-
Notifications
You must be signed in to change notification settings - Fork 287
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add markers encryption_sse_c and encryption_sse_kms #553
base: ceph-reef
Are you sure you want to change the base?
Conversation
atta
commented
Mar 1, 2024
- testing of sse-c is now possible without a configured kms
- add header 'X-Forwarded-Proto' = 'https' if is_secure is set to False in the configuration file
* testing of sse-c is now possible without a configured kms * add header 'X-Forwarded-Proto' = 'https' if is_secure is set to False in the configuration file
Hi, please let me know if there is anything to change, would love to get it done |
Hey @cbodley or @mattbenjamin - would you mind taking a look at this PR? Thank you :) |
pip install pylint | ||
- name: Analysing the code with pylint | ||
run: | | ||
pylint $(git ls-files '*.py') |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please remove this
encryption_sse_c | ||
encryption_sse_kms |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
there's already a marker for sse_s3
. please remove the encryption_
part to be consistent
@@ -5171,15 +5171,15 @@ def test_list_buckets_invalid_auth(): | |||
e = assert_raises(ClientError, bad_auth_client.list_buckets) | |||
status, error_code = _get_status_and_error_code(e.response) | |||
assert status == 403 | |||
assert error_code == 'InvalidAccessKeyId' | |||
assert error_code == 'AccessDenied' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what's the motivation of this change? afaik this has been passing as-is
if get_config_is_secure() == False: | ||
sse_client_headers['X-Forwarded-Proto'] = 'https' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this shouldn't be necessary, and servers probably shouldn't accept this header from clients without additional configuration. if you're just testing against ceph rgw, you can set rgw_crypt_require_ssl=false to run these
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In my tests, if the rgw_crypt_require_ssl=false
is set, the ceph rgw will require the header in order to accept the request.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
that config option has always worked in our automated testing, ex. https://github.com/ceph/ceph/blob/04416f4/qa/suites/rgw/crypt/3-rgw/rgw.yaml#L7