RGW_OP_GET_BUCKET_LOGGING,
RGW_OP_GET_BUCKET_VERSIONING,
RGW_OP_SET_BUCKET_VERSIONING,
+ RGW_OP_GET_BUCKET_WEBSITE,
+ RGW_OP_SET_BUCKET_WEBSITE,
RGW_OP_STAT_BUCKET,
RGW_OP_CREATE_BUCKET,
RGW_OP_DELETE_BUCKET,
RGW_OP_PUT_CORS,
RGW_OP_DELETE_CORS,
RGW_OP_OPTIONS_CORS,
+ RGW_OP_GET_REQUEST_PAYMENT,
+ RGW_OP_SET_REQUEST_PAYMENT,
RGW_OP_INIT_MULTIPART,
RGW_OP_COMPLETE_MULTIPART,
RGW_OP_ABORT_MULTIPART,
RGW_OP_LIST_MULTIPART,
RGW_OP_LIST_BUCKET_MULTIPARTS,
RGW_OP_DELETE_MULTI_OBJ,
+ RGW_OP_BULK_DELETE,
/* rgw specific */
- RGW_OP_ADMIN_SET_METADATA,
+ RGW_OP_ADMIN_SET_METADATA
};
class RGWAccessControlPolicy;
* by converting %-escaped strings into characters, etc*/
extern void rgw_uri_escape_char(char c, string& dst);
extern bool url_decode(const string& src_str, string& dest_str, bool in_query = false);
-extern void url_encode(const string& src, string& dst, bool in_query = false);
+extern void url_encode(const string& src, string& dst);
/* destination should be CEPH_CRYPTO_HMACSHA1_DIGESTSIZE bytes long */
extern void calc_hmac_sha1(const char *key, int key_len,
/* verify signature */
- if (s->aws4_auth_signature != s->aws4_auth_new_signature) {
+ if (s->aws4_auth->signature != s->aws4_auth->new_signature) {
op_ret = -ERR_SIGNATURE_NO_MATCH;
ldout(s->cct, 20) << "delayed aws4 auth failed" << dendl;
goto done;
s->system_request = true;
dout(20) << "system request" << dendl;
s->info.args.set_system();
- string effective_uid = s->info.args.get(RGW_SYS_PARAM_PREFIX "uid");
+ string euid = s->info.args.get(RGW_SYS_PARAM_PREFIX "uid");
+ rgw_user effective_uid(euid);
RGWUserInfo effective_user;
if (!effective_uid.empty()) {
int ret = rgw_get_user_info_by_uid(store, effective_uid, effective_user);