Actions
Bug #2083
closedrgw: test_object_raw_authenticated* fail (on xfs?)
Status:
Resolved
Priority:
High
Assignee:
-
Target version:
-
% Done:
0%
Source:
Development
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):
Description
This fails sometimes, but not always. It seems to happen more often on xfs, but maybe that's my imagination.
kernel: branch: testing interactive-on-error: true overrides: ceph: branch: master fs: xfs log-whitelist: - clocks not synchronized - old request roles: - - mon.a - mon.c - osd.0 - - mon.b - mds.a - osd.1 - - client.0 tasks: - ceph: null - rgw: - client.0 - s3tests: client.0: rgw_server: client.0
Updated by Yehuda Sadeh about 12 years ago
Not really related to xfs. The problem is that when generating authenticated urls, boto doesn't escape the access key. The teuthology test generates random base64 access key, so from time to time we get access key that has '+' in it.
I'll modify the test to avoid generating such access keys, and add a check in radosgw-admin to disallow such characters.
Updated by Yehuda Sadeh about 12 years ago
- Status changed from New to Resolved
Should be fixed now. Updated relevant teuthology tests to use only url safe chars. Also updated rgw-admin to disallow reserved url chars in access key.
Updated by John Spray over 6 years ago
- Project changed from Ceph to rgw
- Category deleted (
22) - Target version deleted (
v0.43)
Bulk reassign of radosgw category to RGW project.
Actions