Skip to content

Commit

Permalink
website: fix mention of read-only policy for service acls
Browse files Browse the repository at this point in the history
  • Loading branch information
ryanuber committed Jun 19, 2015
1 parent bdf7821 commit 0381e1a
Showing 1 changed file with 4 additions and 2 deletions.
6 changes: 4 additions & 2 deletions website/source/docs/internals/acl.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -155,8 +155,9 @@ in 0.5.1). The default rule, applied to any service that doesn't have a matching
is provided using the empty string. A service policy is either "read", "write", or "deny".
A "write" policy implies "read", and there is no way to specify write-only. If there is no
applicable rule, the [`acl_default_policy`](/docs/agent/options.html#acl_default_policy) is
applied. Currently, only the "write" level is enforced for registration of
services; services can always be read.
applied. The "read" policy in a service ACL rule allows restricting access to
the discovery of that service prefix. More information about service discovery
and ACLs can be found [below](#discovery_acls).

The policy for the "consul" service is always "write" as it is managed internally by Consul.

Expand Down Expand Up @@ -239,6 +240,7 @@ methods of configuring ACL tokens to use for registration events:
[checks](/docs/agent/checks.html). Tokens may also be passed to the
[HTTP API](/docs/agent/http.html) for operations that require them.

<a name="discovery_acls"></a>
## Restricting service discovery with ACLs

In Consul 0.6, the ACL system was extended to support restricting read access to
Expand Down

0 comments on commit 0381e1a

Please sign in to comment.