Yes, master as of today lists all acls with a newly created user-level account.

On Mon, Nov 11, 2013 at 4:46 PM, Marcus Sorensen <shadow...@gmail.com> wrote:
> I can say in practice, at least, if I create a rule that opens TCP 22
> and another rule that opens TCP 22 through 80, they both show up on
> the virtual router's iptables. That shouldn't hurt anything, and is
> actually a bit less confusing. I think I see what you're saying, the
> first rule listed will match in iptables and will stop processing. I
> thought you meant that the ACLs would stop being installed on the
> router according to whether or not they overlap.  This behavior I'm
> seeing makes sense.
>
>
> Let me try to duplicate in master, as well. This is with 4.2
>
> On Mon, Nov 11, 2013 at 4:38 PM, Alena Prokharchyk
> <alena.prokharc...@citrix.com> wrote:
>> On 11/11/13 3:34 PM, "Marcus Sorensen" <shadow...@gmail.com> wrote:
>>
>>>On Mon, Nov 11, 2013 at 4:09 PM, Alena Prokharchyk
>>><alena.prokharc...@citrix.com> wrote:
>>>> On 11/11/13 2:59 PM, "Marcus Sorensen" <shadow...@gmail.com> wrote:
>>>>
>>>>>Sorry for the back and forth,  I'm interfacing with individuals who
>>>>>consume our CloudStack environment. I'm being told that the issues
>>>>>actually aren't related to API parameters, but behavior of the API
>>>>>calls:
>>>>>
>>>>>1) As a user, listing network ACLs now shows ALL ACLs, not just the
>>>>>ones you own. An example test that was shown to me created a new user,
>>>>>listed ACLs, then created two ACLs and listed again.  Previously, the
>>>>>result would be 0, then 2 ACLs. Now, we get 24 and 26, as the brand
>>>>>new user sees all ACLs.
>>>>
>>>> Its a bug if the ACLs belong to some other user in the domain as the
>>>> regular user can see only his own resources. Can you please elaborate
>>>>who
>>>> owns 24 and 26 ACLs, and who makes the call (the type of the user -
>>>>domain
>>>> admin, root admin, regular user)
>>>
>>>Test creates a domain, creates a new user in the domain, lists ACLs as
>>>that user.  ACLs from other domains and accounts are seen (all ACLs,
>>>as far as I can tell).
>>
>>
>> Sounds like a security bug to me. Kishan, can you take a look pls?
>>
>>
>>>
>>>>
>>>>>
>>>>>2) Test case used to succeed by failing when duplicate or overlapping
>>>>>ACLs were created. Now, they're allowed.  I have yet to duplicate this
>>>>>and see if it causes problems for virtual routers.
>>>>
>>>>
>>>> Not a bug. If it was the other way around - duplicated rules were
>>>>allowed,
>>>> and now we block it - then it would have been a bug because your DB
>>>>might
>>>> already have duplicated records prior to update.
>>>> With the new way ACLs are implemented, you can set the priority for the
>>>> rule. Once the rule with the highest priority is hit, the rest of the
>>>> rules are not being processed. You can read the FS to understand how the
>>>> feature works. Kishan, can you point Marcus to the spec.
>>>
>>>Yes, please. This sounds as though someone may create a rule for
>>>22-80, and another for 80-443, and only one of the rules will work
>>>(the one with priority). That would cause confusion as far as
>>>understanding why a rule isn't working. I'll see if I can dig it up on
>>>my own as well.
>>>
>>>>
>>>>
>>>>>
>>>>>I'll try to confirm/duplicate and create JIRA issues for these if I
>>>>>don't get a response back from someone explaining/validating the new
>>>>>behavior.
>>>>>
>>>>>On Mon, Nov 11, 2013 at 2:22 PM, Alena Prokharchyk
>>>>><alena.prokharc...@citrix.com> wrote:
>>>>>> Marcus, if any of the CS API command(s) return the error for
>>>>>> parameter/parameter combination that used to work before, then it
>>>>>>means
>>>>>>APIs
>>>>>> are incompatible, and it has to be fixed.
>>>>>> Thank you for looking into it.
>>>>>>
>>>>>> -Alena.
>>>>>>
>>>>>> From: Marcus Sorensen <shadow...@gmail.com>
>>>>>> Reply-To: "dev@cloudstack.apache.org" <dev@cloudstack.apache.org>
>>>>>> Date: Monday, November 11, 2013 1:10 PM
>>>>>> To: "dev@cloudstack.apache.org" <dev@cloudstack.apache.org>
>>>>>>
>>>>>> Subject: Re: api incompatibility between 4.1 and 4.2 in ACLs
>>>>>>
>>>>>> Ok, I'll dig deeper into it. Our api's ACL tests are breaking against
>>>>>>4.2.
>>>>>>
>>>>>> On Sun, Nov 10, 2013 at 11:13 PM, Kishan Kavala
>>>>>> <kishan.kav...@citrix.com> wrote:
>>>>>>
>>>>>> Marcus,
>>>>>>   aclid is optional when creating a networlACL. In 4.1, networkId is
>>>>>> mandatory for creating ACL. So, when networkId is specified instead of
>>>>>>aclid
>>>>>> in 4.2, CS gets the aclList associated with the network and adds acl
>>>>>>to
>>>>>>it.
>>>>>> So, API doesn't break if the aclid is not specified.
>>>>>>
>>>>>> -----Original Message-----
>>>>>> From: Marcus Sorensen [mailto:shadow...@gmail.com]
>>>>>> Sent: Saturday, 9 November 2013 1:13 AM
>>>>>> To: dev@cloudstack.apache.org
>>>>>> Cc: Kishan Kavala
>>>>>> Subject: Re: api incompatibility between 4.1 and 4.2 in ACLs
>>>>>>
>>>>>> Yes, that would certainly maintain api compatibility if one creates an
>>>>>>ACL
>>>>>> without specifying aclid, it creates a new list and applies it to the
>>>>>>given
>>>>>> network.
>>>>>>
>>>>>> On Fri, Nov 8, 2013 at 12:28 PM, Animesh Chaturvedi
>>>>>> <animesh.chaturv...@citrix.com> wrote:
>>>>>>> Actually use this link to the message in that thread
>>>>>>> http://s.apache.org/QKI
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>> -----Original Message-----
>>>>>>>> From: Animesh Chaturvedi [mailto:animesh.chaturv...@citrix.com]
>>>>>>>> Sent: Friday, November 08, 2013 11:24 AM
>>>>>>>> To: dev@cloudstack.apache.org
>>>>>>>> Cc: Kishan Kavala
>>>>>>>> Subject: RE: api incompatibility between 4.1 and 4.2 in ACLs
>>>>>>>>
>>>>>>>>
>>>>>>>> I will let Kishan comment but found this thread
>>>>>>>> http://markmail.org/thread/fxzki6ftqacyrylk
>>>>>>>>
>>>>>>>>
>>>>>>>> > -----Original Message-----
>>>>>>>> > From: Marcus Sorensen [mailto:shadow...@gmail.com]
>>>>>>>> > Sent: Friday, November 08, 2013 9:13 AM
>>>>>>>> > To: dev@cloudstack.apache.org
>>>>>>>> > Subject: Re: api incompatibility between 4.1 and 4.2 in ACLs
>>>>>>>> >
>>>>>>>> > So I take the silence to simply be a collective "oops".  I guess
>>>>>>>> > this just should serve as a reminder to not break API
>>>>>>>>compatibility
>>>>>>>> > without a discussion. Perhaps our tests will surface this better
>>>>>>>>in
>>>>>>>> > the future (although I need to look, I wonder if any ACL tests
>>>>>>>>were
>>>>>>>> > also simply changed to accomodate the new behavior).
>>>>>>>> >
>>>>>>>> > On Thu, Nov 7, 2013 at 2:23 PM, Marcus Sorensen
>>>>>>>> > <shadow...@gmail.com>
>>>>>>>> > wrote:
>>>>>>>> > > Maybe this has been discussed already, but we seem to have run
>>>>>>>> > > into an api incompatibility. In 4.1, you could create ad-hoc ACL
>>>>>>>> > > rules that applied to a network. In 4.2, you have to first
>>>>>>>>create
>>>>>>>> > > an 'ACL list', then add those rules to the list, then apply the
>>>>>>>> > > list to a network. Or so it seems.  This means that applications
>>>>>>>> > > that are coded to the cloudstack API and utilize
>>>>>>>>createNetworkACL
>>>>>>>> > > will break, because the flow has changed.
>>>>>>>> > >
>>>>>>>> > > Am I correct on this? And if so, shouldn't we have deployed 4.2
>>>>>>>> > > as 5.0, since the stated versioning is based on API
>>>>>>>>compatibility?
>>>>>>
>>>>>>
>>>>>
>>>>
>>>>
>>>
>>
>>

Reply via email to