-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot see values in UI with nested ACL #1747
Comments
Hi @ashald this is a function of the longest prefix match behavior of ACLs (see https://groups.google.com/d/msgid/consul-tool/e1e286f7-f091-420f-93ee-3939268a23e9%40googlegroups.com?utm_medium=email&utm_source=footer). I think we'd need a special-case "list" permission to change this behavior. Consul KV doesn't really have knowledge of folders, though, so we'd need to see how this would look. |
But how does that work with
? I assume when you hit on |
Yeah - it will list |
Ah, I see - it will compare exact key names with ACLs, right? It'd be so nice to have simple fnmatch-alike wildcards though... |
Correct - it finds the longest prefix match against the ACLs and uses that. Wildcards are a good suggestion for this! |
I'm also interested by this enhancement. From the example
I was thinking of ACL like (default set to deny):
we can also think of rule like :
"**" meaning any number of level in order to hide some stuff for specific people. If I got some time I will look source to check if I can do that |
I agree that support for wildcards would be of great benefit to us. We have configuration data stored under different namespaces each ACL'ed off to the team that owns that namespace. Right now that involves explicitly denying every other namespace in every ACL. 40 teams = 1600 ACL rules and adding a rule to all 40 ACLs any time a new team is created :( . Being able to reduce that down to what @intelradoux suggested would be awesome. @slackpack is there any update on possibly getting this support added? |
Closing this against #3025 which captures the wildcard portion of this. |
With Consul 0.6.3 and the latest UI bundle (due to #1071) let's assume following KV hierarchy:
With ACLs enabled and default policy set to
deny
if ACL for token set to:then in UI you will see
bar
and all its content. But if ACL is set toyou won't be able to see
foo
in the UI. In order to get access toalpha
you will need to manually putfoo
into your URL.Expected behavior: with ACL as mentioned above you should be able to use UI to navigate up to the target dir.
The text was updated successfully, but these errors were encountered: