-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG]: Consul deletes K/V if ACL policy is key
with value being a path ending in /
#5819
Comments
Hi @danlsgiga Thanks for the bug report! Right now I am unable to reproduce your bug, so it would be great if you could help me exactly recreate the steps you've gone through to produce the bug. I've tried the following in both 1.4.4 and 1.5.0, hopefully between us we can sync up steps to reproduce what you are seeing:
Everything seemed to work as expected. Some further notes incase it helps:
Can I ask if you see the KV actually deleted in Consul itself, or is it just not visible via the UI? Thanks again for the report! John |
Hi @johncowen, this was a very weird ocurrence for us and we could reproduce it at least 3 times until we changed the policy to I was sitting beside a colleague showing him some procedures for our deployment.. I was logged with a management token and he with a client token with that policy attached. At the moment he clicked in the root k/v path I'll try to reproduce it again switching the policy to |
K... I was able to reproduce the issue once I set I asked my colleague to try the same thing in Firefox, Chrome and Safari and we can reproduce it all the time. Note: the A gif with the steps reproducing the issue... at the end we can see that the UI is sending a |
This is great (well not, but you know what I mean!) @danlsgiga thankyou so much. I'll see if I can recreate again here and report back. |
Well, at least we know the "fix" for now which is to use As a side note, I'm not sure this would have any impact but the |
Overview of the Issue
In consul v1.4.4 if an ACL token has the following policy attached to it, it will cause the key/value to be deleted once the owner of the ACL token navigates to it in the UI
Note that our intention was to give
key_prefix
but we by mistake created it as above and that was the cause of the issue. Once we updated the policy tokey_prefix
the issue could not be reproduced anymore.Reproduction Steps
Consul info for both Client and Server
Client info
Server info
Operating system and Environment details
CentOS Linux release 7.6.1810 (Core)
3.10.0-957.1.3.el7.x86_64
The text was updated successfully, but these errors were encountered: