| Summary: | ACL denials while replicating exclusive queues to a newly joined node | ||
|---|---|---|---|
| Product: | Red Hat Enterprise MRG | Reporter: | Siddhesh Poyarekar <spoyarek> |
| Component: | qpid-cpp | Assignee: | Alan Conway <aconway> |
| Status: | CLOSED ERRATA | QA Contact: | Zdenek Kraus <zkraus> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 1.3 | CC: | aconway, freznice, iboverma, jross, mcressma, mnewsome, pematous, pmoravec, ppecka, rdassen, rrajaram, zkraus |
| Target Milestone: | 2.2 | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | qpid-cpp-0.14-20 | Doc Type: | Bug Fix |
| Doc Text: |
Cause: During an update, ACL rules were preventing access to the cluster-update exchange.
Consequence: new brokers could not join the cluster.
Fix: for catch-up connections, which are authenticated as the cluster-user, allow all access to update state.
Result: Brokers can join the cluster as expected.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2012-09-19 17:19:59 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Bug Depends On: | |||
| Bug Blocks: | 785156, 809460 | ||
|
Description
Siddhesh Poyarekar
2011-03-21 12:16:36 UTC
Fixed on trunk: r1182451 | QPID-3544: ACL denials while replicating exclusive queues to a newly joined node. Note: fix on trunk was incomplete, also need this commit: r1182451 | QPID-3544: ACL denials while replicating exclusive queues to a newly joined node *** Bug 809460 has been marked as a duplicate of this bug. *** Testing Packages: python-qpid-0.14-7.el5 python-qpid-qmf-0.14-12.el5 qpid-cpp-client-0.14-19.el5 qpid-cpp-client-devel-0.14-19.el5 qpid-cpp-client-devel-docs-0.14-19.el5 qpid-cpp-client-ssl-0.14-19.el5 qpid-cpp-mrg-debuginfo-0.14-18.el5 qpid-cpp-server-0.14-19.el5 qpid-cpp-server-cluster-0.14-19.el5 qpid-cpp-server-devel-0.14-19.el5 qpid-cpp-server-ssl-0.14-19.el5 qpid-cpp-server-store-0.14-19.el5 qpid-cpp-server-xml-0.14-19.el5 qpid-qmf-0.14-12.el5 qpid-qmf-devel-0.14-12.el5 qpid-tools-0.14-3.el5 python-qpid-0.14-8.el6 python-qpid-qmf-0.14-12.el6_3 qpid-cpp-client-0.14-19.el6_3 qpid-cpp-client-devel-0.14-19.el6_3 qpid-cpp-client-devel-docs-0.14-19.el6_3 qpid-cpp-server-0.14-19.el6_3 qpid-cpp-server-cluster-0.14-19.el6_3 qpid-cpp-server-devel-0.14-19.el6_3 qpid-cpp-server-store-0.14-19.el6_3 qpid-cpp-server-xml-0.14-19.el6_3 qpid-qmf-0.14-12.el6_3 qpid-tools-0.14-4.el6_3 Tested on RHEL 5.8, RHEL 6.3 && i386, x86_64 We discovered slight problem with fix in 0.14-19: Replication of exclusive Queue is no more denied by ACL, but Queue is replicated as NON-Exclusive, that is incorrect. -> ASSIGNED Not sure why this isn't working but it should not be hard to fix. Please describe how you reproduce the problem, or attach a test case if you have one. 1/ Prepare cluster without authentication, without ACL.
2/ Start node A.
3/ create exclusive Q by python spout:
# ./spout -b user/user@<node_A:port_A> "exclQ.A; {create: sender, delete: receiver, node:{ x-declare:{ auto-delete: false, exclusive: true } } }" "$(date | md5sum)"
4/ Start node B, cluster joining
5/ check created Q is not exclusive on node B
NOTE: authentication has no influence on behaviour in this case.
Fixed on upstream trunk r1367776 Testing packages: python-qpid-0.14-10.el5 python-qpid-qmf-0.14-13.el5 qpid-cpp-client-0.14-20.el5 qpid-cpp-client-devel-0.14-20.el5 qpid-cpp-client-devel-docs-0.14-20.el5 qpid-cpp-client-ssl-0.14-20.el5 qpid-cpp-mrg-debuginfo-0.14-18.el5 qpid-cpp-server-0.14-20.el5 qpid-cpp-server-cluster-0.14-20.el5 qpid-cpp-server-devel-0.14-20.el5 qpid-cpp-server-ssl-0.14-20.el5 qpid-cpp-server-store-0.14-20.el5 qpid-cpp-server-xml-0.14-20.el5 qpid-java-client-0.14-3.el5 qpid-java-common-0.14-3.el5 qpid-java-example-0.14-3.el5 qpid-jca-0.14-8.el5 qpid-jca-xarecovery-0.14-8.el5 qpid-qmf-0.14-13.el5 qpid-qmf-devel-0.14-13.el5 qpid-tools-0.14-5.el5 python-qpid-0.14-10.el6_3 python-qpid-qmf-0.14-13.el6_3 qpid-cpp-client-0.14-20.el6_3 qpid-cpp-client-devel-0.14-20.el6_3 qpid-cpp-client-devel-docs-0.14-20.el6_3 qpid-cpp-server-0.14-20.el6_3 qpid-cpp-server-cluster-0.14-20.el6_3 qpid-cpp-server-devel-0.14-20.el6_3 qpid-cpp-server-store-0.14-20.el6_3 qpid-cpp-server-xml-0.14-20.el6_3 qpid-qmf-0.14-13.el6_3 qpid-tools-0.14-5.el6_3 Tested on RHEL5.8, RHEL6.3 & i686, x86_64 Queue is now correctly replicated as exclusive -> VERIFIED
Technical note added. If any revisions are required, please edit the "Technical Notes" field
accordingly. All revisions will be proofread by the Engineering Content Services team.
New Contents:
Cause: During an update, ACL rules were preventing access to the cluster-update exchange.
Consequence: new brokers could not join the cluster.
Fix: for catch-up connections, which are authenticated as the cluster-user, allow all access to update state.
Result: Brokers can join the cluster as expected.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2012-1277.html |