terraform-vault/policies.tf
Ben Vincent cbee19b5f9 feat: move k8s secrets into vault
- update kubernetes_host to match value in jwt
- regenerate jwt token and store in vault
- add policy to enable access to jwt token
- update tf_deploy user with access to token
2025-11-16 12:42:18 +11:00

48 lines
1.2 KiB
HCL

# Define a list of directories that contain policy files
locals {
policy_directories = [
"policies",
"policies/sys",
"policies/auth/approle",
"policies/auth/kubernetes",
"policies/auth/ldap",
"policies/auth/token",
"policies/k8s",
"policies/pki_int",
"policies/pki_root",
"policies/rundeck",
"policies/ssh-host-signer",
"policies/sshca",
"policies/transit/decrypt",
"policies/transit/encrypt",
"policies/transit/keys",
"policies/kv/service/glauth/services",
"policies/kv/service/incus",
"policies/kv/service/packer",
"policies/kv/service/puppet/certificates",
"policies/kv/service/puppetapi",
"policies/kv/service/terraform",
"policies/kv/service/kubernetes/au/syd1/token_reviewer_jwt",
]
}
# Load policy files from each directory
locals {
policy_files = flatten([
for path in local.policy_directories : [
for f in fileset(path, "*.hcl") : {
name = trimsuffix(trimprefix("${path}/${f}", "policies/"), ".hcl")
path = "${path}/${f}"
}
]
])
}
# Define Vault policies for all listed directories
resource "vault_policy" "policies" {
for_each = { for p in local.policy_files : p.name => p }
name = each.key
policy = file(each.value.path)
}