Skip to content

ACLs: add fine-grained ACLs for Sentinel CRUD operations#27556

Merged
tgross merged 1 commit intomainfrom
NMD512-acls-for-sentinel-ce
Feb 20, 2026
Merged

ACLs: add fine-grained ACLs for Sentinel CRUD operations#27556
tgross merged 1 commit intomainfrom
NMD512-acls-for-sentinel-ce

Conversation

@tgross
Copy link
Copy Markdown
Member

@tgross tgross commented Feb 20, 2026

Updating Sentinel policies currently requires a management token. We'd like to break up the management token capabilities so that users can provide less-privileged tokens to services for specific purposes. For example, one might want to run testing on Sentinel policies and not allow that test pipeline to have full management access.

Add support for fine-grained ACLs on Sentinel CRUD operations. Note that unlike most ACLs, Sentinel is disabled when ACLs are disabled.

This is the CE portion of the work. The Sentinel RPC handlers are in the Enterprise PR.

Ref: https://github.com/hashicorp/nomad-enterprise/pull/3700
Ref: https://hashicorp.atlassian.net/browse/NMD-512
Fixes: #24225

Generative AI disclosure: these ACL package code changes were substantially generated via IBM Bob (with heavy hand-holding), while the RPC handler code and its test updates in the ENT PR were done solely by me. Fully reviewed and tested by me before marking ready for review.

Contributor Checklist

Reviewer Checklist

  • Backport Labels Please add the correct backport labels as described by the internal
    backporting document.
  • Commit Type Ensure the correct merge method is selected which should be "squash and merge"
    in the majority of situations. The main exceptions are long-lived feature branches or merges where
    history should be preserved.
  • Enterprise PRs If this is an enterprise only PR, please add any required changelog entry
    within the public repository.
  • If a change needs to be reverted, we will roll out an update to the code within 7 days.

Changes to Security Controls

Are there any changes to security controls (access controls, encryption, logging) in this pull request? If so, explain.

Updating Sentinel policies currently requires a management token. We'd like to
break up the management token capabilities so that users can provide
less-privileged tokens to services for specific purposes. For example, one might
want to run testing on Sentinel policies and not allow that test pipeline to
have full management access.

Add support for fine-grained ACLs on Sentinel CRUD operations. Note that unlike
most ACLs, Sentinel is disabled when ACLs are disabled.

This is the CE portion of the work. The Sentinel RPC handlers are in the
Enterprise PR.

Ref: hashicorp/nomad-enterprise#3700
Ref: https://hashicorp.atlassian.net/browse/NMD-512
Fixes: #24225
@tgross tgross force-pushed the NMD512-acls-for-sentinel-ce branch from 9fc02fd to d2f244d Compare February 20, 2026 14:42
@tgross tgross marked this pull request as ready for review February 20, 2026 15:02
@tgross tgross requested review from a team as code owners February 20, 2026 15:02
Copy link
Copy Markdown
Member

@gulducat gulducat left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@tgross tgross merged commit 4140723 into main Feb 20, 2026
37 checks passed
@tgross tgross deleted the NMD512-acls-for-sentinel-ce branch February 20, 2026 15:16
tgross added a commit that referenced this pull request Feb 20, 2026
Updating Sentinel policies currently requires a management token. We'd like to
break up the management token capabilities so that users can provide
less-privileged tokens to services for specific purposes. For example, one might
want to run testing on Sentinel policies and not allow that test pipeline to
have full management access.

Add support for fine-grained ACLs on Sentinel CRUD operations. Note that unlike
most ACLs, Sentinel is disabled when ACLs are disabled.

This is the CE portion of the work. The Sentinel RPC handlers are in the
Enterprise PR.

Ref: hashicorp/nomad-enterprise#3700
Ref: https://hashicorp.atlassian.net/browse/NMD-512
Fixes: #24225
tgross added a commit that referenced this pull request Feb 20, 2026
…27556) (#27557)

Updating Sentinel policies currently requires a management token. We'd like to
break up the management token capabilities so that users can provide
less-privileged tokens to services for specific purposes. For example, one might
want to run testing on Sentinel policies and not allow that test pipeline to
have full management access.

Add support for fine-grained ACLs on Sentinel CRUD operations. Note that unlike
most ACLs, Sentinel is disabled when ACLs are disabled.

This is the CE portion of the work. The Sentinel RPC handlers are in the
Enterprise PR.

Ref: hashicorp/nomad-enterprise#3700
Ref: https://hashicorp.atlassian.net/browse/NMD-512
Fixes: #24225

Co-authored-by: Tim Gross <tgross@hashicorp.com>
tgross added a commit to hashicorp/web-unified-docs that referenced this pull request Feb 26, 2026
The Nomad snapshot agent needs to save snapshots and check the Enterprise license for Enterprise features. We'd also like to reduce the strength of the token required for keyring rotation. In
hashicorp/nomad#27525 and hashicorp/nomad#27526 we've added fine-grained ACL capabilities.

In hashicorp/nomad#27556 we've added new Sentinel policies along the same lines.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport/1.11.x backport to 1.11.x release line theme/enterprise Issues related to Enterprise features type/enhancement

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Feature Request] Fine-grained ACL Capabilities for Sentinel Policy CRUD Actions

2 participants