Commit Graph

20566 Commits

Author SHA1 Message Date
Matthew Wodrich
5962a9dde0 obsync: add missing package specifier to format_exc
Fixes: #2873
Signed-off-by: Matthew Wodrich <matthew.wodrich@dreamhost.com>
Reviewed-by: Dan Mick <dan.mick@inktank.com>
2012-08-16 11:01:46 -07:00
Danny Kukawka
a15fde495f fix keyring generation for mds and osd
[ The following text is in the "UTF-8" character set. ]
    [ Your display is set for the "ANSI_X3.4-1968" character set.  ]
    [ Some characters may be displayed incorrectly. ]

Fix config keys for OSD/MDS data dirs. As in documentation and other
places of the scripts the keys are 'osd data'/'mds data' and not
'osd_data'

In case if MDS: if 'mds data' doesn't exist, create it.

Signed-off-by: Danny Kukawka <danny.kukawka@bisect.de>
2012-08-16 09:26:00 -07:00
Danny Kukawka
36e7b077a7 fix ceph osd create help
[ The following text is in the "UTF-8" character set. ]
    [ Your display is set for the "ANSI_X3.4-1968" character set.  ]
    [ Some characters may be displayed incorrectly. ]

Change ceph osd create <osd-id> to ceph osd create <uuid>, since this
is what the command is really doing.

Signed-off-by: Danny Kukawka <danny.kukawka@bisect.de>
2012-08-16 09:26:00 -07:00
Sage Weil
c6ae5e29a1 objectcacher: fix bh leak on discard
Fixes: #2950
Signed-off-by: Sage Weil <sage@inktank.com>
2012-08-15 18:46:25 -07:00
Sage Weil
b97931f43b Merge branch 'testing' into next 2012-08-15 17:56:41 -07:00
Sage Weil
77745f9441 mkcephfs: fix mon data empty check
'read' needs an arg on dash.

Fixes #2922, again.
Signed-off-by: Sage Weil <sage@inktank.com>
2012-08-15 17:56:35 -07:00
Samuel Just
74dd560317 Merge branch 'testing' into next 2012-08-15 15:19:02 -07:00
Samuel Just
3e7df78e67 PG,Message: move intrusive_ptr_* into top namespace
gcc 4.7 requires that the intrusive_ptr_* functions be in
the same namespace as the templated class.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-08-15 14:40:17 -07:00
Sage Weil
119880ca14 Merge branch 'testing' into next 2012-08-14 16:53:48 -07:00
Sage Weil
24a26c6274 mkcephfs: fix mon_data check
* check the right path <facepalm>
* behave if the directory doesn't exist at all yet

Fixes: #2922
Signed-off-by: Sage Weil <sage@inktank.com>
2012-08-14 16:53:34 -07:00
Sage Weil
a4428bd0e1 v0.50 2012-08-13 09:49:24 -07:00
Sage Weil
c75c0d8127 v0.50
-----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1.4.11 (GNU/Linux)
 
 iQIcBAABAgAGBQJQKTBXAAoJEH6/3V0X7TFtVMkP/iFUDiUyJrsr6nxukR9saroe
 i2j2RHzjClY1M1DRYuk4YZ2BljQEVb5rkjGVxXT+LuXK9OOAEbdpSy5EtP3ArHzZ
 VWIdcyac+gMlTxgP5LN2dgPDWBtaEq3PMJex43UViLDz7l5uRHrAnhSMBNw1o+9H
 BwEOF16ZgZl+qQBj1aPakYFl0WqGAzzLtjzvA2Is5kJhffA5JmLDfm7eOrTY2h3n
 +0rGjpam77BJNOze0VGUbQe9PLRg+G4eHYfVJ+KvDS1hBUIH3izOuPWO5u9ThgKM
 OM7clwwKXu3xGxzS4g36bqA+3xCnw+e7Yw+71ne87Ai7hlVAJ0y+q4RdaOBqAeWB
 3OMuz73Dq0c4CsZw5Ot3sGJUoyqqw/fBtfzbMdaBv70Ax28ZGZnHxij0F5uDz4kk
 +X7sxouAsk7GkEtxTZQoGBkRhJoZBwxQBIW698u1wGSJQYHr+8aa+o1eHukloTrc
 L7K1C+YuWQWechK5nRNFEU5hPjcv+beL2ndUZeSJj8ri62qhHPAEi66rh1YJOOq9
 cZRQr99hdfM4tNYLUh3eO3LM6TbBNFmlPwDCse35I70mqTh9ccT9WH0Wj95PIFBD
 rmuXXXwNFTuV/mhUpSUpCaDsEIi4ywfdRYn4jX7iY3z9y2zuhWZSatW4fdvXC0G+
 J91BjPKWdjl9nvBtPJUP
 =dUVd
 -----END PGP SIGNATURE-----

Merge tag 'v0.50'

v0.50
2012-08-13 09:48:49 -07:00
Josh Durgin
98286b499c MonMap: return error on failure in build_initial
If mon_host fails to parse, return an error instead of success.
This avoids failing later on an assert monmap.size() > 0 in the
monmap in MonClient.

Fixes: #2913
Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-08-10 08:59:46 -07:00
Josh Durgin
5c116bf8df addr_parsing: report correct error message
getaddrinfo uses its return code to report failures.

Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-08-10 08:59:41 -07:00
Yehuda Sadeh
677934b1c8 rgw: modify some error messages
Make them more correct, clearer.

Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-08-09 13:54:15 -07:00
Yehuda Sadeh
86be6fe797 Merge remote-tracking branch 'origin/wip-rgw-admin' 2012-08-09 13:39:20 -07:00
Yehuda Sadeh
b28db08ea8 rgw: use multiple notification objects
Issue #2504. This makes us listen and notify on more than
a single object, which reduces the contention of cache
notifications.

NOTE: This change requires that any radosgw and radosgw-admin
use the same 'rgw num control oids' config value. A config value
of 0 will maintain old compatibility, and will allow an upgraded
process run in conjuction with an old one. Setting value other
than 0 (or using the non-zero default) will require upgrading
and restarting all the gateways together. Failing to do so
might lead to inconsistent user and buckets metadata (which
will be resolved once gateways are restarted).

Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-08-09 13:33:37 -07:00
caleb miles
b15d639264 radosgw-admin.rst: Misc doccumentation update.
Signed-off-by: caleb miles <caleb.miles@inktank.com>
2012-08-09 13:27:28 -07:00
caleb miles
45f7f0602c rgw_admin.cc: Allow removal of a user's buckets during user removal.
Allow the buckets, and any child objects, of a user to be deleted when the
user is deleted through radosgw-admin. In reference to feature request
2499: http://tracker.newdream.net/issues/2499.

Signed-off-by: caleb miles <caleb.miles@inktank.com>
2012-08-09 13:27:21 -07:00
caleb miles
cc8eac2427 rgw_admin.cc: Allow for deletion of objects through radosgw-admin.
Allow objects to be deleted through radosgw-admin with an optional flag
to delete the tail of that object during the processing of the intent log.

Signed-off-by: caleb miles <caleb.miles@inktank.com>
2012-08-09 09:55:27 -07:00
John Wilkins
f9359f0c59 doc: New example usage.
Signed-off-by: John Wilkins <john.wilkins@inktank.com>
2012-08-09 09:21:38 -07:00
Yehuda Sadeh
6bc1067fc8 rgw: fix usage trim call encoding
Fixes: #2841.
Usage trim operation was encoding the wrong op structure (usage read).
Since the structures somewhat overlapped it somewhat worked, but user
info wasn't encoded.

Backport: argonaut
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-08-08 16:09:56 -07:00
Yehuda Sadeh
04a0eacd92 cls_rgw: fix rgw_cls_usage_log_trim_op encode/decode
It was not encoding user, adding that and reset version
compatibility.
This changes affects command interface, makes use of
radosgw-admin usage trim incompatible. Use of old
radosgw-admin usage trim should be avoided, as it may
remove more data than requested. In any case, upgraded
server code will not handle old client's trim requests.

backport: argonaut
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-08-08 16:05:57 -07:00
Yehuda Sadeh
074c3c0fe0 rgw: expand date format support
Relaxing the date format parsing function to allow UTC
instead of GMT.

Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-08-08 15:37:28 -07:00
Yehuda Sadeh
d39ea1d4b5 rgw: complete multipart upload can handle chunked encoding
Fixes: #2878
We now allow complete multipart upload to use chunked encoding
when sending request data. With chunked encoding the HTTP_LENGTH
header is not required.

Backport: argonaut
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-08-08 15:34:56 -07:00
Yehuda Sadeh
03b787e0ee rgw_xml: xml_handle_data() appends data string
Fixes: #2879.
xml_handle_data() appends data to the object instead of just
replacing it. Parsed data can arrive in pieces, specifically
when data is escaped.

Backport: argonaut
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-08-08 15:34:27 -07:00
Yehuda Sadeh
3809e34448 rgw: ETag is unquoted in multipart upload complete
Fixes #2877.
Removing quotes from ETag before comparing it to what we
have when completing a multipart upload.

Backport: argonaut
Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-08-08 15:34:02 -07:00
John Wilkins
52f03dcc70 doc: Added debug and logging reference.
Signed-off-by: John Wilkins <john.wilkins@inktank.com>
2012-08-08 15:06:57 -07:00
Sage Weil
d78dfe5d14 mkcephfs: use default osd_data, _journal values
Signed-off-by: Sage Weil <sage@inktank.com>
Reviewed-by: Greg Farnum <greg@inktank.com>
2012-08-08 14:07:16 -07:00
Sage Weil
3c90ff4e96 mkcephfs: use new default keyring locations
The ceph-conf command only parses the conf; it does not apply default
config values.  This breaks mkcephfs if values are not specified in the
config.

Let ceph-osd create its own key, fix copying, and fix creation/copying for
the mds.

Fixes: #2845
Reported-by: Florian Haas <florian@hastexo.com>
Signed-off-by: Sage Weil <sage@inktank.com>
Reviewed-by: Greg Farnum <greg@inktank.com>
2012-08-08 14:07:13 -07:00
Sage Weil
1839105977 Merge remote-tracking branch 'gh/next' 2012-08-08 13:05:12 -07:00
Sage Weil
d5704bd762 buffer: make release() private
This should only be called by ~ptr or when we are replacing the current
target with something new.  It is not suitable for external consumption
Because it doesn't reset length and offset.

Signed-off-by: Sage Weil <sage@inktank.com>
2012-08-08 08:09:59 -07:00
Evan Felix
43291951fa rados.py: add binding for rados_trunc
Fixes: #2909
Signed-off-by: Evan Felix <evan.felix@pnnl.gov>
Signed-off-by: Josh Durgin <josh.durgin@inktank.com>
2012-08-03 17:59:05 -07:00
Tommi Virtanen
3671a37e5d doc: Explicitly state mount.ceph two first arguments are fixed.
I've hurt myself too many times with this.

Signed-off-by: Tommi Virtanen <tv@inktank.com>
2012-08-02 16:03:19 -07:00
Tommi Virtanen
17ad4e18d0 doc: mount.ceph is also needed for cephx.
Signed-off-by: Tommi Virtanen <tv@inktank.com>
2012-08-02 16:03:09 -07:00
Tommi Virtanen
c961a20eca doc: Fix toctree structure for man obsync(1).
Signed-off-by: Tommi Virtanen <tv@inktank.com>
2012-08-02 15:56:57 -07:00
caleb miles
5db3a9e71c rgw_admin.cc: Disallow addition of S3 keys with subuser creation
Fixes: #1855
It is no longer possible to create a subuser and new S3 key associated
with that user through the radosgw-admin utility. In reference to Bug 1855
http://tracker.newdream.net/issues/1855.

Reviewed-by: Yehuda Sadeh <yehuda@inktank.com>
Signed-off-by: caleb miles <caleb.miles@inktank.com>
2012-08-02 13:31:35 -07:00
Tommi Virtanen
4e40a78494 ceph-authtool: Fix usage, it's --print-key not --print.
Signed-off-by: Tommi Virtanen <tv@inktank.com>
2012-08-02 13:02:04 -07:00
Samuel Just
25de5e59d5 Revert "osd: peering: detect when log source osd goes down"
This reverts commit 0d3d75ec0d.

Accidental double push.
2012-08-02 11:00:42 -07:00
Tommi Virtanen
203dffadb7 doc: cd to repository before running git status.
Signed-off-by: Tommi Virtanen <tv@inktank.com>
2012-08-02 08:35:14 -07:00
Tommi Virtanen
48de9b5b87 doc: Say what to do if submodules are out of date.
Signed-off-by: Tommi Virtanen <tv@inktank.com>
2012-08-02 08:35:14 -07:00
Tommi Virtanen
93cbab7370 doc: Simplify submodules explanation.
``git clone --recursive`` does ``init`` & ``update`` for us. Also
avoids incorrect language; there never were submodules called ``init``
and ``update``.

Signed-off-by: Tommi Virtanen <tv@inktank.com>
2012-08-02 08:35:14 -07:00
Wido den Hollander
6af560def9 doc: Correct Git URL for clone
Using git@github.com would mean SSHing in, and your average open
source consumer probably won't have a Github account.

Using HTTPS offers the best combination of resisting man-in-the-middle
attacks and passing through corporate firewalls.

Signed-off-by: Wido den Hollander <wido@widodh.nl>
Signed-off-by: Tommi Virtanen <tv@inktank.com>
2012-08-02 08:33:44 -07:00
Sage Weil
0d3d75ec0d osd: peering: detect when log source osd goes down
The Peering state has a generic check based on the prior set osds that
will restart peering if one of them goes down (or one of the interesting
down ones comes up).  The GetLog state, however, can pull the log from
a peer that is not in the prior set if it got a notify from them (e.g., an
osd in an old interval that was down when the prior set was calculated).
If that osd goes down, we don't detect it and will block forward.

Fix by adding a simple check in GetLog for the newest_update_osd going
down.

(BTW GetMissing does not suffer from this problem because
peer_missing_requested is a subset of the prior set, so the Peering check
is sufficient.)

Signed-off-by: Sage Weil <sage@inktank.com>
Reviewed-by: Samuel Just <sam.just@inktank.com>
2012-08-01 17:17:29 -07:00
Sage Weil
ca2c381380 osd: peering: detect when log source osd goes down
The Peering state has a generic check based on the prior set osds that
will restart peering if one of them goes down (or one of the interesting
down ones comes up).  The GetLog state, however, can pull the log from
a peer that is not in the prior set if it got a notify from them (e.g., an
osd in an old interval that was down when the prior set was calculated).
If that osd goes down, we don't detect it and will block forward.

Fix by adding a simple check in GetLog for the newest_update_osd going
down.

(BTW GetMissing does not suffer from this problem because
peer_missing_requested is a subset of the prior set, so the Peering check
is sufficient.)

Signed-off-by: Sage Weil <sage@inktank.com>
Reviewed-by: Samuel Just <sam.just@inktank.com>
2012-08-01 09:55:45 -07:00
Yehuda Sadeh
bb6e0d0e58 wireshark: update patch
Update to latest source tree (svn 43768).

Signed-off-by: Yehuda Sadeh <yehuda@inktank.com>
2012-07-31 15:49:25 -07:00
Samuel Just
deec81b4e9 ReplicatedPG: clear waiting_for_ack when we send the commit
Otherwise, we might send the ack anyway later, after a subsequent
commit is sent resulting in an out-of-order op.

This resulted in a a crash when the client encountered out of
order ops.

Signed-off-by: Samuel Just <sam.just@inktank.com>
2012-07-31 14:26:19 -07:00
Samuel Just
e0e72d78b7 Merge remote-tracking branch 'upstream/wip-leveldb-iterators' 2012-07-31 13:51:49 -07:00
Sylvain Munaut
f22b95da27 rbd: fix off-by-one error in key name
Fixes: #2846
Signed-off-by: Sylvain Munaut <tnt@246tNt.com>
2012-07-31 11:48:31 -07:00
Sylvain Munaut
e775ce52ab secret: return error on empty secret
Signed-off-by: Sylvain Munaut <tnt@246tNt.com>
2012-07-31 11:48:29 -07:00