Fixes links to ACL API docs (#4966)

Was previously pointed to `/api/acl.html` but should be `/api/acl/acl.html`.
This commit fixes all instances of the incorrect link.
This commit is contained in:
Geoffrey Grosenbach 2018-11-16 11:06:35 -08:00 committed by GitHub
parent 07e8e4d29d
commit 62aecfc643
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
6 changed files with 22 additions and 24 deletions

View File

@ -13,7 +13,7 @@ line. It exposes top-level commands for bootstrapping the ACL system,
managing tokens and policies, translating legacy rules, and setting the managing tokens and policies, translating legacy rules, and setting the
tokens for use by an agent. tokens for use by an agent.
ACLs are also accessible via the [HTTP API](/api/acl.html). ACLs are also accessible via the [HTTP API](/api/acl/acl.html).
Bootstrap Consul's ACLs: Bootstrap Consul's ACLs:

View File

@ -13,7 +13,7 @@ for management purposes and output its details. This can only be done once and a
will be disabled. If all tokens are lost and you need to bootstrap again you can follow the bootstrap will be disabled. If all tokens are lost and you need to bootstrap again you can follow the bootstrap
reset procedure. reset procedure.
The ACL system can also be bootstrapped via the [HTTP API](/api/acl.html#bootstrap-acls). The ACL system can also be bootstrapped via the [HTTP API](/api/acl/acl.html#bootstrap-acls).
## Usage ## Usage
@ -35,5 +35,3 @@ Create Time: 2018-10-22 11:27:04.479026 -0400 EDT
Policies: Policies:
00000000-0000-0000-0000-000000000001 - global-management 00000000-0000-0000-0000-000000000001 - global-management
``` ```

View File

@ -17,7 +17,7 @@ subcommands for the individual operations that can be performed.
* [`delete`](#delete) * [`delete`](#delete)
* [`list`](#list) * [`list`](#list)
ACL policies are also accessible via the [HTTP API](/api/acl.html). ACL policies are also accessible via the [HTTP API](/api/acl/acl.html).
Usage: `consul acl policy <subcommand> [options] [args]` Usage: `consul acl policy <subcommand> [options] [args]`

View File

@ -18,7 +18,7 @@ subcommands for the individual operations that can be performed.
* [`delete`](#delete) * [`delete`](#delete)
* [`list`](#list) * [`list`](#list)
ACL tokens are also accessible via the [HTTP API](/api/acl.html). ACL tokens are also accessible via the [HTTP API](/api/acl/acl.html).
Usage: `consul acl token <subcommand> [options] [args]` Usage: `consul acl token <subcommand> [options] [args]`

View File

@ -31,7 +31,7 @@ all while providing administrative insight.
#### ACL Tokens #### ACL Tokens
The ACL system is based on tokens, which are managed by Consul operators via Consul's The ACL system is based on tokens, which are managed by Consul operators via Consul's
[ACL API](/api/acl.html), or systems like [ACL API](/api/acl/acl.html), or systems like
[HashiCorp's Vault](https://www.vaultproject.io/docs/secrets/consul/index.html). [HashiCorp's Vault](https://www.vaultproject.io/docs/secrets/consul/index.html).
Every token has an ID, name, type, and rule set. The ID is a randomly generated Every token has an ID, name, type, and rule set. The ID is a randomly generated
@ -48,7 +48,7 @@ token [RFC6750](https://tools.ietf.org/html/rfc6750). Consul's
If no token is provided, the rules associated with a special, configurable anonymous If no token is provided, the rules associated with a special, configurable anonymous
token are automatically applied. The anonymous token is managed using the token are automatically applied. The anonymous token is managed using the
[ACL API](/api/acl.html) like any other ACL token, but using `anonymous` for the ID. [ACL API](/api/acl/acl.html) like any other ACL token, but using `anonymous` for the ID.
#### ACL Rules and Scope #### ACL Rules and Scope
@ -200,7 +200,7 @@ The first step for bootstrapping ACLs is to enable ACLs on the Consul servers in
datacenter. In this example, we are configuring the following: datacenter. In this example, we are configuring the following:
1. An ACL datacenter of "dc1", which is where these servers are 1. An ACL datacenter of "dc1", which is where these servers are
2. An ACL master token of "b1gs33cr3t"; see below for an alternative using the [/v1/acl/bootstrap API](/api/acl.html#bootstrap-acls) 2. An ACL master token of "b1gs33cr3t"; see below for an alternative using the [/v1/acl/bootstrap API](/api/acl/acl.html#bootstrap-acls)
3. A default policy of "deny" which means we are in whitelist mode 3. A default policy of "deny" which means we are in whitelist mode
4. A down policy of "extend-cache" which means that we will ignore token TTLs during an 4. A down policy of "extend-cache" which means that we will ignore token TTLs during an
outage outage
@ -228,7 +228,7 @@ a server acquires cluster leadership. If you would like to install or change the
[`acl_master_token`](/docs/agent/options.html#acl_master_token) in the configuration [`acl_master_token`](/docs/agent/options.html#acl_master_token) in the configuration
for all servers. Once this is done, restart the current leader to force a leader election. for all servers. Once this is done, restart the current leader to force a leader election.
In Consul 0.9.1 and later, you can use the [/v1/acl/bootstrap API](/api/acl.html#bootstrap-acls) In Consul 0.9.1 and later, you can use the [/v1/acl/bootstrap API](/api/acl/acl.html#bootstrap-acls)
to make the initial master token, so a token never needs to be placed into a configuration to make the initial master token, so a token never needs to be placed into a configuration
file. To use this approach, omit `acl_master_token` from the above config and then call the API: file. To use this approach, omit `acl_master_token` from the above config and then call the API:
@ -245,7 +245,7 @@ It's only possible to bootstrap one time, and bootstrapping will be disabled if
token was configured and created. token was configured and created.
Once the ACL system is bootstrapped, ACL tokens can be managed through the Once the ACL system is bootstrapped, ACL tokens can be managed through the
[ACL API](/api/acl.html). [ACL API](/api/acl/acl.html).
#### Create an Agent Token #### Create an Agent Token
@ -517,7 +517,7 @@ The token can then be set on the "settings" page of the UI.
#### Next Steps #### Next Steps
The examples above configure a basic ACL environment with the ability to see all nodes The examples above configure a basic ACL environment with the ability to see all nodes
by default, and limited access to just the "consul" service. The [ACL API](/api/acl.html) by default, and limited access to just the "consul" service. The [ACL API](/api/acl/acl.html)
can be used to create tokens for applications specific to their intended use, and to create can be used to create tokens for applications specific to their intended use, and to create
more specific ACL agent tokens for each agent's expected role. more specific ACL agent tokens for each agent's expected role.
@ -584,7 +584,7 @@ This is equivalent to the following JSON input:
} }
``` ```
The [ACL API](/api/acl.html) allows either HCL or JSON to be used to define the content The [ACL API](/api/acl/acl.html) allows either HCL or JSON to be used to define the content
of the rules section. of the rules section.
Here's a sample request using the HCL form: Here's a sample request using the HCL form:
@ -1070,7 +1070,7 @@ a large set of ACLs.
If there's a partition or other outage affecting the authoritative datacenter, If there's a partition or other outage affecting the authoritative datacenter,
and the [`acl_down_policy`](/docs/agent/options.html#acl_down_policy) and the [`acl_down_policy`](/docs/agent/options.html#acl_down_policy)
is set to "extend-cache", tokens will be resolved during the outage using the is set to "extend-cache", tokens will be resolved during the outage using the
replicated set of ACLs. An [ACL replication status](/api/acl.html#acl_replication_status) replicated set of ACLs. An [ACL replication status](/api/acl/acl.html#acl_replication_status)
endpoint is available to monitor the health of the replication process. endpoint is available to monitor the health of the replication process.
Also note that in recent versions of Consul (greater than 1.2.0), using Also note that in recent versions of Consul (greater than 1.2.0), using
`acl_down_policy = "async-cache"` refreshes token asynchronously when an ACL is `acl_down_policy = "async-cache"` refreshes token asynchronously when an ACL is
@ -1088,7 +1088,7 @@ using a process like this:
1. Enable ACL replication in all datacenters to allow continuation of service 1. Enable ACL replication in all datacenters to allow continuation of service
during the migration, and to populate the target datacenter. Verify replication during the migration, and to populate the target datacenter. Verify replication
is healthy and caught up to the current ACL index in the target datacenter is healthy and caught up to the current ACL index in the target datacenter
using the [ACL replication status](/api/acl.html#acl_replication_status) using the [ACL replication status](/api/acl/acl.html#acl_replication_status)
endpoint. endpoint.
2. Turn down the old authoritative datacenter servers. 2. Turn down the old authoritative datacenter servers.
3. Rolling restart the agents in the target datacenter and change the 3. Rolling restart the agents in the target datacenter and change the

View File

@ -28,7 +28,7 @@ At the highest level, there are two major components to the ACL system:
make requests to Consul. make requests to Consul.
ACL Tokens and Policies are managed by Consul operators via Consul's ACL Tokens and Policies are managed by Consul operators via Consul's
[ACL API](/api/acl.html), ACL CLI or systems like [ACL API](/api/acl/acl.html), ACL CLI or systems like
[HashiCorp's Vault](https://www.vaultproject.io/docs/secrets/consul/index.html). [HashiCorp's Vault](https://www.vaultproject.io/docs/secrets/consul/index.html).
### ACL Policies ### ACL Policies
@ -98,7 +98,7 @@ rules:
| Resource | Scope | | Resource | Scope |
| ------------------------ | ----- | | ------------------------ | ----- |
| [`acl`](#acl-rules) | Operations for managing the ACL system [ACL API](/api/acl.html) | | [`acl`](#acl-rules) | Operations for managing the ACL system [ACL API](/api/acl/acl.html) |
| [`agent`](#agent-rules) | Utility operations in the [Agent API](/api/agent.html), other than service and check registration | | [`agent`](#agent-rules) | Utility operations in the [Agent API](/api/agent.html), other than service and check registration |
| [`event`](#event-rules) | Listing and firing events in the [Event API](/api/event.html) | | [`event`](#event-rules) | Listing and firing events in the [Event API](/api/event.html) |
| [`key`](#key-value-rules) | Key/value store operations in the [KV Store API](/api/kv.html) | | [`key`](#key-value-rules) | Key/value store operations in the [KV Store API](/api/kv.html) |
@ -200,7 +200,7 @@ The first step for bootstrapping ACLs is to enable ACLs on the Consul servers in
datacenter. In this example, we are configuring the following: datacenter. In this example, we are configuring the following:
1. A primary datacenter of "dc1", which is where these servers are. 1. A primary datacenter of "dc1", which is where these servers are.
2. An ACL master token of "b1gs33cr3t"; see below for an alternative using the [/v1/acl/bootstrap API](/api/acl.html#bootstrap-acls) 2. An ACL master token of "b1gs33cr3t"; see below for an alternative using the [/v1/acl/bootstrap API](/api/acl/acl.html#bootstrap-acls)
3. A default policy of "deny" which means we are in whitelist mode 3. A default policy of "deny" which means we are in whitelist mode
4. A down policy of "extend-cache" which means that we will ignore token TTLs during an 4. A down policy of "extend-cache" which means that we will ignore token TTLs during an
outage outage
@ -233,7 +233,7 @@ a server acquires cluster leadership. If you would like to install or change the
[`acl.tokens.master`](/docs/agent/options.html#acl_tokens_master) in the configuration [`acl.tokens.master`](/docs/agent/options.html#acl_tokens_master) in the configuration
for all servers. Once this is done, restart the current leader to force a leader election. for all servers. Once this is done, restart the current leader to force a leader election.
In Consul 0.9.1 and later, you can use the [/v1/acl/bootstrap API](/api/acl.html#bootstrap-acls) In Consul 0.9.1 and later, you can use the [/v1/acl/bootstrap API](/api/acl/acl.html#bootstrap-acls)
to make the initial master token, so a token never needs to be placed into a configuration to make the initial master token, so a token never needs to be placed into a configuration
file. To use this approach, omit `acl.tokens.master` from the above config and then call the API: file. To use this approach, omit `acl.tokens.master` from the above config and then call the API:
@ -252,7 +252,7 @@ It's only possible to bootstrap one time, and bootstrapping will be disabled if
token was configured and created. token was configured and created.
Once the ACL system is bootstrapped, ACL tokens can be managed through the Once the ACL system is bootstrapped, ACL tokens can be managed through the
[ACL API](/api/acl.html). [ACL API](/api/acl/acl.html).
#### Create an Agent Token #### Create an Agent Token
@ -588,7 +588,7 @@ The token can then be set on the "settings" page of the UI.
#### Next Steps #### Next Steps
The examples above configure a basic ACL environment with the ability to see all nodes The examples above configure a basic ACL environment with the ability to see all nodes
by default, and limited access to just the "consul" service. The [ACL API](/api/acl.html) by default, and limited access to just the "consul" service. The [ACL API](/api/acl/acl.html)
can be used to create tokens for applications specific to their intended use, and to create can be used to create tokens for applications specific to their intended use, and to create
more specific ACL agent tokens for each agent's expected role. more specific ACL agent tokens for each agent's expected role.
@ -674,7 +674,7 @@ This is equivalent to the following JSON input:
} }
``` ```
The [ACL API](/api/acl.html) allows either HCL or JSON to be used to define the content The [ACL API](/api/acl/acl.html) allows either HCL or JSON to be used to define the content
of the rules section of a policy. of the rules section of a policy.
Here's a sample request using the HCL form: Here's a sample request using the HCL form:
@ -722,7 +722,7 @@ or the `CONSUL_HTTP_TOKEN` environment variable.
#### ACL Rules #### ACL Rules
The `acl` resource controls access to ACL operations in the The `acl` resource controls access to ACL operations in the
[ACL API](/api/acl.html). [ACL API](/api/acl/acl.html).
ACL rules look like this: ACL rules look like this: