mirror of
https://github.com/kemko/nomad.git
synced 2026-01-05 18:05:42 +03:00
e2e: use hclfmt on consul acls policy config files
This commit is contained in:
@@ -7,7 +7,8 @@ provisioned e2e environment to enable Consul ACLs.
|
||||
|
||||
The `consul-acls-manage.sh` script can be used to manipulate the Consul cluster
|
||||
to activate or de-activate Consul ACLs. There are 3 targets into the script, only
|
||||
2 of which should be used from e2e framework tests.
|
||||
2 of which should be used from e2e framework tests. The script should be run from
|
||||
the e2e directory (i.e. the directory from wich the e2e framework also runs).
|
||||
|
||||
### bootstrap
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
# consul-acls-manage.sh script uploads this file as "acl.hcl" to Consul Server
|
||||
# configuration directories, and restarts those agents.
|
||||
acl = {
|
||||
enabled = true
|
||||
default_policy = "deny"
|
||||
enabled = true
|
||||
default_policy = "deny"
|
||||
enable_token_persistence = true
|
||||
}
|
||||
|
||||
@@ -23,4 +23,3 @@ query "" {
|
||||
service "" {
|
||||
policy = "write"
|
||||
}
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
// The provided consul.token value must be blessed with service=write ACLs.
|
||||
consul {
|
||||
token="CONSUL_TOKEN"
|
||||
token = "CONSUL_TOKEN"
|
||||
}
|
||||
|
||||
@@ -3,4 +3,3 @@
|
||||
service "" {
|
||||
policy = "write"
|
||||
}
|
||||
|
||||
|
||||
@@ -4,5 +4,5 @@
|
||||
// The provided consul.token value must be blessed with acl=write ACLs.
|
||||
consul {
|
||||
allow_unauthenticated = false
|
||||
token="CONSUL_TOKEN"
|
||||
token = "CONSUL_TOKEN"
|
||||
}
|
||||
|
||||
@@ -2,5 +2,3 @@
|
||||
// will be requesting new SI tokens from Consul.
|
||||
|
||||
acl = "write"
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user