Ceph : Issues
https://tracker.ceph.com/
https://tracker.ceph.com/favicon.ico
2017-12-26T08:59:37Z
Ceph
Redmine
rgw - Bug #22541 (Resolved): put bucket policy panics RGW process
https://tracker.ceph.com/issues/22541
2017-12-26T08:59:37Z
芽亮 豆
<p>When put bucket policy with invalid effect, the RGW process panics with "Segmentation fault".</p>
<p>Example bucket policy
{<br /> 'Statement':[{<br /> 'Effect':'All',<br /> }]<br />}</p>
<p>RGW panic trace<br /> 0> 2017-12-26 15:05:52.479 7f45b4e33700 -1 *<strong>* Caught signal (Segmentation fault) *</strong><br /> in thread 7f45b4e33700 thread_name:civetweb-worker</p>
<pre><code>ceph version 13.0.0-4024-g0ba3308 (0ba33080769d8aa696b7e704c01edf5c05cab6c1) mimic (dev)<br /> 1: (()+0x1f9bec) [0x556929ae0bec]<br /> 2: (()+0x11390) [0x7f45edda6390]<br /> 3: (rgw::IAM::ParseState::do_string(CephContext*, char const*, unsigned long)+0x200) [0x556929d59030]<br /> 4: (void rapidjson::GenericReader&lt;rapidjson::UTF8&lt;char&gt;, rapidjson::UTF8&lt;char&gt;, rapidjson::CrtAllocator>::ParseString&lt;96u, rapidjson::GenericStringStream&lt;rapidjson::UTF8&lt;char&gt; >, rgw::IAM::PolicyParser>(rapidjson::GenericStringStream&lt;rapidjson::UTF8&lt;char&gt; >&, rgw::IAM::PolicyParser&, bool)+0x11a) [0x556929d6457a]<br /> 5: (void rapidjson::GenericReader&lt;rapidjson::UTF8&lt;char&gt;, rapidjson::UTF8&lt;char&gt;, rapidjson::CrtAllocator>::ParseObject&lt;96u, rapidjson::GenericStringStream&lt;rapidjson::UTF8&lt;char&gt; >, rgw::IAM::PolicyParser>(rapidjson::GenericStringStream&lt;rapidjson::UTF8&lt;char&gt; >&, rgw::IAM::PolicyParser&)+0x147) [0x556929d650d7]<br /> 6: (void rapidjson::GenericReader&lt;rapidjson::UTF8&lt;char&gt;, rapidjson::UTF8&lt;char&gt;, rapidjson::CrtAllocator>::ParseValue&lt;96u, rapidjson::GenericStringStream&lt;rapidjson::UTF8&lt;char&gt; >, rgw::IAM::PolicyParser>(rapidjson::GenericStringStream&lt;rapidjson::UTF8&lt;char&gt; >&, rgw::IAM::PolicyParser&)+0x156) [0x556929d64cb6]<br /> 7: (void rapidjson::GenericReader&lt;rapidjson::UTF8&lt;char&gt;, rapidjson::UTF8&lt;char&gt;, rapidjson::CrtAllocator>::ParseObject&lt;96u, rapidjson::GenericStringStream&lt;rapidjson::UTF8&lt;char&gt; >, rgw::IAM::PolicyParser>(rapidjson::GenericStringStream&lt;rapidjson::UTF8&lt;char&gt; >&, rgw::IAM::PolicyParser&)+0x147) [0x556929d650d7]<br /> 8: (rgw::IAM::Policy::Policy(CephContext*, std::__cxx11::basic_string&lt;char, std::char_traits&lt;char&gt;, std::allocator&lt;char&gt; > const&, ceph::buffer::list const&)+0x123) [0x556929d5a7e3]<br /> 9: (RGWPutBucketPolicy::execute()+0x97) [0x556929bbb907]<br /> 10: (rgw_process_authenticated(RGWHandler_REST*, RGWOp*&, RGWRequest*, req_state*, bool)+0x14f) [0x556929becfbf]<br /> 11: (process_request(RGWRados*, RGWREST*, RGWRequest*, std::__cxx11::basic_string&lt;char, std::char_traits&lt;char&gt;, std::allocator&lt;char&gt; > const&, rgw::auth::StrategyRegistry const&, RGWRestfulIO*, OpsLogSocket*)+0x186c) [0x556929beea3c]<br /> 12: (RGWCivetWebFrontend::process(mg_connection*)+0x39c) [0x556929a991fc]<br /> 13: (()+0x1eb189) [0x556929ad2189]<br /> 14: (()+0x1ecb59) [0x556929ad3b59]<br /> 15: (()+0x76ba) [0x7f45edd9c6ba]<br /> 16: (clone()+0x6d) [0x7f45e39a63dd]<br /> NOTE: a copy of the executable, or `objdump -rdS &lt;executable&gt;` is needed to interpret this.</code></pre>
rgw - Bug #22439 (Resolved): The return value of auth v2/v4 in RGW is wrong when Expires/X-Amz-Ex...
https://tracker.ceph.com/issues/22439
2017-12-14T07:45:21Z
芽亮 豆
The return value of auth v2/v4 in RGW is different from that in AWS:
<ul>
<li>When 'Expires' is missing in auth v2 query string request, AWS returns AccessDenied while RGW returns SignatureDoesNotMatch;</li>
<li>When 'X-Amz-Expires' is missing in auth v4 query string request, AWS returns AuthorizationQueryParametersError while RGW returns RequestTimeTooSkewed;</li>
</ul>
rgw - Bug #22418 (Resolved): RGW doesn't check time skew in auth v4 http header request
https://tracker.ceph.com/issues/22418
2017-12-13T09:44:19Z
芽亮 豆
<p>In auth v4 http header request, RGW doesn't check time skew, while AWS does.</p>