Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add markers encryption_sse_c and encryption_sse_kms #553

Open
wants to merge 2 commits into
base: ceph-reef
Choose a base branch
from

Conversation

atta
Copy link

@atta atta commented Mar 1, 2024

  • testing of sse-c is now possible without a configured kms
  • add header 'X-Forwarded-Proto' = 'https' if is_secure is set to False in the configuration file

Ansgar Jazdzewski and others added 2 commits March 1, 2024 10:34
* testing of sse-c is now possible without a configured kms
* add header 'X-Forwarded-Proto' = 'https' if is_secure is set to False
  in the configuration file
@atta
Copy link
Author

atta commented Apr 22, 2024

Hi, please let me know if there is anything to change, would love to get it done

@LenzGr
Copy link

LenzGr commented Apr 25, 2024

Hey @cbodley or @mattbenjamin - would you mind taking a look at this PR? Thank you :)

pip install pylint
- name: Analysing the code with pylint
run: |
pylint $(git ls-files '*.py')
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please remove this

Comment on lines +12 to +13
encryption_sse_c
encryption_sse_kms
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

there's already a marker for sse_s3. please remove the encryption_ part to be consistent

@@ -5171,15 +5171,15 @@ def test_list_buckets_invalid_auth():
e = assert_raises(ClientError, bad_auth_client.list_buckets)
status, error_code = _get_status_and_error_code(e.response)
assert status == 403
assert error_code == 'InvalidAccessKeyId'
assert error_code == 'AccessDenied'
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what's the motivation of this change? afaik this has been passing as-is

Comment on lines +8610 to +8611
if get_config_is_secure() == False:
sse_client_headers['X-Forwarded-Proto'] = 'https'
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this shouldn't be necessary, and servers probably shouldn't accept this header from clients without additional configuration. if you're just testing against ceph rgw, you can set rgw_crypt_require_ssl=false to run these

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In my tests, if the rgw_crypt_require_ssl=false is set, the ceph rgw will require the header in order to accept the request.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

that config option has always worked in our automated testing, ex. https://github.com/ceph/ceph/blob/04416f4/qa/suites/rgw/crypt/3-rgw/rgw.yaml#L7

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants