Or just generate the secret/access key explicitly:
radosgw-admin user create --access-key `tr -dc A-Z0-9 < /dev/urandom |
head -c 20` --secret `tr -dc a-zA-Z0-9 < /dev/urandom | head -c 40`
I'm not sure why the documentation suggests just generating it over and
over, rather then just generating it in a way that won't cause problems.
On 6/27/2014 1:15 PM, Craig Lewis wrote:
backslash characters (\) are known to cause problems for some clients
(like s3cmd).
Try removing them from your secret, and see if that works. If it
doesn't, just remove the key and secret, and regenerate until the
secret doesn't have any backslashes.
On Fri, Jun 27, 2014 at 12:22 AM, Florent B <[email protected]
<mailto:[email protected]>> wrote:
I have a similar issue but I don't know if it is related to yours.
When secret key of a swift subuser contains "+" or "\" (I don't
which), authentification fails using python-swiftclient.
Is it an issue ?
On 06/25/2014 11:58 PM, Brian Rak wrote:
I'm trying to find an issue with RadosGW and special characters
in filenames. Specifically, it seems that filenames with a + in
them are not being handled correctly, and that I need to
explicitly escape them.
For example:
---request begin---
HEAD
/ubuntu/pool/main/a/adduser/adduser_3.113+nmu3ubuntu3_all.deb
HTTP/1.0
User-Agent: Wget/1.12 (linux-gnu)
Will fail with a 404 error, but
---request begin---
HEAD
/ubuntu/pool/main/a/adduser/adduser_3.113%2Bnmu3ubuntu3_all.deb
HTTP/1.0
User-Agent: Wget/1.12 (linux-gnu)
will work properly.
I enabled debug mode on radosgw, and see this:
2014-06-25 17:30:37.383029 7f7ca7fff700 20 RGWWQ:
2014-06-25 17:30:37.383040 7f7ca7fff700 20 req: 0x7f7ca000b180
2014-06-25 17:30:37.383053 7f7ca7fff700 10 allocated request
req=0x7f7ca0015ef0
2014-06-25 17:30:37.383064 7f7c6cfa9700 20 dequeued request
req=0x7f7ca000b180
2014-06-25 17:30:37.383070 7f7c6cfa9700 20 RGWWQ: empty
2014-06-25 17:30:37.383121 7f7c6cfa9700 20 CONTENT_LENGTH=
2014-06-25 17:30:37.383123 7f7c6cfa9700 20 CONTENT_TYPE=
2014-06-25 17:30:37.383124 7f7c6cfa9700 20
DOCUMENT_ROOT=/etc/nginx/html
2014-06-25 17:30:37.383125 7f7c6cfa9700 20
DOCUMENT_URI=/ubuntu/pool/main/a/adduser/adduser_3.113+nmu3ubuntu3_all.deb
2014-06-25 17:30:37.383126 7f7c6cfa9700 20 FCGI_ROLE=RESPONDER
2014-06-25 17:30:37.383127 7f7c6cfa9700 20 GATEWAY_INTERFACE=CGI/1.1
2014-06-25 17:30:37.383128 7f7c6cfa9700 20 HTTP_ACCEPT=*/*
2014-06-25 17:30:37.383129 7f7c6cfa9700 20 HTTP_CONNECTION=Keep-Alive
2014-06-25 17:30:37.383129 7f7c6cfa9700 20 HTTP_HOST=xxx
2014-06-25 17:30:37.383130 7f7c6cfa9700 20
HTTP_USER_AGENT=Wget/1.12 (linux-gnu)
2014-06-25 17:30:37.383131 7f7c6cfa9700 20 QUERY_STRING=
2014-06-25 17:30:37.383131 7f7c6cfa9700 20 REDIRECT_STATUS=200
2014-06-25 17:30:37.383132 7f7c6cfa9700 20 REMOTE_ADDR=yyy
2014-06-25 17:30:37.383133 7f7c6cfa9700 20 REMOTE_PORT=43855
2014-06-25 17:30:37.383134 7f7c6cfa9700 20 REQUEST_METHOD=HEAD
2014-06-25 17:30:37.383134 7f7c6cfa9700 20
REQUEST_URI=/ubuntu/pool/main/a/adduser/adduser_3.113+nmu3ubuntu3_all.deb
2014-06-25 17:30:37.383135 7f7c6cfa9700 20
SCRIPT_NAME=/ubuntu/pool/main/a/adduser/adduser_3.113+nmu3ubuntu3_all.deb
2014-06-25 17:30:37.383136 7f7c6cfa9700 20 SERVER_ADDR=yyy
2014-06-25 17:30:37.383136 7f7c6cfa9700 20 SERVER_NAME=xxx
2014-06-25 17:30:37.383137 7f7c6cfa9700 20 SERVER_PORT=80
2014-06-25 17:30:37.383138 7f7c6cfa9700 20 SERVER_PROTOCOL=HTTP/1.0
2014-06-25 17:30:37.383138 7f7c6cfa9700 20
SERVER_SOFTWARE=nginx/1.4.6
2014-06-25 17:30:37.383140 7f7c6cfa9700 1 ====== starting new
request req=0x7f7ca000b180 =====
2014-06-25 17:30:37.383152 7f7c6cfa9700 2 req 1:0.000013::HEAD
/ubuntu/pool/main/a/adduser/adduser_3.113+nmu3ubuntu3_all.deb::initializing
2014-06-25 17:30:37.383158 7f7c6cfa9700 10 host=xxxx
rgw_dns_name=xxxx
2014-06-25 17:30:37.383199 7f7c6cfa9700 10
*s->object=ubuntu/pool/main/a/adduser/adduser_3.113
nmu3ubuntu3_all.deb s->bucket=ubuntu*
2014-06-25 17:30:37.383207 7f7c6cfa9700 2 req 1:0.000068:s3:HEAD
/ubuntu/pool/main/a/adduser/adduser_3.113+nmu3ubuntu3_all.deb::getting
op
2014-06-25 17:30:37.383211 7f7c6cfa9700 2 req 1:0.000072:s3:HEAD
/ubuntu/pool/main/a/adduser/adduser_3.113+nmu3ubuntu3_all.deb:get_obj:authorizing
2014-06-25 17:30:37.383218 7f7c6cfa9700 2 req 1:0.000079:s3:HEAD
/ubuntu/pool/main/a/adduser/adduser_3.113+nmu3ubuntu3_all.deb:get_obj:reading
permissions
2014-06-25 17:30:37.383268 7f7c6cfa9700 20 get_obj_state:
rctx=0x7f7c6cfa8640 obj=.rgw:ubuntu state=0x7f7c6800c0a8
s->prefetch_data=0
2014-06-25 17:30:37.383279 7f7c6cfa9700 10 cache get:
name=.rgw+ubuntu : miss
It seems that Ceph is attempting to urldecode the filename, even
when it shouldn't be. (Going by
http://stackoverflow.com/questions/1005676/urls-and-plus-signs
). Is this a bug, or is this the desired behavior?
_______________________________________________
ceph-users mailing list
[email protected] <mailto:[email protected]>
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
_______________________________________________
ceph-users mailing list
[email protected] <mailto:[email protected]>
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
_______________________________________________
ceph-users mailing list
[email protected]
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
_______________________________________________
ceph-users mailing list
[email protected]
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com