Skip to content
#

hashicorp

Here are 722 public repositories matching this topic...

johnnybubonic
johnnybubonic commented Mar 2, 2021

So there is currently an hvac.v1.Client.sys.list_mounted_secrets_engines() method.

However, for obvious reasons this will fail as it will attempt to list all mounted secrets engines (as it calls /v1/sys/mounts).

The web UI, however, shows what mounts the current token has access to.

While poking around the live API documentation the other day (`VAULT_BASE_URI/ui/vault/api-explorer

good first issue system backend
saurabh-sp-tripathi
saurabh-sp-tripathi commented Jan 3, 2022

I understand the nomad need to be start/restart as a 'root' user because many operation it runs, needs root privilege.

However as a system admin I would like to harden/limit the scope of 'sudo' access to specific tasks only. As far as I have analyzed the following will need sudo/become/root privilege's:

  • handlers/main.yml: restart nomad
  • tasks/main.yml: start nomad
  • file & template oper

Improve this page

Add a description, image, and links to the hashicorp topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the hashicorp topic, visit your repo's landing page and select "manage topics."

Learn more