Project

General

Profile

Actions

Bug #980

closed

radosgw returns access_key instead of user_id when fetching acl

Added by Anonymous about 13 years ago. Updated over 6 years ago.

Status:
Resolved
Priority:
Normal
Assignee:
-
Target version:
-
% Done:

0%

Source:
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):

Description

from s3-tests: bucket.get_acl() on AWS returns the user_id (typically a 64-char hexstring), not the access_key

def test_bucket_acl_default():
    bucket = get_new_bucket()
    policy = bucket.get_acl()
    print repr(policy)
    eq(policy.owner.type, None)
    eq(policy.owner.id, config.main.user_id)
    eq(policy.owner.display_name, config.main.display_name)
    eq(len(policy.acl.grants), 1)
    eq(policy.acl.grants[0].permission, 'FULL_CONTROL')
    eq(policy.acl.grants[0].id, policy.owner.id)
    eq(policy.acl.grants[0].display_name, policy.owner.display_name)
    eq(policy.acl.grants[0].uri, None)
    eq(policy.acl.grants[0].email_address, None)
    eq(policy.acl.grants[0].type, 'CanonicalUser')

$ S3TEST_CONF=tv.conf ./virtualenv/bin/nosetests test_s3:test_bucket_acl_default
F
======================================================================
FAIL: test_s3.test_bucket_acl_default
----------------------------------------------------------------------
Traceback (most recent call last):
  File "/home/tv/src/s3-tests.git/virtualenv/lib/python2.6/site-packages/nose/case.py", line 187, in runTest
    self.test(*self.arg)
  File "/home/tv/src/s3-tests.git/test_s3.py", line 416, in test_bucket_acl_default
    eq(policy.owner.id, config.main.user_id)
  File "/home/tv/src/s3-tests.git/virtualenv/lib/python2.6/site-packages/nose/tools.py", line 31, in eq_
    assert a == b, msg or "%r != %r" % (a, b)
AssertionError: u'O54XVCC9MQ9Q72TWP5Y1' != 'foo'
-------------------- >> begin captured stdout << ---------------------
<Policy: Mr. Foo (owner) = FULL_CONTROL>

--------------------- >> end captured stdout << ----------------------
-------------------- >> begin captured logging << --------------------
boto: DEBUG: path=/
boto: DEBUG: auth_path=/
boto: DEBUG: Canonical: GET

Tue, 05 Apr 2011 17:13:52 GMT
/
boto: DEBUG: Method: GET
boto: DEBUG: Path: /
boto: DEBUG: Data: 
boto: DEBUG: Headers: {'Date': 'Tue, 05 Apr 2011 17:13:52 GMT', 'Content-Length': '0', 'Authorization': 'AWS TKKZ1DX83O7ZCTWHE0YD:vdkB58RfkV02f7WnKh2gedBBD/s=', 'User-Agent': 'Boto/2.0b4 (linux2)'}
boto: DEBUG: Host: localhost:7280
boto: DEBUG: establishing HTTP connection
boto: DEBUG: path=/
boto: DEBUG: auth_path=/
boto: DEBUG: Canonical: GET

Tue, 05 Apr 2011 17:13:53 GMT
/
boto: DEBUG: Method: GET
boto: DEBUG: Path: /
boto: DEBUG: Data: 
boto: DEBUG: Headers: {'Date': 'Tue, 05 Apr 2011 17:13:53 GMT', 'Content-Length': '0', 'Authorization': 'AWS O54XVCC9MQ9Q72TWP5Y1:poqvs6UBeHJf9UIE5JiM7nUc+bY=', 'User-Agent': 'Boto/2.0b4 (linux2)'}
boto: DEBUG: Host: localhost:7280
boto: DEBUG: establishing HTTP connection
boto: DEBUG: path=/test-tv-212pjqrynmm1l2iblwhyj-1/
boto: DEBUG: auth_path=/test-tv-212pjqrynmm1l2iblwhyj-1/
boto: DEBUG: Canonical: PUT

Tue, 05 Apr 2011 17:13:53 GMT
/test-tv-212pjqrynmm1l2iblwhyj-1/
boto: DEBUG: Method: PUT
boto: DEBUG: Path: /test-tv-212pjqrynmm1l2iblwhyj-1/
boto: DEBUG: Data: 
boto: DEBUG: Headers: {'Date': 'Tue, 05 Apr 2011 17:13:53 GMT', 'Content-Length': '0', 'Authorization': 'AWS O54XVCC9MQ9Q72TWP5Y1:AjA3gY7uz1JJzs8Q05AhgDQGoQU=', 'User-Agent': 'Boto/2.0b4 (linux2)'}
boto: DEBUG: Host: localhost:7280
boto: DEBUG: path=/test-tv-212pjqrynmm1l2iblwhyj-1/
boto: DEBUG: auth_path=/test-tv-212pjqrynmm1l2iblwhyj-1/
boto: DEBUG: path=/test-tv-212pjqrynmm1l2iblwhyj-1/?acl
boto: DEBUG: auth_path=/test-tv-212pjqrynmm1l2iblwhyj-1/?acl
boto: DEBUG: Canonical: GET

Tue, 05 Apr 2011 17:13:54 GMT
/test-tv-212pjqrynmm1l2iblwhyj-1/?acl
boto: DEBUG: Method: GET
boto: DEBUG: Path: /test-tv-212pjqrynmm1l2iblwhyj-1/?acl
boto: DEBUG: Data: 
boto: DEBUG: Headers: {'Date': 'Tue, 05 Apr 2011 17:13:54 GMT', 'Content-Length': '0', 'Authorization': 'AWS O54XVCC9MQ9Q72TWP5Y1:Ex6BiojwdOr7WudkG7/BQ2FMfM8=', 'User-Agent': 'Boto/2.0b4 (linux2)'}
boto: DEBUG: Host: localhost:7280
--------------------- >> end captured logging << ---------------------

----------------------------------------------------------------------
Ran 1 test in 7.831s

FAILED (failures=1)
Actions #1

Updated by Sage Weil about 13 years ago

  • Target version set to v0.28
Actions #2

Updated by Sage Weil about 13 years ago

  • Translation missing: en.field_position set to 3
Actions #3

Updated by Yehuda Sadeh about 13 years ago

  • Status changed from New to Resolved

Fixed as of commit:796528c3db66d63d0bd75c880cb871d5e4f0322a.

Actions #4

Updated by Sage Weil about 13 years ago

  • Target version changed from v0.28 to v0.27
  • Translation missing: en.field_position deleted (8)
  • Translation missing: en.field_position set to 1
  • Translation missing: en.field_position changed from 1 to 633
Actions #5

Updated by Sage Weil about 13 years ago

  • Translation missing: en.field_story_points set to 2
  • Translation missing: en.field_position deleted (633)
  • Translation missing: en.field_position set to 1
  • Translation missing: en.field_position changed from 1 to 633
Actions #6

Updated by John Spray over 6 years ago

  • Project changed from Ceph to rgw
  • Category deleted (22)
  • Target version deleted (v0.27)

Bulk reassign of radosgw category to RGW project.

Actions

Also available in: Atom PDF