AuthMethodList supported;
public:
- AuthAuthorizeHandlerRegistry(CephContext *cct_, std::string methods)
+ AuthAuthorizeHandlerRegistry(CephContext *cct_, const std::string &methods)
: m_lock("AuthAuthorizeHandlerRegistry::m_lock"), supported(cct_, methods)
{}
~AuthAuthorizeHandlerRegistry();
uint64_t obj_index_,
uint64_t obj_size_,
time_t mtime_,
- std::string obj_xattr_name_,
- std::string mtime_xattr_name_,
- std::string obj_size_xattr_name_)
+ const std::string &obj_xattr_name_,
+ const std::string &mtime_xattr_name_,
+ const std::string &obj_size_xattr_name_)
: obj_index(obj_index_),
obj_size(obj_size_),
mtime(mtime_),
static const string RBD_GROUP_SNAP_KEY_PREFIX = "snapshot_";
-std::string snap_key(std::string snap_id) {
+std::string snap_key(const std::string &snap_id) {
ostringstream oss;
oss << RBD_GROUP_SNAP_KEY_PREFIX << snap_id;
return oss.str();
}
static int check_duplicate_snap_name(cls_method_context_t hctx,
- std::string snap_name,
- std::string snap_id)
+ const std::string &snap_name,
+ const std::string &snap_id)
{
const int max_read = 1024;
cls::rbd::GroupSnapshot snap_last;
return get_id_finish(&it, id);
}
- void set_id(librados::ObjectWriteOperation *op, const std::string id)
+ void set_id(librados::ObjectWriteOperation *op, const std::string &id)
{
bufferlist bl;
encode(id, bl);
op->exec("rbd", "set_id", bl);
}
- int set_id(librados::IoCtx *ioctx, const std::string &oid, std::string id)
+ int set_id(librados::IoCtx *ioctx, const std::string &oid, const std::string &id)
{
librados::ObjectWriteOperation op;
set_id(&op, id);
int get_id_finish(bufferlist::iterator *it, std::string *id);
int get_id(librados::IoCtx *ioctx, const std::string &oid, std::string *id);
- void set_id(librados::ObjectWriteOperation *op, std::string id);
- int set_id(librados::IoCtx *ioctx, const std::string &oid, std::string id);
+ void set_id(librados::ObjectWriteOperation *op, const std::string &id);
+ int set_id(librados::IoCtx *ioctx, const std::string &oid, const std::string &id);
// operations on rbd_directory objects
int dir_get_id(librados::IoCtx *ioctx, const std::string &oid,
int rval; ///< return value
public:
C_SaferCond() : lock("C_SaferCond"), done(false), rval(0) {}
- C_SaferCond(std::string name) : lock(name), done(false), rval(0) {}
+ C_SaferCond(const std::string &name) : lock(name), done(false), rval(0) {}
void finish(int r) override { complete(r); }
/// We overload complete in order to not delete the context
namespace ceph {
namespace logging {
-Graylog::Graylog(const SubsystemMap * const s, std::string logger)
+Graylog::Graylog(const SubsystemMap * const s, const std::string &logger)
: m_subs(s),
m_log_dst_valid(false),
m_hostname(""),
m_formatter_section = std::unique_ptr<Formatter>(Formatter::create("json"));
}
-Graylog::Graylog(std::string logger)
+Graylog::Graylog(const std::string &logger)
: m_subs(NULL),
m_log_dst_valid(false),
m_hostname(""),
* @param s SubsystemMap
* @param logger Value for key "_logger" in GELF
*/
- Graylog(const SubsystemMap * const s, std::string logger);
+ Graylog(const SubsystemMap * const s, const std::string &logger);
/**
* Create Graylog without SubsystemMap. Logging will not be ready
* until set_destination is called
* @param logger Value for key "_logger" in GELF
*/
- explicit Graylog(std::string logger);
+ explicit Graylog(const std::string &logger);
virtual ~Graylog();
void set_hostname(const std::string& host);
Align col_align;
TextTableColumn() {}
- TextTableColumn(std::string h, int w, Align ha, Align ca) :
+ TextTableColumn(const std::string &h, int w, Align ha, Align ca) :
heading(h), width(w), hd_align(ha), col_align(ca) { }
~TextTableColumn() {}
};
void print_bit_str(
uint64_t bits,
std::ostream &out,
- std::function<const char*(uint64_t)> func,
+ const std::function<const char*(uint64_t)> &func,
bool dump_bit_val)
{
_dump_bit_str(bits, &out, NULL, func, dump_bit_val);
void dump_bit_str(
uint64_t bits,
ceph::Formatter *f,
- std::function<const char*(uint64_t)> func,
+ const std::function<const char*(uint64_t)> &func,
bool dump_bit_val)
{
_dump_bit_str(bits, NULL, f, func, dump_bit_val);
extern void print_bit_str(
uint64_t bits,
std::ostream &out,
- std::function<const char*(uint64_t)> func,
+ const std::function<const char*(uint64_t)> &func,
bool dump_bit_val = false);
extern void dump_bit_str(
uint64_t bits,
ceph::Formatter *f,
- std::function<const char*(uint64_t)> func,
+ const std::function<const char*(uint64_t)> &func,
bool dump_bit_val = false);
#endif /* CEPH_COMMON_BIT_STR_H */
return _set_gid;
}
- void set_uid_gid_strings(std::string u, std::string g) {
+ void set_uid_gid_strings(const std::string &u, const std::string &g) {
_set_uid_string = u;
_set_gid_string = g;
}
}
}
-std::string hexdump(std::string msg, const char *s, int len)
+std::string hexdump(const std::string &msg, const char *s, int len)
{
int buf_len = len*4;
char buf[buf_len];
return 0;
}
-int ErasureCodeLrc::layers_parse(string description_string,
+int ErasureCodeLrc::layers_parse(const string &description_string,
json_spirit::mArray description,
ostream *ss)
{
return 0;
}
-int ErasureCodeLrc::layers_sanity_checks(string description_string,
+int ErasureCodeLrc::layers_sanity_checks(const string &description_string,
ostream *ss) const
{
int position = 0;
return 0;
}
-int ErasureCodeLrc::parse_rule_step(string description_string,
+int ErasureCodeLrc::parse_rule_step(const string &description_string,
json_spirit::mArray description,
ostream *ss)
{
static const std::string DEFAULT_KML;
struct Layer {
- explicit Layer(std::string _chunks_map) : chunks_map(_chunks_map) { }
+ explicit Layer(const std::string &_chunks_map) : chunks_map(_chunks_map) { }
ErasureCodeInterfaceRef erasure_code;
std::vector<int> data;
std::vector<int> coding;
std::string rule_root;
std::string rule_device_class;
struct Step {
- Step(std::string _op, std::string _type, int _n) :
+ Step(const std::string &_op, const std::string &_type, int _n) :
op(_op),
type(_type),
n(_n) {}
int parse_rule(ErasureCodeProfile &profile, std::ostream *ss);
- int parse_rule_step(std::string description_string,
+ int parse_rule_step(const std::string &description_string,
json_spirit::mArray description,
std::ostream *ss);
int layers_description(const ErasureCodeProfile &profile,
json_spirit::mArray *description,
std::ostream *ss) const;
- int layers_parse(std::string description_string,
+ int layers_parse(const std::string &description_string,
json_spirit::mArray description,
std::ostream *ss);
int layers_init(std::ostream *ss);
- int layers_sanity_checks(std::string description_string,
+ int layers_sanity_checks(const std::string &description_string,
std::ostream *ss) const;
};
return m_map.erase(key);
}
-std::shared_ptr<KeyValueDB::MergeOperator> MemDB::_find_merge_op(std::string prefix)
+std::shared_ptr<KeyValueDB::MergeOperator> MemDB::_find_merge_op(const std::string &prefix)
{
for (const auto& i : merge_ops) {
if (i.first == prefix) {
int set_merge_operator(const std::string& prefix,
std::shared_ptr<MergeOperator> mop) override;
- std::shared_ptr<MergeOperator> _find_merge_op(std::string prefix);
+ std::shared_ptr<MergeOperator> _find_merge_op(const std::string &prefix);
static
int _test_init(const string& dir) { return 0; };
private:
std::shared_ptr<KeyValueDB::MergeOperator> mop;
public:
- MergeOperatorLinker(std::shared_ptr<KeyValueDB::MergeOperator> o) : mop(o) {}
+ MergeOperatorLinker(const std::shared_ptr<KeyValueDB::MergeOperator> &o) : mop(o) {}
const char *Name() const override {
return mop->name().c_str();
}
std::string calc_ind_image_snap_name(uint64_t pool_id,
- std::string group_id,
- std::string snap_id)
+ const std::string &group_id,
+ const std::string &snap_id)
{
std::stringstream ind_snap_name_stream;
ind_snap_name_stream << ".group." << std::hex << pool_id << "_"
/** set_dir_auth
*/
-void CDir::set_dir_auth(mds_authority_t a)
+void CDir::set_dir_auth(const mds_authority_t &a)
{
dout(10) << "setting dir_auth=" << a
<< " from " << dir_auth
public:
mds_authority_t authority() const override;
mds_authority_t get_dir_auth() const { return dir_auth; }
- void set_dir_auth(mds_authority_t a);
+ void set_dir_auth(const mds_authority_t &a);
void set_dir_auth(mds_rank_t a) { set_dir_auth(mds_authority_t(a, CDIR_AUTH_UNKNOWN)); }
bool is_ambiguous_dir_auth() const {
return dir_auth.second != CDIR_AUTH_UNKNOWN;
/**
* A daemon has informed us of its offload targets
*/
- void update_export_targets(mds_gid_t who, const std::set<mds_rank_t> targets)
+ void update_export_targets(mds_gid_t who, const std::set<mds_rank_t> &targets)
{
auto fscid = mds_roles.at(who);
modify_filesystem(fscid, [who, &targets](std::shared_ptr<Filesystem> fs) {
}
}
-void MDCache::adjust_bounded_subtree_auth(CDir *dir, vector<dirfrag_t>& bound_dfs, mds_authority_t auth)
+void MDCache::adjust_bounded_subtree_auth(CDir *dir, vector<dirfrag_t>& bound_dfs, const mds_authority_t &auth)
{
dout(7) << "adjust_bounded_subtree_auth " << dir->get_dir_auth() << " -> " << auth
<< " on " << *dir << " bound_dfs " << bound_dfs << dendl;
void adjust_bounded_subtree_auth(CDir *dir, set<CDir*>& bounds, mds_rank_t a) {
adjust_bounded_subtree_auth(dir, bounds, mds_authority_t(a, CDIR_AUTH_UNKNOWN));
}
- void adjust_bounded_subtree_auth(CDir *dir, vector<dirfrag_t>& bounds, mds_authority_t auth);
+ void adjust_bounded_subtree_auth(CDir *dir, vector<dirfrag_t>& bounds, const mds_authority_t &auth);
void adjust_bounded_subtree_auth(CDir *dir, vector<dirfrag_t>& bounds, mds_rank_t a) {
adjust_bounded_subtree_auth(dir, bounds, mds_authority_t(a, CDIR_AUTH_UNKNOWN));
}
MDSCapMatch() : uid(MDS_AUTH_UID_ANY) {}
MDSCapMatch(int64_t uid_, std::vector<gid_t>& gids_) : uid(uid_), gids(gids_) {}
- explicit MDSCapMatch(std::string path_)
+ explicit MDSCapMatch(const std::string &path_)
: uid(MDS_AUTH_UID_ANY), path(path_) {
normalize_path();
}
- MDSCapMatch(std::string path_, int64_t uid_, std::vector<gid_t>& gids_)
+ MDSCapMatch(const std::string& path_, int64_t uid_, std::vector<gid_t>& gids_)
: uid(uid_), gids(gids_), path(path_) {
normalize_path();
}
// keep our default values synced with MDRequestParam's
MutationImpl() : TrackedOp(nullptr, utime_t()) {}
MutationImpl(OpTracker *tracker, utime_t initiated,
- metareqid_t ri, __u32 att=0, mds_rank_t slave_to=MDS_RANK_NONE)
+ const metareqid_t &ri, __u32 att=0, mds_rank_t slave_to=MDS_RANK_NONE)
: TrackedOp(tracker, initiated),
reqid(ri), attempt(att),
slave_to_mds(slave_to) { }
std::string uri;
public:
- ActivePyModule(PyModuleRef py_module_,
+ ActivePyModule(const PyModuleRef &py_module_,
LogChannelRef clog_)
: PyModuleRunner(py_module_, clog_)
{}
}
PyObject* ActivePyModules::get_perf_schema_python(
- const std::string svc_type,
+ const std::string &svc_type,
const std::string &svc_id)
{
PyThreadState *tstate = PyEval_SaveThread();
const std::string &svc_id,
const std::string &path);
PyObject *get_perf_schema_python(
- const std::string svc_type,
+ const std::string &svc_type,
const std::string &svc_id);
PyObject *get_context();
PyObject *get_osdmap();
bufferlist from_mon;
string outs;
- ReplyOnFinish(std::shared_ptr<CommandContext> cmdctx_)
+ ReplyOnFinish(const std::shared_ptr<CommandContext> &cmdctx_)
: cmdctx(cmdctx_)
{}
void finish(int r) override {
bool handle_command_reply(MCommandReply *m);
void send_pgstats();
- void set_pgstats_cb(std::function<MPGStats*()> cb_)
+ void set_pgstats_cb(std::function<MPGStats*()>&& cb_)
{
Mutex::Locker l(lock);
- pgstats_cb = cb_;
+ pgstats_cb = std::move(cb_);
}
int start_command(const vector<string>& cmd, const bufferlist& inbl,
void log(int level, const std::string &record);
PyModuleRunner(
- PyModuleRef py_module_,
+ const PyModuleRef &py_module_,
LogChannelRef clog_)
:
py_module(py_module_),
StandbyPyModule(
StandbyPyModuleState &state_,
- PyModuleRef py_module_,
+ const PyModuleRef &py_module_,
LogChannelRef clog_)
:
PyModuleRunner(py_module_, clog_),
std::vector<MonCapGrant> grants;
MonCap() {}
- explicit MonCap(std::vector<MonCapGrant> g) : grants(g) {}
+ explicit MonCap(const std::vector<MonCapGrant> &g) : grants(g) {}
string get_str() const {
return text;
}
-int MonMap::build_from_host_list(std::string hostlist, std::string prefix)
+int MonMap::build_from_host_list(std::string hostlist, const std::string &prefix)
{
vector<entity_addr_t> addrs;
if (parse_ip_port_vec(hostlist.c_str(), addrs)) {
* @param prefix prefix to prepend to generated mon names
* @return 0 for success, -errno on error
*/
- int build_from_host_list(std::string hosts, std::string prefix);
+ int build_from_host_list(std::string hosts, const std::string &prefix);
/**
* filter monmap given a set of initial members.
stuck_cb stuck_since;
bool invert;
- PgStateResponse(const pg_consequence_t &c, stuck_cb s)
- : consequence(c), stuck_since(s), invert(false)
+ PgStateResponse(const pg_consequence_t& c, stuck_cb&& s)
+ : consequence(c), stuck_since(std::move(s)), invert(false)
{
}
- PgStateResponse(const pg_consequence_t &c, stuck_cb s, bool i)
- : consequence(c), stuck_since(s), invert(i)
+ PgStateResponse(const pg_consequence_t& c, stuck_cb&& s, bool i)
+ : consequence(c), stuck_since(std::move(s)), invert(i)
{
}
};
);
}
- static inline mon_feature_t get_feature_by_name(std::string n);
+ static inline mon_feature_t get_feature_by_name(const std::string &n);
}
}
}
return "unknown";
}
-inline mon_feature_t ceph::features::mon::get_feature_by_name(std::string n) {
+inline mon_feature_t ceph::features::mon::get_feature_by_name(const std::string &n) {
if (n == "kraken") {
return FEATURE_KRAKEN;
_op->cid = _get_coll_id(cid);
data.ops++;
}
- void collection_move(const coll_t& cid, coll_t oldcid, const ghobject_t& oid)
+ void collection_move(const coll_t& cid, const coll_t &oldcid, const ghobject_t& oid)
__attribute__ ((deprecated)) {
// NOTE: we encode this as a fixed combo of ADD + REMOVE. they
// always appear together, so this is effectively a single MOVE.
data.ops++;
}
void collection_move_rename(const coll_t& oldcid, const ghobject_t& oldoid,
- coll_t cid, const ghobject_t& oid) {
+ const coll_t &cid, const ghobject_t& oid) {
Op* _op = _get_next_op();
_op->op = OP_COLL_MOVE_RENAME;
_op->cid = _get_coll_id(oldcid);
_op->dest_oid = _get_object_id(oid);
data.ops++;
}
- void try_rename(coll_t cid, const ghobject_t& oldoid,
+ void try_rename(const coll_t &cid, const ghobject_t& oldoid,
const ghobject_t& oid) {
Op* _op = _get_next_op();
_op->op = OP_TRY_RENAME;
/// Remove omap from oid
void omap_clear(
- coll_t cid, ///< [in] Collection containing oid
+ const coll_t &cid, ///< [in] Collection containing oid
const ghobject_t &oid ///< [in] Object from which to remove omap
) {
Op* _op = _get_next_op();
/// Set keys on an oid omap (bufferlist variant).
void omap_setkeys(
- coll_t cid, ///< [in] Collection containing oid
+ const coll_t &cid, ///< [in] Collection containing oid
const ghobject_t &oid, ///< [in] Object to update
const bufferlist &attrset_bl ///< [in] Replacement keys and values
) {
/// Remove keys from oid omap
void omap_rmkeys(
- coll_t cid, ///< [in] Collection containing oid
+ const coll_t &cid, ///< [in] Collection containing oid
const ghobject_t &oid, ///< [in] Object from which to remove the omap
const set<string> &keys ///< [in] Keys to clear
) {
/// Remove keys from oid omap
void omap_rmkeys(
- coll_t cid, ///< [in] Collection containing oid
+ const coll_t &cid, ///< [in] Collection containing oid
const ghobject_t &oid, ///< [in] Object from which to remove the omap
const bufferlist &keys_bl ///< [in] Keys to clear
) {
/// Remove key range from oid omap
void omap_rmkeyrange(
- coll_t cid, ///< [in] Collection containing oid
+ const coll_t &cid, ///< [in] Collection containing oid
const ghobject_t &oid, ///< [in] Object from which to remove the omap keys
const string& first, ///< [in] first key in range
const string& last ///< [in] first key past range, range is [first,last)
/// Set omap header
void omap_setheader(
- coll_t cid, ///< [in] Collection containing oid
+ const coll_t &cid, ///< [in] Collection containing oid
const ghobject_t &oid, ///< [in] Object
const bufferlist &bl ///< [in] Header value
) {
/// Split collection based on given prefixes, objects matching the specified bits/rem are
/// moved to the new collection
void split_collection(
- coll_t cid,
+ const coll_t &cid,
uint32_t bits,
uint32_t rem,
- coll_t destination) {
+ const coll_t &destination) {
Op* _op = _get_next_op();
_op->op = OP_SPLIT_COLLECTION2;
_op->cid = _get_coll_id(cid);
}
void collection_set_bits(
- coll_t cid,
+ const coll_t &cid,
int bits) {
Op* _op = _get_next_op();
_op->op = OP_COLL_SET_BITS;
/// Set allocation hint for an object
/// make 0 values(expected_object_size, expected_write_size) noops for all implementations
void set_alloc_hint(
- coll_t cid,
+ const coll_t &cid,
const ghobject_t &oid,
uint64_t expected_object_size,
uint64_t expected_write_size,
ECBackend::ECBackend(
PGBackend::Listener *pg,
- coll_t coll,
+ const coll_t &coll,
ObjectStore::CollectionHandle &ch,
ObjectStore *store,
CephContext *cct,
public:
ECBackend(
PGBackend::Listener *pg,
- coll_t coll,
+ const coll_t &coll,
ObjectStore::CollectionHandle &ch,
ObjectStore *store,
CephContext *cct,
};
Listener *parent;
Listener *get_parent() const { return parent; }
- PGBackend(CephContext* cct, Listener *l, ObjectStore *store, coll_t coll,
+ PGBackend(CephContext* cct, Listener *l, ObjectStore *store, const coll_t &coll,
ObjectStore::CollectionHandle &ch) :
cct(cct),
store(store),
ReplicatedBackend::ReplicatedBackend(
PGBackend::Listener *pg,
- coll_t coll,
+ const coll_t &coll,
ObjectStore::CollectionHandle &c,
ObjectStore *store,
CephContext *cct) :
public:
ReplicatedBackend(
PGBackend::Listener *pg,
- coll_t coll,
+ const coll_t &coll,
ObjectStore::CollectionHandle &ch,
ObjectStore *store,
CephContext *cct);
ghobject_t hoid;
ObjectStore::Transaction *t;
OSTransaction(
- coll_t cid,
+ const coll_t &cid,
const ghobject_t &hoid,
ObjectStore::Transaction *t)
: cid(cid), hoid(hoid), t(t) {}
public:
explicit pool_opts_encoder_t(bufferlist& bl_) : bl(bl_) {}
- void operator()(std::string s) const {
+ void operator()(const std::string &s) const {
encode(static_cast<int32_t>(pool_opts_t::STR), bl);
encode(s, bl);
}
} // anonymous namespace
-void IO::write_debug_base(ostream& out, string type) const {
+void IO::write_debug_base(ostream& out, const string &type) const {
out << m_ionum << ": " << m_start_time / 1000000.0 << ": " << type << ", thread = " << m_thread_id << ", deps = {";
bool first = true;
for (io_set_t::iterator itr = m_dependencies.begin(), end = m_dependencies.end(); itr != end; ++itr) {
virtual void write_debug(std::ostream& out) const = 0;
protected:
- void write_debug_base(std::ostream& out, std::string iotype) const;
+ void write_debug_base(std::ostream& out, const std::string &iotype) const;
private:
action_id_t m_ionum;
class AnonymizedImage {
public:
- void init(string image_name, int index) {
+ void init(const string &image_name, int index) {
assert(m_image_name == "");
m_image_name = image_name;
ostringstream oss;
map<string, string> m_snaps;
};
-static void usage(string prog) {
+static void usage(const string &prog) {
std::stringstream str;
str << "Usage: " << prog << " ";
std::cout << str.str() << "[ --window <seconds> ] [ --anonymize ] [ --verbose ]" << std::endl
<< std::string(str.str().size(), ' ') << "<trace-input> <replay-output>" << endl;
}
-__attribute__((noreturn)) static void usage_exit(string prog, string msg) {
+__attribute__((noreturn)) static void usage_exit(const string &prog, const string &msg) {
cerr << msg << endl;
usage(prog);
exit(1);
rbd_loc::rbd_loc() {
}
-rbd_loc::rbd_loc(string pool, string image, string snap)
+rbd_loc::rbd_loc(const string &pool, const string &image, const string &snap)
: pool(pool),
image(image),
snap(snap) {
/**
Constructs an rbd_loc with the given pool, image, and snap.
*/
- rbd_loc(std::string pool, std::string image, std::string snap);
+ rbd_loc(const std::string &pool, const std::string &image, const std::string &snap);
/**
Parses an rbd_loc from the given string.
}
}
-static int check_pool_support_omap(rgw_pool pool)
+static int check_pool_support_omap(const rgw_pool& pool)
{
librados::IoCtx io_ctx;
int ret = store->get_rados_handle()->ioctx_create(pool.to_str().c_str(), io_ctx);
virtual aplptr_t create_apl_remote(CephContext* cct,
const req_state* s,
acl_strategy_t&& extra_acl_strategy,
- const AuthInfo info) const = 0;
+ const AuthInfo &info) const = 0;
};
};
template <typename U>
ThirdPartyAccountApplier(RGWRados* const store,
- const rgw_user acct_user_override,
+ const rgw_user &acct_user_override,
U&& decoratee)
: DecoratedApplier<T>(std::move(decoratee)),
store(store),
template <typename T> static inline
ThirdPartyAccountApplier<T> add_3rdparty(RGWRados* const store,
- const rgw_user acct_user_override,
+ const rgw_user &acct_user_override,
T&& t) {
return ThirdPartyAccountApplier<T>(store, acct_user_override,
std::forward<T>(t));
aplptr_t create_apl_remote(CephContext* const cct,
const req_state* const s,
rgw::auth::RemoteApplier::acl_strategy_t&& acl_alg,
- const rgw::auth::RemoteApplier::AuthInfo info
+ const rgw::auth::RemoteApplier::AuthInfo &info
) const override {
auto apl = rgw::auth::add_sysreq(cct, store, s,
rgw::auth::RemoteApplier(cct, store, std::move(acl_alg), info,
typedef std::set<header_name_t, ltstr_nocase> header_spec_t;
RGWHTTPHeadersCollector(CephContext * const cct,
- const header_spec_t relevant_headers)
+ const header_spec_t &relevant_headers)
: RGWHTTPClient(cct),
relevant_headers(relevant_headers) {
}
#if defined(HAVE_OPENLDAP)
namespace rgw {
- int LDAPHelper::auth(const std::string uid, const std::string pwd) {
+ int LDAPHelper::auth(const std::string &uid, const std::string &pwd) {
int ret;
std::string filter;
if (msad) {
using lock_guard = std::lock_guard<std::mutex>;
LDAPHelper(std::string _uri, std::string _binddn, std::string _bindpw,
- std::string _searchdn, std::string _searchfilter, std::string _dnattr)
+ const std::string &_searchdn, const std::string &_searchfilter, const std::string &_dnattr)
: uri(std::move(_uri)), binddn(std::move(_binddn)),
bindpw(std::move(_bindpw)), searchdn(_searchdn), searchfilter(_searchfilter), dnattr(_dnattr),
ldap(nullptr) {
return ret; // OpenLDAP client error space
}
- int auth(const std::string uid, const std::string pwd);
+ int auth(const std::string &uid, const std::string &pwd);
~LDAPHelper() {
if (ldap)
class LDAPHelper
{
public:
- LDAPHelper(std::string _uri, std::string _binddn, std::string _bindpw,
- std::string _searchdn, std::string _searchfilter, std::string _dnattr)
+ LDAPHelper(const std::string &_uri, const std::string &_binddn, const std::string &_bindpw,
+ const std::string &_searchdn, const std::string &_searchfilter, const std::string &_dnattr)
{}
int init() {
return -ENOTSUP;
}
- int auth(const std::string uid, const std::string pwd) {
+ int auth(const std::string &uid, const std::string &pwd) {
return -EACCES;
}
aplptr_t create_apl_remote(CephContext* const cct,
const req_state* const s,
rgw::auth::RemoteApplier::acl_strategy_t&& acl_alg,
- const rgw::auth::RemoteApplier::AuthInfo info
+ const rgw::auth::RemoteApplier::AuthInfo &info
) const override {
return aplptr_t(
new rgw::auth::RemoteApplier(cct, store, std::move(acl_alg), info,
static void dump_account_metadata(struct req_state * const s,
const RGWUsageStats& global_stats,
- const std::map<std::string, RGWUsageStats> policies_stats,
+ const std::map<std::string, RGWUsageStats> &policies_stats,
/* const */map<string, bufferlist>& attrs,
const RGWQuotaInfo& quota,
const RGWAccessControlPolicy_SWIFTAcct &policy)
aplptr_t create_apl_remote(CephContext* const cct,
const req_state* const s,
acl_strategy_t&& extra_acl_strategy,
- const rgw::auth::RemoteApplier::AuthInfo info) const override {
+ const rgw::auth::RemoteApplier::AuthInfo &info) const override {
auto apl = \
rgw::auth::add_3rdparty(store, s->account_name,
rgw::auth::add_sysreq(cct, store, s,
int ret{0};
public:
- RGWMetaSyncCR(RGWMetaSyncEnv *_sync_env, RGWPeriodHistory::Cursor cursor,
+ RGWMetaSyncCR(RGWMetaSyncEnv *_sync_env, const RGWPeriodHistory::Cursor &cursor,
const rgw_meta_sync_status& _sync_status, RGWSyncTraceNodeRef& _tn)
: RGWCoroutine(_sync_env->cct), sync_env(_sync_env),
pool(sync_env->store->get_zone_params().log_pool),
std::string val;
public:
RGWObjTagEntry_S3() {}
- RGWObjTagEntry_S3(std::string k,std::string v):key(k),val(v) {};
+ RGWObjTagEntry_S3(const std::string &k, const std::string &v):key(k),val(v) {};
~RGWObjTagEntry_S3() {}
bool xml_end(const char*) override;
::testing::AssertionResult validate_iterator(
KeyValueDB::WholeSpaceIterator it,
string expected_prefix,
- string expected_key,
- string expected_value) {
+ const string &expected_key,
+ const string &expected_value) {
if (!it->valid()) {
return ::testing::AssertionFailure()
<< __func__
return str;
}
- string _gen_val_str(string key) {
+ string _gen_val_str(const string &key) {
ostringstream ss;
ss << "##value##" << key << "##";
return ss.str();
}
- bufferlist _gen_val(string key) {
+ bufferlist _gen_val(const string &key) {
bufferlist bl;
bl.append(_gen_val_str(key));
return bl;
std::pair<std::string, std::string>
AdminSocketOutput::run_command(AdminSocketClient &client,
- const std::string raw_command,
+ const std::string &raw_command,
bool send_untouched) {
std::cout << "Sending command \"" << raw_command << "\"" << std::endl;
std::string command;
return true;
}
-std::string AdminSocketOutput::get_result(const std::string target,
- const std::string command) const {
+std::string AdminSocketOutput::get_result(const std::string &target,
+ const std::string &command) const {
const auto& target_results = results.find(target);
if (target_results == results.end())
return std::string("");
bool init_sockets();
bool gather_socket_output();
- std::string get_result(const std::string target, const std::string command) const;
+ std::string get_result(const std::string &target, const std::string &command) const;
std::pair<std::string, std::string>
- run_command(AdminSocketClient &client, const std::string raw_command,
+ run_command(AdminSocketClient &client, const std::string &raw_command,
bool send_untouched = false);
bool run_tests() const;
static void check_list(
std::set<std::string>& myset,
rados_list_ctx_t& ctx,
- std::string check_nspace)
+ const std::string &check_nspace)
{
const char *entry, *nspace;
cout << "myset " << myset << std::endl;
rados_nobjects_list_close(ctx);
}
-static void check_listpp(std::set<std::string>& myset, IoCtx& ioctx, std::string check_nspace)
+static void check_listpp(std::set<std::string>& myset, IoCtx& ioctx, const std::string &check_nspace)
{
NObjectIterator iter(ioctx.nobjects_begin());
std::set<std::string> orig_set(myset);
}
int destroy_ruleset(rados_t *cluster,
- std::string ruleset,
+ const std::string &ruleset,
std::ostream &oss)
{
char *cmd[2];
}
int destroy_ec_profile_and_ruleset(rados_t *cluster,
- std::string ruleset,
+ const std::string &ruleset,
std::ostream &oss)
{
int ret;
}
int destroy_ruleset_pp(Rados &cluster,
- std::string ruleset,
+ const std::string &ruleset,
std::ostream &oss)
{
bufferlist inbl;
}
int destroy_ec_profile_and_ruleset_pp(Rados &cluster,
- std::string ruleset,
+ const std::string &ruleset,
std::ostream &oss)
{
int ret;
#define dout_subsys ceph_subsys_
#undef dout_prefix
#define dout_prefix _prefix(_dout, get_name())
-static ostream& _prefix(std::ostream *_dout, string n) {
+static ostream& _prefix(std::ostream *_dout, const string &n) {
return *_dout << " stub(" << n << ") ";
}
vector<ClientThread*> clients;
public:
- MessengerClient(string t, string addr, int delay):
+ MessengerClient(const string &t, const string &addr, int delay):
type(t), serveraddr(addr), think_time_us(delay) {
}
~MessengerClient() {
ServerDispatcher dispatcher;
public:
- MessengerServer(string t, string addr, int threads, int delay):
+ MessengerServer(const string &t, const string &addr, int threads, int delay):
msgr(NULL), type(t), bindaddr(addr), dispatcher(threads, delay) {
msgr = Messenger::create(g_ceph_context, type, entity_name_t::OSD(0), "server", 0, 0);
msgr->set_default_policy(Messenger::Policy::stateless_server(0));
bool zero_copy_read;
SocketOptions options;
- explicit StressFactory(std::shared_ptr<NetworkStack> s, const string &addr,
+ explicit StressFactory(const std::shared_ptr<NetworkStack> &s, const string &addr,
size_t cli, size_t qd, size_t mc, size_t l, bool zero_copy)
: stack(s), rs(128), client_num(cli), queue_depth(qd),
max_message_length(l), message_count(mc), message_left(mc),
#pragma GCC diagnostic warning "-Wpragmas"
void
-test_replicated(Rados &cluster, std::string pool_name, std::string obj_name)
+test_replicated(Rados &cluster, std::string pool_name, const std::string &obj_name)
{
// May already exist
cluster.pool_create(pool_name.c_str());
}
void
-test_erasure(Rados &cluster, std::string pool_name, std::string obj_name)
+test_erasure(Rados &cluster, const std::string &pool_name, const std::string &obj_name)
{
string outs;
bufferlist inbl;
void do_matrix(const char *matrix[][10],
boost::scoped_ptr<ObjectStore>& store,
- MatrixTest fn) {
+ const MatrixTest &fn) {
map<string,string> old;
for (unsigned i=0; matrix[i][0]; ++i) {
old[matrix[i][0]] = matrix_get(matrix[i][0]);
#include <iostream>
using namespace std;
-int print(string s) {
+int print(const string &s) {
filepath fp = s;
cout << "s = " << s << " filepath = " << fp << endl;
cout << " depth " << fp.depth() << endl;
ContentsGenerator::iterator iter;
ContState(
- ContDesc _cont,
+ const ContDesc &_cont,
ceph::shared_ptr<ContentsGenerator> _gen,
ContentsGenerator::iterator _iter)
: size(_gen->get_length(_cont)), cont(_cont), gen(_gen), iter(_iter) {
redirect_objs[oid] = target;
}
- void update_object_chunk_target(const string &oid, uint64_t offset, ChunkDesc info)
+ void update_object_chunk_target(const string &oid, uint64_t offset, const ChunkDesc &info)
{
for (map<int, map<string,ObjectDesc> >::const_reverse_iterator i =
pool_obj_cont.rbegin();
ChunkReadOp(int n,
RadosTestContext *context,
const string &oid,
- string tgt_pool_name,
+ const string &tgt_pool_name,
bool balance_reads,
TestOpStat *stat = 0)
: TestOp(n, context, stat),
struct MapPredicate {
map<int, pair<PastIntervals::osd_state_t, epoch_t>> states;
MapPredicate(
- vector<pair<int, pair<PastIntervals::osd_state_t, epoch_t>>> _states)
+ const vector<pair<int, pair<PastIntervals::osd_state_t, epoch_t>>> &_states)
: states(_states.begin(), _states.end()) {}
PastIntervals::osd_state_t operator()(epoch_t start, int osd, epoch_t *lost_at) {
auto val = states.at(osd);
// XXX: Only tests default namespace
struct op_data {
- op_data(std::string oid, uint64_t offset, uint64_t len, bool read)
+ op_data(const std::string &oid, uint64_t offset, uint64_t len, bool read)
: extent(oid, 0, offset, len, 0), is_read(read)
{
extent.oloc.pool = 0;
buf_to_hex((unsigned char *)dest, CEPH_CRYPTO_HMACSHA1_DIGESTSIZE, hex_str);
}
-static int get_s3_auth(string method, string creds, string date, string res, string& out){
+static int get_s3_auth(const string &method, string creds, const string &date, const string &res, string& out){
string aid, secret, auth_hdr;
size_t off = creds.find(":");
out = "";
admin_log::buf_to_hex((unsigned char *)dest, CEPH_CRYPTO_HMACSHA1_DIGESTSIZE, hex_str);
}
-static int get_s3_auth(string method, string creds, string date, string res, string& out){
+static int get_s3_auth(const string &method, string creds, const string &date, string res, string& out){
string aid, secret, auth_hdr;
string tmp_res;
size_t off = creds.find(":");
admin_meta::buf_to_hex((unsigned char *)dest, CEPH_CRYPTO_HMACSHA1_DIGESTSIZE, hex_str);
}
-static int get_s3_auth(string method, string creds, string date, string res, string& out){
+static int get_s3_auth(const string &method, string creds, const string &date, string res, string& out){
string aid, secret, auth_hdr;
string tmp_res;
size_t off = creds.find(":");
admin_log::buf_to_hex((unsigned char *)dest, CEPH_CRYPTO_HMACSHA1_DIGESTSIZE, hex_str);
}
-static int get_s3_auth(string method, string creds, string date, string res, string& out){
+static int get_s3_auth(const string &method, string creds, const string &date, string res, string& out){
string aid, secret, auth_hdr;
string tmp_res;
size_t off = creds.find(":");
return ceph_init(cmount);
}
-PgFiles::PgFiles(Objecter *o, std::set<pg_t> pgs_)
+PgFiles::PgFiles(Objecter *o, const std::set<pg_t> &pgs_)
: objecter(o), pgs(pgs_)
{
for (const auto &i : pgs) {
public:
- PgFiles(Objecter *o, std::set<pg_t> pgs_);
+ PgFiles(Objecter *o, const std::set<pg_t> &pgs_);
~PgFiles();
int init();
}
void add_special_pool_option(po::options_description *opt,
- std::string prefix) {
+ const std::string &prefix) {
std::string name = prefix + "-" + POOL_NAME;
std::string description = prefix + " pool name";
void add_special_pool_option(boost::program_options::options_description *opt,
- std::string prefix);
+ const std::string &prefix);
void add_all_option(boost::program_options::options_description *opt,
std::string description);
return stringify(d);
}
-static void put_map_option(const std::string &key, std::string val)
+static void put_map_option(const std::string &key, const std::string &val)
{
map_options[key] = val;
}
class RbdWatchCtx : public librados::WatchCtx2 {
public:
RbdWatchCtx(librados::IoCtx& io_ctx, const char *image_name,
- std::string header_oid)
+ const std::string &header_oid)
: m_io_ctx(io_ctx), m_image_name(image_name), m_header_oid(header_oid)
{
}
RWLock m_map_lock; // protects m_map, m_shuffled_timestamp
InstanceToImageMap m_map; // instance_id -> global_id map
- bool is_dead_instance(const std::string instance_id) {
+ bool is_dead_instance(const std::string &instance_id) {
assert(m_map_lock.is_locked());
return m_dead_instances.find(instance_id) != m_dead_instances.end();
}