|
3 | 3 |
|
4 | 4 | terraform { |
5 | 5 | required_providers { |
6 | | - boundary = { |
| 6 | + boundary = { |
7 | 7 | source = "hashicorp/boundary" |
8 | | - version = "1.0.9" |
| 8 | + version = "1.1.15" |
9 | 9 | } |
10 | 10 | } |
11 | 11 | } |
@@ -68,45 +68,44 @@ resource "boundary_account_password" "user" { |
68 | 68 | for_each = var.users |
69 | 69 | name = each.key |
70 | 70 | description = "User account for ${each.key}" |
71 | | - type = "password" |
72 | 71 | login_name = lower(each.key) |
73 | 72 | password = "password" |
74 | 73 | auth_method_id = boundary_auth_method.password.id |
75 | 74 | } |
76 | 75 |
|
77 | 76 | resource "boundary_role" "global_anon_listing" { |
78 | 77 | scope_id = boundary_scope.global.id |
| 78 | + principal_ids = ["u_anon"] |
79 | 79 | grant_strings = [ |
80 | | - "id=*;type=auth-method;actions=list,authenticate", |
| 80 | + "ids=*;type=auth-method;actions=list,authenticate", |
81 | 81 | "type=scope;actions=list", |
82 | | - "id={{account.id}};actions=read,change-password" |
| 82 | + "ids={{account.id}};actions=read,change-password" |
83 | 83 | ] |
84 | | - principal_ids = ["u_anon"] |
85 | 84 | } |
86 | 85 |
|
87 | 86 | resource "boundary_role" "org_anon_listing" { |
88 | | - scope_id = boundary_scope.org.id |
| 87 | + scope_id = boundary_scope.org.id |
| 88 | + principal_ids = ["u_anon"] |
89 | 89 | grant_strings = [ |
90 | | - "id=*;type=auth-method;actions=list,authenticate", |
| 90 | + "ids=*;type=auth-method;actions=list,authenticate", |
91 | 91 | "type=scope;actions=list", |
92 | | - "id={{account.id}};actions=read,change-password" |
| 92 | + "ids={{account.id}};actions=read,change-password" |
93 | 93 | ] |
94 | | - principal_ids = ["u_anon"] |
95 | 94 | } |
96 | 95 | resource "boundary_role" "org_admin" { |
97 | | - scope_id = "global" |
98 | | - grant_scope_id = boundary_scope.org.id |
99 | | - grant_strings = ["id=*;type=*;actions=*"] |
| 96 | + scope_id = "global" |
| 97 | + grant_scope_ids = [boundary_scope.org.id] |
| 98 | + grant_strings = ["ids=*;type=*;actions=*"] |
100 | 99 | principal_ids = concat( |
101 | 100 | [for user in boundary_user.user : user.id], |
102 | 101 | ["u_auth"] |
103 | 102 | ) |
104 | 103 | } |
105 | 104 |
|
106 | 105 | resource "boundary_role" "proj_admin" { |
107 | | - scope_id = boundary_scope.org.id |
108 | | - grant_scope_id = boundary_scope.project.id |
109 | | - grant_strings = ["id=*;type=*;actions=*"] |
| 106 | + scope_id = boundary_scope.org.id |
| 107 | + grant_scope_ids = [boundary_scope.project.id] |
| 108 | + grant_strings = ["ids=*;type=*;actions=*"] |
110 | 109 | principal_ids = concat( |
111 | 110 | [for user in boundary_user.user : user.id], |
112 | 111 | ["u_auth"] |
@@ -166,9 +165,9 @@ resource "boundary_target" "db" { |
166 | 165 | } |
167 | 166 |
|
168 | 167 | resource "boundary_host_static" "postgres" { |
169 | | - type = "static" |
170 | | - name = "postgres" |
171 | | - description = "Private postgres container" |
| 168 | + type = "static" |
| 169 | + name = "postgres" |
| 170 | + description = "Private postgres container" |
172 | 171 | # DNS set via docker-compose |
173 | 172 | address = "postgres" |
174 | 173 | host_catalog_id = boundary_host_catalog_static.databases.id |
|
0 commit comments