Wednesday, 2018-12-26

*** kei-ichi has joined #openstack-swift00:43
notmynamemerry christmasa01:07
notmynameviks__: re account undeletes, you will like https://review.openstack.org/#/c/507808/ (and I'd like to see it land sometime soon)01:09
patchbotpatch 507808 - swift - Add ability to undelete an account. - 19 patch sets01:09
openstackgerritKazuhiro MIYAHARA proposed openstack/swift master: Enable to configure object-expirer in object-server.conf  https://review.openstack.org/60195002:41
*** psachin has joined #openstack-swift02:51
viks__notmyname: ok... thank you04:22
openstackgerritKazuhiro MIYAHARA proposed openstack/swift master: Enable to configure object-expirer in object-server.conf  https://review.openstack.org/60195004:29
openstackgerritKazuhiro MIYAHARA proposed openstack/swift master: Enable to configure object-expirer in object-server.conf  https://review.openstack.org/60195004:52
openstackgerritKazuhiro MIYAHARA proposed openstack/swift master: Add object-expirer new mode to execute tasks from general task queue  https://review.openstack.org/51738905:32
*** galaxyblr has joined #openstack-swift06:18
openstackgerritKazuhiro MIYAHARA proposed openstack/swift master: Add object-expirer new mode to execute tasks from general task queue  https://review.openstack.org/51738906:30
viks__DHE: notmyname : I have an `admin` user which has reseller admin role on the default domain. So with domain scoped token, i can access containers and object of all the projects in that domain. I can delete objects and containers of any projects in the default domain. But if i try to issue `DELETE`  for account as you have mentioned, it gives the following response:06:36
viks__i.e. `curl -g -i -X  DELETE -H "X-Auth-Token: $TOKEN" "https://<HOSTNAME/IP>/v1/$PROJECT_ID"`06:36
viks__```06:36
viks__HTTP/1.1 405 Method Not Allowed06:36
viks__Content-Length: 9106:36
viks__Content-Type: text/html; charset=UTF-806:36
viks__Allow: HEAD, GET, POST, OPTIONS06:36
viks__X-Trans-Id: tx828f868473d145a3bbd58-005c231a0706:36
viks__X-Openstack-Request-Id: tx828f868473d145a3bbd58-005c231a0706:36
viks__Date: Wed, 26 Dec 2018 06:04:55 GMT06:36
viks__<html><h1>Method Not Allowed</h1><p>The method is not allowed for this resource.</p></html>06:36
viks__```06:36
*** galaxyblr has quit IRC07:24
openstackgerritKazuhiro MIYAHARA proposed openstack/swift master: Add object-expirer new mode to execute tasks from general task queue  https://review.openstack.org/51738907:44
*** e0ne has joined #openstack-swift07:48
openstackgerritKazuhiro MIYAHARA proposed openstack/swift master: Add object-expirer new mode to execute tasks from general task queue  https://review.openstack.org/51738907:54
*** gkadam has joined #openstack-swift13:02
*** psachin has quit IRC13:17
*** gkadam_ has joined #openstack-swift14:24
*** gkadam has quit IRC14:26
*** gkadam_ is now known as gkadam-afk14:51
*** gkadam-afk is now known as gkadam15:23
*** mvkr has quit IRC15:41
*** mvkr has joined #openstack-swift16:01
*** e0ne has quit IRC16:11
*** gkadam has quit IRC17:06
*** brimestone has joined #openstack-swift19:06
*** brimestone has left #openstack-swift19:07
*** baojg has quit IRC19:08
timburkeso what do we think about https://github.com/openstack/swift/blob/2.20.0/swift/common/middleware/s3api/s3api.py#L272-L310 ? as things currently stand, conf['__file__'] is *never* set, so the whole thing is a no-op... i'm kind of inclined to just rip it out, as i've had troubles with it in the past where filters (or even the app) aren't named how swift3/s3api expects...20:06
timburkeif we *were* to keep something like that, i'd much rather use get_swift_info and make sure all appropriate middlewares register themselves... i should double check, but i'm pretty sure registering goes in pipeline order, right to left, so you could even make inferences about whether things make sense or not that way...20:10
timburkelong-term, we'd probably want to do something like we did for encryption, where we roll up a few different middlewares just to reduce the opportunities for misconfiguration. like, have a keystone meta-middleware that rolls up keystoneauth, authtoken, and s3token and keeps them all in the correct order20:15
timburkethis also reminds me of torgomatic's https://review.openstack.org/#/c/504472/ ...20:26
patchbotpatch 504472 - swift - Shorten typical proxy pipeline. - 4 patch sets20:26
notmynameviks__: you need to check that "allow_account_management" is set to true in the proxy config. in many cases, operators will keep that turned off (the default) for public-facing proxies and turn it on on a special internal proxy server. that way, even if a token or creds were to leak, it will still not be able to create or delete accounts23:01
timburkenotmyname: you reminded me of https://bugs.launchpad.net/swift/+bug/174032623:12
openstackLaunchpad bug 1740326 in OpenStack Object Storage (swift) "tempauth: Account ACLs allow users to delete their own accounts" [Undecided,New]23:12
timburkethough i'm pretty certain that it requires allow_account_management=true23:12

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!