Bug 2321291
Summary: | [CEE] Multipart file download by anonymous user results in 401 error. | |||
---|---|---|---|---|
Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Bipin Kunal <bkunal> | |
Component: | RGW | Assignee: | Marcus Watts <mwatts> | |
Status: | CLOSED ERRATA | QA Contact: | Tejas <tchandra> | |
Severity: | urgent | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 6.1 | CC: | bhkaur, bkunal, ceph-eng-bugs, cephqe-warriors, ckulal, jhardee, ksuzumur, mbenjamin, mkasturi, mwatts, tasano, tchandra, tserlin, vumrao, yariyama | |
Target Milestone: | --- | Flags: | mbenjamin:
needinfo?
(mwatts) |
|
Target Release: | 7.1z4 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | ceph-18.2.1-250.el9cp | Doc Type: | Bug Fix | |
Doc Text: |
.Keystone now correctly invalidates cached admin tokens based on API responses
Previously, RGW continued using a cached admin token based solely on its expiration time. It did not remove the token even when the Keystone API returned an HTTP 401 status, indicating the token was no longer valid.
With this fix, RGW now detects invalid tokens based on Keystone's response and immediately removes them from the cache. This prevents 401 errors on Swift API requests and eliminates the need to restart RGW services.
|
Story Points: | --- | |
Clone Of: | 2272648 | |||
: | 2321292 (view as bug list) | Environment: | ||
Last Closed: | 2025-05-07 12:47:46 UTC | Type: | --- | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | 2272648 | |||
Bug Blocks: | 2315068, 2321292 |
Description
Bipin Kunal
2024-10-23 13:10:19 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: Red Hat Ceph Storage 7.1 security, bug fix, and enhancement updates), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2025:4664 |