Hi,
Defining an ACL for consul 0.7.5. backend took some research. A working configuration was:
{
"key": {
"vault/": {
"policy": "write"
}
},
"service": {
"vault": {
"policy": "write"
}
}
}
with the backend defined in vault (0.7.0) as:
"backend": {
"consul": {
"token": "88937d44-244c-11e7-aae4-005056ae16c6",
"path": "vault",
"address": "127.0.0.1:8500"
}
}
I now want to upgrade consul to 0.8.1, but there are some permission problems.
In the vault.log:
Error detecting redirect address: Unexpected response code: 403 (Permission denied)
Error initializing core: missing redirect address
In the consul log:
2017/05/01 11:50:37 [ERR] http: Request GET /v1/agent/self, error: Permission denied from=127.0.0.1:56004
My initial thought was to that for consul 0.8.1, I need a node stanza in the ACL to allow vault to register as a consul service.
{
"key": {
"vault/": {
"policy": "write"
}
},
"node": {
"vault01": {
"policy": "write"
}
},
"service": {
"vault": {
"policy": "write"
}
}
}
I tried this with both the empty node name "" (which I think should work) and with the node name as listed in "consul members" - but I get the same error as before.
So far, the only way I can get vault to work with the consul 0.8.1 acls is to use a "management" acl for vault.
Can anyone help me with this please ?
It would be really great if the vault user guide for the consul storage backend gave some clues about setting up the ACLs.
regards,
Martin