minio: fix store user creation#8425
Conversation
To prevent error during multi-user access, use account UUID to create/access user on the procider side. Also, update existing secret key for a user that already exist. Signed-off-by: Abhishek Kumar <abhishek.mrt22@gmail.com>
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## main #8425 +/- ##
============================================
- Coverage 30.80% 30.02% -0.79%
+ Complexity 33981 33032 -949
============================================
Files 5341 5341
Lines 374864 374891 +27
Branches 54518 54528 +10
============================================
- Hits 115485 112561 -2924
- Misses 244114 247332 +3218
+ Partials 15265 14998 -267
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
|
@blueorangutan package |
|
@shwstppr a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress. |
|
Packaging result [SF]: ✔️ el7 ✔️ el8 ✔️ el9 ✔️ debian ✔️ suse15. SL-JID 8177 |
|
@blueorangutan test |
|
@shwstppr a [SL] Trillian-Jenkins test job (centos7 mgmt + kvm-centos7) has been kicked to run smoke tests |
|
[SF] Trillian test result (tid-8706)
|
DaanHoogland
left a comment
There was a problem hiding this comment.
clgtm. I think we missed a big issue before, putting the Bucket VO and Dao in package com.cloud instead of org.apache.cloudstack. Nothing to do about that in the scope of this PR, though.
| } | ||
| } catch (Exception e) { | ||
| s_logger.debug("User does not exist. Creating user: "+accessKey); | ||
| s_logger.debug("User does not exist. Creating user: " + accessKey); |
There was a problem hiding this comment.
| s_logger.debug("User does not exist. Creating user: " + accessKey); | |
| s_logger.debug(String.format("User does not exist. Creating user: %s", accessKey), e); |
or error level?
There was a problem hiding this comment.
@DaanHoogland I don't think we need error level here. Based on the code I understand ideally user shouldn't exist on the object store we create one. Though I'm not sure if we should catchall
There was a problem hiding this comment.
Made some changes to error handling
|
While testing this PR, I found the following issue, here are the steps to reproduce: As admin, create a bucket |
Signed-off-by: Abhishek Kumar <abhishek.mrt22@gmail.com>
|
@vladimirpetrov I was able to reproduce the issue and have added a fix in the latest commit @blueorangutan package |
|
@shwstppr a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress. |
|
Packaging result [SF]: ✔️ el7 ✔️ el8 ✔️ el9 ✔️ debian ✔️ suse15. SL-JID 8213 |
|
@blueorangutan test |
|
@shwstppr a [SL] Trillian-Jenkins test job (centos7 mgmt + kvm-centos7) has been kicked to run smoke tests |
|
[SF] Trillian test result (tid-8743)
|
Signed-off-by: Abhishek Kumar <abhishek.mrt22@gmail.com>
|
@blueorangutan package |
|
@shwstppr a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress. |
|
Packaging result [SF]: ✔️ el7 ✖️ el8 ✖️ el9 ✖️ debian ✖️ suse15. SL-JID 8232 |
|
@blueorangutan package |
|
@vladimirpetrov a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress. |
|
Packaging result [SF]: ✔️ el7 ✔️ el8 ✔️ el9 ✔️ debian ✔️ suse15. SL-JID 8236 |
|
@blueorangutan test |
|
@shwstppr a [SL] Trillian-Jenkins test job (centos7 mgmt + kvm-centos7) has been kicked to run smoke tests |
|
[SF] Trillian test result (tid-8763)
|
vladimirpetrov
left a comment
There was a problem hiding this comment.
LGTM based on manual testing.
To prevent errors during multi-user access, use account UUID to create/access user on the provider side. Also, update the existing secret key for a user that already exists.

Description
To prevent error during multi-user access, use account UUID to create/access user on the procider side. Also, update existing secret key for a user that already exist.
Types of changes
Feature/Enhancement Scale or Bug Severity
Feature/Enhancement Scale
Bug Severity
Screenshots (if appropriate):
How Has This Been Tested?
testuserHow did you try to break this feature and the system with this change?