保险柜:如何创建秘密ID

时间:2018-06-20 09:08:07

标签: hashicorp-vault

我创建了令牌:

$ vault token lookup abac979c-d00d-4182-5654-793861dc0be9
Key                 Value
---                 -----
accessor            ee63d369-0823-4f5d-62c3-5fb877f36a36
creation_time       1529483637
creation_ttl        604800
display_name        token
entity_id           n/a
expire_time         2018-06-27T08:33:57.103907674Z
explicit_max_ttl    0
id                  abac979c-d00d-4182-5654-793861dc0be9
issue_time          2018-06-20T08:33:57.103907333Z
meta                <nil>
num_uses            0
orphan              false
path                auth/token/create
policies            [default openshift-token-manager]
renewable           true
ttl                 603405

如您所见,它具有openshift-token-manager策略。该政策如下:

vault policy read openshift-token-manager
path "auth/approle/role/openshift/secret-id" {
    capabilities = ["update"]
}

我正在使用此令牌来创建secret-id

$ vault write -f auth/approle/role/openshift-ro/secret-id
Error writing data to auth/approle/role/openshift-ro/secret-id: Error making API request.

URL: PUT https://vault.vault-sidekick.svc/v1/auth/approle/role/openshift-ro/secret-id
Code: 403. Errors:

* permission denied

有什么想法吗?

1 个答案:

答案 0 :(得分:3)

您要为其创建秘密ID的角色 openshift-ro 与您的策略 openshift 中授予的角色不匹配-因此,权限被拒绝错误似乎是正确的。

更改策略以授予对 openshift-ro 角色的访问权限。