Learn more about these different git repos.
Other Git URLs
Recently an application was trying to manipulate Koji tags with the editTag2 RPC, but the user account did not have the "tag" permission, so the hub raised ActionNotAllowed from assertPerm("tag").
editTag2
ActionNotAllowed
assertPerm("tag")
It was not immediately obvious what was going on, because the application developers use two different system accounts. One account had the "tag" permission, one did not.
When we hit the error in assertPerm(), we only tell the user what permission they are missing, and not the user account:
assertPerm()
raise koji.ActionNotAllowed("%s permission required" % name)
I understand the user shares some responsibility to understand what account they are using, but on the other hand when the application is wrapped in several layers (containers, openshift, etc) it's a little hard for new users to debug this.
If session.logged_in is false, it would be really nice to say "user not logged in" in the exception here.
session.logged_in
If session.logged_in is true, it would be really nice to include the username in the exception.
Metadata Update from @tkopecek: - Custom field Size adjusted to None - Issue priority set to: Low (was: Normal) - Issue set to the milestone: 1.23 - Issue tagged with: feature
PR #2457
Metadata Update from @jcupova: - Issue tagged with: testing-ready
Metadata Update from @jcupova: - Issue tagged with: testing-done
Commit 9c92f5e fixes this issue
Commit b4cfca0 fixes this issue
Login to comment on this ticket.