-
Notifications
You must be signed in to change notification settings - Fork 3
/
vault_boundary.tf
92 lines (72 loc) · 1.99 KB
/
vault_boundary.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
resource "vault_token" "boundary" {
provider = vault.app
no_parent = true
policies = [vault_policy.boundary_policy.name, "superadmin", "admin-policy"]
display_name = "boundary cred store"
renewable = true
period = "72h"
}
resource "vault_policy" "boundary_policy" {
provider = vault.app
name = "dev-team"
policy = <<EOT
path "*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
path "kv/*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
path "kv/test/*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
path "pki/*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
# all access to boundary namespace
path "postgres/*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
path "boundary/*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
path "auth/token/revoke-accessor" {
capabilities = ["read","update"]
}
path "auth/token/lookup-self" {
capabilities = ["read"]
}
path "auth/token/lookup" {
capabilities = ["read","update"]
}
path "auth/token/renew-self" {
capabilities = ["read","update"]
}
path "auth/token/revoke-self" {
capabilities = ["read","update"]
}
path "sys/leases/renew" {
capabilities = ["read","update"]
}
path "sys/leases/revoke" {
capabilities = ["read","update"]
}
path "auth/token/revoke-accessor" {
capabilities = ["read","update"]
}
path "/sys/capabilities-self" {
capabilities = ["delete", "list", "read", "update"]
}
path "/sys/capabilities-accessor" {
capabilities = ["delete", "list", "read", "update"]
}
path "/sys/capabilities" {
capabilities = ["delete", "list", "read", "update"]
}
path "auth/token/renew-self" {
capabilities = ["read","update"]
}
path "/postgres/creds/*"{
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
EOT
}