-
Notifications
You must be signed in to change notification settings - Fork 3.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cloud/gcp: TestFileDoesNotExist failed #135307
cloud/gcp: TestFileDoesNotExist failed #135307
Comments
cloud/gcp.TestFileDoesNotExist failed with artifacts on master @ 69fbd56c594624b45f421617728ff00462020ff5:
Same failure on other branches
|
cloud/gcp.TestFileDoesNotExist failed with artifacts on master @ a5ab06046e817627cd0b64390f4ede0c4a5d82ef:
Same failure on other branches
|
cloud/gcp.TestFileDoesNotExist failed with artifacts on master @ 864b6c3c540a7fb2039227d25e3d785cbdbc769f:
Same failure on other branches
|
Okay. I think what happened is GCP behavior changed. This started failing on all branches without a correlated back port. Here's the error the test is seeing:
Instead of returning not found, its returning a permission denied error. This isn't listed in the change log for GCS: https://cloud.google.com/storage/docs/release-notes. |
The behavior of GCS appears to have changed. If a bucket does not exist, it will return a 403 forbidden. So we can't disambiguate a bucket that does not exist from a bucket we can't access. Overall, this is annoying but fine. The main value of not found as a sentinel error the program can check is it indicates the name is free and can be used. This property doesn't apply if the bucket does not exist because CRDB will never create a bucket. Release Justification: Test only change Release Note: None Fixes: cockroachdb#135307 Fixes: cockroachdb#135348 Fixes: cockroachdb#135349 Fixes: cockroachdb#135350 Fixes: cockroachdb#135351 Fixes: cockroachdb#135352
The behavior of GCS appears to have changed. If a bucket does not exist, it will return a 403 forbidden. So we can't disambiguate a bucket that does not exist from a bucket we can't access. Overall, this is annoying but fine. The main value of not found as a sentinel error the program can check is it indicates the name is free and can be used. This property doesn't apply if the bucket does not exist because CRDB will never create a bucket. Release Justification: Test only change Release Note: None Fixes: cockroachdb#135307 Fixes: cockroachdb#135348 Fixes: cockroachdb#135349 Fixes: cockroachdb#135350 Fixes: cockroachdb#135351 Fixes: cockroachdb#135352
126587: kvpb: removed disused Path field from ExportResp r=dt a=dt Release note: none. Epic: none. 134228: rpc: reduce certificate-related allocations during authentication r=mgartner a=mgartner #### rpc: add authenication benchmark Release note: None #### rpc: reduce certificate-related allocations during authentication This commit avoids certificate-related allocations in the happy path of authenticating network requests. Release note: None #### security: inline getCertificatePrincipals The `getCertificatePrincipals` function has been inlined into its one callsite to avoid allocating a slice of the results. Fixes #133317 Release note: None 135291: logictest: enable local-mixed-24.3 config r=RaduBerinde a=RaduBerinde #### bootstrap: add 24.3 bootstrap data Obtained by running (on release-24.3 branch): ``` ./dev build sql-bootstrap-data && bin/sql-bootstrap-data ``` Epic: REL-1322 Release note: None #### logictest: enable local-mixed-24.3 config Includes a minor fix to the schema changer (thanks Rafi and Annie!). Fixes #135358 Epic: REL-1322 Release note: None 135337: cli: skip TestTenantZip under deadlock r=dhartunian a=dhartunian We had some CPU profile failures under deadlock, skipping under that scenario since that's not relevant for this test. Resolves: #134187 Release note: None 135552: ldapccl: support partial ldap groups mapping on authz r=souravcrl a=souravcrl fixes #133779 Epic CRDB-33829 Currently, an LDAP user may be configured to be a member of multiple LDAP groups, and when we retrieve the group roles for the user during LDAP authZ we try to find corresponding roles for all the groups being synced and fail the roles grant operation if any of the group roles do not exist on CRDB. This is a problem as not all groups are desired to have corresponding CRDB roles and in such a case a partial roles grant should take place. Release note(security): This fix will add support for partial roles from ldap synced group to be mapped to crdb roles and ensure appropriate erroring for undesired behavior. 135565: gcs: remove test that asserts buckets produce not found error r=jeffswenson a=jeffswenson The behavior of GCS appears to have changed. If a bucket does not exist, it will return a 403 forbidden. So we can't disambiguate a bucket that does not exist from a bucket we can't access. Overall, this is annoying but fine. The main value of not found as a sentinel error the program can check is it indicates the name is free and can be used. This property doesn't apply if the bucket does not exist because CRDB will never create a bucket. Release Justification: Test only change Release Note: None Fixes: #135307 Fixes: #135348 Fixes: #135349 Fixes: #135350 Fixes: #135351 Fixes: #135352 Co-authored-by: David Taylor <tinystatemachine@gmail.com> Co-authored-by: Marcus Gartner <marcus@cockroachlabs.com> Co-authored-by: Radu Berinde <radu@cockroachlabs.com> Co-authored-by: David Hartunian <davidh@cockroachlabs.com> Co-authored-by: souravcrl <sourav.sarangi@cockroachlabs.com> Co-authored-by: Jeff Swenson <jeffswenson@betterthannull.com>
Based on the specified backports for linked PR #135565, I applied the following new label(s) to this issue: branch-release-23.2, branch-release-24.1, branch-release-24.2, branch-release-24.3, branch-release-24.3.0-rc. Please adjust the labels as needed to match the branches actually affected by this issue, including adding any known older branches. 🦉 Hoot! I am a Blathers, a bot for CockroachDB. My owner is dev-inf. |
The behavior of GCS appears to have changed. If a bucket does not exist, it will return a 403 forbidden. So we can't disambiguate a bucket that does not exist from a bucket we can't access. Overall, this is annoying but fine. The main value of not found as a sentinel error the program can check is it indicates the name is free and can be used. This property doesn't apply if the bucket does not exist because CRDB will never create a bucket. Release Justification: Test only change Release Note: None Fixes: #135307 Fixes: #135348 Fixes: #135349 Fixes: #135350 Fixes: #135351 Fixes: #135352
The behavior of GCS appears to have changed. If a bucket does not exist, it will return a 403 forbidden. So we can't disambiguate a bucket that does not exist from a bucket we can't access. Overall, this is annoying but fine. The main value of not found as a sentinel error the program can check is it indicates the name is free and can be used. This property doesn't apply if the bucket does not exist because CRDB will never create a bucket. Release Justification: Test only change Release Note: None Fixes: #135307 Fixes: #135348 Fixes: #135349 Fixes: #135350 Fixes: #135351 Fixes: #135352
The behavior of GCS appears to have changed. If a bucket does not exist, it will return a 403 forbidden. So we can't disambiguate a bucket that does not exist from a bucket we can't access. Overall, this is annoying but fine. The main value of not found as a sentinel error the program can check is it indicates the name is free and can be used. This property doesn't apply if the bucket does not exist because CRDB will never create a bucket. Release Justification: Test only change Release Note: None Fixes: #135307 Fixes: #135348 Fixes: #135349 Fixes: #135350 Fixes: #135351 Fixes: #135352
The behavior of GCS appears to have changed. If a bucket does not exist, it will return a 403 forbidden. So we can't disambiguate a bucket that does not exist from a bucket we can't access. Overall, this is annoying but fine. The main value of not found as a sentinel error the program can check is it indicates the name is free and can be used. This property doesn't apply if the bucket does not exist because CRDB will never create a bucket. Release Justification: Test only change Release Note: None Fixes: #135307 Fixes: #135348 Fixes: #135349 Fixes: #135350 Fixes: #135351 Fixes: #135352
The behavior of GCS appears to have changed. If a bucket does not exist, it will return a 403 forbidden. So we can't disambiguate a bucket that does not exist from a bucket we can't access. Overall, this is annoying but fine. The main value of not found as a sentinel error the program can check is it indicates the name is free and can be used. This property doesn't apply if the bucket does not exist because CRDB will never create a bucket. Release Justification: Test only change Release Note: None Fixes: #135307 Fixes: #135348 Fixes: #135349 Fixes: #135350 Fixes: #135351 Fixes: #135352
Previously, we used a hard coded bucket name when tested the GCS and S3 behavior of buckets that do not exist. This made it possible for people to create that bucket and break the test. Now, the test uses a random bucket name. Release Justification: Test Only Change Release Note: None Fixes: cockroachdb#135307 Fixes: cockroachdb#135348 Fixes: cockroachdb#135349 Fixes: cockroachdb#135350 Fixes: cockroachdb#135351 Fixes: cockroachdb#135352
Previously, the GCS and S3 tests used hard coded bucket names to test the behavior of buckets that do not exist. Now, the tests use a random UUID. This change is necessary because someone appears to have created the GCP bucket which causes the test to fail. Release Justification: Test Only Change Release Note: None Fixes: cockroachdb#135307 Fixes: cockroachdb#135348 Fixes: cockroachdb#135349 Fixes: cockroachdb#135350 Fixes: cockroachdb#135351 Fixes: cockroachdb#135352
135135: backupccl: clean up old restore syntax code r=msbutler a=kev-cao The old restore syntax was fully removed in #133610. This commit removes all the old code that ran for the old syntax. Epic: none Release note: none 135581: orchestration: released CockroachDB version 24.2.5. Next version: 24.2.6 r=fantapop a=cockroach-teamcity Release note: None Epic: None Release justification: non-production (release infra) change. 135616: build: allow `bazel-generate.sh` to detect changes to untracked files r=rail,RaduBerinde a=rickystewart In some scenarios, the existing logic can be insufficient to detect changes as file generation can create untracked files, which are then not spotted by `git diff`. In addition to the `git diff`, we also run `git status` to spot these files specifically. Closes: #135345 Epic: CRDB-17171 Release note: None 135619: Revert "gcs: remove test that asserts buckets produce not found error" r=jeffswenson a=jeffswenson This reverts commit 83ece20. Release Note: None Part of: #135307 Part of: #135348 Part of: #135349 Part of: #135350 Part of: #135351 Part of: #135352 Co-authored-by: Kevin Cao <kevin.cao@cockroachlabs.com> Co-authored-by: Justin Beaver <teamcity@cockroachlabs.com> Co-authored-by: Ricky Stewart <ricky@cockroachlabs.com> Co-authored-by: Jeff Swenson <jeffswenson@betterthannull.com>
Previously, the GCS and S3 tests used hard coded bucket names to test the behavior of buckets that do not exist. Now, the tests use a random UUID. This change is necessary because someone appears to have created the GCP bucket which causes the test to fail. Release Justification: Test Only Change Release Note: None Fixes: cockroachdb#135307 Fixes: cockroachdb#135348 Fixes: cockroachdb#135349 Fixes: cockroachdb#135350 Fixes: cockroachdb#135351 Fixes: cockroachdb#135352
cloud/gcp.TestFileDoesNotExist failed with artifacts on master @ cd7b29726f13528f2c435cd46a9f7af2b341cb1a:
Help
See also: How To Investigate a Go Test Failure (internal)
This test on roachdash | Improve this report!
Jira issue: CRDB-44448
The text was updated successfully, but these errors were encountered: