2019-05-01 21:11:23 +00:00
|
|
|
---
|
2020-09-01 15:14:13 +00:00
|
|
|
layout: commands
|
2020-04-07 18:55:19 +00:00
|
|
|
page_title: 'Commands: ACL Policy Read'
|
2023-01-26 18:42:13 +00:00
|
|
|
description: |
|
|
|
|
The `consul acl policy read` command outputs rules that make up an ACL policy of the specified ID.
|
2019-05-01 21:11:23 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# Consul ACL Policy Read
|
|
|
|
|
|
|
|
Command: `consul acl policy read`
|
|
|
|
|
2023-01-25 16:52:43 +00:00
|
|
|
Corresponding HTTP API Endpoints: [\[GET\] /v1/acl/policy/:id](/consul/api-docs/acl/policies#read-a-policy), [\[GET\] /v1/acl/policy/name/:name](/consul/api-docs/acl/policies#read-a-policy-by-name)
|
2022-01-10 17:40:11 +00:00
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
The `acl policy read` command reads and displays a policies details.
|
|
|
|
|
2023-01-25 16:52:43 +00:00
|
|
|
The table below shows this command's [required ACLs](/consul/api-docs/api-structure#authentication). Configuration of
|
|
|
|
[blocking queries](/consul/api-docs/features/blocking) and [agent caching](/consul/api-docs/features/caching)
|
2022-01-10 21:44:56 +00:00
|
|
|
are not supported from commands, but may be from the corresponding HTTP endpoint.
|
|
|
|
|
|
|
|
| ACL Required |
|
|
|
|
| ------------ |
|
|
|
|
| `acl:read` |
|
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
## Usage
|
|
|
|
|
|
|
|
Usage: `consul acl policy read [options] [args]`
|
|
|
|
|
|
|
|
#### Command Options
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-id=<string>` - The ID of the policy to read. It may be specified as a unique ID
|
|
|
|
prefix but will error if the prefix matches multiple policy IDs.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-meta` - Indicates that policy metadata such as the content hash and raft
|
2019-05-01 21:11:23 +00:00
|
|
|
indices should be shown for each entry.
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-name=<string>` - The name of the policy to read.
|
2019-05-01 21:11:23 +00:00
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
- `-format={pretty|json}` - Command output format. The default value is `pretty`.
|
2020-03-26 16:03:22 +00:00
|
|
|
|
2019-12-06 16:14:56 +00:00
|
|
|
#### Enterprise Options
|
|
|
|
|
2022-07-27 06:17:11 +00:00
|
|
|
@include 'http_api_partition_options.mdx'
|
|
|
|
|
2020-04-07 18:55:19 +00:00
|
|
|
@include 'http_api_namespace_options.mdx'
|
2019-12-06 16:14:56 +00:00
|
|
|
|
2022-07-27 06:17:11 +00:00
|
|
|
#### API Options
|
|
|
|
|
|
|
|
@include 'http_api_options_client.mdx'
|
|
|
|
|
|
|
|
@include 'http_api_options_server.mdx'
|
2021-12-15 01:55:21 +00:00
|
|
|
|
2019-05-01 21:11:23 +00:00
|
|
|
## Examples
|
|
|
|
|
|
|
|
Get policy details:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ consul acl policy read -id 00000000-0000-0000-0000-000000000001
|
|
|
|
ID: 00000000-0000-0000-0000-000000000001
|
|
|
|
Name: global-management
|
|
|
|
Description: Builtin Policy that grants unlimited access
|
|
|
|
Datacenters:
|
|
|
|
Rules:
|
|
|
|
|
|
|
|
acl = "write"
|
|
|
|
agent_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
event_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
key_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
keyring = "write"
|
|
|
|
node_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
operator = "write"
|
|
|
|
query_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
service_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
intentions = "write"
|
|
|
|
}
|
|
|
|
session_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
Get policy details by name:
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ consul acl policy read -name "acl-replication"
|
|
|
|
ID: 35b8ecb0-707c-ee18-2002-81b238b54b38
|
|
|
|
Name: acl-replication
|
|
|
|
Description: Token capable of replicating ACL policies
|
|
|
|
Datacenters:
|
|
|
|
Rules:
|
|
|
|
acl = "read"
|
|
|
|
```
|
|
|
|
|
|
|
|
Get policy details (Builtin Policies):
|
|
|
|
|
|
|
|
Builtin policies can be accessed by specifying their original name as the value to the `-id` parameter.
|
|
|
|
|
2020-05-19 18:32:38 +00:00
|
|
|
```shell-session
|
2019-05-01 21:11:23 +00:00
|
|
|
$ consul acl policy read -id global-management
|
|
|
|
ID: 00000000-0000-0000-0000-000000000001
|
|
|
|
Name: global-management
|
|
|
|
Description: Builtin Policy that grants unlimited access
|
|
|
|
Datacenters:
|
|
|
|
Hash: b30210b7aba9facd1c57891e3df27669174a08b690cb2905e0797535f75eba69
|
|
|
|
Create Index: 4
|
|
|
|
Modify Index: 4
|
|
|
|
Rules:
|
|
|
|
|
|
|
|
acl = "write"
|
|
|
|
agent_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
event_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
key_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
keyring = "write"
|
|
|
|
node_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
operator = "write"
|
|
|
|
query_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
service_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
intentions = "write"
|
|
|
|
}
|
|
|
|
session_prefix "" {
|
|
|
|
policy = "write"
|
|
|
|
}
|
|
|
|
```
|