Skip to content

Commit 61a3faf

Browse files
Vault: documentation update (#104)
Vault: documentation update Updated documentation includes: demo.rst api.md usage.rst README.md vault_configure.tf Reviewed-by: Anton Sidelnikov <None> Reviewed-by: Aloento <None>
1 parent 9f567c6 commit 61a3faf

File tree

5 files changed

+14
-14
lines changed

5 files changed

+14
-14
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,8 @@ You must have a Vault server already running, unsealed, and authenticated.
6262
1. Firstly you have to define an admin credentials in a cloud.
6363

6464
```sh
65-
$ vault write /openstack/cloud/example-cloud auth_url=https://127.0.0.1/v3/ username=admin password=admin user_domain_name=mydomain
66-
Success! Data written to: openstack/cloud/example-cloud
65+
$ vault write /openstack/clouds/example-cloud auth_url=https://127.0.0.1/v3/ username=admin password=admin user_domain_name=mydomain
66+
Success! Data written to: openstack/clouds/example-cloud
6767
```
6868

6969
> **_NOTE:_** In the `cloud` you can specify additional parameters such as [`username_template`](https://www.vaultproject.io/docs/concepts/username-templating)
@@ -72,8 +72,8 @@ You must have a Vault server already running, unsealed, and authenticated.
7272
1. After that you need to create a role for the cloud.
7373

7474
```sh
75-
$ vault write /openstack/role/example-role cloud=example-cloud project_name=myproject domain_name=mydomain user_roles="member" root=false
76-
Success! Data written to: openstack/role/example-role
75+
$ vault write /openstack/roles/example-role cloud=example-cloud project_name=myproject domain_name=mydomain user_roles="member" root=false
76+
Success! Data written to: openstack/roles/example-role
7777
```
7878

7979
1. Now you can easily create a temporary user/token pair.

doc/source/api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ $ curl \
5555

5656
## Read Root Configuration
5757

58-
This endpoint allows you to read non-secure values that have been set in the `cloud/:cloud` endpoint.
58+
This endpoint allows you to read non-secure values that have been set in the `clouds/:cloud` endpoint.
5959
In particular, the `password` parameter is never returned.
6060

6161
| Method | Path |

doc/source/examples/demo.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,13 +53,13 @@ perform invoke Terraform to query image_id for the image by name.
5353

5454
.. code-block::
5555
56-
$ vault write openstack/cloud/demo auth_url=https://<AUTH_URL> username=<USER> password=<PASSWORD> user_domain_name=<USER_DOMAIN_NAME> password_policy=os-policy
56+
$ vault write openstack/clouds/demo auth_url=https://<AUTH_URL> username=<USER> password=<PASSWORD> user_domain_name=<USER_DOMAIN_NAME> password_policy=os-policy
5757
5858
- Configure root token role
5959

6060
.. code-block:: console
6161
62-
$ vault write /openstack/role/root_token cloud=demo project_name=<PROJECT_NAME> domain_name=<DOMAIN_NAME> root=true
62+
$ vault write /openstack/roles/root_token cloud=demo project_name=<PROJECT_NAME> domain_name=<DOMAIN_NAME> root=true
6363
6464
- Prepare Terraform configuration
6565

doc/source/examples/terraform_vault_configure/vault_configure.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ resource "vault_generic_secret" "os_policy" {
55
}
66

77
resource "vault_generic_secret" "os_root" {
8-
path = "openstack/cloud/os_root"
8+
path = "openstack/clouds/os_root"
99

1010
data_json = file("${path.cwd}/vault_data/os_root.json")
1111

@@ -15,7 +15,7 @@ resource "vault_generic_secret" "os_root" {
1515
}
1616

1717
resource "vault_generic_secret" "tmp_user_token" {
18-
path = "openstack/role/tmp_user_token"
18+
path = "openstack/roles/tmp_user_token"
1919

2020
data_json = file("${path.cwd}/vault_data/tmp_user_token.json")
2121

@@ -25,7 +25,7 @@ resource "vault_generic_secret" "tmp_user_token" {
2525
}
2626

2727
resource "vault_generic_secret" "root_token" {
28-
path = "openstack/role/root_token"
28+
path = "openstack/roles/root_token"
2929

3030
data_json = file("${path.cwd}/vault_data/root_token.json")
3131

doc/source/usage.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ will give possibility to use dynamic roles for requesting a temporary user.
1111

1212
.. code-block:: console
1313
14-
$ vault write /openstack/cloud/example-cloud auth_url=https://127.0.0.1/v3/ username=admin password=admin user_domain_name=mydomain username_template= vault{{random 8 | lowercase}} password_policy=my-policy
14+
$ vault write /openstack/clouds/example-cloud auth_url=https://127.0.0.1/v3/ username=admin password=admin user_domain_name=mydomain username_template= vault{{random 8 | lowercase}} password_policy=my-policy
1515
Success! Data written to: openstack/cloud/example-cloud
1616
1717
Roles
@@ -25,21 +25,21 @@ To configure a role that generates OSC Service Account token (preferred):
2525

2626
.. code-block:: console
2727
28-
$ vault write /openstack/role/role-tmp-user cloud=example-cloud project_name=myproject domain_name=mydomain user_groups=power-user root=false secret_type=token
28+
$ vault write /openstack/roles/role-tmp-user cloud=example-cloud project_name=myproject domain_name=mydomain user_groups=power-user root=false secret_type=token
2929
Success! Data written to: openstack/role/role-tmp-user
3030
3131
To configure a role that generates OSC Service Account password:
3232

3333
.. code-block:: console
3434
35-
$ vault write /openstack/role/role-tmp-user-pwd cloud=example-cloud project_name=myproject domain_name=mydomain user_groups=power-user root=false secret_type=password
35+
$ vault write /openstack/roles/role-tmp-user-pwd cloud=example-cloud project_name=myproject domain_name=mydomain user_groups=power-user root=false secret_type=password
3636
Success! Data written to: openstack/role/role-tmp-user-pwd
3737
3838
To configure a role that generates OSC root account token
3939

4040
.. code-block:: console
4141
42-
$ vault write /openstack/role/role-root-user cloud=example-cloud project_name=myproject domain_name=mydomain root=true
42+
$ vault write /openstack/roles/role-root-user cloud=example-cloud project_name=myproject domain_name=mydomain root=true
4343
Success! Data written to: openstack/role/role-root-user
4444
4545
After the secrets engine is configured and a user/machine has a Vault token

0 commit comments

Comments
 (0)