Add instructions for both kvv1 and kvv2 to getting started policies info
This commit is contained in:
parent
d88e4d5019
commit
d60360ddbe
|
@ -27,13 +27,23 @@ Policies are authored in [HCL][hcl], but it is JSON compatible. Here is an
|
||||||
example policy:
|
example policy:
|
||||||
|
|
||||||
```hcl
|
```hcl
|
||||||
|
# Normal servers have version 1 of KV mounted by default, so will need these
|
||||||
|
# paths:
|
||||||
path "secret/*" {
|
path "secret/*" {
|
||||||
capabilities = ["create"]
|
capabilities = ["create"]
|
||||||
}
|
}
|
||||||
|
|
||||||
path "secret/foo" {
|
path "secret/foo" {
|
||||||
capabilities = ["read"]
|
capabilities = ["read"]
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Dev servers have version 2 of KV mounted by default, so will need these
|
||||||
|
# paths:
|
||||||
|
path "secret/data/*" {
|
||||||
|
capabilities = ["create"]
|
||||||
|
}
|
||||||
|
path "secret/data/foo" {
|
||||||
|
capabilities = ["read"]
|
||||||
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
With this policy, a user could write any secret to `secret/`, except to
|
With this policy, a user could write any secret to `secret/`, except to
|
||||||
|
@ -69,13 +79,23 @@ Here is an example you can copy-paste in the terminal:
|
||||||
|
|
||||||
```text
|
```text
|
||||||
$ vault policy write my-policy -<<EOF
|
$ vault policy write my-policy -<<EOF
|
||||||
|
# Normal servers have version 1 of KV mounted by default, so will need these
|
||||||
|
# paths:
|
||||||
path "secret/*" {
|
path "secret/*" {
|
||||||
capabilities = ["create"]
|
capabilities = ["create"]
|
||||||
}
|
}
|
||||||
|
|
||||||
path "secret/foo" {
|
path "secret/foo" {
|
||||||
capabilities = ["read"]
|
capabilities = ["read"]
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Dev servers have version 2 of KV mounted by default, so will need these
|
||||||
|
# paths:
|
||||||
|
path "secret/data/*" {
|
||||||
|
capabilities = ["create"]
|
||||||
|
}
|
||||||
|
path "secret/data/foo" {
|
||||||
|
capabilities = ["read"]
|
||||||
|
}
|
||||||
EOF
|
EOF
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -92,11 +112,12 @@ To view the contents of a policy, run:
|
||||||
|
|
||||||
```text
|
```text
|
||||||
$ vault policy read my-policy
|
$ vault policy read my-policy
|
||||||
|
# Normal servers have version 1 of KV mounted by default, so will need these
|
||||||
|
# paths:
|
||||||
path "secret/*" {
|
path "secret/*" {
|
||||||
capabilities = ["create"]
|
capabilities = ["create"]
|
||||||
}
|
}
|
||||||
|
...
|
||||||
# ...
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## Testing the Policy
|
## Testing the Policy
|
||||||
|
@ -130,11 +151,33 @@ token_policies [default my-policy]
|
||||||
Verify that you can write any data to `secret/`, but only read from
|
Verify that you can write any data to `secret/`, but only read from
|
||||||
`secret/foo`:
|
`secret/foo`:
|
||||||
|
|
||||||
|
### Dev servers
|
||||||
|
|
||||||
```text
|
```text
|
||||||
$ vault write secret/bar value=yes
|
$ vault kv put secret/bar robot=beepboop
|
||||||
|
Key Value
|
||||||
|
--- -----
|
||||||
|
created_time 2018-05-22T18:05:42.537496856Z
|
||||||
|
deletion_time n/a
|
||||||
|
destroyed false
|
||||||
|
version 1
|
||||||
|
|
||||||
|
$ vault kv put secret/foo robot=beepboop
|
||||||
|
Error writing data to secret/data/foo: Error making API request.
|
||||||
|
|
||||||
|
URL: PUT http://127.0.0.1:8200/v1/secret/data/foo
|
||||||
|
Code: 403. Errors:
|
||||||
|
|
||||||
|
* permission denied
|
||||||
|
```
|
||||||
|
|
||||||
|
### Non-dev servers
|
||||||
|
|
||||||
|
```text
|
||||||
|
$ vault kv put secret/bar robot=beepboop
|
||||||
Success! Data written to: secret/bar
|
Success! Data written to: secret/bar
|
||||||
|
|
||||||
$ vault write secret/foo value=yes
|
$ vault kv put secret/foo robot=beepboop
|
||||||
Error writing data to secret/foo: Error making API request.
|
Error writing data to secret/foo: Error making API request.
|
||||||
|
|
||||||
URL: PUT http://127.0.0.1:8200/v1/secret/foo
|
URL: PUT http://127.0.0.1:8200/v1/secret/foo
|
||||||
|
|
Loading…
Reference in New Issue