project_id and user_id are empty in ceilometer storage.objects.outgoing.bytes for dlo objects

Bug #1477283 reported by Clément Contini
22
This bug affects 4 people
Affects Status Importance Assigned to Milestone
OpenStack Object Storage (swift)
Fix Released
Undecided
Clément Contini

Bug Description

Ceilometer data for storage.objects.outgoing.bytes has null fields for "project_id" and "user_id" when requesting a multipart object.

Expected behavior for a multipart file:

{
        "counter_name": "storage.objects.outgoing.bytes",
        "counter_type": "delta",
        "counter_unit": "B",
        "counter_volume": 97152.0,
        "message_id": "971404a2-30aa-11e5-8e6f-068ee400005b",
        "project_id": "7f9adf4f433143eab4d42cf26c19c07c",
        "recorded_at": "2015-07-22T19:48:14.174000",
        "resource_id": "",
        "resource_metadata": {
            "container": "toto_segments",
            "object": "toto/1437591107.845052/2097152/1000000/00000002",
            "path": "/v1/7f9adf4f433143eab4d42cf26c19c07c/toto_segments/toto/1437591107.845052/2097152/1000000/00000002",
            "version": "v1"
        },
        "source": "openstack",
        "timestamp": "2015-07-22T19:48:14.190000",
        "user_id": "8f9383bb23cd4aa5ae80cbb1b6de001a"
    },
    {
        "counter_name": "storage.objects.outgoing.bytes",
        "counter_type": "delta",
        "counter_unit": "B",
        "counter_volume": 1000000.0,
        "message_id": "9703fde6-30aa-11e5-8e6f-068ee400005b",
        "project_id": "7f9adf4f433143eab4d42cf26c19c07c",
        "recorded_at": "2015-07-22T19:48:14.097000",
        "resource_id": "",
        "resource_metadata": {
            "container": "toto_segments",
            "object": "toto/1437591107.845052/2097152/1000000/00000001",
            "path": "/v1/7f9adf4f433143eab4d42cf26c19c07c/toto_segments/toto/1437591107.845052/2097152/1000000/00000001",
            "version": "v1"
        },
        "source": "openstack",
        "timestamp": "2015-07-22T19:48:14.084000",
        "user_id": "8f9383bb23cd4aa5ae80cbb1b6de001a"
    },
    {
        "counter_name": "storage.objects.outgoing.bytes",
        "counter_type": "delta",
        "counter_unit": "B",
        "counter_volume": 1000000.0,
        "message_id": "96d86730-30aa-11e5-8e6f-068ee400005b",
        "project_id": "7f9adf4f433143eab4d42cf26c19c07c",
        "recorded_at": "2015-07-22T19:48:13.785000",
        "resource_id": "",
        "resource_metadata": {
            "container": "toto_segments",
            "object": "toto/1437591107.845052/2097152/1000000/00000000",
            "path": "/v1/7f9adf4f433143eab4d42cf26c19c07c/toto_segments/toto/1437591107.845052/2097152/1000000/00000000",
            "version": "v1"
        },
        "source": "openstack",
        "timestamp": "2015-07-22T19:48:13.757000",
        "user_id": "8f9383bb23cd4aa5ae80cbb1b6de001a"
    }

Observed behavior:

{
        "counter_name": "storage.objects.outgoing.bytes",
        "counter_type": "delta",
        "counter_unit": "B",
        "counter_volume": 97152.0,
        "message_id": "0abba47e-30aa-11e5-9cd9-068ee400005b",
        "project_id": null,
        "recorded_at": "2015-07-22T19:44:18.713000",
        "resource_id": "",
        "resource_metadata": {
            "container": "toto_segments",
            "object": "toto/1437591107.845052/2097152/1000000/00000002",
            "path": "/v1/7f9adf4f433143eab4d42cf26c19c07c/toto_segments/toto/1437591107.845052/2097152/1000000/00000002",
            "version": "v1"
        },
        "source": "openstack",
        "timestamp": "2015-07-22T19:44:18.730000",
        "user_id": null
    },
    {
        "counter_name": "storage.objects.outgoing.bytes",
        "counter_type": "delta",
        "counter_unit": "B",
        "counter_volume": 1000000.0,
        "message_id": "0ab0865c-30aa-11e5-9cd9-068ee400005b",
        "project_id": null,
        "recorded_at": "2015-07-22T19:44:18.640000",
        "resource_id": "",
        "resource_metadata": {
            "container": "toto_segments",
            "object": "toto/1437591107.845052/2097152/1000000/00000001",
            "path": "/v1/7f9adf4f433143eab4d42cf26c19c07c/toto_segments/toto/1437591107.845052/2097152/1000000/00000001",
            "version": "v1"
        },
        "source": "openstack",
        "timestamp": "2015-07-22T19:44:18.657000",
        "user_id": null
    },
    {
        "counter_name": "storage.objects.outgoing.bytes",
        "counter_type": "delta",
        "counter_unit": "B",
        "counter_volume": 1000000.0,
        "message_id": "0a8d44ee-30aa-11e5-9cd9-068ee400005b",
        "project_id": null,
        "recorded_at": "2015-07-22T19:44:18.415000",
        "resource_id": "",
        "resource_metadata": {
            "container": "toto_segments",
            "object": "toto/1437591107.845052/2097152/1000000/00000000",
            "path": "/v1/7f9adf4f433143eab4d42cf26c19c07c/toto_segments/toto/1437591107.845052/2097152/1000000/00000000",
            "version": "v1"
        },
        "source": "openstack",
        "timestamp": "2015-07-22T19:44:18.367000",
        "user_id": null
    }

We found that the problem is related to https://github.com/openstack/swift/blob/master/swift/common/wsgi.py. This patch seems to fix the issue.

--- a/swift/common/wsgi.py
+++ b/swift/common/wsgi.py
@@ -1085,7 +1085,7 @@ def make_env(env, method=None, path=None, agent='Swift', query_string=None,
                  'HTTP_ORIGIN', 'HTTP_ACCESS_CONTROL_REQUEST_METHOD',
                  'SERVER_PROTOCOL', 'swift.cache', 'swift.source',
                  'swift.trans_id', 'swift.authorize_override',
- 'swift.authorize'):
+ 'swift.authorize', 'HTTP_X_USER_ID', 'HTTP_X_TENANT_ID'):
         if name in env:
             newenv[name] = env[name]
     if method:

CVE References

Changed in swift:
assignee: nobody → Clément Contini (ccontini)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to swift (master)

Fix proposed to branch: master
Review: https://review.openstack.org/212149

Changed in swift:
status: New → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to swift (master)

Reviewed: https://review.openstack.org/212149
Committed: https://git.openstack.org/cgit/openstack/swift/commit/?id=d6267c1f95a7fcd2b0e4f15d5efc6bcfe2114de0
Submitter: Jenkins
Branch: master

commit d6267c1f95a7fcd2b0e4f15d5efc6bcfe2114de0
Author: Clément Contini <email address hidden>
Date: Wed Aug 12 15:00:45 2015 -0400

    Keep user id and project id in subrequests env

    Keep HTTP_X_USER_ID and HTTP_X_PROJECT_ID to be available as
    user_id and project_id in storage.objects.outgoing.bytes in
    ceilometer when downloading a multipart object.

    Change-Id: I0f4734f021e5d6e84d48ed9bebeb321d7a9590ad
    Closes-Bug: #1477283

Changed in swift:
status: In Progress → Fix Committed
Thierry Carrez (ttx)
Changed in swift:
milestone: none → 2.4.0
status: Fix Committed → Fix Released
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to swift (feature/crypto)

Fix proposed to branch: feature/crypto
Review: https://review.openstack.org/219775

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to swift (feature/crypto)
Download full text (43.3 KiB)

Reviewed: https://review.openstack.org/219775
Committed: https://git.openstack.org/cgit/openstack/swift/commit/?id=257e468e9bfd1088040419ad408106ac3c77b531
Submitter: Jenkins
Branch: feature/crypto

commit e02609c66a804845672413b06830b87395afef31
Author: Samuel Merritt <email address hidden>
Date: Tue Sep 1 15:19:50 2015 -0700

    Preserve traceback in swift-dispersion-report

    Commit c690bcb fixed a bug in the dispersion report, but changed this
    from a bare "raise" to "raise err", which loses the traceback. Not a
    big deal, but worth putting back IMO.

    Change-Id: Id5b72153a4b8df8e3faaf1fa3fb2040e28ba85cc

commit d06d4ad0fd2dfe69da8008e729651264522c6c06
Author: Minwoo Bae <email address hidden>
Date: Tue Sep 1 15:08:44 2015 -0500

    Included reference in swift.obj.diskfile to enumerate the string
    used for data file paths.

    Change-Id: Ie22caa678bc00dfc43fabec7efbbb9f34490f1b5

commit 524c89b7eeff037b8a6b421888771e15f98c2da2
Author: John Dickinson <email address hidden>
Date: Fri Aug 21 13:39:41 2015 -0700

    Updated CHANGELOG, AUTHORS, and .mailmap for 2.4.0 release.

    Change-Id: Ic6301146b839c9921bb85c4f4c1e585c9ab66661

commit 05de1305a903ee4ce9c8c50fde53c552d5b90d51
Author: Clay Gerrard <email address hidden>
Date: Thu Aug 27 18:35:09 2015 -0700

    Make ssync_sender send valid chunked requests

    The connect method of ssync_sender tells the remote connection that it's
    going to send a valid HTTP chunked request, but if the remote end needs
    to respond with an error of any kind sender throws HTTP right out the
    window, picks up his ball, and closes the socket down hard - much to the
    surprise of the eventlet.wsgi server who up to this point had been
    playing along quite nicely with this 'SSYNC' nonsense assuming that
    everyone here is consenting mature adults.

    If you're going to make a "Transfer-Encoding: chunked" request have the
    good decency to finish the job with a proper '0\r\n\r\n'. [1]

    N.B. It might be possible to handle an error status during the
    initialize_request phase with some sort of 100-continue support, but
    honestly it's not entirely clear to me when the server isn't going to
    close the connection if the client is still expected to send the body
    [2] - further if the error comes later during missing_check or updates
    we'll for sure want to send the chunk transfer termination line before
    we close down the socket and this way we cover both.

    1. Really, eventlet.wsgi shouldn't be so blasted brittle about this [3]
    2. https://lists.w3.org/Archives/Public/ietf-http-wg/2005AprJun/0007.html
    3. https://github.com/eventlet/eventlet/commit/c3ce3eef0b4d0dfdbfb1ec0186d4bb204fb8ecd5

    Closes-Bug #1489587
    Change-Id: Ic17c6c3075553f8cf6ef6213e62a00282f0d01cf

commit 993ee4e37af1961adba2047d5aa2eb210e423eb3
Author: nakagawamsa <email address hidden>
Date: Fri Aug 28 11:49:43 2015 +0900

    Remove duplicate X-Backend-Storage-Policy-Index key

    There is duplicate 'X-Backend-Storage-Policy-Index' dictionary key in unit.obj.test_server.py.
    One key has fixed policy index value, and another ha...

tags: added: in-feature-crypto
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to swift (feature/hummingbird)

Fix proposed to branch: feature/hummingbird
Review: https://review.openstack.org/221410

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to swift (feature/hummingbird)
Download full text (70.7 KiB)

Reviewed: https://review.openstack.org/221410
Committed: https://git.openstack.org/cgit/openstack/swift/commit/?id=eb8f1f83f1cfc63d8452bc30096fd1c145781527
Submitter: Jenkins
Branch: feature/hummingbird

commit cb683d391cb66d0f52830de16760c80fd2afedf9
Author: OpenStack Proposal Bot <email address hidden>
Date: Sat Sep 5 06:17:51 2015 +0000

    Imported Translations from Transifex

    For more information about this automatic import see:
    https://wiki.openstack.org/wiki/Translations/Infrastructure

    Change-Id: I2d92b8e34a665fb0bb4c048cfb0c59de295dfce6

commit e4542455c8a07b7981c247df8b737816062c1655
Author: Emett Speer <email address hidden>
Date: Wed Sep 2 17:18:03 2015 -0700

    [Labs] Update links to Cloud Admin Guide

    Update links to the Cloud Admin Guide after the
    RST conversion of that book altered URLs.

    Change-Id: I899f8938498b744e62887968a65e58c00ef27f1b

commit 58fcc07523978306cd3889ada73af5d9e664cf59
Author: Christian Schwede <email address hidden>
Date: Wed Sep 2 10:52:34 2015 +0000

    Test if container_sweep is executed on unmounted devices

    This change ensures that container_sweep is not run if a device is not mounted
    and mount_check is set to True.

    Change-Id: I823083c8431d9e61fd426508033ec9188503957b

commit e02609c66a804845672413b06830b87395afef31
Author: Samuel Merritt <email address hidden>
Date: Tue Sep 1 15:19:50 2015 -0700

    Preserve traceback in swift-dispersion-report

    Commit c690bcb fixed a bug in the dispersion report, but changed this
    from a bare "raise" to "raise err", which loses the traceback. Not a
    big deal, but worth putting back IMO.

    Change-Id: Id5b72153a4b8df8e3faaf1fa3fb2040e28ba85cc

commit d06d4ad0fd2dfe69da8008e729651264522c6c06
Author: Minwoo Bae <email address hidden>
Date: Tue Sep 1 15:08:44 2015 -0500

    Included reference in swift.obj.diskfile to enumerate the string
    used for data file paths.

    Change-Id: Ie22caa678bc00dfc43fabec7efbbb9f34490f1b5

commit 615c7a204b9386e05c5bab658bfe96766ad1e680
Author: Brian Cline <email address hidden>
Date: Tue Sep 1 10:51:20 2015 -0500

    Adds useful dispersion info from changelog

    Change-Id: I1a45088fc32620b02ff9a754b02ec1eb75a59d6e

commit 3b8755098a1786c5447abf158bd686293a82977c
Author: janonymous <email address hidden>
Date: Sun Aug 2 21:29:13 2015 +0530

    Replace a / b with a // b to use integer division where needed

    Change-Id: I72c81faa62786e140b0de00e3a04934bf1b5adbd

commit 524c89b7eeff037b8a6b421888771e15f98c2da2
Author: John Dickinson <email address hidden>
Date: Fri Aug 21 13:39:41 2015 -0700

    Updated CHANGELOG, AUTHORS, and .mailmap for 2.4.0 release.

    Change-Id: Ic6301146b839c9921bb85c4f4c1e585c9ab66661

commit 05de1305a903ee4ce9c8c50fde53c552d5b90d51
Author: Clay Gerrard <email address hidden>
Date: Thu Aug 27 18:35:09 2015 -0700

    Make ssync_sender send valid chunked requests

    The connect method of ssync_sender tells the remote connection that it's
    going to send a valid HTTP chunked request, but if the remote end needs
    to respond with an error of any kind sender th...

tags: added: in-feature-hummingbird
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.