bool more, //< true if this is not the first part of the handshake
uint32_t auth_method,
const bufferlist& bl,
+ uint64_t *p_peer_global_id,
bufferlist *reply) = 0;
};
bool more,
uint32_t auth_method,
const bufferlist& bl,
+ uint64_t *p_peer_global_id,
bufferlist *reply) override {
return 1;
}
bool more,
uint32_t auth_method,
const ceph::bufferlist& payload,
+ uint64_t *p_peer_global_id,
ceph::bufferlist *reply)
{
if (payload.length() == 0) {
auth_meta.get_connection_secret_length(),
reply,
&name,
- &conn.peer_global_id,
+ p_peer_global_id,
&caps_info,
&auth_meta.session_key,
&auth_meta.connection_secret,
bool more,
uint32_t auth_method,
const ceph::bufferlist& payload,
+ uint64_t *p_peer_global_id,
ceph::bufferlist *reply) final;
crimson::common::CephContext cct; // for auth_registry
set_peer_id(name.num());
}
- public:
- uint64_t peer_global_id = 0;
-
protected:
uint64_t features = 0;
more,
auth_meta->auth_method,
auth_payload,
+ &conn.peer_global_id,
&reply);
switch (r) {
// successful
// messages sent, but not yet acked by peer
std::deque<MessageURef> sent;
+ uint64_t peer_global_id = 0;
+
seastar::shard_id shard_id() const;
public: