Breaking this out in a separate commit to make the backport a bit easier.
Signed-off-by: Sage Weil <sage@redhat.com>
s->entity_name,
module, prefix, param_str_map,
cmd_r, cmd_w, cmd_x,
- s->get_peer_addr());
+ s->get_peer_socket_addr());
dout(10) << __func__ << " " << (capable ? "" : "not ") << "capable" << dendl;
return capable;
CEPH_ENTITY_TYPE_MON,
session->entity_name,
"osd", "osd pool rmsnap", {}, true, true, false,
- session->get_peer_addr())) {
+ session->get_peer_socket_addr())) {
dout(0) << "got preprocess_remove_snaps from entity with insufficient caps "
<< session->caps << dendl;
goto ignore;
if (!is_unmanaged_snap_op_permitted(cct, mon->key_server,
session->entity_name, session->caps,
- session->get_peer_addr(),
+ session->get_peer_socket_addr(),
pool_name)) {
dout(0) << "got unmanaged-snap pool op from entity with insufficient "
<< "privileges. message: " << *m << std::endl
uint64_t con_features = 0; // zero if AnonConnection
entity_name_t name;
entity_addrvec_t addrs;
+ entity_addr_t socket_addr;
utime_t session_timeout;
bool closed = false;
xlist<MonSession*>::item item;
con_type(c->get_peer_type()),
name(n),
addrs(av),
+ socket_addr(c->get_peer_socket_addr()),
item(this) {
if (c->get_messenger()) {
// only fill in features if this is a non-anonymous connection
entity_name,
service, "", args,
mask & MON_CAP_R, mask & MON_CAP_W, mask & MON_CAP_X,
- get_peer_addr());
+ get_peer_socket_addr());
}
- const entity_addr_t& get_peer_addr() {
- return inst.addr;
+ const entity_addr_t& get_peer_socket_addr() {
+ return socket_addr;
}
};