consul/command/acl/token/testdata/FormatTokenExpanded/ce/complex.pretty-meta.golden

198 lines
5.0 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

AccessorID: fbd2447f-7479-4329-ad13-b021d74f86ba
SecretID: 869c6e91-4de9-4dab-b56e-87548435f9c6
Namespace: foo
Description: test token
Local: false
Auth Method: bar (Namespace: baz)
Create Time: 2020-05-22 18:52:31 +0000 UTC
Expiration Time: 2020-05-22 19:52:31 +0000 UTC
Hash: 6162636465666768
Create Index: 5
Modify Index: 10
Policies:
Policy Name: hobbiton
ID: beb04680-815b-4d7c-9e33-3d707c24672c
Description: user policy on token
Rules:
service_prefix "" {
policy = "read"
}
Policy Name: bywater
ID: 18788457-584c-4812-80d3-23d403148a90
Description: other user policy on token
Rules:
operator = "read"
Service Identities:
Name: gardener (Datacenters: middleearth-northwest)
Description: synthetic policy generated from templated policy: builtin/service
Rules:
service "gardener" {
policy = "write"
}
service "gardener-sidecar-proxy" {
policy = "write"
}
service_prefix "" {
policy = "read"
}
node_prefix "" {
policy = "read"
}
Node Identities:
Name: bagend (Datacenter: middleearth-northwest)
Description: synthetic policy generated from templated policy: builtin/node
Rules:
node "bagend" {
policy = "write"
}
service_prefix "" {
policy = "read"
}
Templated Policies:
builtin/service
Name: web
Datacenters: middleearth-northwest
Description: synthetic policy generated from templated policy: builtin/service
Rules:
service "web" {
policy = "write"
}
service "web-sidecar-proxy" {
policy = "write"
}
service_prefix "" {
policy = "read"
}
node_prefix "" {
policy = "read"
}
builtin/node
Name: api
Datacenters: all
Description: synthetic policy generated from templated policy: builtin/node
Rules:
node "api" {
policy = "write"
}
service_prefix "" {
policy = "read"
}
Roles:
Role Name: shire
ID: 3b0a78fe-b9c3-40de-b8ea-7d4d6674b366
Description: shire role
Policies:
Policy Name: shire-policy
ID: 6204f4cd-4709-441c-ac1b-cb029e940263
Description: policy for shire role
Rules:
operator = "write"
Service Identities:
Name: foo (Datacenters: middleearth-southwest)
Description: synthetic policy generated from templated policy: builtin/service
Rules:
service "foo" {
policy = "write"
}
service "foo-sidecar-proxy" {
policy = "write"
}
service_prefix "" {
policy = "read"
}
node_prefix "" {
policy = "read"
}
Role Name: west-farthing
ID: 6c9d1e1d-34bc-4d55-80f3-add0890ad791
Description: west-farthing role
Policies:
Policy Name: west-farthing-policy
ID: e86f0d1f-71b1-4690-bdfd-ff8c2cd4ae93
Description: policy for west-farthing role
Rules:
service "foo" {
policy = "read"
}
Node Identities:
Name: bar (Datacenter: middleearth-southwest)
Description: synthetic policy generated from templated policy: builtin/node
Rules:
node "bar" {
policy = "write"
}
service_prefix "" {
policy = "read"
}
=== End of Authorizer Layer 0: Token ===
=== Start of Authorizer Layer 1: Token Namespaces Defaults (Inherited) ===
Description: ACL Roles inherited by all Tokens in Namespace "foo"
Namespace Policy Defaults:
Policy Name: default-policy-1
ID: 2b582ff1-4a43-457f-8a2b-30a8265e29a5
Description: default policy 1
Rules:
key "foo" { policy = "write" }
Namespace Role Defaults:
Role Name: ns-default
ID: 56033f2b-e1a6-4905-b71d-e011c862bc65
Description: default role
Policies:
Policy Name: default-policy-2
ID: b55dce64-f2cc-4eb5-8e5f-50e90e63c6ea
Description: default policy 2
Rules:
key "bar" { policy = "read" }
Service Identities:
Name: web (Datacenters: middleearth-northeast)
Description: synthetic policy generated from templated policy: builtin/service
Rules:
service "web" {
policy = "write"
}
service "web-sidecar-proxy" {
policy = "write"
}
service_prefix "" {
policy = "read"
}
node_prefix "" {
policy = "read"
}
Node Identities:
Name: db (Datacenter: middleearth-northwest)
Description: synthetic policy generated from templated policy: builtin/node
Rules:
node "db" {
policy = "write"
}
service_prefix "" {
policy = "read"
}
=== End of Authorizer Layer 1: Token Namespaces Defaults (Inherited) ===
=== Start of Authorizer Layer 2: Agent Configuration Defaults (Inherited) ===
Description: Defined at request-time by the agent that resolves the ACL token; other agents may have different configuration defaults
Resolved By Agent: "server-1"
Default Policy: deny
Description: Backstop rule used if no preceding layer has a matching rule (refer to default_policy option in agent configuration)
Down Policy: extend-cache
Description: Defines what to do if this Token's information cannot be read from the primary_datacenter (refer to down_policy option in agent configuration)