2022-03-14 23:34:33 +00:00
|
|
|
# Allow everyone to manage things under kv/server/<user>
|
|
|
|
path "kv/data/server/{{identity.entity.name}}/*" {
|
|
|
|
capabilities = ["create", "update", "read", "delete"]
|
|
|
|
}
|
|
|
|
|
|
|
|
path "kv/metadata/server/{{identity.entity.name}}/*" {
|
|
|
|
capabilities = ["list"]
|
|
|
|
}
|
|
|
|
path "kv/metadata/server" {
|
|
|
|
capabilities = ["list"]
|
|
|
|
}
|
|
|
|
|
2023-01-15 19:23:53 +00:00
|
|
|
# Can read secrets for their own Wireguard keys.
|
|
|
|
path "kv/data/apps/wireguard/{{identity.entity.name}}" {
|
|
|
|
capabilities = ["read"]
|
|
|
|
}
|
|
|
|
path "kv/metadata/apps/wireguard/{{identity.entity.name}}" {
|
|
|
|
capabilities = ["read"]
|
|
|
|
}
|
|
|
|
|
2022-03-14 23:34:33 +00:00
|
|
|
path "kv/metadata/+" {
|
|
|
|
capabilities = ["list"]
|
|
|
|
}
|
|
|
|
|
|
|
|
path "acme/certs/*" {
|
|
|
|
capabilities = ["create"]
|
|
|
|
}
|
|
|
|
|
|
|
|
# Servers can always get nix-daemon data
|
|
|
|
path "kv/data/apps/nix-daemon" {
|
|
|
|
capabilities = ["read"]
|
|
|
|
}
|
|
|
|
path "kv/metadata/apps/nix-daemon" {
|
|
|
|
capabilities = ["read"]
|
|
|
|
}
|
2022-03-20 17:47:52 +00:00
|
|
|
|
|
|
|
# Servers can issue sub-tokens.
|
|
|
|
path "auth/token/create" {
|
|
|
|
capabilities = ["update"]
|
|
|
|
}
|