recv_start(0), recv_end(0),
last_active(ceph::coarse_mono_clock::now()),
inactive_timeout_us(cct->_conf->ms_tcp_read_timeout*1000*1000),
- got_bad_auth(false), authorizer(NULL), replacing(false),
+ authorizer(NULL), replacing(false),
is_reset_from_peer(false), once_ready(false), state_buffer(NULL), state_offset(0),
worker(w), center(&w->center)
{
assert(!policy.server);
// reset connect state variables
- got_bad_auth = false;
delete authorizer;
authorizer = NULL;
authorizer_buf.clear();
if (reply.tag == CEPH_MSGR_TAG_BADAUTHORIZER) {
ldout(async_msgr->cct,0) << __func__ << " connect got BADAUTHORIZER" << dendl;
- if (got_bad_auth)
- goto fail;
- got_bad_auth = true;
- delete authorizer;
- authorizer = async_msgr->get_authorizer(peer_type, true); // try harder
- state = STATE_CONNECTING_SEND_CONNECT_MSG;
+ goto fail;
}
if (reply.tag == CEPH_MSGR_TAG_RESETSESSION) {
ldout(async_msgr->cct, 0) << __func__ << " connect got RESETSESSION" << dendl;
state <= STATE_CONNECTING_READY) {
delete authorizer;
authorizer = NULL;
- got_bad_auth = false;
}
if (state > STATE_OPEN_MESSAGE_THROTTLE_MESSAGE &&
bufferlist front, middle, data;
ceph_msg_connect connect_msg;
// Connecting state
- bool got_bad_auth;
AuthAuthorizer *authorizer;
bufferlist authorizer_buf;
ceph_msg_connect_reply connect_reply;