Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DAOS-15874 control: Add optional credential cache to agent #14412

Merged
merged 5 commits into from
Jul 7, 2024

Conversation

mjmac
Copy link
Contributor

@mjmac mjmac commented May 21, 2024

On heavily-loaded client nodes where many processes are being
launched by the same user or users, the admin may optionally
enable the credential cache in the agent in order to lower
agent overhead caused by generating identical credentials
for each process owned by a user. The agent-generated
credential is presented by the client process during pool/container
connection and is used to evaluate ACL permissions for
that connection.

Example config:
credential_config:
cache_expiration: 1m

Signed-off-by: Michael MacDonald mjmac@google.com

Copy link

Ticket title is 'Optionally cache generated client credentials in daos_agent'
Status is 'Open'
https://daosio.atlassian.net/browse/DAOS-15874

Base automatically changed from mjmac/DAOS-15849 to master June 11, 2024 12:47
On heavily-loaded client nodes where many processes are being
launched by the same user or users, the admin may optionally
enable the credential cache in the agent in order to lower
agent overhead caused by generating identical credentials
for each process owned by a user. The agent-generated
credential is presented by the client process during pool/container
connection and is used to evaluate ACL permissions for
that connection.

Example config:
credential_config:
  cache_lifetime: 1m

Features: control
Required-githooks: true
Change-Id: I6ae2a8be1dd97ef14e0ccef0283d65bc1fabc4ed
Signed-off-by: Michael MacDonald <mjmac@google.com>
@mjmac mjmac force-pushed the mjmac/DAOS-15874 branch from 7a3887f to 8efd78e Compare June 11, 2024 12:53
@mjmac mjmac marked this pull request as ready for review June 11, 2024 20:47
@mjmac mjmac requested review from a team as code owners June 11, 2024 20:47
tanabarr
tanabarr previously approved these changes Jun 12, 2024
@mjmac mjmac requested a review from kjacque June 12, 2024 12:00
@daosbuild1
Copy link
Collaborator

Test stage Functional Hardware Medium completed with status FAILURE. https://build.hpdd.intel.com//job/daos-stack/job/daos/view/change-requests/job/PR-14412/3/execution/node/1506/log

@daosbuild1
Copy link
Collaborator

Test stage Functional Hardware Medium completed with status FAILURE. https://build.hpdd.intel.com//job/daos-stack/job/daos/view/change-requests/job/PR-14412/4/execution/node/657/log

@mjmac
Copy link
Contributor Author

mjmac commented Jun 17, 2024

Runs 3 & 4 both hit a timeout in the offline reintegration tests, which appears to be tracked in DAOS-15608. I don't think it's related to any changes made in this patch.

mjmac added 2 commits June 20, 2024 22:12
Required-githooks: true

Change-Id: I05033f12fc40f7abdab0fbf12086a900d1f96142
  * Remove lock management from RefreshableItem implementations
  * Add interface assignments checks to ensure that breaking
    implementation updates are flagged by the compiler

Features: control
Required-githooks: true

Change-Id: Id3351895d4de6ce928b5f65bbbde8408dc841c55
Signed-off-by: Michael MacDonald <mjmac@google.com>
@daosbuild1
Copy link
Collaborator

Test stage Functional on EL 8.8 completed with status FAILURE. https://build.hpdd.intel.com//job/daos-stack/job/daos/view/change-requests/job/PR-14412/5/execution/node/1183/log

@mjmac mjmac requested review from kjacque and tanabarr June 25, 2024 17:25
Copy link
Contributor

@kjacque kjacque left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A couple very minor nonblocking comments. LGTM.

lastResponse: &control.GetAttachInfoResp{},
},
},
} {
t.Run(name, func(t *testing.T) {
test.AssertEqual(t, tc.expResult, tc.ai.NeedsRefresh(), "")
refreshed, _ := tc.ai.RefreshIfNeeded(test.Context(t))
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should probably verify the resulting error as well?

cachedCredential struct {
cacheItem
key string
expiredAt time.Time
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
expiredAt time.Time
expiresAt time.Time

Just a nit but expiredAt reads to me as "already expired"

@daosbuild1
Copy link
Collaborator

Test stage Functional Hardware Medium MD on SSD completed with status FAILURE. https://build.hpdd.intel.com//job/daos-stack/job/daos/view/change-requests/job/PR-14412/6/execution/node/752/log

@daosbuild1
Copy link
Collaborator

Test stage Functional Hardware Medium Verbs Provider completed with status FAILURE. https://build.hpdd.intel.com//job/daos-stack/job/daos/view/change-requests/job/PR-14412/6/execution/node/798/log

@daosbuild1
Copy link
Collaborator

Test stage Functional Hardware Medium UCX Provider completed with status FAILURE. https://build.hpdd.intel.com//job/daos-stack/job/daos/view/change-requests/job/PR-14412/6/execution/node/1207/log

Change-Id: Ic077b4b35fce9893290ce2075b03f93a1279621f
@daosbuild1
Copy link
Collaborator

Test stage Functional Hardware Medium completed with status FAILURE. https://build.hpdd.intel.com//job/daos-stack/job/daos/view/change-requests/job/PR-14412/8/execution/node/1562/log

@daosbuild1
Copy link
Collaborator

Test stage Functional Hardware Medium Verbs Provider MD on SSD completed with status FAILURE. https://build.hpdd.intel.com//job/daos-stack/job/daos/view/change-requests/job/PR-14412/8/execution/node/1700/log

@daosbuild1
Copy link
Collaborator

Test stage Functional Hardware Medium UCX Provider completed with status FAILURE. https://build.hpdd.intel.com//job/daos-stack/job/daos/view/change-requests/job/PR-14412/8/execution/node/1883/log

Change-Id: I4ee7940dcdd3dcd5647ffae1fd346ae1c1dec750
@mjmac mjmac merged commit 6231264 into master Jul 7, 2024
52 checks passed
@mjmac mjmac deleted the mjmac/DAOS-15874 branch July 7, 2024 22:28
mjmac added a commit that referenced this pull request Jul 10, 2024
On heavily-loaded client nodes where many processes are being
launched by the same user or users, the admin may optionally
enable the credential cache in the agent in order to lower
agent overhead caused by generating identical credentials
for each process owned by a user. The agent-generated
credential is presented by the client process during pool/container
connection and is used to evaluate ACL permissions for
that connection.

Example config:
credential_config:
  cache_expiration: 1m

Signed-off-by: Michael MacDonald <mjmac@google.com>
mjmac added a commit that referenced this pull request Jul 10, 2024
On heavily-loaded client nodes where many processes are being
launched by the same user or users, the admin may optionally
enable the credential cache in the agent in order to lower
agent overhead caused by generating identical credentials
for each process owned by a user. The agent-generated
credential is presented by the client process during pool/container
connection and is used to evaluate ACL permissions for
that connection.

Example config:
credential_config:
  cache_expiration: 1m

Signed-off-by: Michael MacDonald <mjmac@google.com>
jolivier23 pushed a commit that referenced this pull request Jul 16, 2024
…14739)

On heavily-loaded client nodes where many processes are being
launched by the same user or users, the admin may optionally
enable the credential cache in the agent in order to lower
agent overhead caused by generating identical credentials
for each process owned by a user. The agent-generated
credential is presented by the client process during pool/container
connection and is used to evaluate ACL permissions for
that connection.

Example config:
credential_config:
  cache_expiration: 1m

Signed-off-by: Michael MacDonald <mjmac@google.com>
grom72 pushed a commit to grom72/daos that referenced this pull request Jul 25, 2024
…k#14412)

On heavily-loaded client nodes where many processes are being
launched by the same user or users, the admin may optionally
enable the credential cache in the agent in order to lower
agent overhead caused by generating identical credentials
for each process owned by a user. The agent-generated
credential is presented by the client process during pool/container
connection and is used to evaluate ACL permissions for
that connection.

Example config:
credential_config:
  cache_expiration: 1m

Signed-off-by: Michael MacDonald <mjmac@google.com>
@mjmac mjmac mentioned this pull request Mar 18, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

4 participants