09-26 22:59:40 +10:00
rundeck feat: import current status 2024-09-23 22:01:18 +10:00
ssh-host-signer chore: format policy files 2025-11-16 13:35:10 +11:00
sshca chore: format policy files 2025-11-16 13:35:10 +11:00
sys feat: manage terraform access to vault 2024-09-26 22:59:40 +10:00
transit feat: add transit engine 2025-11-15 15:55:51 +11:00
default_access.hcl feat: manage terraform access to vault 2024-09-26 22:59:40 +10:00