Project

General

Profile

Actions

Bug #7450

closed

"radosgw-admin key create" ignores specified access key when subuser specified

Added by Robin Johnson about 10 years ago. Updated about 10 years ago.

Status:
Resolved
Priority:
High
Assignee:
Target version:
-
% Done:

0%

Source:
Community (user)
Tags:
Backport:
Regression:
Severity:
2 - major
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):

Description

If I create to create an explicit accesskey/secret key combo, and specify a subuser, then the access key is not used. If the subuser argument is not used, then the keys are correctly created, but not assigned to the subuser.

  1. ceph --version
    ceph version 0.76 (3b990136bfab74249f166dd742fd8e61637e63d9)
  1. radosgw-admin user create --uid=test --display-name=test { "user_id": "test",
    "display_name": "test",
    "email": "",
    "suspended": 0,
    "max_buckets": 1000,
    "auid": 0,
    "subusers": [],
    "keys": [ { "user": "test",
    "access_key": "2D02WGGD48YBH6EXFMX0",
    "secret_key": "tVGZ14wnjwSkw+4N+zqUYxZ+PzpdHaBHEfgQt3OK"}],
    "swift_keys": [],
    "caps": [],
    "op_mask": "read, write, delete",
    "default_placement": "",
    "placement_tags": [],
    "bucket_quota": { "enabled": false,
    "max_size_kb": -1,
    "max_objects": -1}}
  1. radosgw-admin subuser create --uid=test --subuser=test:test --access=readwrite { "user_id": "test",
    "display_name": "test",
    "email": "",
    "suspended": 0,
    "max_buckets": 1000,
    "auid": 0,
    "subusers": [ { "id": "test:test",
    "permissions": "read-write"}],
    "keys": [ { "user": "test",
    "access_key": "2D02WGGD48YBH6EXFMX0",
    "secret_key": "tVGZ14wnjwSkw+4N+zqUYxZ+PzpdHaBHEfgQt3OK"}],
    "swift_keys": [],
    "caps": [],
    "op_mask": "read, write, delete",
    "default_placement": "",
    "placement_tags": [],
    "bucket_quota": { "enabled": false,
    "max_size_kb": -1,
    "max_objects": -1}}
  1. radosgw-admin key create --uid=test --subuser=test:test --access-key=D4KJW07WJ33T41S2QDF7 --secret "QUIdqQM1hVK9lHU6cZFElaUhti0kCTt3iNRTQorP" { "user_id": "test",
    "display_name": "test",
    "email": "",
    "suspended": 0,
    "max_buckets": 1000,
    "auid": 0,
    "subusers": [ { "id": "test:test",
    "permissions": "read-write"}],
    "keys": [ { "user": "test",
    "access_key": "2D02WGGD48YBH6EXFMX0",
    "secret_key": "tVGZ14wnjwSkw+4N+zqUYxZ+PzpdHaBHEfgQt3OK"}, { "user": "test:test",
    "access_key": "MCCQDZRDNXURNK1DB04R",
    "secret_key": "QUIdqQM1hVK9lHU6cZFElaUhti0kCTt3iNRTQorP"}],
    "swift_keys": [],
    "caps": [],
    "op_mask": "read, write, delete",
    "default_placement": "",
    "placement_tags": [],
    "bucket_quota": { "enabled": false,
    "max_size_kb": -1,
    "max_objects": -1}}
  1. radosgw-admin key create --uid=test --subuser=test:test --access-key=D4KJW07WJ33T41S2QDF7 --secret "QUIdqQM1hVK9lHU6cZFElaUhti0kCTt3iNRTQorP" { "user_id": "test",
    "display_name": "test",
    "email": "",
    "suspended": 0,
    "max_buckets": 1000,
    "auid": 0,
    "subusers": [ { "id": "test:test",
    "permissions": "read-write"}],
    "keys": [ { "user": "test",
    "access_key": "2D02WGGD48YBH6EXFMX0",
    "secret_key": "tVGZ14wnjwSkw+4N+zqUYxZ+PzpdHaBHEfgQt3OK"}, { "user": "test:test",
    "access_key": "CXW5RK6EZ5U500FE9HSK",
    "secret_key": "QUIdqQM1hVK9lHU6cZFElaUhti0kCTt3iNRTQorP"}, { "user": "test:test",
    "access_key": "MCCQDZRDNXURNK1DB04R",
    "secret_key": "QUIdqQM1hVK9lHU6cZFElaUhti0kCTt3iNRTQorP"}],
    "swift_keys": [],
    "caps": [],
    "op_mask": "read, write, delete",
    "default_placement": "",
    "placement_tags": [],
    "bucket_quota": { "enabled": false,
    "max_size_kb": -1,
    "max_objects": -1}}
  1. radosgw-admin key create --uid=test --access-key=D4KJW07WJ33T41S2QDF7 --secret "QUIdqQM1hVK9lHU6cZFElaUhti0kCTt3iNRTQorP" { "user_id": "test",
    "display_name": "test",
    "email": "",
    "suspended": 0,
    "max_buckets": 1000,
    "auid": 0,
    "subusers": [ { "id": "test:test",
    "permissions": "read-write"}],
    "keys": [ { "user": "test",
    "access_key": "2D02WGGD48YBH6EXFMX0",
    "secret_key": "tVGZ14wnjwSkw+4N+zqUYxZ+PzpdHaBHEfgQt3OK"}, { "user": "test:test",
    "access_key": "CXW5RK6EZ5U500FE9HSK",
    "secret_key": "QUIdqQM1hVK9lHU6cZFElaUhti0kCTt3iNRTQorP"}, { "user": "test",
    "access_key": "D4KJW07WJ33T41S2QDF7",
    "secret_key": "QUIdqQM1hVK9lHU6cZFElaUhti0kCTt3iNRTQorP"}, { "user": "test:test",
    "access_key": "MCCQDZRDNXURNK1DB04R",
    "secret_key": "QUIdqQM1hVK9lHU6cZFElaUhti0kCTt3iNRTQorP"}],
    "swift_keys": [],
    "caps": [],
    "op_mask": "read, write, delete",
    "default_placement": "",
    "placement_tags": [],
    "bucket_quota": { "enabled": false,
    "max_size_kb": -1,
    "max_objects": -1}}
Actions

Also available in: Atom PDF