Bug 1250713

Summary: config_tempest.py breaks if Rados Gateway is configured for object-store
Product: Red Hat Ceph Storage Reporter: David Paterson <david_paterson>
Component: DocumentationAssignee: Bara Ancincova <bancinco>
Status: CLOSED ERRATA QA Contact: ceph-qe-bugs <ceph-qe-bugs>
Severity: high Docs Contact:
Priority: unspecified    
Version: 1.2.3CC: aperotti, apevec, arkady_kanevsky, cdevine, ceph-eng-bugs, christopher_dearborn, david_paterson, dmellado, flucifre, hnallurv, icolle, jdurgin, John_walsh, kbader, kdreyer, kurt_hey, lhh, mbenjamin, morazi, nlevine, owasserm, rajini.karthik, randy_perryman, rsussman, rwheeler, sankarshan, slinaber, smanjara, sreichar, srevivo, sweil, tkammer, tserlin, uboppana, wayne_allen, yweinste
Target Milestone: rc   
Target Release: 2.2   
Hardware: All   
OS: All   
Fixed In Version: RHEL: ceph-10.2.5-31.el7cp Ubuntu: ceph_10.2.5-23redhat1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 1251237 (view as bug list) Environment:
Last Closed: 2017-03-14 15:42:04 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On:    
Bug Blocks: 1172300, 1251237, 1252600, 1273812, 1436386    

Description David Paterson 2015-08-05 19:35:56 UTC
Description of problem: If the Rados Gateway is configured as object-store instead of swift the tools/config_tempest.py script will break

Version-Release number of selected component (if applicable):

How reproducible:
Every time

Steps to Reproduce:
1. Install tempest
2. run config_tempest script with appropriate arguments.

Actual results:
Fails with exception: 
CRITICAL tempest [-] ServiceError: Request on service 'object-store' with url '' failed with code 404
TRACE tempest Traceback (most recent call last):
TRACE tempest   File "tools/config_tempest.py", line 726, in <module>
TRACE tempest     main()
TRACE tempest   File "tools/config_tempest.py", line 140, in main
TRACE tempest     clients.identity_region)
TRACE tempest   File "/root/tempest/tempest/common/api_discovery.py", line 154, in discover
TRACE tempest     services[name]['extensions'] = service.get_extensions()
TRACE tempest   File "/root/tempest/tempest/common/api_discovery.py", line 111, in get_extensions
TRACE tempest     top_level_path="info")
TRACE tempest   File "/root/tempest/tempest/common/api_discovery.py", line 53, in do_get
TRACE tempest     " with code %d" % (self.name, url, r.status))
TRACE tempest ServiceError: Request on service 'object-store' with url '' failed with code 404

Expected results:
Script generates ./etc/tempest.conf

Additional info:
The reason this is happening is because RadowGW does not implement the /info api call.

Comment 6 arkady kanevsky 2015-08-05 21:48:23 UTC
Mike O,
need you help to have this BZ targeted for 7.0.

We need to handle it differently for short term and long term.
For long term Ceph RGW need to respond correctly so both config_tempest.py and for tempest swift tests. That will be Ceph bug. Neil, you decide which Ceph release it will land.

For short term, we need to fix config_tempest.py to "ignore" ceph swift responses. We should try to get it into CDN OSP7 bits ASAP. once we have a fix for config_tempest.py we can "apply" it in scripts for Tempest deployment on tempest VM.

Comment 7 Neil Levine 2015-08-11 21:11:59 UTC
*** Bug 1252600 has been marked as a duplicate of this bug. ***

Comment 8 Neil Levine 2015-08-11 21:25:05 UTC
There is barely any documentation about the /info API call:


Assigning this to one of our Swift devs as it's hard to know what to implement in lieu of proper documentation.

Comment 24 Ian Colle 2016-09-15 07:08:06 UTC
Merged upstream https://github.com/ceph/ceph/pull/10280

Comment 25 Ken Dreyer (Red Hat) 2016-09-15 17:25:02 UTC
Matt will you be backporting this to jewel?

If so, http://tracker.ceph.com/issues/8945 should be marked "Backport: jewel".

If not, this BZ should be re-targeted to RHCS 3.

Comment 43 errata-xmlrpc 2017-03-14 15:42:04 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.