Commit Graph

5349 Commits

Author SHA1 Message Date
Sage Weil
0a7077a855 Merge PR #26237 into master
* refs/pull/26237/head:
	Revert "qa: update test_envlibrados_for_rocksdb.sh for libradospp split"
	doc/librados: explicitly mention that the C++ API is not stable
	ceph.spec: force use of upgrade devtoolset-gcc under RHEL 7
	librados: add symbol versioning to the C++ API
	librados: add symbol versioning to the C API
	librados: revert librados3/libradoscc back to librados2

Reviewed-by: Kefu Chai <kchai@redhat.com>
2019-02-21 11:18:46 -06:00
Jason Dillaman
e066757731
Merge pull request #26395 from ykcowrebbaj/patch-1
doc: corrected options of iscsiadm command

Reviewed-by: Jason Dillaman <dillaman@redhat.com>
2019-02-21 09:54:17 -05:00
Jason Dillaman
3322798a36 doc/librados: explicitly mention that the C++ API is not stable
Signed-off-by: Jason Dillaman <dillaman@redhat.com>
2019-02-21 08:28:43 -05:00
ykcowrebbaj
50f0d8739b doc/rbd: fix options of iscsiadm command
Signed-off-by: ZhuJieWen <154667715@qq.com>
2019-02-21 21:25:36 +08:00
Jason Dillaman
65c8733b56 librados: revert librados3/libradoscc back to librados2
For backwards compatibility and upgrade reasons, the librados2
API needs to be preserved and it needs to continue to be compatible
with dependent libraries like librbd1.

Signed-off-by: Jason Dillaman <dillaman@redhat.com>
2019-02-20 14:59:26 -05:00
Sage Weil
d198831c44 Merge PR #26262 into master
* refs/pull/26262/head:
	mgr/orch/ssh: add qa test
	qa: install/exclude ceph-mgr-ssh package
	debian: package ssh orchestrator
	spec.ceph: package ssh orchestrator
	ssh/orch: add ssh orchestrator
2019-02-20 13:05:11 -06:00
Noah Watkins
cdeb604b10 ssh/orch: add ssh orchestrator
Signed-off-by: Noah Watkins <noahwatkins@gmail.com>
2019-02-20 09:45:48 -08:00
Alfredo Deza
7324744712
Merge pull request #26471 from tnaganawa/patch-3
ceph-deploy would not support --cluster option anymore

Reviewed-by: Alfredo Deza <adeza@redhat.com>
2019-02-20 12:23:38 -05:00
Casey Bodley
4c43dd9475
Merge pull request #26299 from yuvalif/add_pubsub_tests
rgw/pubsub: add pubsub tests

Reviewed-by: Casey Bodley <cbodley@redhat.com>
Reviewed-by: Matt Benjamin <mbenjamin@redhat.com>
2019-02-20 09:10:17 -05:00
Sage Weil
a15115fd05 Merge PR #26484 into master
* refs/pull/26484/head:
	msg/async: msgr2: don't smash client cookie on reconnect
	doc/msgr2: session establishment failure scenarios
	msg/async: msgr2: don't smash peer_name and features on reconnect
	msg/async: msgr2: added client and server cookie to protocol

Reviewed-by: Sage Weil <sage@redhat.com>
2019-02-20 07:16:12 -06:00
Sage Weil
618c0ea5da Merge PR #26417 into master
* refs/pull/26417/head:
	qa, doc: update ec fast read setting
	qa/suites: remove mon kv backend options

Reviewed-by: Kefu Chai <kchai@redhat.com>
2019-02-20 07:03:56 -06:00
Matt Benjamin
fcb8149951
Merge pull request #25866 from yuvalif/add_amqp_push_endpoint_new
rgw/pubsub: add amqp push endpoint
2019-02-20 07:37:34 -05:00
Ricardo Dias
d5fab790ef
doc/msgr2: session establishment failure scenarios
Signed-off-by: Ricardo Dias <rdias@suse.com>
2019-02-19 12:14:51 +00:00
Jason Dillaman
1a74204952
Merge pull request #26226 from trociny/wip-rbd-re-sparsify
rbd: online re-sparsify of images

Reviewed-by: Jason Dillaman <dillaman@redhat.com>
2019-02-18 09:24:21 -05:00
Tatsuya Naganawa
e9dd52eb74
ceph-deploy would not support --cluster option anymore
Since ceph-deploy would not support --cluster option anymore, section in this doc could be removed
Signed-off-by: Tatsuya Naganawa <tatsuyan201101@gmail.com>
2019-02-18 02:25:05 +09:00
Mykola Golub
be2cdc0bcf rbd: online re-sparsify of images
Signed-off-by: Mykola Golub <mgolub@suse.com>
2019-02-15 11:12:00 +00:00
Kefu Chai
360ef6ff90
Merge pull request #26406 from drunkard/master
doc: typo fixes, s/Requered/Required/

Reviewed-by: Kefu Chai <kchai@redhat.com>
2019-02-14 00:37:34 +08:00
Lenz Grimmer
681de1a0f1
Merge pull request #26325 from jtlayton/wip-jlayton-dashboard-orch
mgr/dashboard: use the orchestrator_cli backend setting

Reviewed-by: Ricardo Dias <rdias@suse.com>
Reviewed-by: Sebastian Wagner <swagner@suse.com>
Reviewed-by: Sage Weil <sage@redhat.com>
Reviewed-by: Volker Theile <vtheile@suse.com>
2019-02-13 17:08:23 +01:00
Drunkard Zhang
016da6d892 doc: typo fixes, s/Requered/Required/
Signed-off-by: Drunkard Zhang <gongfan193@gmail.com>
2019-02-13 23:04:40 +08:00
Kefu Chai
b145cf0a04
Merge pull request #26390 from smithfarm/wip-doc-mgr-dashboard
doc: add Ceph Manager Dashboard to top-level TOC

Reviewed-by: Lenz Grimmer <lgrimmer@suse.com>
Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>
Reviewed-by: Kefu Chai <kchai@redhat.com>
2019-02-13 21:31:58 +08:00
Yuval Lifshitz
95f586d32f rgw: pubsub. fix commenst from PR#25866. support https
Signed-off-by: Yuval Lifshitz <yuvalif@yahoo.com>
2019-02-13 11:19:19 +02:00
Yuval Lifshitz
3606cb774f rgw: pubsub fix bullet list in doc
Signed-off-by: Yuval Lifshitz <yuvalif@yahoo.com>
2019-02-13 11:19:18 +02:00
Yuval Lifshitz
1682e1917e rgw: pubsub update documentation with amqp support
Signed-off-by: Yuval Lifshitz <yuvalif@yahoo.com>
2019-02-13 11:19:18 +02:00
Nathan Cutler
99493b4a28 doc: add Ceph Manager Dashboard to top-level TOC
Signed-off-by: Nathan Cutler <ncutler@suse.com>
2019-02-12 18:17:11 +01:00
Jeff Layton
55422589ce mgr: make orchestrator_cli be always-on
The volumes module has at least a loose dependency on the orchestrator,
and thus also relies on the orchestrator_cli module for the backend
setting. Since the volumes module is always-on, do the same with the
orchestrator_cli module.

Signed-off-by: Jeff Layton <jlayton@redhat.com>
2019-02-12 08:08:18 -05:00
Sage Weil
bc7f567467 msg/async/ProtocolV2: refuse incoming reconnect attempt intended for someone else
The same scenario that was possible on client_ident is also possible
for reconnect: on the accepting side we recognized the client_addrs
but the client is trying to reach someone else.  Since the cookie is a
random 64-bit value it is unlikely, but still possible, that we will
match an existing session that is not for the client.

Signed-off-by: Sage Weil <sage@redhat.com>
2019-02-11 11:02:28 -06:00
Sage Weil
e399fc7514 msg/async/ProtocolV2: refuse incoming connection intended for someone else
If we get a client_ident frame, and they are trying to talk to someone
else, drop the connection.

This is an inelegant workaround to http://tracker.ceph.com/issues/38247.
A nicer fix would be to restructure the protocol so that the client knows
who they connected to before they try to open a session.  That is a bigger
change that can follow...

Fixes: http://tracker.ceph.com/issues/38247
Signed-off-by: Sage Weil <sage@redhat.com>
2019-02-11 09:29:30 -06:00
Lenz Grimmer
4431d6d60f
Merge pull request #26102 from rhcs-dashboard/wip-featuretoggles
mgr/dashboard: add Feature Toggles

Reviewed-by: Alfonso Martínez <almartin@redhat.com>
Reviewed-by: Patrick Nawracay <pnawracay@suse.com>
Reviewed-by: Tatjana Dehler <tdehler@suse.com>
Reviewed-by: Volker Theile <vtheile@suse.com>
2019-02-11 15:58:57 +01:00
Ernesto Puerta
ec949ab71d
doc: mgr/orch: Fix remote_host doc reference
The type fix in the remote_host to remove_host has caused a Ceph docs
build failure.

Introduced-By: 05cfa6f
Fixes: http://tracker.ceph.com/issues/38254
Signed-off-by: Ernesto Puerta <epuertat@redhat.com>
2019-02-11 12:55:47 +01:00
Ernesto Puerta
ae8e288769
doc: mgr/dashboard: feature-toggles: Fix config
Add '*.inc.rst' to the list of excluded patterns from sphinx-build. This
allows for using '*.inc.rst' as includes, and avoids duplicates. The
benefit of keeping the trailing '.rst' extension is that most IDEs use
that to render reStructured Text files.

Fixes: http://tracker.ceph.com/issues/37530
Signed-off-by: Ernesto Puerta <epuertat@redhat.com>
2019-02-11 12:07:55 +01:00
Ernesto Puerta
7b06daedfc
doc: mgr/dashboard: feature-toggles: Add doc
Fixes: http://tracker.ceph.com/issues/37530
Signed-off-by: Ernesto Puerta <epuertat@redhat.com>
2019-02-11 12:07:55 +01:00
Sebastian Wagner
ad7abc3995
Merge pull request #26314 from sebastian-philipp/orchestrator-host-mon-mgr
mgr/orchestrator: Add host mon mgr management to interface

Reviewed-by: Jeff Layton <jlayton@redhat.com>
Reviewed-by: Noah Watkins <noahwatkins@gmail.com>
2019-02-11 09:52:53 +01:00
Sage Weil
33582d2290 Merge PR #26327 into master
* refs/pull/26327/head:
	doc/dev/msgr2: bring up to date with new HELLO, different RECONNECT
	msg/async/ProtocolV2: separate IDENT into {CLIENT,SERVER}_IDENT

Reviewed-by: Ricardo Dias <rdias@suse.com>
2019-02-09 08:29:18 -06:00
Patrick Donnelly
f9854b522f
Merge PR #26287 into master
* refs/pull/26287/head:
	doc: update doc on new recall config

Reviewed-by: Venky Shankar <vshankar@redhat.com>
2019-02-08 19:38:37 -08:00
Josh Durgin
682def2e32 qa, doc: update ec fast read setting
31dd620883 renamed it but did not update the suites or docs

Signed-off-by: Josh Durgin <jdurgin@redhat.com>
2019-02-08 17:11:34 -05:00
Sebastian Wagner
0daae004f0
Merge pull request #26331 from tchaikov/wip-mgr-orchestrator-docstring
doc/mgr/orchestrator: Add Architecture Image

Reviewed-by: Kefu Chai <kchai@redhat.com>
Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
2019-02-08 09:33:05 +01:00
Sage Weil
2e9c61de49 doc/dev/msgr2: bring up to date with new HELLO, different RECONNECT
Signed-off-by: Sage Weil <sage@redhat.com>
2019-02-07 17:05:10 -06:00
Sage Weil
86c99bf023 msg/async/ProtocolV2: separate IDENT into {CLIENT,SERVER}_IDENT
This is less ambiguous and easier to document since the frame payloads
are different.

Signed-off-by: Sage Weil <sage@redhat.com>
2019-02-07 17:05:10 -06:00
Sage Weil
d3766916a7 Merge PR #26059 into master
* refs/pull/26059/head:
	mon/MonClient: fix keepalive with v2 auth
	msg/async/ProtocolV2: reject peer_addrs of -
	msg/async/ProtocolV2: clean up feature management
	mon/MonClient: set up rotating_secrets, etc before msgr ready
	msg/async: let client specify preferred order of modes
	msg/async/ProtocolV2: include entity_name, features in reconnect
	msg/async/ProtocolV2: fix write_lock usage around AckFrame
	qa/suites/rados/verify/validator/valgrind: debug refs = 5
	qa/standalone/ceph-helpers: fix health_ok test
	auth/AuthRegistry: only complain about disabling cephx if cephx was enabled
	auth/AuthRegistry: fix locking for get_supported_methods()
	auth: remove AUTH_UNKNOWN weirdness, hardcoded defaults.
	msg/async/ProtocolV2: remove unused get_auth_allowed_methods
	osd: set up messener auth_* before setting dispatcher (and going 'ready')
	mon/AuthMonitor: request max_global_id increase from peon in tick
	mon: prime MgrClient only after messengers are initialized
	qa/suites/rados/workloads/rados_api_tests.yaml: debug mgrc = 20 on mon
	auth: document Auth{Client,Server} interfaces
	auth: future-proof AUTH_MODE_* a bit in case we need to change the encoding byte
	mon/MonClient: request monmap on open instead of ping
	mgr/PyModuleRegistry: add details for MGR_MODULE_{DEPENDENCY,ERROR}
	crimson: fix build
	mon/MonClient: finsih authenticate() only after we get monmap; fix 'tell mgr'
	mon: add auth_lock to protect auth_meta manipulation
	ceph-mon: set up auth before binding
	mon: defer initial connection auth attempts until initial quorum is formed
	mon/MonClient: make MonClientPinger an AuthCleint
	ceph_test_msgr: use DummyAuth
	auth/DummyAuth: dummy auth server and client for test code
	mon/Monitor: fix leak of auth_handler if we error out
	doc/dev/cephx: re-wordwrap
	doc/dev/cephx: document nautilus change to cephx
	vstart.sh: fix --msgr2 option
	msg/async/ProtocolV2: use shared_ptr to manage auth_meta
	auth/Auth{Client,Server}: pass auth_meta in explicitly
	mon/MonClient: behave if authorizer can't be built (yet)
	osd: set_auth_server on client_messenger
	common/ceph_context: get_moduel_type() for seastar cct
	auth: make connection_secret a std::string
	auth,msg/async/ProtocolV2: negotiate connection modes
	auth/AuthRegistry: refactor handling of auth_*_requred options
	osd,mgr,mds: remove unused authorize registries
	switch monc, daemons to use new msgr2 auth frame exchange
	doc/dev/msgr2: update docs to match implementation for auth frames
	auth/AuthClientHandler: add build_initial_request hook
	msg/Messenger: attach auth_client and/or auth_server to each Messenger
	auth: introduce AuthClient and AuthServer handlers
	auth: codify AUTH_MODE_AUTHORIZER
	msg/Connection: track peer_id (id portion of entity_name_t) for msgr2
	auth/AuthAuthorizeHandler: add get_supported_methods()
	auth/AuthAuthorizeHandler: fix args for verify_authorizer()
	auth: constify bufferlist arg to AuthAuthorizer::add_challenge()
	auth/cephx: share all tickets and connection_secret in initial reply
	msg/async,auth: add AuthConnectionMeta to Protocol
	auth/AuthClientHandler: pass in session_key, connection_secret pointers
	auth/AuthServiceHandler: take session_key and connection_secret as args
	auth/cephx: pass more specific type into build_session_auth_info
	mon/Session: separate session creation, peer ident, and registration
	mon/AuthMonitor: bump max_global_id from on_active() and tick()
	mon/AuthMonitor: be more careful with max_global_id
	mon: only all ms_handle_authentication() if auth method says we're done
	mon/AuthMonitor: fix "finished with auth" condition check
	auth: clean up AuthServiceHandler::handle_request() args
	auth: clean up AuthServiceHandler::start_session()
	mon/AuthMonitor: drop unused op arg to assign_global_id()
	msg/async: separate TAG_AUTH_REQUEST_MORE and TAG_AUTH_REPLY_MORE
	msg/async: consolidate authorizer checks
	msg/async: move get_auth_allowed into ProtocolV2.cc
	mon/MonClient: trivial cleanup

Reviewed-by: Greg Farnum <gfarnum@redhat.com>
2019-02-07 16:51:39 -06:00
Sage Weil
5e4df2a509 doc/dev/cephx: re-wordwrap
Signed-off-by: Sage Weil <sage@redhat.com>
2019-02-07 12:10:34 -06:00
Sage Weil
c1102f043e doc/dev/cephx: document nautilus change to cephx
Signed-off-by: Sage Weil <sage@redhat.com>
2019-02-07 12:10:33 -06:00
Sage Weil
c7ee66c3e5 auth,msg/async/ProtocolV2: negotiate connection modes
The modes are:

- crc: crc32c checksums to protect against bit errors.  No secrecy or
  authenticity guarantees, so a MITM could alter traffic in flight.
- secure: cryptographic secrecy and authenticity proection (i.e, encrypted
  and signed).

We do not include a 'signed' mode that provides authenticity without
secrecy because the cryptographic protocols appear to be faster than
SHA-2.

New settings:

- ms_cluster_mode  : mode(s list) for intra-cluster connections
- ms_service_mode  : mode(s list) for daemons to allow
- ms_client_mode   : mode(s list) for clients to allow

Also,

- ms_mon_cluster_mode  : mon <-> mon connections
- ms_mon_service_mode  : mon <-> daemon or client connections

The msgr2 protocol is expanded slightly to negotiate a mode.  Client
shares it's allowed/preferred modes, and server picks one as auth finishes.
Negotiation is independent of the authentication, except that the
authentiction mode may precluse certain choices. Specifically, AUTH_NONE
does not support 'secure', only 'crc'.

Signed-off-by: Sage Weil <sage@redhat.com>
2019-02-07 12:10:33 -06:00
Sebastian Wagner
00e2a7c357 doc/mgr/orchestrator: Add Image
Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
2019-02-07 16:24:00 +01:00
Abhishek L
c6f171fc6c
Merge pull request #26312 from smithfarm/wip-luminous-cve
doc: mention CVEs in luminous v12.2.11 release notes

Reviewed-By: Sage Weil <sage@redhat.com>
2019-02-07 14:51:43 +01:00
Sage Weil
c1a2d1be52 doc/dev/msgr2: update docs to match implementation for auth frames
Signed-off-by: Sage Weil <sage@redhat.com>
2019-02-07 06:53:03 -06:00
Sage Weil
1c40968bd5 msg/async: separate TAG_AUTH_REQUEST_MORE and TAG_AUTH_REPLY_MORE
Signed-off-by: Sage Weil <sage@redhat.com>
2019-02-07 06:53:03 -06:00
Matt Benjamin
661d108064
Merge pull request #26098 from pritha-srivastava/wip-rgw-awsv4signature
rgw: Correcting logic for signature calculation for non s3 ops.
2019-02-07 07:34:46 -05:00
Matt Benjamin
56e1a9b66a
Merge pull request #24818 from pritha-srivastava/wip-rgw-sts-auth-policy
[DNM] rgw: Controlling STS authentication via a Policy
2019-02-07 07:33:29 -05:00
Nathan Cutler
1da10a02f3 doc: mention CVEs in luminous v12.2.11 release notes
Signed-off-by: Abhishek Lekshmanan <abhishek@suse.com>
Signed-off-by: Nathan Cutler <ncutler@suse.com>
2019-02-07 11:04:59 +01:00
Noah Watkins
394d3d007e mgr/orch: add host, mon, mgr mgmt interfaces
Signed-off-by: Noah Watkins <nwatkins@redhat.com>
2019-02-07 10:47:41 +01:00