[CC-5719] Add support for builtin global-read-only policy#18319
[CC-5719] Add support for builtin global-read-only policy#18319jjacobson93 merged 13 commits intomainfrom
Conversation
There was a problem hiding this comment.
This makes sense to me as far as I understand policy implementation in Consul! I like how clean the changes are to handle global-management and global-read-only policy ✨
Left mostly nits and a couple suggestions. We also chatted about adding consul docs for the builtin policy. Will take a look again then!
EDIT: I missed the new commit to add the docs! Taking a look now 😄
trujillo-adam
left a comment
There was a problem hiding this comment.
Looks good from the docs perspective; just a minor nit
|
|
||
| ### Global Read-Only | ||
|
|
||
| The `builtin/global-read-only` policy grants unrestricted _read-only_ privileges to any token linked to it. The policy is assigned the reserved ID of `00000000-0000-0000-0000-000000000002`. You can rename the global read-only policy, but Consul will prevent you from modifying any other attributes, including the rule set and datacenter scope. |
There was a problem hiding this comment.
| The `builtin/global-read-only` policy grants unrestricted _read-only_ privileges to any token linked to it. The policy is assigned the reserved ID of `00000000-0000-0000-0000-000000000002`. You can rename the global read-only policy, but Consul will prevent you from modifying any other attributes, including the rule set and datacenter scope. | |
| The `builtin/global-read-only` policy grants unrestricted _read-only_ privileges to any token linked to it. The policy is assigned the reserved ID of `00000000-0000-0000-0000-000000000002`. You can rename the global read-only policy, but Consul prevents you from modifying any other attributes, including the rule set and datacenter scope. |
Per the style guide, we should use present tense.
There was a problem hiding this comment.
Good catch, I didn't know that. I actually copy-pasted from the above description 😬 Should I change that one as well?
|
@pglass just bumping this up, if you get a chance to review, please. Thanks! |
Co-authored-by: Paul Glass <[email protected]>
cthain
left a comment
There was a problem hiding this comment.
Looking good. I had some comments/questions around ID allocation and naming.
Co-authored-by: Chris Thain <[email protected]>
Description
This adds a new builtin policy that provides global read-only access, in contrast to the global read-write access that the builtin
global-managementpolicy provides. Other changes were made to process builtin policies more generically, since there are several places where checks or validations are done before processing or altering a policy.Links
Ticket
RFC
PR Checklist