Ceph : Issueshttps://tracker.ceph.com/https://tracker.ceph.com/favicon.ico2018-05-09T16:36:15ZCeph
Redmine rgw - Bug #24061 (Resolved): Misnamed S3 operationhttps://tracker.ceph.com/issues/240612018-05-09T16:36:15ZAdam Emersonaemerson@redhat.com
<p>s3:ListBucketMultiPartUploads should be s3:ListBucketMultipartUploads</p>
<p>Fixed in <a class="external" href="https://github.com/ceph/ceph/pull/20974">https://github.com/ceph/ceph/pull/20974</a></p> rgw - Backport #22955 (Resolved): luminous: rgw: Command to inspect the RGW cachehttps://tracker.ceph.com/issues/229552018-02-07T21:29:12ZAdam Emersonaemerson@redhat.com
<p>Easiest to do first, I'll just walk the cache, print the name of each object and what hangs off it. Maybe dump the complete entry for any object specified by name.</p>
<p><a class="external" href="https://github.com/ceph/ceph/pull/20353">https://github.com/ceph/ceph/pull/20353</a></p> rgw - Backport #22954 (Resolved): luminous: rgw: Command to invalidate cachehttps://tracker.ceph.com/issues/229542018-02-07T21:27:09ZAdam Emersonaemerson@redhat.com
<p>The original request was to use the radosgw-admin tool to invalidate cache, but this doesn't fit the RGW architecture well. Instead we'll make it a command in the admin hook.</p>
<p>Backport PR at: <a class="external" href="https://github.com/ceph/ceph/pull/20353">https://github.com/ceph/ceph/pull/20353</a></p> rgw - Backport #22618 (Resolved): luminous: put bucket policy panics RGW processhttps://tracker.ceph.com/issues/226182018-01-08T18:32:16ZAdam Emersonaemerson@redhat.com
<p><a class="external" href="https://github.com/ceph/ceph/pull/19847">https://github.com/ceph/ceph/pull/19847</a></p> rgw - Feature #22604 (Resolved): Command to inspect the RGW cachehttps://tracker.ceph.com/issues/226042018-01-05T22:37:58ZAdam Emersonaemerson@redhat.com
<p>Easiest to do first, I'll just walk the cache, print the name of each object and what hangs off it. Maybe dump the complete entry for any object specified by name.</p> rgw - Feature #22603 (Resolved): Command to invalidate cachehttps://tracker.ceph.com/issues/226032018-01-05T22:29:55ZAdam Emersonaemerson@redhat.com
<p>The original request was to use the radosgw-admin tool to invalidate cache, but this doesn't fit the RGW architecture well. Instead we'll make it a command in the admin hook.</p> rgw - Backport #22602 (Resolved): luminous: Bucket Policy Evaluation Logical Errorhttps://tracker.ceph.com/issues/226022018-01-05T21:34:07ZAdam Emersonaemerson@redhat.com
<p><a class="external" href="https://github.com/ceph/ceph/pull/19810">https://github.com/ceph/ceph/pull/19810</a></p> rgw - Backport #22601 (Resolved): luminous: S3 API Policy Conditions IpAddress and NotIpAddress d...https://tracker.ceph.com/issues/226012018-01-05T21:18:03ZAdam Emersonaemerson@redhat.com
<p><a class="external" href="https://github.com/ceph/ceph/pull/19819">https://github.com/ceph/ceph/pull/19819</a></p> rgw - Bug #22517 (Resolved): Cache never becoming consistent after failed updateshttps://tracker.ceph.com/issues/225172017-12-20T21:47:40ZAdam Emersonaemerson@redhat.com
<p>This seems to happen with redundant POST/PUT requests on an existing container. The issue has been found during upload of an object on an existing container using python-swiftclient.</p>
<p><a class="external" href="https://github.com/ceph/ceph/pull/18954">https://github.com/ceph/ceph/pull/18954</a><br /><a class="external" href="https://github.com/ceph/ceph/pull/19581">https://github.com/ceph/ceph/pull/19581</a></p> rgw - Bug #21962 (Resolved): Policy parser may or may not dereference uninitialized boost::option...https://tracker.ceph.com/issues/219622017-10-27T22:25:32ZAdam Emersonaemerson@redhat.comrgw - Bug #21896 (Resolved): Bucket policy evaluation is not carried out for DeleteBucketWebsitehttps://tracker.ceph.com/issues/218962017-10-23T20:09:05ZAdam Emersonaemerson@redhat.comrgw - Bug #21597 (Resolved): s3:GetBucketWebsite/PutBucketWebsite fails with 403https://tracker.ceph.com/issues/215972017-09-28T17:41:50ZAdam Emersonaemerson@redhat.com
<p>From <a class="external" href="https://bugzilla.redhat.com/show_bug.cgi?id=1493896">https://bugzilla.redhat.com/show_bug.cgi?id=1493896</a></p>
<p>Description of problem:<br />After setting the policy, configure_website() and get_website_configuration() fail to work.</p>
<p>Version-Release number of selected component (if applicable):<br />ceph-radosgw-12.2.0-2.el7cp.x86_64</p>
<p>How reproducible:<br />Always</p>
<p>Steps to Reproduce:<br />1. Create a bucket with tenant user testx$tester<br />2. Write a bucket policy providing s3:GetBucketWebsite/s3:PutBucketWebsite to another user in the same or different tenant<br />3. After setting the policy, try enabling/getting static website configuration on the bucket</p>
<p>Actual results:<br />S3ResponseError: 403 Forbidden</p>
<p>Expected results:<br />Website configuration should work</p>
<p>Additional info:
{<br /> "Version": "2012-10-17",<br /> "Statement": [{<br /> "Effect": "Allow",<br /> "Principal": {"AWS": ["arn:aws:iam::testy:user/u2"]},<br /> "Action": ["s3:ListBucket", "s3:PutObject", "s3:GetBucketWebsite", "s3:PutBucketWebsite"],<br /> "Resource": [<br /> "arn:aws:s3::*:s3website",<br /> "arn:aws:s3::*:s3website/*" <br /> ]<br /> }]<br />}</p>
<ol>
<li>s3cmd -c s3test.cfg setpolicy getwebsite s3://s3website</li>
</ol>
<p>#s3website.py<br />website_bucket = conn.get_bucket("testx:s3website")<br />index_key = website_bucket.new_key('index.html')<br />index_key.content_type = 'text/html'<br />index_key.set_contents_from_filename('index.html',policy='public-read')</p>
<p>website_bucket.configure_website('index.html')<br />website_bucket.get_website_configuration()</p> rgw - Bug #21582 (Resolved): s3:GetBucketLocation bucket policy fails with 403https://tracker.ceph.com/issues/215822017-09-27T20:07:18ZAdam Emersonaemerson@redhat.com
<p>After setting the policy, get_location() on the bucket fails to work.</p>
<p>Version-Release number of selected component (if applicable):<br />ceph-radosgw-12.2.0-2.el7cp.x86_64</p>
<p>How reproducible:<br />Always</p>
<p>Steps to Reproduce:<br />1. Create a bucket with tenant user testx$tester<br />2. Write a bucket policy providing s3:GetBucketLocation to another user in the same or different tenant<br />3. After setting the policy, try doing a get_location() on the bucket with the permitted user credentials.</p>
<p>Actual results:<br />S3ResponseError: 403 Forbidden</p>
<p>Additional info:
{<br /> "Version": "2012-10-17",<br /> "Statement": [{<br /> "Effect": "Allow",<br /> "Principal": {"AWS": ["arn:aws:iam::testy:user/u2"]},<br /> "Action": ["s3:ListBucket", "s3:GetBucketLocation"],<br /> "Resource": [<br /> "arn:aws:s3::*:location-bucket",<br /> "arn:aws:s3::*:location-bucket/*" <br /> ]<br /> }]<br />}</p>
<p>b = conn.get_bucket("testx:location-bucket")<br />print b.get_location()</p>
<ol>
<li>python getlocation.py</li>
</ol> rgw - Bug #21578 (Resolved): s3:GetBucketCORS/s3:PutBucketCORS policy fails with 403https://tracker.ceph.com/issues/215782017-09-27T18:49:16ZAdam Emersonaemerson@redhat.com
<p>Upstream counterpart to Red Had Bugzilla #1494140</p>
<p>After setting the policy, set_cors_xml()/set_cors() or get_cors_xml()/get_cors() fail to work.</p>
<p>Version-Release number of selected component (if applicable):<br />ceph-radosgw-12.2.0-2.el7cp.x86_64</p>
<p>How reproducible:<br />Always</p>
<p>Steps to Reproduce:<br />1. Create a bucket with tenant user testx$tester<br />2. Write a bucket policy providing s3:GetBucketCORS/s3:PutBucketCORS to another user in the same or different tenant<br />3. After setting the policy, try setting/getting CORS configuration on the bucket using the permitted user credentials</p>
<p>Actual results:<br />S3ResponseError: 403 Forbidden</p>
<p>Expected results:<br />Should successfully allow the user to set/get CORS configuration.</p>
<p>Additional info:</p>
<p>Bucket policy:</p>
<p>{<br /> "Version": "2012-10-17",<br /> "Statement": [{<br /> "Effect": "Allow",<br /> "Principal": {"AWS": ["arn:aws:iam::testy:user/u2"]},<br /> "Action": ["s3:ListBucket", "s3:GetBucketCORS", "s3:PutBucketCORS"],<br /> "Resource": [<br /> "arn:aws:s3::*:my-bucket",<br /> "arn:aws:s3::*:my-bucket/*" <br /> ]<br /> }]<br />}</p>
<ol>
<li>s3cmd -c s3test.cfg setpolicy getputcors s3://my-bucket</li>
</ol>
<p>Boto script with the user credentials of testy$u2:</p>
<p>b = conn.get_bucket("testx:my-bucket")</p>
<p>cors_conf = """ <br /><CORSConfiguration><br /> <CORSRule><br /> <AllowedOrigin>*</AllowedOrigin><br /> <AllowedMethod>PUT</AllowedMethod><br /> <AllowedMethod>POST</AllowedMethod><br /> <AllowedMethod>DELETE</AllowedMethod><br /> <AllowedHeader>*</AllowedHeader><br /> </CORSRule><br /></CORSConfiguration><br />""" <br />b.set_cors_xml(cors_conf)<br />print b.get_cors()</p> mgr - Bug #20322 (Rejected): All cephtool tests fail on master with "tell mgr.x restful create-ke...https://tracker.ceph.com/issues/203222017-06-15T17:40:49ZAdam Emersonaemerson@redhat.com
<p>Attempting to run make check on my local machine (or ctest), I get failures in cephtool-test-mds.sh, cephtool-test-mon.sh, cephtool-test-osd.sh, cephtool-test-rados.sh</p>
<p>Kefu Chai suggested it was a race condition, with the tests starting before ceph-mgr was able to run.</p>