Address @dadgar feedback

This commit is contained in:
Armon Dadgar
2017-09-11 10:30:59 -07:00
parent d6faa383d7
commit 3fc9dce13b
3 changed files with 3 additions and 3 deletions

View File

@@ -39,7 +39,7 @@ func testACLServer(t *testing.T, cb func(*nomad.Config)) (*nomad.Server, string,
}
})
token := mock.ACLManagementToken()
err := server.State().BootstrapACLTokens(1, token)
err := server.State().BootstrapACLTokens(1, 0, token)
if err != nil {
t.Fatalf("failed to bootstrap ACL token: %v", err)
}

View File

@@ -1624,7 +1624,7 @@ func TestFSM_BootstrapACLTokens(t *testing.T) {
assert.Nil(t, err)
assert.NotNil(t, out)
// Teset with reset
// Test with reset
token2 := mock.ACLToken()
req = structs.ACLTokenBootstrapRequest{
Token: token2,

View File

@@ -104,7 +104,7 @@ $ curl \
}
```
Once the initial bootstrap is performed, it cannot be performed again until [reset](#reseting-acl-bootstrap). Make sure to save this AccessorID and SecretID.
Once the initial bootstrap is performed, it cannot be performed again unless [reset](#reseting-acl-bootstrap). Make sure to save this AccessorID and SecretID.
The bootstrap token is a `management` type token, meaning it can perform any operation. It should be used to setup the ACL policies and create additional ACL tokens. The bootstrap token can be deleted and is like any other token, so care should be taken to not revoke all management tokens.
### Enable ACLs on Nomad Clients