» Consul ACL Token Update
Command: consul acl token update
The acl token update command will update a token. Some parts of the token like whether the
token is local to the datacenter cannot be changed.
» Usage
Usage: consul acl token update [options]
» API Options
- 
-ca-file=<value>- Path to a CA file to use for TLS when communicating with Consul. This can also be specified via theCONSUL_CACERTenvironment variable. - 
-ca-path=<value>- Path to a directory of CA certificates to use for TLS when communicating with Consul. This can also be specified via theCONSUL_CAPATHenvironment variable. - 
-client-cert=<value>- Path to a client cert file to use for TLS whenverify_incomingis enabled. This can also be specified via theCONSUL_CLIENT_CERTenvironment variable. - 
-client-key=<value>- Path to a client key file to use for TLS whenverify_incomingis enabled. This can also be specified via theCONSUL_CLIENT_KEYenvironment variable. - 
-http-addr=<addr>- Address of the Consul agent with the port. This can be an IP address or DNS address, but it must include the port. This can also be specified via theCONSUL_HTTP_ADDRenvironment variable. In Consul 0.8 and later, the default value is http://127.0.0.1:8500, and https can optionally be used instead. The scheme can also be set to HTTPS by setting the environment variableCONSUL_HTTP_SSL=true. This may be a unix domain socket usingunix:///path/to/socketif the agent is configured to listen that way. - 
-tls-server-name=<value>- The server name to use as the SNI host when connecting via TLS. This can also be specified via theCONSUL_TLS_SERVER_NAMEenvironment variable. - 
-token=<value>- ACL token to use in the request. This can also be specified via theCONSUL_HTTP_TOKENenvironment variable. If unspecified, the query will default to the token of the Consul agent at the HTTP address. - 
-token-file=<value>- File containing the ACL token to use in the request instead of one specified via the-tokenargument orCONSUL_HTTP_TOKENenvironment variable. This can also be specified via theCONSUL_HTTP_TOKEN_FILEenvironment variable. 
- 
-datacenter=<name>- Name of the datacenter to query. If unspecified, the query will default to the datacenter of the Consul agent at the HTTP address. - 
-stale- Permit any Consul server (non-leader) to respond to this request. This allows for lower latency and higher throughput, but can result in stale data. This option has no effect on non-read operations. The default value is false. 
» Command Options
- 
-description=<string>- A description of the token - 
-id=<string>- The Accessor ID of the token to read. It may be specified as a unique ID prefix but will error if the prefix matches multiple token Accessor IDs - 
-merge-policies- Merge the new policies with the existing policies. - 
-merge-roles- Merge the new roles with the existing roles. - 
-merge-service-identities- Merge the new service identities with the existing service identities. - 
-meta- Indicates that token metadata such as the content hash and Raft indices should be shown for each entry. - 
-policy-id=<value>- ID of a policy to use for this token. May be specified multiple times. - 
-policy-name=<value>- Name of a policy to use for this token. May be specified multiple times. - 
-role-id=<value>- ID of a role to use for this token. May be specified multiple times. - 
-role-name=<value>- Name of a role to use for this token. May be specified multiple times. - 
-service-identity=<value>- Name of a service identity to use for this token. May be specified multiple times. Format is theSERVICENAMEorSERVICENAME:DATACENTER1,DATACENTER2,... 
» Examples
Update the anonymous token:
$ consul acl token update -id anonymous -policy-id 06acc
Token updated successfully.
AccessorID:   00000000-0000-0000-0000-000000000002
SecretID:     anonymous
Description:  Anonymous Token
Local:        false
Create Time:  0001-01-01 00:00:00 +0000 UTC
Policies:
   06acc965-df4b-5a99-58cb-3250930c6324 - node-services-read
Update a token description and take the policies from the existing token:
$ consul acl token update -id 986193 -description "WonderToken" -merge-policies
Token updated successfully.
AccessorID:   986193b5-e2b5-eb26-6264-b524ea60cc6d
SecretID:     ec15675e-2999-d789-832e-8c4794daa8d7
Description:  WonderToken
Local:        false
Create Time:  2018-10-22 15:33:39.01789 -0400 EDT
Policies:
   06acc965-df4b-5a99-58cb-3250930c6324 - node-services-read