Project

General

Profile

Actions

Bug #2083

closed

rgw: test_object_raw_authenticated* fail (on xfs?)

Added by Sage Weil about 12 years ago. Updated over 6 years ago.

Status:
Resolved
Priority:
High
Assignee:
-
Target version:
-
% Done:

0%

Source:
Development
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):

Description

This fails sometimes, but not always. It seems to happen more often on xfs, but maybe that's my imagination.

kernel:
  branch: testing
interactive-on-error: true
overrides:
  ceph:
    branch: master
    fs: xfs
    log-whitelist:
    - clocks not synchronized
    - old request
roles:
- - mon.a
  - mon.c
  - osd.0
- - mon.b
  - mds.a
  - osd.1
- - client.0
tasks:
- ceph: null
- rgw:
  - client.0
- s3tests:
    client.0:
      rgw_server: client.0

Actions #1

Updated by Yehuda Sadeh about 12 years ago

Not really related to xfs. The problem is that when generating authenticated urls, boto doesn't escape the access key. The teuthology test generates random base64 access key, so from time to time we get access key that has '+' in it.
I'll modify the test to avoid generating such access keys, and add a check in radosgw-admin to disallow such characters.

Actions #2

Updated by Anonymous about 12 years ago

  • Source set to Development
Actions #3

Updated by Yehuda Sadeh about 12 years ago

  • Status changed from New to Resolved

Should be fixed now. Updated relevant teuthology tests to use only url safe chars. Also updated rgw-admin to disallow reserved url chars in access key.

Actions #4

Updated by John Spray over 6 years ago

  • Project changed from Ceph to rgw
  • Category deleted (22)
  • Target version deleted (v0.43)

Bulk reassign of radosgw category to RGW project.

Actions

Also available in: Atom PDF