website: minor acl guide fixes (#5214)

This commit is contained in:
R.B. Boyer 2019-01-10 14:17:20 -06:00 committed by GitHub
parent 2e97a4858f
commit 4db60f8243
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 15 additions and 15 deletions

View File

@ -83,8 +83,8 @@ On the server where the `bootstrap` command was issued we should see the followi
2018/12/11 15:30:23 [DEBUG] http: Request PUT /v1/acl/bootstrap (2.347965ms) from=127.0.0.1:40566 2018/12/11 15:30:23 [DEBUG] http: Request PUT /v1/acl/bootstrap (2.347965ms) from=127.0.0.1:40566
``` ```
Since ACLs have been enabled, we will need it use it to complete any additional operations. Since ACLs have been enabled, we will need to use it to complete any additional operations.
For example, even checking the memeber list will require a token. For example, even checking the member list will require a token.
```sh ```sh
$ consul members -token "4411f091-a4c9-48e6-0884-1fcb092da1c8" $ consul members -token "4411f091-a4c9-48e6-0884-1fcb092da1c8"
@ -109,7 +109,7 @@ Note, the bootstrap token can only be created once, bootstrapping will be disabl
## Step 3: Create an Agent Token Policy ## Step 3: Create an Agent Token Policy
Before we can create a token, we will need to create its associated policy. A policy is a set of rules that can used to specify granular permissions. To learn more about rules, read the ACL rule specification [documentation](/docs/agent/acl-rules.html). Before we can create a token, we will need to create its associated policy. A policy is a set of rules that can be used to specify granular permissions. To learn more about rules, read the ACL rule specification [documentation](/docs/agent/acl-rules.html).
```bash ```bash
# agent-policy.hcl contains the following: # agent-policy.hcl contains the following:
@ -262,7 +262,7 @@ it has write privileges to an empty `node` prefix, meaning it has access to all
```bash ```bash
$ CONSUL_HTTP_TOKEN=4411f091-a4c9-48e6-0884-1fcb092da1c8 consul members $ CONSUL_HTTP_TOKEN=4411f091-a4c9-48e6-0884-1fcb092da1c8 consul members
Node Address Status Type Build Protocol DC Node Address Status Type Build Protocol DC Segment
fox 172.20.20.10:8301 alive server 1.4.0 2 kc <all> fox 172.20.20.10:8301 alive server 1.4.0 2 kc <all>
bear 172.20.20.11:8301 alive server 1.4.0 2 kc <all> bear 172.20.20.11:8301 alive server 1.4.0 2 kc <all>
wolf 172.20.20.12:8301 alive server 1.4.0 2 kc <all> wolf 172.20.20.12:8301 alive server 1.4.0 2 kc <all>
@ -305,7 +305,7 @@ The anonymous token is implicitly used if no token is supplied, so now we can ru
```bash ```bash
$ consul members $ consul members
Node Address Status Type Build Protocol DC Node Address Status Type Build Protocol DC Segment
fox 172.20.20.10:8301 alive server 1.4.0 2 kc <all> fox 172.20.20.10:8301 alive server 1.4.0 2 kc <all>
bear 172.20.20.11:8301 alive server 1.4.0 2 kc <all> bear 172.20.20.11:8301 alive server 1.4.0 2 kc <all>
wolf 172.20.20.12:8301 alive server 1.4.0 2 kc <all> wolf 172.20.20.12:8301 alive server 1.4.0 2 kc <all>