Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CEPH-83575592: Automate assume-role at multisite. #580

Merged
merged 1 commit into from
Mar 29, 2024

Conversation

viduship
Copy link
Contributor

@viduship viduship commented Mar 25, 2024

CEPH-83575592:sts assume-role at multisite.

The flow of the test is as follows:

  1. On the primary zone,
  • create 2 users, user1 and user2
  • Add role caps to the user1, create a role, and attach role policy.
  1. Connect to the secondary zone, and perform the below steps
  • test sts assume role call on the secondary zone
  • perform s3 bucket creation and other operations via the session token generated with assume role call.

Currently with this automation, we saw that the s3 bucket operations fails on the secondary (https://bugzilla.redhat.com/show_bug.cgi?id=2271399)

logs: will fail at bucket creation (expected)
http://magna002.ceph.redhat.com/ceph-qe-logs/vidushi/580/logs_stst_assumerole_ms

@openshift-ci-robot
Copy link

@viduship: No Jira issue with key CEPH-83575592 exists in the tracker at https://issues.redhat.com/.
Once a valid jira issue is referenced in the title of this pull request, request a refresh with /jira refresh.

In response to this:

CEPH-83575592:sts assume-role at multisite..

The flow of the test is as follows:

  1. On the primary zone,
  • create 2 users, user1 and user2
  • Add role caps to the user1, create a role, and attach role policy.
  1. Connect to the secondary zone, and perform the below steps
  • test sts assume role call on the secondary zone
  • perform s3 bucket creation and other operations via the session token generated with assume role call.

Currently with this automation, we saw that the s3 bucket operations fails on the secondary (https://bugzilla.redhat.com/show_bug.cgi?id=2271399)

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

1 similar comment
@openshift-ci-robot
Copy link

@viduship: No Jira issue with key CEPH-83575592 exists in the tracker at https://issues.redhat.com/.
Once a valid jira issue is referenced in the title of this pull request, request a refresh with /jira refresh.

In response to this:

CEPH-83575592:sts assume-role at multisite..

The flow of the test is as follows:

  1. On the primary zone,
  • create 2 users, user1 and user2
  • Add role caps to the user1, create a role, and attach role policy.
  1. Connect to the secondary zone, and perform the below steps
  • test sts assume role call on the secondary zone
  • perform s3 bucket creation and other operations via the session token generated with assume role call.

Currently with this automation, we saw that the s3 bucket operations fails on the secondary (https://bugzilla.redhat.com/show_bug.cgi?id=2271399)

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@viduship viduship requested a review from a team March 25, 2024 18:21
@viduship viduship self-assigned this Mar 25, 2024
@viduship viduship added RGW RGW tier-3 tier-3 automation labels Mar 25, 2024
@viduship viduship changed the title CEPH-83575592:sts assume-role at multisite. CEPH-83575592: Automate assume-role at multisite. Mar 25, 2024
@openshift-ci-robot
Copy link

@viduship: No Jira issue with key CEPH-83575592 exists in the tracker at https://issues.redhat.com/.
Once a valid jira issue is referenced in the title of this pull request, request a refresh with /jira refresh.

In response to this:

CEPH-83575592:sts assume-role at multisite.

The flow of the test is as follows:

  1. On the primary zone,
  • create 2 users, user1 and user2
  • Add role caps to the user1, create a role, and attach role policy.
  1. Connect to the secondary zone, and perform the below steps
  • test sts assume role call on the secondary zone
  • perform s3 bucket creation and other operations via the session token generated with assume role call.

Currently with this automation, we saw that the s3 bucket operations fails on the secondary (https://bugzilla.redhat.com/show_bug.cgi?id=2271399)

logs: will fail at bucket creation (expected)
http://magna002.ceph.redhat.com/ceph-qe-logs/vidushi/580/logs_stst_assumerole_ms

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

hmaheswa
hmaheswa previously approved these changes Mar 27, 2024
@openshift-ci openshift-ci bot added the lgtm Looks good to me label Mar 27, 2024
@openshift-ci openshift-ci bot removed the lgtm Looks good to me label Mar 28, 2024
@viduship viduship requested a review from a team March 28, 2024 11:24
@openshift-ci openshift-ci bot added the lgtm Looks good to me label Mar 29, 2024
Copy link
Contributor

openshift-ci bot commented Mar 29, 2024

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: ckulal, viduship

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@mergify mergify bot merged commit cf616a8 into red-hat-storage:master Mar 29, 2024
2 of 3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lgtm Looks good to me product-bug-via-automation RGW RGW tier-3 tier-3 automation
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants