@@ -361,7 +361,7 @@ The ``config`` section defines various parameters related to centralized configu
361
361
config.context.*
362
362
~~~~~~~~~~~~~~~~
363
363
364
- This section describes options related to loading configuration settings from external storage.
364
+ This section describes options related to loading configuration settings from external storage such as external files or environment variables .
365
365
366
366
* :ref: `config.context <configuration_reference_config_context >`
367
367
@@ -379,13 +379,8 @@ This section describes options related to loading configuration settings from ex
379
379
**Since: ** :doc: `3.0.0 </release/3.0.0 >`.
380
380
381
381
Specify how to load settings from external storage.
382
- There are the following storage types:
383
-
384
- * file
385
- * environment variable
386
-
387
382
For example, this option can be used to load passwords from safe storage.
388
- You can find the examples in :ref: `configuration_credentials_loading_secrets `.
383
+ You can find examples in :ref: `configuration_credentials_loading_secrets `.
389
384
390
385
|
391
386
| Type: map
@@ -397,26 +392,60 @@ This section describes options related to loading configuration settings from ex
397
392
398
393
.. confval :: config.context.<name>
399
394
395
+ The name of an entity that identifies a configuration value to load.
400
396
401
397
.. _configuration_reference_config_context_name_env :
402
398
403
399
.. confval :: config.context.<name>.env
404
400
401
+ The name of an environment variable to load a configuration value from.
402
+
403
+ **Example: **
404
+
405
+ .. literalinclude :: /code_snippets/snippets/config/instances.enabled/credentials_context_env/config.yaml
406
+ :language: yaml
407
+ :start-at: config:
408
+ :end-before: credentials:
409
+ :dedent:
410
+
411
+ See also: :ref: `configuration_credentials_loading_secrets `.
412
+
405
413
406
414
.. _configuration_reference_config_context_name_from :
407
415
408
416
.. confval :: config.context.<name>.from
409
417
418
+ The type of storage to load a configuration value from.
419
+ There are the following storage types:
420
+
421
+ * ``file ``: load a configuration value from a file.
422
+ In this case, you need to specify the path to the file using :ref: `config.context.\< name\> .file <configuration_reference_config_context_name_file >`.
423
+ * ``env ``: load a configuration value from an environment variable.
424
+ In this case, specify the environment variable name using :ref: `config.context.\< name\> .env <configuration_reference_config_context_name_env >`.
425
+
410
426
411
427
.. _configuration_reference_config_context_name_file :
412
428
413
429
.. confval :: config.context.<name>.file
414
430
431
+ The path to a file to load a configuration value from.
432
+
433
+ **Example: **
434
+
435
+ .. literalinclude :: /code_snippets/snippets/config/instances.enabled/credentials_context_file/config.yaml
436
+ :language: yaml
437
+ :start-at: config:
438
+ :end-before: credentials:
439
+ :dedent:
440
+
441
+ See also: :ref: `configuration_credentials_loading_secrets `.
442
+
415
443
416
444
.. _configuration_reference_config_context_name_rstrip :
417
445
418
446
.. confval :: config.context.<name>.rstrip
419
447
448
+ Whether to strip whitespace characters and newlines from the end of data.
420
449
421
450
422
451
@@ -610,7 +639,8 @@ This section describes options related to :ref:`storing configuration in etcd <c
610
639
credentials
611
640
-----------
612
641
613
- .. TODO: https://github.com/tarantool/doc/issues/3666
642
+ The ``credentials `` section allows you to create users and grant them the specified privileges.
643
+ Learn more in :ref: `configuration_credentials `.
614
644
615
645
.. NOTE ::
616
646
@@ -626,6 +656,18 @@ credentials
626
656
627
657
.. confval :: credentials.roles
628
658
659
+ An array of :ref: `roles <access_control_concepts_roles >` that can be granted to users.
660
+
661
+ **Example: **
662
+
663
+ .. literalinclude :: /code_snippets/snippets/config/instances.enabled/credentials/config.yaml
664
+ :language: yaml
665
+ :start-after: spaces: [ books ]
666
+ :end-at: spaces: [ writers ]
667
+ :dedent:
668
+
669
+ See also: :ref: `configuration_credentials_managing_users_roles `.
670
+
629
671
| Type: map
630
672
| Default: nil
631
673
| Environment variable: TT_CREDENTIALS_ROLES
@@ -635,6 +677,18 @@ credentials
635
677
636
678
.. confval :: credentials.users
637
679
680
+ An array of :ref: `users <access_control_concepts_users >`.
681
+
682
+ **Example: **
683
+
684
+ .. literalinclude :: /code_snippets/snippets/config/instances.enabled/credentials/config.yaml
685
+ :language: yaml
686
+ :start-at: credentials:
687
+ :end-at: T0p_Secret
688
+ :dedent:
689
+
690
+ See also: :ref: `configuration_credentials_managing_users_roles `.
691
+
638
692
| Type: map
639
693
| Default: nil
640
694
| Environment variable: TT_CREDENTIALS_USERS
@@ -650,12 +704,15 @@ credentials.roles.*
650
704
651
705
.. confval :: credentials.roles.<role_name>.roles
652
706
707
+ An array of :ref: `roles <access_control_concepts_roles >` granted to this role.
653
708
654
709
.. _configuration_reference_credentials_roles_name_privileges :
655
710
656
711
.. confval :: credentials.roles.<role_name>.privileges
657
712
658
- See :ref: `privileges <configuration_reference_credentials_privileges >`.
713
+ An array of :ref: `privileges <authentication-owners_privileges >` granted to this role.
714
+
715
+ See :ref: `\< user_or_role_name\> .privileges.* <configuration_reference_credentials_privileges >`.
659
716
660
717
661
718
.. _configuration_reference_credentials_user :
@@ -668,17 +725,31 @@ credentials.users.*
668
725
669
726
.. confval :: credentials.users.<username>.password
670
727
728
+ A user's password.
729
+
730
+ **Example: **
731
+
732
+ .. literalinclude :: /code_snippets/snippets/config/instances.enabled/credentials/config.yaml
733
+ :language: yaml
734
+ :start-at: credentials:
735
+ :end-at: T0p_Secret
736
+ :dedent:
737
+
738
+ See also: :ref: `configuration_credentials_loading_secrets `.
671
739
672
740
.. _configuration_reference_credentials_users_name_roles :
673
741
674
742
.. confval :: credentials.users.<username>.roles
675
743
744
+ An array of :ref: `roles <access_control_concepts_roles >` granted to this user.
676
745
677
746
.. _configuration_reference_credentials_users_name_privileges :
678
747
679
748
.. confval :: credentials.users.<username>.privileges
680
749
681
- See :ref: `privileges <configuration_reference_credentials_privileges >`.
750
+ An array of :ref: `privileges <authentication-owners_privileges >` granted to this user.
751
+
752
+ See :ref: `\< user_or_role_name\> .privileges.* <configuration_reference_credentials_privileges >`.
682
753
683
754
684
755
.. _configuration_reference_credentials_privileges :
@@ -690,36 +761,69 @@ credentials.users.*
690
761
691
762
.. confval :: <user_or_role_name>.privileges.permissions
692
763
764
+ Permissions assigned to this user or a user with this role.
765
+
766
+ **Example: **
767
+
768
+ .. literalinclude :: /code_snippets/snippets/config/instances.enabled/credentials/config.yaml
769
+ :language: yaml
770
+ :start-at: sampleuser:
771
+ :end-at: [ books ]
772
+ :dedent:
773
+
774
+ See also: :ref: `configuration_credentials_managing_users_roles `.
693
775
694
776
.. _configuration_reference_credentials_users_name_privileges_spaces :
695
777
696
778
.. confval :: <user_or_role_name>.privileges.spaces
697
779
780
+ Spaces to which this user or a user with this role gets the specified permissions.
781
+
782
+ **Example: **
783
+
784
+ .. literalinclude :: /code_snippets/snippets/config/instances.enabled/credentials/config.yaml
785
+ :language: yaml
786
+ :start-at: sampleuser:
787
+ :end-at: [ books ]
788
+ :dedent:
789
+
790
+ See also: :ref: `configuration_credentials_managing_users_roles `.
791
+
698
792
699
793
.. _configuration_reference_credentials_users_name_privileges_functions :
700
794
701
795
.. confval :: <user_or_role_name>.privileges.functions
702
796
797
+ Functions to which this user or a user with this role gets the specified permissions.
798
+
703
799
704
800
.. _configuration_reference_credentials_users_name_privileges_sequences :
705
801
706
802
.. confval :: <user_or_role_name>.privileges.sequences
707
803
804
+ Sequences to which this user or a user with this role gets the specified permissions.
805
+
708
806
709
807
.. _configuration_reference_credentials_users_name_privileges_lua_eval :
710
808
711
809
.. confval :: <user_or_role_name>.privileges.lua_eval
712
810
811
+ Whether this user or a user with this role can execute arbitrary Lua code.
812
+
713
813
714
814
.. _configuration_reference_credentials_users_name_privileges_lua_call :
715
815
716
816
.. confval :: <user_or_role_name>.privileges.lua_call
717
817
818
+ Whether this user or a user with this role can call any global user-defined Lua function.
819
+
718
820
719
821
.. _configuration_reference_credentials_users_name_privileges_sql :
720
822
721
823
.. confval :: <user_or_role_name>.privileges.sql
722
824
825
+ Whether this user or a user with this role can execute an arbitrary SQL expression.
826
+
723
827
724
828
725
829
0 commit comments