e2e: use hclfmt on consul acls policy config files

This commit is contained in:
Seth Hoenig
2020-01-27 09:52:44 -06:00
parent 390a7f1c24
commit 8372bfbc8b
7 changed files with 6 additions and 9 deletions

View File

@@ -7,7 +7,8 @@ provisioned e2e environment to enable Consul ACLs.
The `consul-acls-manage.sh` script can be used to manipulate the Consul cluster
to activate or de-activate Consul ACLs. There are 3 targets into the script, only
2 of which should be used from e2e framework tests.
2 of which should be used from e2e framework tests. The script should be run from
the e2e directory (i.e. the directory from wich the e2e framework also runs).
### bootstrap

View File

@@ -2,7 +2,7 @@
# consul-acls-manage.sh script uploads this file as "acl.hcl" to Consul Server
# configuration directories, and restarts those agents.
acl = {
enabled = true
default_policy = "deny"
enabled = true
default_policy = "deny"
enable_token_persistence = true
}

View File

@@ -23,4 +23,3 @@ query "" {
service "" {
policy = "write"
}

View File

@@ -1,4 +1,4 @@
// The provided consul.token value must be blessed with service=write ACLs.
consul {
token="CONSUL_TOKEN"
token = "CONSUL_TOKEN"
}

View File

@@ -3,4 +3,3 @@
service "" {
policy = "write"
}

View File

@@ -4,5 +4,5 @@
// The provided consul.token value must be blessed with acl=write ACLs.
consul {
allow_unauthenticated = false
token="CONSUL_TOKEN"
token = "CONSUL_TOKEN"
}

View File

@@ -2,5 +2,3 @@
// will be requesting new SI tokens from Consul.
acl = "write"