[
https://issues.apache.org/jira/browse/CLOUDSTACK-8650?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14637061#comment-14637061
]
ASF GitHub Bot commented on CLOUDSTACK-8650:
--------------------------------------------
Github user franklouwers commented on the pull request:
https://github.com/apache/cloudstack/pull/601#issuecomment-123756479
See updated commit to fix the missing : .
See also https://gist.github.com/franklouwers/d5061b4ef50e2b4253fe with
logs of what works, what doesn't work, and how this PR makes it work....
> When using security groups, adding an ingress rule for protocol "all" for
> source cidr 0.0.0.0/0 is impossible
> -------------------------------------------------------------------------------------------------------------
>
> Key: CLOUDSTACK-8650
> URL: https://issues.apache.org/jira/browse/CLOUDSTACK-8650
> Project: CloudStack
> Issue Type: Bug
> Security Level: Public(Anyone can view this level - this is the
> default.)
> Reporter: Frank Louwers
> Priority: Minor
>
> While it is possible to add ingress rules for tcp, udp and icmp for source
> range 0.0.0.0/0, it is currently impossible to add a rule for protocol all
> for source range 0.0.0.0/0.
> So these work (using eg cloudmonkey):
> * authorize securitygroupingress securitygroupid=$id cidrlist="0.0.0.0/0"
> protocol=tcp
> * authorize securitygroupingress securitygroupid=$id cidrlist="0.0.0.0/0"
> protocol=icmp
> * authorize securitygroupingress securitygroupid=$id cidrlist="0.0.0.0/1"
> protocol=all
> * authorize securitygroupingress securitygroupid=$id cidrlist="128.0.0.0/1"
> protocol=all
> But this doesn't work:
> * authorize securitygroupingress securitygroupid=$id cidrlist="0.0.0.0/0"
> protocol=all
> Fix is in https://github.com/apache/cloudstack/pull/601
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)