Bug 1250713 - config_tempest.py breaks if Rados Gateway is configured for object-store
config_tempest.py breaks if Rados Gateway is configured for object-store
Status: CLOSED ERRATA
Product: Red Hat Ceph Storage
Classification: Red Hat
Component: Documentation (Show other bugs)
1.2.3
All All
unspecified Severity high
: rc
: 2.2
Assigned To: Bara Ancincova
ceph-qe-bugs
:
Depends On:
Blocks: 1273812 1436386 1172300 1251237 1252600
  Show dependency treegraph
 
Reported: 2015-08-05 15:35 EDT by David Paterson
Modified: 2017-03-27 16:02 EDT (History)
36 users (show)

See Also:
Fixed In Version: RHEL: ceph-10.2.5-31.el7cp Ubuntu: ceph_10.2.5-23redhat1
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 1251237 (view as bug list)
Environment:
Last Closed: 2017-03-14 11:42:04 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Ceph Project Bug Tracker 8945 None None None 2016-09-15 03:08 EDT

  None (edit)
Description David Paterson 2015-08-05 15:35:56 EDT
Description of problem: If the Rados Gateway is configured as object-store instead of swift the tools/config_tempest.py script will break


Version-Release number of selected component (if applicable):
OSP7 RC2

How reproducible:
Every time

Steps to Reproduce:
1. Install tempest
2. run config_tempest script with appropriate arguments.

Actual results:
Fails with exception: 
CRITICAL tempest [-] ServiceError: Request on service 'object-store' with url 'http://192.168.190.246:8087/info' failed with code 404
TRACE tempest Traceback (most recent call last):
TRACE tempest   File "tools/config_tempest.py", line 726, in <module>
TRACE tempest     main()
TRACE tempest   File "tools/config_tempest.py", line 140, in main
TRACE tempest     clients.identity_region)
TRACE tempest   File "/root/tempest/tempest/common/api_discovery.py", line 154, in discover
TRACE tempest     services[name]['extensions'] = service.get_extensions()
TRACE tempest   File "/root/tempest/tempest/common/api_discovery.py", line 111, in get_extensions
TRACE tempest     top_level_path="info")
TRACE tempest   File "/root/tempest/tempest/common/api_discovery.py", line 53, in do_get
TRACE tempest     " with code %d" % (self.name, url, r.status))
TRACE tempest ServiceError: Request on service 'object-store' with url 'http://192.168.190.246:8087/info' failed with code 404


Expected results:
Script generates ./etc/tempest.conf

Additional info:
The reason this is happening is because RadowGW does not implement the /info api call.
Comment 6 arkady kanevsky 2015-08-05 17:48:23 EDT
Mike O,
need you help to have this BZ targeted for 7.0.

We need to handle it differently for short term and long term.
For long term Ceph RGW need to respond correctly so both config_tempest.py and for tempest swift tests. That will be Ceph bug. Neil, you decide which Ceph release it will land.

For short term, we need to fix config_tempest.py to "ignore" ceph swift responses. We should try to get it into CDN OSP7 bits ASAP. once we have a fix for config_tempest.py we can "apply" it in scripts for Tempest deployment on tempest VM.
Comment 7 Neil Levine 2015-08-11 17:11:59 EDT
*** Bug 1252600 has been marked as a duplicate of this bug. ***
Comment 8 Neil Levine 2015-08-11 17:25:05 EDT
There is barely any documentation about the /info API call:

http://docs.openstack.org/developer/swift/api/discoverability.html

Assigning this to one of our Swift devs as it's hard to know what to implement in lieu of proper documentation.
Comment 24 Ian Colle 2016-09-15 03:08:06 EDT
Merged upstream https://github.com/ceph/ceph/pull/10280
Comment 25 Ken Dreyer (Red Hat) 2016-09-15 13:25:02 EDT
Matt will you be backporting this to jewel?

If so, http://tracker.ceph.com/issues/8945 should be marked "Backport: jewel".

If not, this BZ should be re-targeted to RHCS 3.
Comment 43 errata-xmlrpc 2017-03-14 11:42:04 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2017-0514.html

Note You need to log in before you can comment on or make changes to this bug.