Doc explaining the blacklist mode and consul exec

This commit is contained in:
Laurent Raufaste 2014-11-13 17:42:39 -05:00
parent c9de806ab9
commit 19820d9794
1 changed files with 24 additions and 0 deletions

View File

@ -63,6 +63,30 @@ to deny all actions, then token rules can be set to allow or whitelist
actions. In the inverse, the allow all default behavior is a blacklist,
where rules are used to prohibit actions.
### Blacklist mode and `consul exec`
If you set `acl_default_policy` to `deny`, the `anonymous` token won't have the
permission to read the default `_rexec` prefix, and therefore token-less consul
agents (using the `anonymous` token) won't be able to perform `consul exec`
actions.
There is a subtle interaction there. The agents will need permission to
read/write to the `_rexec` prefix for `consul exec` to work properly. They use
that as the transport for most data, only the edge trigger uses the event
system.
You can do this by allowing the `anonymous` token to access that prefix, or by
providing tokens to the agents that enable it. The formar can be done by giving
this rule to the `anonymous` token`:
```javascript
key "_rexec/" {
policy = "write"
}
```
### Bootstrapping ACLs
Bootstrapping the ACL system is done by providing an initial `acl_master_token`
[configuration](/docs/agent/options.html), which will be created as a
"management" type token if it does not exist.