Consul: Add support for wildcards in ACL policies

Created on 9 May 2017  路  5Comments  路  Source: hashicorp/consul

Please add support for something like this, wildcard syntax (similar to what vault supports) for acls

{"key":{"apps/me/*/whatever":{"Policy":"read"}}}
themacls typenhancement

Most helpful comment

Could be handy in supporting multiple versions

something like:
"app/v1.1.0/destination", "app/v1.1.1/destination", "app/v1.2.0/destination"

so a policy of "app/*/destination" would just simply be written.

All 5 comments

Could be handy in supporting multiple versions

something like:
"app/v1.1.0/destination", "app/v1.1.1/destination", "app/v1.2.0/destination"

so a policy of "app/*/destination" would just simply be written.

That would be super useful!

This is very much needed. Any update?

We want to restrict a token to only see a path and not allow listing other folders. Example,
for a key
/foo/bar/baz.key

Currently we use
key_prefix "" { policy="list" }
and then apply policy write rules on path. This lists all the paths which makes sense why it would.

What we would like is
key_prefix "/foo/bar/*" { policy="write" }

and the user should be able to see just that path in UI. No other paths should show up. Vault policy already supports wildcard. I wonder why consul shouldn't.

+1 for this, ale looking for possibility to do something like this, now I need to give write access to all keys in order to solve my problem

Hello,
A few years later there is still no plan to implement this feature?

Thanks

Was this page helpful?
0 / 5 - 0 ratings