ca7468fd1bf6994ed2c1cf2edb7b5832cf2c7123
2405 Commits
| Author | SHA1 | Message | Date | |
|---|---|---|---|---|
|
Peter Portante
|
37da61bf30 |
Ignore pycscope files
Change-Id: I5fe38f28896d086e56ba9e718b02227d87dd4a2d Signed-off-by: Peter Portante <peter.portante@redhat.com> |
||
|
Eugene Kirpichov
|
772da0a004 |
drop_privileges should also set HOME
E.g. if HOME is not set, swift-proxy will create the keystone_signing file not in HOME but in /root. This is because the swift user doesn't have a shell in /etc/passwd and so it doesn't set environment variables when impersonating. Change-Id: I3013007e0dadf6ddccc176e142b7c78c5d63a351 |
||
|
Jenkins
|
8a6922b73e | Merge "406 if we can't satisfy Accept" | ||
|
Jenkins
|
4f617f49b6 | Merge "Added --top option to swift-recon -d" | ||
|
Michael Barton
|
064ee2b583 |
406 if we can't satisfy Accept
The container and account servers should respond with 406 if the Accept header isn't satisfiable. This behavior is defined in RFC 2616 section 14.1. Change-Id: I8a67ccafe33dc70ef4f7794686a54fbc8581f4dc |
||
|
Jenkins
|
4ac6904793 | Merge "Improve container-sync docs." | ||
|
Guang Yee
|
795acd40f1 |
bp/cross-tenant-acls: allow tenantId:user, tenantName:user, and *:user ALCs
Change-Id: I7cfe77b3f03172814814f2e2bae04a3ae184efb0 |
||
|
gholt
|
6743e4d57f |
Swob bugfixes; for ? in names specifically
It was discovered that uploading items with ? in their names (encoded with %3F of course) made Swob fail in that it trimmed off everything after the ? as if it were a query string. Change-Id: Ie686db9a2177aafad2e77c307ffc3f446646fbb5 |
||
|
gholt
|
18f755a287 |
Added --top option to swift-recon -d
When showing the disk usage dispersion graph it is often useful to know what those top full drives are so you can do further research. Now you can run 'swift-recon -d --top 10' to list the top ten devices by fullness after the usual dispersion graph. Change-Id: I7ddb2141e55e0613f69750fabe544940192c2d48 |
||
|
Jenkins
|
871f552ab6 | Merge "Updates to use new keystoneclient middleware." | ||
|
Jenkins
|
a830b6ffc9 | Merge "Fix for container sync not syncing last rowid" | ||
|
Jenkins
|
02429858de | Merge "Fix bug with swob.Request.path_info_pop" | ||
|
Dan Prince
|
abcd872394 |
Updates to use new keystoneclient middleware.
Updates the proxy-server.conf-sample and docs to use the new Keystoneclient middleware class name. Change-Id: I3727f7b7328a2513347b8ef257c270126df36d7b |
||
|
Jenkins
|
da8578fdde | Merge "Upgrade pep8 to 1.3.3." | ||
|
gholt
|
4063123e3c |
Fix bug with swob.Request.path_info_pop
path_info_pop didn't behave as the webob one did with single segment paths like /one and with root-only paths / Now it should. Change-Id: Ib88344de386ab9e8975e7f48c1afc47731992ee2 |
||
|
Jenkins
|
0b00d0dbce | Merge "added GoLang binding and CDMI to associated projects" | ||
|
John Dickinson
|
46f26b3034 |
added GoLang binding and CDMI to associated projects
Change-Id: I720a0e0e886d25eec52556e8ce93bf9c49f6b452 |
||
|
Jason Johnson
|
48ebd6732e |
Replace hard-coded test accounts with user-configured values
Change-Id: I824ba5f231e252b923abc895f757137855a93d3a |
||
|
Samuel Merritt
|
35f4d29ed6 |
Upgrade pep8 to 1.3.3.
This required a bunch of whitespace-poking of the scripts in bin, but that's all. Now every file in swift/ and bin/ is pep8-1.3.3-compliant, so hopefully we can be done with this pep8 stuff for a good long time. Change-Id: I44fdb41d219c57400a4c396ab7eb0ffa9dcd8db8 |
||
|
Jenkins
|
2ad23a25e8 | Merge "pep8 db.py" | ||
|
Jenkins
|
67201c3159 | Merge "pep8 direct client" | ||
|
Samuel Merritt
|
89a871d42f |
Improve container-sync docs.
Two improvements: first, document that the container-sync process connects to the remote cluster's proxy server, so outbound connectivity is required. Second, rewrite the behind-the-scenes container-sync example and add some ASCII-art diagrams. Fixes bug 1068430. Bonus fix of docstring in wsgi.py to squelch a sphinx warning. Change-Id: I85bd56c2bd14431e13f7c57a43852777f14014fb |
||
|
Samuel Merritt
|
fdf55c2817 |
Add CONTRIBUTING file.
If the CONTRIBUTING[.md] file exists, Github will show a link to it to anyone who files an issue on Github or opens a pull request on Github. We don't want people to do that, so this file points people at the OpenStack wiki page with instructions on how to contribute properly. This should cut down on the number of pull requests and Github issues that we then have to spend our valuable time ignoring. See also <https://github.com/blog/1184-contributing-guidelines>. Change-Id: Icd23b65c642c5ae748ca1f7f397e2c8d63173492 |
||
|
Jenkins
|
2fc9716ec9 | Merge "pep8 middleware" | ||
|
John Dickinson
|
1f7be20a91 |
pep8 middleware
Change-Id: Ieef65f05e66b12347752c0e02648858e3242d8e7 |
||
|
John Dickinson
|
c46033a9a7 |
pep8 db.py
Change-Id: I2ae277b6f435f56549560684697486b56d24d46d |
||
|
John Dickinson
|
3aab2488b2 |
pep8 direct client
Change-Id: I1ed6afe4336c238044174c93ae1e0078fbcef971 |
||
|
John Dickinson
|
f74ef1e396 |
pep8 utils.py
Change-Id: I0466fd2a462e94e5a1e0f88adf901de9f5ac131d |
||
|
Dan Hersam
|
923b8b95c3 |
Fix for container sync not syncing last rowid
Bug 1079439 Change-Id: I1985a7176f34931ecb0f24c0289f18df5e934598 |
||
|
Jenkins
|
cb55f0c3a8 | Merge "Fix lazy-listing of object segments." | ||
|
Samuel Merritt
|
357b12dc2b |
Remove IP-based container-sync ACLs from auth middlewares.
The determination of the client IP looked at the X-Cluster-Client-Ip and X-Forwarded-For headers in the incoming HTTP request. This is trivially spoofable by a malicious client, so there's no security gained by having the check there. Worse, having the check there provides a false sense of security to cluster operators. It sounds like it's based on the client IP, so an attacker would have to do IP spoofing to defeat it. However, it's really just a shared secret, and there's already a secret key set up. Basically, it looks like 2-factor auth (IP+key), but it's really 1-factor (key). Now, the one case where this might provide some security is where the Swift cluster is behind an external load balancer that strips off the X-Cluster-Client-Ip and X-Forwarded-For headers and substitutes its own. I don't think it's worth the tradeoff, hence this commit. Fixes bug 1068420 for very small values of "fixes". DocImpact Change-Id: I2bef64c2e1e4df8a612a5531a35721202deb6964 |
||
|
Jenkins
|
d13869e64b | Merge "Refactor DiskFile to hide temp file names and exts" | ||
|
Jenkins
|
ac7829f370 | Merge "check response status in WSGIContext._app_call" | ||
|
Jenkins
|
4e2ffff606 | Merge "Use a delta timeout for memcache where possible" | ||
|
Samuel Merritt
|
83bbd0aef2 |
Fix lazy-listing of object segments.
When responding to a GET request for a manifest, it was intended that
the proxy server lazily fetch the pieces of the container
listing. That way, a single client request doesn't immediately turn
into a bunch of requests to backends. The additional requests should
only get made if the client is putting in the work of receiving the
object body.
However, commit
|
||
|
Jenkins
|
4d50728c8e | Merge "change catch_errors to use WSGIContext" | ||
|
Peter Portante
|
1ac7b88a27 |
Use a delta timeout for memcache where possible
We use a delta timeout value for timeouts under 30 days (in seconds) since that is the limit which the memcached protocols will recognize a timeout as a delta. Greater than 30 days and it interprets it as an absolute time in seconds since the epoch. This helps to address an often difficult-to-debug problem of time drift between memcache clients and the memcache servers. Prior to this change, if a client's time drifts behind the servers, short timeouts run the danger of not being cached at all. If a client's time drifts ahead of the servers, short timeouts run the danger of persisting too long. Using delta's avoids this affect. For absolute timeouts 30 days or more in the future small time drifts between clients and servers are inconsequential. See also bug 1076148 (https://bugs.launchpad.net/swift/+bug/1076148). This also fixes incr and decr to handle timeout values in the same way timeouts are handled for set operations. Change-Id: Ie36dbcedfe9b4db9f77ed4ea9b70ff86c5773310 Signed-off-by: Peter Portante <peter.portante@redhat.com> |
||
|
Jenkins
|
ac91ab9e9d | Merge "Refactor http_connect() to use http_connect_raw()" | ||
|
Jenkins
|
1db500839d | Merge "Updating doc reflecting the move of auth_token." | ||
|
Peter Portante
|
259aafb6f0 |
Refactor http_connect() to use http_connect_raw()
Change-Id: I889c5eecf860cc947763c5d79148419f9741a2c2 Signed-off-by: Peter Portante <peter.portante@redhat.com> |
||
|
Chmouel Boudjnah
|
101f566e92 |
Updating doc reflecting the move of auth_token.
The auth_token middleware has moved, updating the doc. Change-Id: I8133b876a53d61bf94169cf08c8b1fa6bbf9681a |
||
|
Jenkins
|
c85d2ace93 | Merge "Refactor db_replicator's roundrobin_datadirs" | ||
|
Jenkins
|
e9a41ed550 | Merge "Remove outdated Debian packaging guide." | ||
|
gholt
|
4e5889d6ce |
Refactor db_replicator's roundrobin_datadirs
roundrobin_datadirs was returning any .db file at any depth in the accounts/containers structure. Since xfs corruption can cause such files to appear in odd places at times (only happened on one drive of ours so far, but still...), I've refactored this function to only return .db files at the proper depth. Change-Id: Id06ef6584941f8a572e286f69dfa3d96fe451355 |
||
|
John Dickinson
|
20d4b00645 |
change catch_errors to use WSGIContext
The current catch_errors (ie without this patch) relinquishes control before the underlying middleware/app has been evaluated. This results in not catching errors in the stack when they occur in either the start_response or in generating the first chunk sent to the client of the underlying stack. Change-Id: Iecd21e4fc7e30fa20239d011f69216354b50baf1 |
||
|
Peter Portante
|
7d70e05aeb |
Refactor DiskFile to hide temp file names and exts
This set of changes reworks the DiskFile class to remove the "extension" parameter from the put() method, offering the new put_metadata() method with an optional tombstone keyword boolean, and changes the mkstemp method to only return the file descriptor. Reviewing the code it was found that the temporary file name created as a result of calling DiskFile.mkstemp() was never used by the caller, but the caller was responsible for passing it back to the DiskFile.put() method. That seems like too much information is exposed to the caller, when all the caller requires is the file descriptor to write data into it. Upon further review, the mkstemp() method was used in three places: PUT, POST and DELETE method handling. Of those three cases, only PUT requires the file descriptor, since it is responsible for writing the object contents. For POST and DELETE, DiskFile only needs to associate metadata with the correct file name. We abstract the pattern that those two use (once we also refactor the code to move the fetch of the delete-at metadata, and subsequent delete-at-update initiation, from under the mkstemp context) by adding the new put_metadata() method. As a result, the DiskFile class is then free to do whatever file system operations it must to meet the API, without the caller having to know more than just how to write data to a file descriptor. Note that DiskFile itself key'd off of the '.ts' and '.meta' extensions for its operations, and for that to work properly, the caller had to know to use those correctly. With this change, the caller has no knowledge of how the file system is being used to accomplish data and metadata storage. See also Question 213796 at: https://answers.launchpad.net/swift/+question/213796 Change-Id: I267f68e64391ba627b2a13682393bec62600159d Signed-off-by: Peter Portante <peter.portante@redhat.com> |
||
|
Jenkins
|
3a806a805c | Merge "Fix 500 on GET of many-segment manifest." | ||
|
Jenkins
|
6b8f966364 | Merge "Better TempAuth storage URL guessing" | ||
|
Michael Barton
|
5c8f9c52e3 |
check response status in WSGIContext._app_call
Only re-chain response iter if start_response hasn't been called yet. Change-Id: I9670f49419104fb8f949e6edc12d9047d1289cde |
||
|
Alex Yang
|
1701b6bc24 |
fix bug in deleting account memcache.
Every request of container and object will invoke account_info() or
container_info() to query the meta of account and container. The meta
will be cached in memcache with the key 'account/{$account}' or
'container/{$container}', So, if any request to update account and
container, we should delete the cache. But in the cache deletion of
account, it use the wrong key 'account/v1/{$account}'. This could lead
to inconsistency of account meta.
Change-Id: Ied116a58a2d5866ac76d75ae50f21277d66e5755
|