Bug 2321291

Summary: [CEE] Multipart file download by anonymous user results in 401 error.
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Bipin Kunal <bkunal>
Component: RGWAssignee: Marcus Watts <mwatts>
Status: VERIFIED --- QA Contact: Tejas <tchandra>
Severity: urgent Docs Contact:
Priority: unspecified    
Version: 6.1CC: bkunal, ceph-eng-bugs, cephqe-warriors, ckulal, jhardee, ksuzumur, mbenjamin, mkasturi, mwatts, tasano, tchandra, tserlin, vumrao, yariyama
Target Milestone: ---Flags: mbenjamin: needinfo? (mwatts)
Target Release: 7.1z4   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ceph-18.2.1-250.el9cp Doc Type: Bug Fix
Doc Text:
Cause: Currently the "admin token" is cached and upon checking the cache we verify the expiration on the token before using it but we have no logic to invalidate the cache if the response from the Keystone API says that the "admin token" is invalid. Consequence: Swift API requests for clients are dropped causing Error 401 on some RGW servers until service is restarted. Fix: There is probably multiple places in Keystone where it invalidates tokens, but one example where the "admin token" would be invalidated and return HTTP 401 status code is if the user that is configured in rgw_keystone_admin_user has it's password changed (even if it's the same password as the current one) then Keystone will invalidate it's cache and invalidated existing tokens even if they have not expired yet Result: Keystone is now able to invalidate it's cache and invalidated existing tokens even if they have not expired yet
Story Points: ---
Clone Of: 2272648
: 2321292 (view as bug list) Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2272648    
Bug Blocks: 2315068, 2321292    

Description Bipin Kunal 2024-10-23 13:10:19 UTC
+++ This bug was initially created as a clone of Bug #2272648 +++