OPTION(auth_service_required, OPT_STR, "cephx") // required by daemons of clients
OPTION(auth_client_required, OPT_STR, "cephx, none") // what clients require of daemons
OPTION(auth_supported, OPT_STR, "") // deprecated; default value for above if they are not defined.
+OPTION(max_rotating_auth_attempts, OPT_INT, 10)
OPTION(cephx_require_signatures, OPT_BOOL, false) // If true, don't talk to Cephx partners if they don't support message signing; off by default
OPTION(cephx_cluster_require_signatures, OPT_BOOL, false)
OPTION(cephx_service_require_signatures, OPT_BOOL, false)
}
int rotating_auth_attempts = 0;
- const int max_rotating_auth_attempts = 10;
-
while (monc->wait_auth_rotating(30.0) < 0) {
- if (++rotating_auth_attempts <= max_rotating_auth_attempts) {
+ if (++rotating_auth_attempts <= g_conf->max_rotating_auth_attempts) {
derr << "unable to obtain rotating service keys; retrying" << dendl;
continue;
}
}
int rotating_auth_attempts = 0;
- const int max_rotating_auth_attempts = 10;
// sanity check long object name handling
{
while (monc->wait_auth_rotating(30.0) < 0) {
derr << "unable to obtain rotating service keys; retrying" << dendl;
++rotating_auth_attempts;
- if (rotating_auth_attempts > max_rotating_auth_attempts) {
+ if (rotating_auth_attempts > g_conf->max_rotating_auth_attempts) {
osd_lock.Lock(); // make locker happy
if (!is_stopping()) {
r = - ETIMEDOUT;