-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The allocations endpoint with namespace=* does not interact with ACLs as expected #9268
Comments
Policy for reference. namespace "default" {
policy = "read"
}
namespace "other-ns" {
policy = "read"
capabilities = ["list-jobs", "read-job"]
}
agent {
policy = "read"
}
node {
policy = "read"
} |
i suspect it's a bad check early in the RPC call, which doesn't account for the sentinel: this code should probably be updated to reflect the pattern in job listing: also, while we're fixing bugs... it looks like the filtering on this line is backwards: and the allow check (in the latest version) is wrong as well ( |
@cgbaker , I'm also facing this issue with the latest nomad version 1.1.6 . Thanks. |
Hi @yitbarek123 , please file a new issue with the pertinent details and someone from Nomad will triage it. Thank you! |
OK, @cgbaker . Thanks again. |
I'm going to lock this issue because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active issues. |
Nomad version
1.0.0-beta2
Issue
When ACLs are enabled and a token has permissions to namespaces individually but no permissions for
*
, requesting/v1/allocations?namespace=*
results in a403 Forbidden
.I expected to get all allocations across all namespaces I have permissions for.
Reproduction steps
http localhost:4646/v1/allocations?namespace=* -- X-Nomad-Token:<token>
or similarThe text was updated successfully, but these errors were encountered: