mirror of
https://github.com/saltstack/salt.git
synced 2025-04-17 10:10:20 +00:00
Correct peer communication docs
This commit is contained in:
parent
20ac30d1e5
commit
278368b908
3 changed files with 54 additions and 23 deletions
1
changelog/52164.fixed
Normal file
1
changelog/52164.fixed
Normal file
|
@ -0,0 +1 @@
|
|||
Corrected peer communication docs regarding target limiting
|
|
@ -5346,9 +5346,9 @@ and pkg modules.
|
|||
.. code-block:: yaml
|
||||
|
||||
peer:
|
||||
foo.example.com:
|
||||
- test.*
|
||||
- pkg.*
|
||||
foo\.example\.com:
|
||||
- test\..*
|
||||
- pkg\..*
|
||||
|
||||
This will allow all minions to execute all commands:
|
||||
|
||||
|
@ -5361,16 +5361,25 @@ This will allow all minions to execute all commands:
|
|||
This is not recommended, since it would allow anyone who gets root on any
|
||||
single minion to instantly have root on all of the minions!
|
||||
|
||||
By adding an additional layer you can limit the target hosts in addition to the
|
||||
accessible commands:
|
||||
It is also possible to limit target hosts with the :term:`Compound Matcher`.
|
||||
You can achieve this by adding another layer in between the source and the
|
||||
allowed functions:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
peer:
|
||||
foo.example.com:
|
||||
'db*':
|
||||
- test.*
|
||||
- pkg.*
|
||||
'.*\.example\.com':
|
||||
- 'G@role:db':
|
||||
- test\..*
|
||||
- pkg\..*
|
||||
|
||||
.. note::
|
||||
|
||||
Notice that the source hosts are matched by a regular expression
|
||||
on their minion ID, while target hosts can be matched by any of
|
||||
the :ref:`available matchers <targeting-compound>`.
|
||||
|
||||
Note that globbing and regex matching on pillar values is not supported.
|
||||
|
||||
.. conf_master:: peer_run
|
||||
|
||||
|
|
|
@ -38,16 +38,16 @@ only recommended for very secure environments.
|
|||
.*:
|
||||
- .*
|
||||
|
||||
This configuration will allow minions with IDs ending in example.com access
|
||||
This configuration will allow minions with IDs ending in ``.example.com`` access
|
||||
to the test, ps, and pkg module functions.
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
peer:
|
||||
.*example.com:
|
||||
- test.*
|
||||
- ps.*
|
||||
- pkg.*
|
||||
.*\.example.com:
|
||||
- test\..*
|
||||
- ps\..*
|
||||
- pkg\..*
|
||||
|
||||
|
||||
The configuration logic is simple, a regular expression is passed for matching
|
||||
|
@ -58,17 +58,38 @@ allow minions ending with foo.org access to the publisher.
|
|||
.. code-block:: yaml
|
||||
|
||||
peer:
|
||||
.*example.com:
|
||||
- test.*
|
||||
- ps.*
|
||||
- pkg.*
|
||||
.*foo.org:
|
||||
- test.*
|
||||
- ps.*
|
||||
- pkg.*
|
||||
.*\.example.com:
|
||||
- test\..*
|
||||
- ps\..*
|
||||
- pkg\..*
|
||||
.*\.foo.org:
|
||||
- test\..*
|
||||
- ps\..*
|
||||
- pkg\..*
|
||||
|
||||
.. note::
|
||||
Functions are matched using regular expressions.
|
||||
Functions are matched using regular expressions as well.
|
||||
|
||||
It is also possible to limit target hosts with the :term:`Compound Matcher`.
|
||||
You can achieve this by adding another layer in between the source and the
|
||||
allowed functions:
|
||||
|
||||
.. code-block:: yaml
|
||||
|
||||
peer:
|
||||
'.*\.example\.com':
|
||||
- 'G@role:db':
|
||||
- test\..*
|
||||
- pkg\..*
|
||||
|
||||
.. note::
|
||||
|
||||
Notice that the source hosts are matched by a regular expression
|
||||
on their minion ID, while target hosts can be matched by any of
|
||||
the :ref:`available matchers <targeting-compound>`.
|
||||
|
||||
Note that globbing and regex matching on pillar values is not supported.
|
||||
|
||||
|
||||
Peer Runner Communication
|
||||
=========================
|
||||
|
|
Loading…
Add table
Reference in a new issue