Hmm, Nope, not using tenants feature. The users/buckets were created on
prior ceph versions, perhaps i'll try with a newly created user + bucket.
radosgw-admin user info --uid=foo
{
"user_id": "foo",
"display_name": "foo",
"email": "snip",
"suspended": 0,
"max_buckets": 1000,
"auid": 0,
"subusers": [
{
"id": "foo:swift",
"permissions": "full-control"
}
],
"keys": [
{
"user": "foo:swift",
"access_key": "xxx",
"secret_key": ""
},
{
"user": "foo",
"access_key": "xxx",
"secret_key": "xxxx"
}
],
"swift_keys": [],
"caps": [
{
"type": "buckets",
"perm": "*"
},
{
"type": "metadata",
"perm": "*"
},
{
"type": "usage",
"perm": "*"
},
{
"type": "users",
"perm": "*"
},
{
"type": "zone",
"perm": "*"
}
],
"op_mask": "read, write, delete",
"default_placement": "",
"placement_tags": [],
"bucket_quota": {
"enabled": false,
"check_on_raw": false,
"max_size": -1024,
"max_size_kb": 0,
"max_objects": -1
},
"user_quota": {
"enabled": false,
"check_on_raw": false,
"max_size": -1024,
"max_size_kb": 0,
"max_objects": -1
},
"temp_url_keys": [],
"type": "none"
}
On Sun, Apr 2, 2017 at 5:54 AM, Orit Wasserman <[email protected]> wrote:
> I see : acct_user=foo, acct_name=foo,
> Are you using radosgw with tenants?
> If not it could be the problem
>
> Orit
>
> On Sat, Apr 1, 2017 at 7:43 AM, Ben Hines <[email protected]> wrote:
>
>> I'm also trying to use lifecycles (via boto3) but i'm getting permission
>> denied trying to create the lifecycle. I'm bucket owner with full_control
>> and WRITE_ACP for good measure. Any ideas?
>>
>> This is debug ms=20 debug radosgw=20
>>
>>
>>
>> 2017-03-31 21:28:18.382217 7f50d0010700 2 req 8:0.000693:s3:PUT
>> /bentest:put_lifecycle:verifying op permissions
>> 2017-03-31 21:28:18.382222 7f50d0010700 5 Searching permissions for
>> identity=RGWThirdPartyAccountAuthApplier() ->
>> RGWLocalAuthApplier(acct_user=foo, acct_name=foo, subuser=,
>> perm_mask=15, is_admin=) mask=56
>> 2017-03-31 21:28:18.382232 7f50d0010700 5 Searching permissions for
>> uid=foo
>> 2017-03-31 21:28:18.382235 7f50d0010700 5 Found permission: 15
>> 2017-03-31 21:28:18.382237 7f50d0010700 5 Searching permissions for
>> group=1 mask=56
>> 2017-03-31 21:28:18.382297 7f50d0010700 5 Found permission: 3
>> 2017-03-31 21:28:18.382307 7f50d0010700 5 Searching permissions for
>> group=2 mask=56
>> 2017-03-31 21:28:18.382313 7f50d0010700 5 Permissions for group not found
>> 2017-03-31 21:28:18.382318 7f50d0010700 5 Getting permissions
>> identity=RGWThirdPartyAccountAuthApplier() ->
>> RGWLocalAuthApplier(acct_user=foo, acct_name=foo, subuser=,
>> perm_mask=15, is_admin=) owner=foo perm=8
>> 2017-03-31 21:28:18.382325 7f50d0010700 10
>> identity=RGWThirdPartyAccountAuthApplier()
>> -> RGWLocalAuthApplier(acct_user=foo, acct_name=foo, subuser=,
>> perm_mask=15, is_admin=) requested perm (type)=8, policy perm=8,
>> user_perm_mask=8, acl perm=8
>> 2017-03-31 21:28:18.382330 7f50d0010700 2 req 8:0.000808:s3:PUT
>> /bentest:put_lifecycle:verifying op params
>> 2017-03-31 21:28:18.382334 7f50d0010700 2 req 8:0.000813:s3:PUT
>> /bentest:put_lifecycle:pre-executing
>> 2017-03-31 21:28:18.382339 7f50d0010700 2 req 8:0.000817:s3:PUT
>> /bentest:put_lifecycle:executing
>> 2017-03-31 21:28:18.382361 7f50d0010700 15 read len=183
>> data=<LifecycleConfiguration xmlns="http://s3.amazonaws.com
>> /doc/2006-03-01/"><Rule><Status>Enabled</Status><Expiration>
>> <Days>1</Days></Expiration><ID>0</ID></Rule></LifecycleConfiguration>
>> 2017-03-31 21:28:18.382439 7f50d0010700 2 req 8:0.000917:s3:PUT
>> /bentest:put_lifecycle:completing
>> 2017-03-31 21:28:18.382594 7f50d0010700 2 req 8:0.001072:s3:PUT
>> /bentest:put_lifecycle:op status=-13
>> 2017-03-31 21:28:18.382620 7f50d0010700 2 req 8:0.001098:s3:PUT
>> /bentest:put_lifecycle:http status=403
>> 2017-03-31 21:28:18.382665 7f50d0010700 1 ====== req done
>> req=0x7f50d000a340 op status=-13 http_status=403 ======
>>
>>
>> -Ben
>>
>> On Tue, Mar 28, 2017 at 6:42 AM, Daniel Gryniewicz <[email protected]>
>> wrote:
>>
>>> On 03/27/2017 04:28 PM, [email protected] wrote:
>>>
>>>> Hi Cephers.
>>>>
>>>> Couldn't find any special documentation about the "S3 object expiration"
>>>> so I assume it should work "AWS S3 like" (?!?) ... BUT ...
>>>> we have a test cluster based on 11.2.0 - Kraken and I set some object
>>>> expiration dates via CyberDuck and DragonDisk, but the objects are still
>>>> there, days after the applied date/time. Do I miss something?
>>>>
>>>> Thanks & regards
>>>>
>>>>
>>> It is intended to work like AWS S3, yes. Not every feature of AWS
>>> lifecycle is supported, (for example no moving between storage tiers), but
>>> deletion works, and is tested in teuthology runs.
>>>
>>> Did you somehow turn it off? The config option rgw_enable_lc_threads
>>> controls it, but it defaults to "on". Also make sure rgw_lc_debug_interval
>>> is not set, and that rgw_lifecycle_work_time isn't set to some interval too
>>> small scan your objects...
>>>
>>> Daniel
>>>
>>> _______________________________________________
>>> ceph-users mailing list
>>> [email protected]
>>> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
>>>
>>
>>
>> _______________________________________________
>> ceph-users mailing list
>> [email protected]
>> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
>>
>>
>
_______________________________________________
ceph-users mailing list
[email protected]
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com