2019-05-01 21:11:23 +00:00
|
|
|
---
|
2020-09-01 15:14:13 +00:00
|
|
|
layout: commands
|
2020-04-07 18:55:19 +00:00
|
|
|
page_title: 'Commands: ACL Binding Rule Create'
|
2023-01-26 18:42:13 +00:00
|
|
|
description: |
|
|
|
|
The `consul acl binding-rule create` command creates new ACL binding rules. These rules bind auth methods to specific services or roles.
|
2019-05-01 21:11:23 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# Consul ACL Binding Rule Create
|
|
|
|
|
|
|
|
Command: `consul acl binding-rule create`
|
|
|
|
|
2023-01-25 16:52:43 +00:00
|
|
|
Corresponding HTTP API Endpoint: [\[PUT\] /v1/acl/binding-rule](/consul/api-docs/acl/binding-rules#create-a-binding-rule)
|
2022-01-10 17:40:11 +00:00
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
The `acl binding-rule create` command creates new binding rules.
|
|
|
|
|
2023-01-25 16:52:43 +00:00
|
|
|
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
|
|
|
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
2022-01-10 21:44:56 +00:00
|
|
|
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
|
|
|
|
|
|
|
| ACL Required |
|
|
|
|
| ------------ |
|
|
|
|
| `acl:write` |
|
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
## Usage
|
|
|
|
|
|
|
|
Usage: `consul acl binding-rule create [options] [args]`
|
|
|
|
|
|
|
|
#### Command Options
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-bind-name=<string>` - Name to bind on match. Can use `${var}`
|
2019-05-01 21:11:23 +00:00
|
|
|
interpolation. This flag is required.
|
|
|
|
|
2023-11-20 14:44:30 +00:00
|
|
|
- `-bind-type=<string>` - Type of binding to perform (`"service"`, `"node"`, `"templated-policy"`, `"policy"` or `"role"`).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-description=<string>` - A description of the binding rule.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-meta` - Indicates that binding rule metadata such as the raft
|
|
|
|
indices should be shown for each entry.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-method=<string>` - The auth method's name for which this binding rule
|
2019-05-01 21:11:23 +00:00
|
|
|
applies. This flag is required.
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-selector=<string>` - Selector is an expression that matches against
|
2019-05-01 21:11:23 +00:00
|
|
|
verified identity attributes returned from the auth method during login.
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-format={pretty|json}` - Command output format. The default value is `pretty`.
|
2020-03-26 16:03:22 +00:00
|
|
|
|
2019-12-06 16:14:56 +00:00
|
|
|
#### Enterprise Options
|
|
|
|
|
2022-07-27 06:17:11 +00:00
|
|
|
@include 'http_api_partition_options.mdx'
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
@include 'http_api_namespace_options.mdx'
|
2019-12-06 16:14:56 +00:00
|
|
|
|
2022-07-27 06:17:11 +00:00
|
|
|
#### API Options
|
|
|
|
|
|
|
|
@include 'http_api_options_client.mdx'
|
|
|
|
|
|
|
|
@include 'http_api_options_server.mdx'
|
2021-12-15 01:55:21 +00:00
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
## Examples
|
|
|
|
|
|
|
|
Create a new binding rule that binds to a service identity:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ consul acl binding-rule create -method 'minikube' \
|
|
|
|
-description 'wildcard service' \
|
|
|
|
-bind-type 'service' \
|
|
|
|
-bind-name 'k8s-${serviceaccount.name}' \
|
|
|
|
-selector 'serviceaccount.namespace==default and serviceaccount.name!=vault'
|
|
|
|
ID: 0ec1bd2f-1d3b-bafb-d9bf-90ef04ab1890
|
|
|
|
AuthMethod: minikube
|
|
|
|
Description: wildcard service
|
|
|
|
BindType: service
|
|
|
|
BindName: k8s-${serviceaccount.name}
|
|
|
|
Selector: serviceaccount.namespace==default and serviceaccount.name!=vault
|
|
|
|
```
|
|
|
|
|
|
|
|
Create a new binding rule that binds to a role:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ consul acl binding-rule create -method 'minikube' \
|
|
|
|
-description 'just vault role' \
|
|
|
|
-bind-type 'role' \
|
|
|
|
-bind-name 'vault' \
|
|
|
|
-selector 'serviceaccount.namespace==default and serviceaccount.name==vault'
|
|
|
|
ID: e21ae868-7b13-a230-0235-f8e83510642c
|
|
|
|
AuthMethod: minikube
|
|
|
|
Description: just vault role
|
|
|
|
BindType: role
|
|
|
|
BindName: vault
|
|
|
|
Selector: serviceaccount.namespace==default and serviceaccount.name==vault
|
2023-11-20 14:44:30 +00:00
|
|
|
```
|
|
|
|
|
|
|
|
Create a new binding rule that binds to a policy:
|
|
|
|
|
|
|
|
```shell-session
|
|
|
|
$ consul acl binding-rule create -method 'nomad' \
|
|
|
|
-description 'gets policy for nomad job' \
|
|
|
|
-bind-type 'policy' \
|
|
|
|
-bind-name 'nomad-${nomad.jobname}' \
|
|
|
|
-selector 'nomad.jobname==billing-app'
|
|
|
|
ID: e21ae868-7b13-a230-0235-f8e83510642c
|
|
|
|
AuthMethod: nomad
|
|
|
|
Description: gets policy for nomad job
|
|
|
|
BindType: policy
|
|
|
|
BindName: nomad-billing-app
|
|
|
|
Selector: nomad.jobname==billing-app
|
|
|
|
```
|
|
|
|
|
|
|
|
Create a new binding rule that binds to a templated policy:
|
|
|
|
|
|
|
|
```shell-session
|
|
|
|
$ consul acl binding-rule create -method 'remote-jwks' \
|
|
|
|
-description 'gets templated policy for dns tokens' \
|
|
|
|
-bind-type 'templated-policy' \
|
|
|
|
-bind-name 'builtin/dns' \
|
|
|
|
-selector 'serviceaccount.namespace==default'
|
|
|
|
ID: eaca9aa4-8913-c8ef-ba39-bfae64f66d99
|
|
|
|
AuthMethod: remote-jwks
|
|
|
|
Description: gets templated policy for dns tokens
|
|
|
|
BindType: templated-policy
|
|
|
|
BindName: builtin/dns
|
|
|
|
Selector: serviceaccount.namespace==default
|
2023-11-20 13:11:08 +00:00
|
|
|
```
|