depot/ops/vault/cfg/policies/server.hcl

41 lines
894 B
HCL
Raw Permalink Normal View History

2022-03-14 23:34:33 +00:00
# Allow everyone to manage things under kv/server/<user>
path "kv/data/server/{{identity.entity.name}}/*" {
capabilities = ["create", "update", "read", "delete"]
}
path "kv/metadata/server/{{identity.entity.name}}/*" {
capabilities = ["list"]
}
path "kv/metadata/server" {
capabilities = ["list"]
}
# Can read secrets for their own Wireguard keys.
path "kv/data/apps/wireguard/{{identity.entity.name}}" {
capabilities = ["read"]
}
path "kv/metadata/apps/wireguard/{{identity.entity.name}}" {
capabilities = ["read"]
}
2022-03-14 23:34:33 +00:00
path "kv/metadata/+" {
capabilities = ["list"]
}
path "acme/certs/*" {
capabilities = ["create"]
}
# Servers can always get nix-daemon data
path "kv/data/apps/nix-daemon" {
capabilities = ["read"]
}
path "kv/metadata/apps/nix-daemon" {
capabilities = ["read"]
}
# Servers can issue sub-tokens.
path "auth/token/create" {
capabilities = ["update"]
}