From 97aac1362d815f861903bf6ae9cd359ad0f02325 Mon Sep 17 00:00:00 2001 From: kirby Date: Tue, 20 May 2025 18:04:33 +0200 Subject: [PATCH] adding cli file --- vault/cli.md | 48 ++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 48 insertions(+) create mode 100644 vault/cli.md diff --git a/vault/cli.md b/vault/cli.md new file mode 100644 index 0000000..65e2e6b --- /dev/null +++ b/vault/cli.md @@ -0,0 +1,48 @@ +### Getting a token from existing role + +```bash +vault write auth/approle/login role_id= secret_id= +``` + +### Getting role-id and secret-id from existing approle + +```bash +vault read auth/approle/role//role-id +vault write -f auth/approle/role//secret-id +``` + +### Add bound_service_account_names to kubernetes role + +```bash +> vim @api.json +{ + "alias_name_source": "serviceaccount_uid", + "bound_service_account_names": [ + "my-api", + "my-api-pending-check-daemon", + "my-api-consumer2", + "my-api-consumer" + ], + "bound_service_account_namespaces": [ + "namespace1" + ], + "token_bound_cidrs": [], + "token_explicit_max_ttl": 0, + "token_max_ttl": 0, + "token_no_default_policy": true, + "token_num_uses": 0, + "token_period": 0, + "token_policies": [ + "my-api-prd" + ], + "token_ttl": 0, + "token_type": "default" +} +> vault write auth/staging/kubernetes/role/my-api @api.json +``` + +### Add policy to LDAP user + +```bash +vault write auth/ldap/users/myUser groups=lead-dev policies=new-policy +```