On Mon, Nov 11, 2013 at 4:09 PM, Alena Prokharchyk <alena.prokharc...@citrix.com> wrote: > On 11/11/13 2:59 PM, "Marcus Sorensen" <shadow...@gmail.com> wrote: > >>Sorry for the back and forth, I'm interfacing with individuals who >>consume our CloudStack environment. I'm being told that the issues >>actually aren't related to API parameters, but behavior of the API >>calls: >> >>1) As a user, listing network ACLs now shows ALL ACLs, not just the >>ones you own. An example test that was shown to me created a new user, >>listed ACLs, then created two ACLs and listed again. Previously, the >>result would be 0, then 2 ACLs. Now, we get 24 and 26, as the brand >>new user sees all ACLs. > > Its a bug if the ACLs belong to some other user in the domain as the > regular user can see only his own resources. Can you please elaborate who > owns 24 and 26 ACLs, and who makes the call (the type of the user - domain > admin, root admin, regular user)
Test creates a domain, creates a new user in the domain, lists ACLs as that user. ACLs from other domains and accounts are seen (all ACLs, as far as I can tell). > >> >>2) Test case used to succeed by failing when duplicate or overlapping >>ACLs were created. Now, they're allowed. I have yet to duplicate this >>and see if it causes problems for virtual routers. > > > Not a bug. If it was the other way around - duplicated rules were allowed, > and now we block it - then it would have been a bug because your DB might > already have duplicated records prior to update. > With the new way ACLs are implemented, you can set the priority for the > rule. Once the rule with the highest priority is hit, the rest of the > rules are not being processed. You can read the FS to understand how the > feature works. Kishan, can you point Marcus to the spec. Yes, please. This sounds as though someone may create a rule for 22-80, and another for 80-443, and only one of the rules will work (the one with priority). That would cause confusion as far as understanding why a rule isn't working. I'll see if I can dig it up on my own as well. > > >> >>I'll try to confirm/duplicate and create JIRA issues for these if I >>don't get a response back from someone explaining/validating the new >>behavior. >> >>On Mon, Nov 11, 2013 at 2:22 PM, Alena Prokharchyk >><alena.prokharc...@citrix.com> wrote: >>> Marcus, if any of the CS API command(s) return the error for >>> parameter/parameter combination that used to work before, then it means >>>APIs >>> are incompatible, and it has to be fixed. >>> Thank you for looking into it. >>> >>> -Alena. >>> >>> From: Marcus Sorensen <shadow...@gmail.com> >>> Reply-To: "dev@cloudstack.apache.org" <dev@cloudstack.apache.org> >>> Date: Monday, November 11, 2013 1:10 PM >>> To: "dev@cloudstack.apache.org" <dev@cloudstack.apache.org> >>> >>> Subject: Re: api incompatibility between 4.1 and 4.2 in ACLs >>> >>> Ok, I'll dig deeper into it. Our api's ACL tests are breaking against >>>4.2. >>> >>> On Sun, Nov 10, 2013 at 11:13 PM, Kishan Kavala >>> <kishan.kav...@citrix.com> wrote: >>> >>> Marcus, >>> aclid is optional when creating a networlACL. In 4.1, networkId is >>> mandatory for creating ACL. So, when networkId is specified instead of >>>aclid >>> in 4.2, CS gets the aclList associated with the network and adds acl to >>>it. >>> So, API doesn't break if the aclid is not specified. >>> >>> -----Original Message----- >>> From: Marcus Sorensen [mailto:shadow...@gmail.com] >>> Sent: Saturday, 9 November 2013 1:13 AM >>> To: dev@cloudstack.apache.org >>> Cc: Kishan Kavala >>> Subject: Re: api incompatibility between 4.1 and 4.2 in ACLs >>> >>> Yes, that would certainly maintain api compatibility if one creates an >>>ACL >>> without specifying aclid, it creates a new list and applies it to the >>>given >>> network. >>> >>> On Fri, Nov 8, 2013 at 12:28 PM, Animesh Chaturvedi >>> <animesh.chaturv...@citrix.com> wrote: >>>> Actually use this link to the message in that thread >>>> http://s.apache.org/QKI >>>> >>>> >>>> >>>>> -----Original Message----- >>>>> From: Animesh Chaturvedi [mailto:animesh.chaturv...@citrix.com] >>>>> Sent: Friday, November 08, 2013 11:24 AM >>>>> To: dev@cloudstack.apache.org >>>>> Cc: Kishan Kavala >>>>> Subject: RE: api incompatibility between 4.1 and 4.2 in ACLs >>>>> >>>>> >>>>> I will let Kishan comment but found this thread >>>>> http://markmail.org/thread/fxzki6ftqacyrylk >>>>> >>>>> >>>>> > -----Original Message----- >>>>> > From: Marcus Sorensen [mailto:shadow...@gmail.com] >>>>> > Sent: Friday, November 08, 2013 9:13 AM >>>>> > To: dev@cloudstack.apache.org >>>>> > Subject: Re: api incompatibility between 4.1 and 4.2 in ACLs >>>>> > >>>>> > So I take the silence to simply be a collective "oops". I guess >>>>> > this just should serve as a reminder to not break API compatibility >>>>> > without a discussion. Perhaps our tests will surface this better in >>>>> > the future (although I need to look, I wonder if any ACL tests were >>>>> > also simply changed to accomodate the new behavior). >>>>> > >>>>> > On Thu, Nov 7, 2013 at 2:23 PM, Marcus Sorensen >>>>> > <shadow...@gmail.com> >>>>> > wrote: >>>>> > > Maybe this has been discussed already, but we seem to have run >>>>> > > into an api incompatibility. In 4.1, you could create ad-hoc ACL >>>>> > > rules that applied to a network. In 4.2, you have to first create >>>>> > > an 'ACL list', then add those rules to the list, then apply the >>>>> > > list to a network. Or so it seems. This means that applications >>>>> > > that are coded to the cloudstack API and utilize createNetworkACL >>>>> > > will break, because the flow has changed. >>>>> > > >>>>> > > Am I correct on this? And if so, shouldn't we have deployed 4.2 >>>>> > > as 5.0, since the stated versioning is based on API compatibility? >>> >>> >> > >