2019-05-01 21:11:23 +00:00
|
|
|
---
|
|
|
|
layout: api
|
|
|
|
page_title: ACL Roles - HTTP API
|
2020-04-07 18:55:19 +00:00
|
|
|
description: The /acl/role endpoints manage Consul's ACL Roles.
|
2019-05-01 21:11:23 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# ACL Role HTTP API
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
-> **1.5.0+:** The role APIs are available in Consul versions 1.5.0 and newer.
|
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
The `/acl/role` endpoints [create](#create-a-role), [read](#read-a-role),
|
2020-04-06 20:27:35 +00:00
|
|
|
[update](#update-a-role), [list](#list-roles) and [delete](#delete-a-role) ACL roles in Consul.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-08-17 16:20:02 +00:00
|
|
|
For more information on how to setup ACLs, please check
|
|
|
|
the [ACL tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
## Create a Role
|
|
|
|
|
|
|
|
This endpoint creates a new ACL role.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | ----------- | ------------------ |
|
|
|
|
| `PUT` | `/acl/role` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2022-03-30 21:16:26 +00:00
|
|
|
[blocking queries](/api-docs/features/blocking),
|
|
|
|
[consistency modes](/api-docs/features/consistency),
|
|
|
|
[agent caching](/api-docs/features/caching), and
|
2022-10-18 19:49:07 +00:00
|
|
|
[required ACLs](/api-docs/api-structure#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `NO` | `none` | `none` | `acl:write` |
|
|
|
|
|
2022-01-15 17:29:35 +00:00
|
|
|
The corresponding CLI command is [`consul acl role create`](/commands/acl/role/create).
|
2022-01-10 19:21:32 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
### Query Parameters
|
|
|
|
|
|
|
|
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the role you create.
|
|
|
|
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
|
|
|
|
|
|
|
### JSON Request Body Schema
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
- `Name` `(string: <required>)` - Specifies a name for the ACL role. The name
|
2020-04-06 20:27:35 +00:00
|
|
|
can contain alphanumeric characters, dashes `-`, and underscores `_`.
|
2019-05-01 21:11:23 +00:00
|
|
|
This name must be unique.
|
2022-05-10 15:51:11 +00:00
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
- `Description` `(string: "")` - Free form human readable description of the role.
|
|
|
|
|
|
|
|
- `Policies` `(array<PolicyLink>)` - The list of policies that should be
|
|
|
|
applied to the role. A PolicyLink is an object with an "ID" and/or "Name"
|
|
|
|
field to specify a policy. With the PolicyLink, roles can be linked to
|
|
|
|
policies either by the policy name or by the policy ID. When policies are
|
|
|
|
linked by name they will be internally resolved to the policy ID. With
|
|
|
|
linking roles internally by IDs, Consul enables policy renaming without
|
|
|
|
breaking tokens.
|
|
|
|
|
|
|
|
- `ServiceIdentities` `(array<ServiceIdentity>)` - The list of [service
|
2022-05-09 16:04:23 +00:00
|
|
|
identities](/docs/security/acl#service-identities) that should be
|
2020-04-06 20:27:35 +00:00
|
|
|
applied to the role. Added in Consul 1.5.0.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
- `ServiceName` `(string: <required>)` - The name of the service. The name
|
|
|
|
must be no longer than 256 characters, must start and end with a lowercase
|
|
|
|
alphanumeric character, and can only contain lowercase alphanumeric
|
|
|
|
characters as well as `-` and `_`.
|
|
|
|
|
|
|
|
- `Datacenters` `(array<string>)` - Specifies the datacenters the effective
|
|
|
|
policy is valid within. When no datacenters are provided the effective
|
|
|
|
policy is valid in all datacenters including those which do not yet exist
|
|
|
|
but may in the future.
|
2020-04-06 20:27:35 +00:00
|
|
|
|
2020-06-16 16:54:27 +00:00
|
|
|
- `NodeIdentities` `(array<NodeIdentity>)` - The list of [node
|
2022-05-09 16:04:23 +00:00
|
|
|
identities](/docs/security/acl#node-identities) that should be
|
2020-06-16 16:54:27 +00:00
|
|
|
applied to the role. Added in Consul 1.8.1.
|
|
|
|
|
|
|
|
- `NodeName` `(string: <required>)` - The name of the node. The name
|
|
|
|
must be no longer than 256 characters, must start and end with a lowercase
|
|
|
|
alphanumeric character, and can only contain lowercase alphanumeric
|
|
|
|
characters as well as `-` and `_`.
|
|
|
|
|
|
|
|
- `Datacenter` `(string: <required>)` - Specifies the nodes datacenter. This
|
|
|
|
will result in effective policy only being valid in that datacenter.
|
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
- `Namespace` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the role you create.
|
|
|
|
This field takes precedence over the `ns` query parameter,
|
|
|
|
one of several [other methods to specify the namespace](#methods-to-specify-namespace).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"Name": "example-role",
|
|
|
|
"Description": "Showcases all input parameters",
|
|
|
|
"Policies": [
|
|
|
|
{
|
|
|
|
"ID": "783beef3-783f-f41f-7422-7087dc272765"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"Name": "node-read"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"ServiceIdentities": [
|
|
|
|
{
|
|
|
|
"ServiceName": "web"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"ServiceName": "db",
|
|
|
|
"Datacenters": ["dc1"]
|
|
|
|
}
|
2020-06-16 16:54:27 +00:00
|
|
|
],
|
|
|
|
"NodeIdentities": [
|
|
|
|
{
|
|
|
|
"NodeName": "node-1",
|
|
|
|
"Datacenter": "dc2"
|
|
|
|
}
|
2020-04-06 20:27:35 +00:00
|
|
|
]
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2022-01-12 23:05:01 +00:00
|
|
|
$ curl --request PUT \
|
2019-05-01 21:11:23 +00:00
|
|
|
--data @payload.json \
|
|
|
|
http://127.0.0.1:8500/v1/acl/role
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"ID": "aa770e5b-8b0b-7fcf-e5a1-8535fcc388b4",
|
|
|
|
"Name": "example-role",
|
|
|
|
"Description": "Showcases all input parameters",
|
|
|
|
"Policies": [
|
|
|
|
{
|
|
|
|
"ID": "783beef3-783f-f41f-7422-7087dc272765",
|
|
|
|
"Name": "node-read"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"ServiceIdentities": [
|
|
|
|
{
|
|
|
|
"ServiceName": "web"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"ServiceName": "db",
|
|
|
|
"Datacenters": ["dc1"]
|
|
|
|
}
|
|
|
|
],
|
2020-06-16 16:54:27 +00:00
|
|
|
"NodeIdentities": [
|
|
|
|
{
|
|
|
|
"NodeName": "node-1",
|
|
|
|
"Datacenter": "dc2"
|
|
|
|
}
|
|
|
|
],
|
2020-04-06 20:27:35 +00:00
|
|
|
"Hash": "mBWMIeX9zyUTdDMq8vWB0iYod+mKBArJoAhj6oPz3BI=",
|
|
|
|
"CreateIndex": 57,
|
|
|
|
"ModifyIndex": 57
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
## Read a Role
|
|
|
|
|
|
|
|
This endpoint reads an ACL role with the given ID. If no role exists with the
|
|
|
|
given ID, a 404 is returned instead of a 200 response.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | --------------- | ------------------ |
|
|
|
|
| `GET` | `/acl/role/:id` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2022-03-30 21:16:26 +00:00
|
|
|
[blocking queries](/api-docs/features/blocking),
|
|
|
|
[consistency modes](/api-docs/features/consistency),
|
|
|
|
[agent caching](/api-docs/features/caching), and
|
2022-10-18 19:49:07 +00:00
|
|
|
[required ACLs](/api-docs/api-structure#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `YES` | `all` | `none` | `acl:read` |
|
|
|
|
|
2022-01-15 17:29:35 +00:00
|
|
|
The corresponding CLI command is [`consul acl role read`](/commands/acl/role/read).
|
2022-01-10 19:21:32 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
### Path Parameters
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
- `id` `(string: <required>)` - Specifies the UUID of the role you lookup.
|
2020-04-23 22:13:18 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
### Query Parameters
|
|
|
|
|
|
|
|
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the role you lookup.
|
|
|
|
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2022-01-12 23:05:01 +00:00
|
|
|
$ curl --request GET http://127.0.0.1:8500/v1/acl/role/aa770e5b-8b0b-7fcf-e5a1-8535fcc388b4
|
2019-05-01 21:11:23 +00:00
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"ID": "aa770e5b-8b0b-7fcf-e5a1-8535fcc388b4",
|
|
|
|
"Name": "example-role",
|
|
|
|
"Description": "Showcases all input parameters",
|
|
|
|
"Policies": [
|
|
|
|
{
|
|
|
|
"ID": "783beef3-783f-f41f-7422-7087dc272765",
|
|
|
|
"Name": "node-read"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"ServiceIdentities": [
|
|
|
|
{
|
|
|
|
"ServiceName": "web"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"ServiceName": "db",
|
|
|
|
"Datacenters": ["dc1"]
|
|
|
|
}
|
|
|
|
],
|
2020-06-16 16:54:27 +00:00
|
|
|
"NodeIdentities": [
|
|
|
|
{
|
|
|
|
"NodeName": "node-1",
|
|
|
|
"Datacenter": "dc2"
|
|
|
|
}
|
|
|
|
],
|
2020-04-06 20:27:35 +00:00
|
|
|
"Hash": "mBWMIeX9zyUTdDMq8vWB0iYod+mKBArJoAhj6oPz3BI=",
|
|
|
|
"CreateIndex": 57,
|
|
|
|
"ModifyIndex": 57
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
## Read a Role by Name
|
|
|
|
|
|
|
|
This endpoint reads an ACL role with the given name. If no role exists with the
|
|
|
|
given name, a 404 is returned instead of a 200 response.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | ---------------------- | ------------------ |
|
|
|
|
| `GET` | `/acl/role/name/:name` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2022-03-30 21:16:26 +00:00
|
|
|
[blocking queries](/api-docs/features/blocking),
|
|
|
|
[consistency modes](/api-docs/features/consistency),
|
|
|
|
[agent caching](/api-docs/features/caching), and
|
2022-10-18 19:49:07 +00:00
|
|
|
[required ACLs](/api-docs/api-structure#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `YES` | `all` | `none` | `acl:read` |
|
|
|
|
|
2022-01-15 17:29:35 +00:00
|
|
|
The corresponding CLI command is [`consul acl role read -name=<string>`](/commands/acl/role/read#name).
|
2022-01-10 19:21:32 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
### Path Parameters
|
|
|
|
|
|
|
|
- `name` `(string: <required>)` - Specifies the name of the ACL role to read.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
### Query Parameters
|
2020-04-23 22:13:18 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the role you lookup.
|
|
|
|
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2022-01-12 23:05:01 +00:00
|
|
|
$ curl --request GET http://127.0.0.1:8500/v1/acl/role/name/example-role
|
2019-05-01 21:11:23 +00:00
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"ID": "aa770e5b-8b0b-7fcf-e5a1-8535fcc388b4",
|
|
|
|
"Name": "example-role",
|
|
|
|
"Description": "Showcases all input parameters",
|
|
|
|
"Policies": [
|
|
|
|
{
|
|
|
|
"ID": "783beef3-783f-f41f-7422-7087dc272765",
|
|
|
|
"Name": "node-read"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"ServiceIdentities": [
|
|
|
|
{
|
|
|
|
"ServiceName": "web"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"ServiceName": "db",
|
|
|
|
"Datacenters": ["dc1"]
|
|
|
|
}
|
|
|
|
],
|
2020-06-16 16:54:27 +00:00
|
|
|
"NodeIdentities": [
|
|
|
|
{
|
|
|
|
"NodeName": "node-1",
|
|
|
|
"Datacenter": "dc2"
|
|
|
|
}
|
|
|
|
],
|
2020-04-06 20:27:35 +00:00
|
|
|
"Hash": "mBWMIeX9zyUTdDMq8vWB0iYod+mKBArJoAhj6oPz3BI=",
|
|
|
|
"CreateIndex": 57,
|
|
|
|
"ModifyIndex": 57
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
## Update a Role
|
|
|
|
|
|
|
|
This endpoint updates an existing ACL role.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | --------------- | ------------------ |
|
|
|
|
| `PUT` | `/acl/role/:id` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2022-03-30 21:16:26 +00:00
|
|
|
[blocking queries](/api-docs/features/blocking),
|
|
|
|
[consistency modes](/api-docs/features/consistency),
|
|
|
|
[agent caching](/api-docs/features/caching), and
|
2022-10-18 19:49:07 +00:00
|
|
|
[required ACLs](/api-docs/api-structure#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `NO` | `none` | `none` | `acl:write` |
|
|
|
|
|
2022-01-15 17:29:35 +00:00
|
|
|
The corresponding CLI command is [`consul acl role update`](/commands/acl/role/update).
|
2022-01-10 19:21:32 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
### Path Parameters
|
|
|
|
|
|
|
|
- `id` `(string: <required>)` - Specifies the UUID of the role you update.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
### Query Parameters
|
|
|
|
|
|
|
|
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the role you update.
|
|
|
|
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
|
|
|
|
|
|
|
### JSON Request Body Schema
|
|
|
|
|
|
|
|
- `ID` `(string: <optional>)` - If specified, this field must be an exact match
|
|
|
|
with the `id` path parameter.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
- `Name` `(string: <required>)` - Specifies a name for the ACL role. The name
|
|
|
|
can only contain alphanumeric characters as well as `-` and `_` and must be
|
2020-04-06 20:27:35 +00:00
|
|
|
unique.
|
2019-05-01 21:11:23 +00:00
|
|
|
- `Description` `(string: "")` - Free form human readable description of the role.
|
|
|
|
|
|
|
|
- `Policies` `(array<PolicyLink>)` - The list of policies that should be
|
|
|
|
applied to the role. A PolicyLink is an object with an "ID" and/or "Name"
|
|
|
|
field to specify a policy. With the PolicyLink, roles can be linked to
|
|
|
|
policies either by the policy name or by the policy ID. When policies are
|
|
|
|
linked by name they will be internally resolved to the policy ID. With
|
|
|
|
linking roles internally by IDs, Consul enables policy renaming without
|
|
|
|
breaking tokens.
|
|
|
|
|
|
|
|
- `ServiceIdentities` `(array<ServiceIdentity>)` - The list of [service
|
2022-05-09 16:04:23 +00:00
|
|
|
identities](/docs/security/acl#service-identities) that should be
|
2020-04-06 20:27:35 +00:00
|
|
|
applied to the role. Added in Consul 1.5.0.
|
|
|
|
|
2020-06-16 16:54:27 +00:00
|
|
|
- `NodeIdentities` `(array<NodeIdentity>)` - The list of [node
|
2022-05-09 16:04:23 +00:00
|
|
|
identities](/docs/security/acl#node-identities) that should be
|
2020-06-16 16:54:27 +00:00
|
|
|
applied to the role. Added in Consul 1.8.1.
|
2020-07-08 23:09:00 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
- `Namespace` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the role you update.
|
|
|
|
This field takes precedence over the `ns` query parameter,
|
|
|
|
one of several [other methods to specify the namespace](#methods-to-specify-namespace).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
### Sample Payload
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"ID": "8bec74a4-5ced-45ed-9c9d-bca6153490bb",
|
|
|
|
"Name": "example-two",
|
|
|
|
"Policies": [
|
|
|
|
{
|
|
|
|
"Name": "node-read"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"ServiceIdentities": [
|
|
|
|
{
|
|
|
|
"ServiceName": "db"
|
|
|
|
}
|
2020-06-16 16:54:27 +00:00
|
|
|
],
|
|
|
|
"NodeIdentities": [
|
|
|
|
{
|
|
|
|
"NodeName": "node-1",
|
|
|
|
"Datacenter": "dc2"
|
|
|
|
}
|
2020-04-06 20:27:35 +00:00
|
|
|
]
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2022-01-12 23:05:01 +00:00
|
|
|
$ curl --request PUT \
|
2019-05-01 21:11:23 +00:00
|
|
|
--data @payload.json \
|
|
|
|
http://127.0.0.1:8500/v1/acl/role/8bec74a4-5ced-45ed-9c9d-bca6153490bb
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
```json
|
|
|
|
{
|
2020-04-06 20:27:35 +00:00
|
|
|
"ID": "8bec74a4-5ced-45ed-9c9d-bca6153490bb",
|
|
|
|
"Name": "example-two",
|
|
|
|
"Policies": [
|
|
|
|
{
|
|
|
|
"ID": "783beef3-783f-f41f-7422-7087dc272765",
|
|
|
|
"Name": "node-read"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"ServiceIdentities": [
|
|
|
|
{
|
|
|
|
"ServiceName": "db"
|
|
|
|
}
|
|
|
|
],
|
2020-06-16 16:54:27 +00:00
|
|
|
"NodeIdentities": [
|
|
|
|
{
|
|
|
|
"NodeName": "node-1",
|
|
|
|
"Datacenter": "dc2"
|
|
|
|
}
|
|
|
|
],
|
2020-04-06 20:27:35 +00:00
|
|
|
"Hash": "OtZUUKhInTLEqTPfNSSOYbRiSBKm3c4vI2p6MxZnGWc=",
|
|
|
|
"CreateIndex": 14,
|
|
|
|
"ModifyIndex": 28
|
2019-05-01 21:11:23 +00:00
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
## Delete a Role
|
|
|
|
|
|
|
|
This endpoint deletes an ACL role.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| -------- | --------------- | ------------------ |
|
|
|
|
| `DELETE` | `/acl/role/:id` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
Even though the return type is application/json, the value is either true or
|
|
|
|
false indicating whether the delete succeeded.
|
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2022-03-30 21:16:26 +00:00
|
|
|
[blocking queries](/api-docs/features/blocking),
|
|
|
|
[consistency modes](/api-docs/features/consistency),
|
|
|
|
[agent caching](/api-docs/features/caching), and
|
2022-10-18 19:49:07 +00:00
|
|
|
[required ACLs](/api-docs/api-structure#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `NO` | `none` | `none` | `acl:write` |
|
|
|
|
|
2022-01-15 17:29:35 +00:00
|
|
|
The corresponding CLI command is [`consul acl role delete`](/commands/acl/role/delete).
|
2022-01-10 19:21:32 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
### Path Parameters
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
- `id` `(string: <required>)` - Specifies the UUID of the role you delete.
|
2020-04-06 20:27:35 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
### Query Parameters
|
|
|
|
|
|
|
|
- `ns` `(string: "")` <EnterpriseAlert inline /> - Specifies the namespace of the role you delete.
|
|
|
|
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
### Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2022-01-12 23:05:01 +00:00
|
|
|
$ curl --request DELETE \
|
2019-05-01 21:11:23 +00:00
|
|
|
http://127.0.0.1:8500/v1/acl/role/8f246b77-f3e1-ff88-5b48-8ec93abf3e05
|
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
2020-04-06 20:27:35 +00:00
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
```json
|
|
|
|
true
|
|
|
|
```
|
|
|
|
|
|
|
|
## List Roles
|
|
|
|
|
|
|
|
This endpoint lists all the ACL roles.
|
|
|
|
|
2020-04-06 20:27:35 +00:00
|
|
|
| Method | Path | Produces |
|
|
|
|
| ------ | ------------ | ------------------ |
|
|
|
|
| `GET` | `/acl/roles` | `application/json` |
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
The table below shows this endpoint's support for
|
2022-03-30 21:16:26 +00:00
|
|
|
[blocking queries](/api-docs/features/blocking),
|
|
|
|
[consistency modes](/api-docs/features/consistency),
|
|
|
|
[agent caching](/api-docs/features/caching), and
|
2022-10-18 19:49:07 +00:00
|
|
|
[required ACLs](/api-docs/api-structure#authentication).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
| Blocking Queries | Consistency Modes | Agent Caching | ACL Required |
|
|
|
|
| ---------------- | ----------------- | ------------- | ------------ |
|
|
|
|
| `YES` | `all` | `none` | `acl:read` |
|
|
|
|
|
2022-01-15 17:29:35 +00:00
|
|
|
The corresponding CLI command is [`consul acl role list`](/commands/acl/role/list).
|
2022-01-10 19:21:32 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
### Query Parameters
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
- `policy` `(string: "")` - Filters the role list to those roles that are
|
2022-05-10 15:51:11 +00:00
|
|
|
linked with this specific policy ID.
|
2019-12-06 16:14:56 +00:00
|
|
|
|
2022-05-10 15:51:11 +00:00
|
|
|
- `ns` `(string: "")` <EnterpriseAlert inline /> - Return only the roles in the specified namespace.
|
|
|
|
The namespace may be specified as '\*' to return results for all namespaces.
|
|
|
|
You can also [specify the namespace through other methods](#methods-to-specify-namespace).
|
2019-05-01 21:11:23 +00:00
|
|
|
|
|
|
|
## Sample Request
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2022-01-12 23:05:01 +00:00
|
|
|
$ curl --request GET http://127.0.0.1:8500/v1/acl/roles
|
2019-05-01 21:11:23 +00:00
|
|
|
```
|
|
|
|
|
|
|
|
### Sample Response
|
|
|
|
|
|
|
|
```json
|
|
|
|
[
|
2020-04-06 20:27:35 +00:00
|
|
|
{
|
|
|
|
"ID": "5e52a099-4c90-c067-5478-980f06be9af5",
|
|
|
|
"Name": "node-read",
|
|
|
|
"Description": "",
|
|
|
|
"Policies": [
|
|
|
|
{
|
|
|
|
"ID": "783beef3-783f-f41f-7422-7087dc272765",
|
|
|
|
"Name": "node-read"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"Hash": "K6AbfofgiZ1BEaKORBloZf7WPdg45J/PipHxQiBlK1U=",
|
|
|
|
"CreateIndex": 50,
|
|
|
|
"ModifyIndex": 50
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"ID": "aa770e5b-8b0b-7fcf-e5a1-8535fcc388b4",
|
|
|
|
"Name": "example-role",
|
|
|
|
"Description": "Showcases all input parameters",
|
|
|
|
"Policies": [
|
|
|
|
{
|
|
|
|
"ID": "783beef3-783f-f41f-7422-7087dc272765",
|
|
|
|
"Name": "node-read"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"ServiceIdentities": [
|
|
|
|
{
|
|
|
|
"ServiceName": "web"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"ServiceName": "db",
|
|
|
|
"Datacenters": ["dc1"]
|
|
|
|
}
|
|
|
|
],
|
2020-06-16 16:54:27 +00:00
|
|
|
"NodeIdentities": [
|
|
|
|
{
|
|
|
|
"NodeName": "node-1",
|
|
|
|
"Datacenter": "dc2"
|
|
|
|
}
|
|
|
|
],
|
2020-04-06 20:27:35 +00:00
|
|
|
"Hash": "mBWMIeX9zyUTdDMq8vWB0iYod+mKBArJoAhj6oPz3BI=",
|
|
|
|
"CreateIndex": 57,
|
|
|
|
"ModifyIndex": 57
|
|
|
|
}
|
2019-05-01 21:11:23 +00:00
|
|
|
]
|
|
|
|
```
|
2022-05-10 15:51:11 +00:00
|
|
|
|
|
|
|
## Methods to Specify Namespace <EnterpriseAlert inline />
|
|
|
|
|
|
|
|
ACL role endpoints
|
|
|
|
support several methods for specifying the namespace of the ACL role resources
|
|
|
|
with the following order of precedence:
|
|
|
|
1. `Namespace` field of the JSON request body -
|
|
|
|
only applies to [create](#create-a-role) and [update](#update-a-role) endpoints
|
|
|
|
1. `ns` query parameter
|
|
|
|
1. `X-Consul-Namespace` request header
|
|
|
|
1. Namespace is inherited from the namespace of the request's ACL token (if any)
|
|
|
|
1. The `default` namespace
|