Skip to content

Commit bb07c0d

Browse files
committed
added test vault policies
Signed-off-by: Rod Anami <rod.anami@kyndryl.com>
1 parent 82e228b commit bb07c0d

File tree

6 files changed

+196
-4
lines changed

6 files changed

+196
-4
lines changed

CHANGELOG.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
## Change Log
44

55
* `0.4.5a` (**latest**)
6-
* Updated Axios dependency to `1.7.4` (CVE-2024-39338)
6+
* Updated Axios dependency to `1.7.4` [#51](CVE-2024-39338)
77
* Upgraded development env to Vault server `1.17.3`
88

99
* `0.4.15`
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
# Manage auth methods broadly across Vault
2+
path "auth/*"
3+
{
4+
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
5+
}
6+
7+
# Create, update, and delete auth methods
8+
path "sys/auth/*"
9+
{
10+
capabilities = ["create", "update", "delete", "sudo"]
11+
}
12+
13+
# List auth methods
14+
path "sys/auth"
15+
{
16+
capabilities = ["read"]
17+
}
18+
19+
# List existing policies
20+
path "sys/policies/acl"
21+
{
22+
capabilities = ["list"]
23+
}
24+
25+
# Create and manage ACL policies
26+
path "sys/policies/acl/*"
27+
{
28+
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
29+
}
30+
31+
# List, create, update, and delete key/value secrets
32+
path "secret/*"
33+
{
34+
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
35+
}
36+
37+
# Manage secrets engines
38+
path "sys/mounts/*"
39+
{
40+
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
41+
}
42+
43+
# List existing secrets engines.
44+
path "sys/mounts"
45+
{
46+
capabilities = ["read"]
47+
}
48+
49+
# Read health checks
50+
path "sys/health"
51+
{
52+
capabilities = ["read", "sudo"]
53+
}
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
path "pki_int/issue/*"
2+
{
3+
capabilities = ["create", "update"]
4+
}
5+
6+
path "pki_int/certs"
7+
{
8+
capabilities = ["list"]
9+
}
10+
11+
path "pki_int/revoke"
12+
{
13+
capabilities = ["create", "update"]
14+
}
15+
16+
path "pki_int/tidy"
17+
{
18+
capabilities = ["create", "update"]
19+
}
20+
21+
path "pki/cert/ca"
22+
{
23+
capabilities = ["read"]
24+
}
25+
26+
path "auth/token/renew"
27+
{
28+
capabilities = ["update"]
29+
}
30+
31+
path "auth/token/renew-self"
32+
{
33+
capabilities = ["update"]
34+
}
35+
36+
# Roles to create, update secrets
37+
path "/sys/mounts" {
38+
capabilities = ["read", "update", "list"]
39+
}
40+
41+
path "/sys/mounts/*"
42+
{
43+
capabilities = ["update", "create"]
44+
}
45+
46+
path "sys/policies/acl"
47+
{
48+
capabilities = ["read"]
49+
}
50+
51+
path "secret/*"
52+
{
53+
capabilities = ["read", "create", "update", "delete"]
54+
}
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
path "knight/*" {
2+
capabilities = ["create","read","update","delete","list"]
3+
}
4+
5+
path "knight/data/*" {
6+
capabilities = ["create","read","update","delete"]
7+
}
8+
9+
path "knight/delete/*" {
10+
capabilities = ["update"]
11+
}
12+
13+
path "knight/undelete/*" {
14+
capabilities = ["update"]
15+
}
16+
17+
path "knight/destroy/*" {
18+
capabilities = ["update"]
19+
}
20+
21+
path "knight/metadata/*" {
22+
capabilities = ["create","update","delete","list","read"]
23+
}
24+
25+
path "auth/approle/login" {
26+
capabilities = ["create"]
27+
}
28+
29+
path "/auth/approle/role/knight" {
30+
capabilities = ["update"]
31+
allowed_parameters = {
32+
"token_ttl" = []
33+
}
34+
}
35+
36+
path "/auth/approle/role/knight/secret-id" {
37+
capabilities = ["create", "read", "update", "delete", "list"]
38+
}
39+
40+
path "/auth/approle/role/knight/secret-id/*" {
41+
capabilities = ["create", "read", "update", "delete", "list"]
42+
}
43+
44+
path "/auth/approle/role/knight/secret-id-accessor" {
45+
capabilities = ["create", "read", "update", "delete", "list"]
46+
}
47+
48+
path "/auth/approle/role/knight/secret-id-accessor/*" {
49+
capabilities = ["create", "read", "update", "delete", "list"]
50+
}
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
# Manage auth methods broadly across Vault
2+
path "auth/*"
3+
{
4+
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
5+
}
6+
7+
# Create, update, and delete auth methods
8+
path "sys/auth/*"
9+
{
10+
capabilities = ["create", "update", "delete", "sudo"]
11+
}
12+
13+
# List auth methods
14+
path "sys/auth"
15+
{
16+
capabilities = ["read"]
17+
}
18+
19+
# List existing policies
20+
path "sys/policies/acl"
21+
{
22+
capabilities = ["list"]
23+
}
24+
25+
# Create and manage ACL policies via API & UI
26+
path "sys/policies/acl/*"
27+
{
28+
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
29+
}
30+
31+
# List, create, update, and delete key/value secrets
32+
path "secret/*"
33+
{
34+
capabilities = ["create", "read", "update", "delete", "list"]
35+
}

container/setup/vault-config.sh

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -64,10 +64,10 @@ max_ttl="87600h"
6464
vault write pki_int/issue/chatopsknight common_name="vault.chatopsknight.kyndryl.net" ttl="87500h"
6565

6666
# Create a policy
67-
vault policy write knight-vault ./policies/chatops-knight-vault.hcl
67+
vault policy write knight-vault ./policies/knight-vault.hcl
6868

6969
# Apply policy to role for AppRole auth method
70-
vault write auth/approle/role/knight secret_id_ttl="720h" token_ttl="12h" token_max_tll="12h" policies="knight-vault"
70+
vault write auth/approle/role/knight secret_id_ttl="720h" token_ttl="12h" token_max_tll="12h" policies="knight-policy"
7171

7272
# Apply policy to role for Token auth method
7373
vault write auth/token/roles/knight token_explicit_max_ttl=43200 allowed_policies="knight-vault"
@@ -79,7 +79,7 @@ vault read auth/approle/role/knight/role-id
7979
vault write -f auth/approle/role/knight/secret-id
8080

8181
# Check if pair role-id and secret-id are working
82-
vault write auth/approle/login -field=token role_id=${ROLE_ID} secret_id=${SECRET_ID}
82+
vault write auth/approle/login role_id=${ROLE_ID} secret_id=${SECRET_ID} -field=token
8383

8484
# Update issuing and clr points to use https
8585
vault write pki/config/urls \

0 commit comments

Comments
 (0)