]>
git.apps.os.sepia.ceph.com Git - ceph-ci.git/log
Patrick Donnelly [Wed, 26 Mar 2025 02:05:09 +0000 (22:05 -0400)]
tools/ceph_authtool: allow configuring a preferred cipher
This makes testing easier as we can configure all keys in the cluster to be the
given "old" type without modifying each location that ceph-authtool is used.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Tue, 13 May 2025 16:28:39 +0000 (12:28 -0400)]
mon/AuthMonitor: shutdown session connection on auth failure
Currently the mons will allow the session to persist even though an auth
failure has occurred, probably while trying to obtain new tickets.
A sequence to easily trigger this:
ceph auth rotate osd.0
ceph auth wipe-rotating-service-keys
The osd.0 will continue interacting with the mons until restart or a network
interruption occurs.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Tue, 13 May 2025 16:26:48 +0000 (12:26 -0400)]
msg: add interface to shutdown Connection
Unfortunately this doesn't work as-is because I couldn't find primitives to
flush the out_queue. It's left as a to-do for now.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Matan Breizman [Thu, 12 Jun 2025 09:23:37 +0000 (09:23 +0000)]
crimson/mon/MonClient: call _wipe_secrets_and_tickets when needed
Signed-off-by: Matan Breizman <mbreizma@redhat.com>
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Matan Breizman [Thu, 12 Jun 2025 09:22:22 +0000 (09:22 +0000)]
crimson/mon/MonClient: refacor Client::handle_monmap
Use coroutines, should help with future changes.
Signed-off-by: Matan Breizman <mbreizma@redhat.com>
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Matan Breizman [Wed, 11 Jun 2025 12:28:26 +0000 (12:28 +0000)]
crimson/mon/MonClient: introduce handle_auth_failure
Signed-off-by: Matan Breizman <mbreizma@redhat.com>
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Matan Breizman [Wed, 11 Jun 2025 12:26:59 +0000 (12:26 +0000)]
crimson/mon/MonClient: add asock TODO comment
Signed-off-by: Matan Breizman <mbreizma@redhat.com>
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Matan Breizman [Wed, 11 Jun 2025 09:38:59 +0000 (09:38 +0000)]
crimson/osd/MonClient: Introduce Client::_wipe_secrets_and_tickets())
Similar to MonClient::_wipe_secrets_and_tickets())
Signed-off-by: Matan Breizman <mbreizma@redhat.com>
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Matan Breizman [Wed, 11 Jun 2025 09:34:30 +0000 (09:34 +0000)]
crimson/mon/MonClient: imitate Classic's _check_auth_tickets
Imitating this interface from Classicals MonClient::_check_auth_tickets()
should make it easier to understand Crimson's counterpart.
Signed-off-by: Matan Breizman <mbreizma@redhat.com>
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Matan Breizman [Wed, 11 Jun 2025 09:33:20 +0000 (09:33 +0000)]
crimson/mon/MonClient: cleanup redundant private
Signed-off-by: Matan Breizman <mbreizma@redhat.com>
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 9 May 2025 18:56:10 +0000 (14:56 -0400)]
mon/MonClient: wipe secrets and invalidate tickets on auth epoch change
* This causes service daemons to drop all known service tickets and request new
ones from the auth server.
* This causes the clients (and service daemons) to request new tickets from the
auth server which will include tickets signed with the new service keys.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 9 May 2025 18:54:47 +0000 (14:54 -0400)]
mon/AuthMonitor: bump auth epoch when wiping service keys
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 9 May 2025 18:19:18 +0000 (14:19 -0400)]
mon/MonmapMonitor: wire up interface to bump auth epoch
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 9 May 2025 18:15:09 +0000 (14:15 -0400)]
mon/MonMap: add auth epoch
This will be used to indicate to clients / service daemons that the auth
service keys have been rotated. Clients and service daemons are expected to
invalidate their tickets and reauth. Service daemons should wipe their service
keys.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Wed, 26 Mar 2025 01:59:34 +0000 (21:59 -0400)]
mon/AuthMonitor: add dump-keys and wipe-rotating-service-keys
`auth dump-keys` allows examining the key types for each entity and also the
rotating session keys. This lets us confirm key upgrades are done as expected.
`wipe-rotating-service-keys` clears out existing non-auth service keys so that we do not
need to wait for the rotating key expiration. It is not disruptive so long as clients
renew their tickets when prompted by the auth epoch change.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 21 Mar 2025 16:56:06 +0000 (12:56 -0400)]
mon/AuthMonitor: add key-type switch
So it's possible to test with various key-types.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 21 Mar 2025 16:57:25 +0000 (12:57 -0400)]
common/cmdparse: add another template cmd_getval_or helper
To mimic the conventional signature where you pass the lvalue you want to set.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 9 May 2025 18:16:55 +0000 (14:16 -0400)]
mon/Monitor: perfect forward universal ref of lambda
This method doesn't currently work for std::move of a lambda.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 9 May 2025 18:19:56 +0000 (14:19 -0400)]
mon/Monitor: add debugging for monmap handling
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 13 Jun 2025 19:14:55 +0000 (15:14 -0400)]
mon: notify_new_monmap via MonmapMonitor::init
Otherwise, configurations are not updated during startup.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Thu, 29 May 2025 15:11:43 +0000 (11:11 -0400)]
doc/man: document new --key-type option for ceph-authtool
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 21 Mar 2025 16:54:33 +0000 (12:54 -0400)]
tools/ceph_authtool: add help message for key-type switch
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 21 Mar 2025 16:53:38 +0000 (12:53 -0400)]
common/buffer: accept "-" as stdin
These methods are used for reading files from tools like "authtool". Read from
stdin if the conventional "-" filename is passed.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Thu, 29 May 2025 14:01:37 +0000 (10:01 -0400)]
auth/cephx: make some parameters const
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Tue, 27 May 2025 23:25:42 +0000 (19:25 -0400)]
auth: cleanup error message formatting
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Wed, 26 Mar 2025 02:04:20 +0000 (22:04 -0400)]
auth,mon: lookup ticket ttl at runtime
and improve debugging.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 9 May 2025 18:52:52 +0000 (14:52 -0400)]
auth: add API to invalidate all tickets
This will prompt the client to request new ones from the auth server.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Fri, 9 May 2025 18:52:13 +0000 (14:52 -0400)]
auth: add API to wipe rotating secrets
This is for the service daemon's store of rotating service secrets.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Wed, 26 Mar 2025 01:55:22 +0000 (21:55 -0400)]
auth/cephx: enforce sorted config keys
Makes future additions avoid conflicts.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Tue, 18 Mar 2025 20:04:02 +0000 (16:04 -0400)]
auth/cephx: update get_tracked_keys signature
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Mon, 24 Mar 2025 02:42:53 +0000 (22:42 -0400)]
auth: fix return type
key type is an unsigned.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Thu, 29 May 2025 12:58:08 +0000 (08:58 -0400)]
common: break print template into separate header
To avoid pulling in all the debug includes for some primitive headers.
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Tue, 3 Jun 2025 15:26:04 +0000 (11:26 -0400)]
common: remove dead option
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Patrick Donnelly [Thu, 15 May 2025 17:29:55 +0000 (13:29 -0400)]
test: fix compiler error
Signed-off-by: Patrick Donnelly <pdonnell@ibm.com>
Matan Breizman [Mon, 9 Jun 2025 16:37:21 +0000 (16:37 +0000)]
auth,*: remove conflicting fwd declarations
Signed-off-by: Matan Breizman <mbreizma@redhat.com>
Matan Breizman [Mon, 9 Jun 2025 12:07:49 +0000 (12:07 +0000)]
include/common_fwd: Include Crypto classes
CryptoManager::cct is now used in CephContext ctor. To provide this
defintion
any ceph_context.cc target must also include Crypto.cc.
crimson-alien-common library which only had ceph_context.cc must now
also include Crypto.cc.
However, the fact that crimson-common also includes Crypto.cc would
cause multiple defintions
to any Crypto classes methods.
To resolve this, let's wrap all Crypto classes with TOPNSPC::common that
would be forwarded using common_fwd logic.
Signed-off-by: Matan Breizman <mbreizma@redhat.com>
Yehuda Sadeh [Wed, 28 May 2025 19:51:19 +0000 (15:51 -0400)]
cephx: sign messages using hmac_sha256
if key type is newer than the original AES, calculate message
hash by using HMAC-SHA256.
We cannot use plain aes256k like we do with the aes key because
of the confounder. The other option would be to inject a
confounder, but that would weaken the cipher.
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Wed, 28 May 2025 19:50:15 +0000 (15:50 -0400)]
auth: create slice api for calculating hmac_sha256
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Tue, 18 Mar 2025 10:53:44 +0000 (06:53 -0400)]
test/auth: more aes256krb5 tests
- DecryptNoBl
- multiple test vectos per each test
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Mon, 17 Mar 2025 11:44:30 +0000 (07:44 -0400)]
auth: test slice interface for aes256k
AES256KRB5 uses the default slice encryption implementation, testing that
it works correctly.
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Mon, 17 Mar 2025 07:57:42 +0000 (03:57 -0400)]
test/crypto: more aes256krb5 tests
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Mon, 17 Mar 2025 07:57:21 +0000 (03:57 -0400)]
auth: add usage param to crypto handler
Allow different usage for crypto handler users. Currently being used
in the crypto unitest to match the test vectors.
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Mon, 17 Mar 2025 06:56:32 +0000 (02:56 -0400)]
auth: aes256krb5: add confounder config for unitests
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Fri, 7 Mar 2025 21:35:36 +0000 (16:35 -0500)]
cephx: add configurable to set allowed ciphers
cephx allowed ciphers: a list of ciphers that sets what type
of keys are allowed to be used to authenticate
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Fri, 7 Mar 2025 18:21:44 +0000 (13:21 -0500)]
auth: remove unused code
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Fri, 7 Mar 2025 18:20:58 +0000 (13:20 -0500)]
auth: add a configurable to control rotating keys cipher type
auth_service_cipher: a mon configurable that determines what type of cipher
the rotating keys are using. The configurable can change at runtime. Note
that the change does not invalidate existing keys, these would expire
based on their ttl.
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Thu, 6 Mar 2025 14:23:34 +0000 (09:23 -0500)]
auth/cephx: session key type is set to client key type
This ensures that the client supports the specific key type.
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Thu, 27 Feb 2025 22:09:26 +0000 (17:09 -0500)]
auth/cephx: switch default cipher to AES256KRB5
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Thu, 27 Feb 2025 21:14:06 +0000 (16:14 -0500)]
auth/cephx: modify client + server challenges hashing
This applies when using ciphers that are not the original
AES-128 one. Use the hmac-sha256 hash now. With AES256KRB5
the original method of encrypting the combined challenges
doesn't work as the confounder randomizes the result.
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Thu, 27 Feb 2025 16:55:37 +0000 (11:55 -0500)]
ceph-authtool: support --key-type param
Also move the encryption handlers out of the ceph_context.
Handlers are now returned as a shared_ptr, to support the
creation of new handlers with different params (such as
the usage param).
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Fri, 21 Feb 2025 21:18:58 +0000 (16:18 -0500)]
auth/crypto: add support for aes256-hmac384-192
Using the encryption standard set in RFC 8009. This is the
encryption that is used in Kerberos 5, so naming this variation
as AES256KRB5.
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Yehuda Sadeh [Mon, 24 Feb 2025 21:31:42 +0000 (16:31 -0500)]
auth: propagate ceph context to encrypt/decrypt
Signed-off-by: Yehuda Sadeh <ysadehwe@ibm.com>
Ernesto Puerta [Wed, 1 Oct 2025 16:38:28 +0000 (18:38 +0200)]
Merge pull request #65720 from rhcs-dashboard/fix-73307-main
.github: pin GH Actions to SHA-1 commit
Kefu Chai [Wed, 1 Oct 2025 00:53:41 +0000 (08:53 +0800)]
Merge pull request #65730 from tchaikov/mailmap-kefu
mailmap: update affiliation for Kefu Chai
Reviewed-by: Laura Flores <lflores@ibm.com>
Anthony D'Atri [Tue, 30 Sep 2025 21:03:18 +0000 (17:03 -0400)]
Merge pull request #65733 from anthonyeleven/typofix
doc: Fix typo in src/common/options/global.yaml.in
Gregory Farnum [Tue, 30 Sep 2025 20:40:32 +0000 (13:40 -0700)]
Merge pull request #65391 from MaxKellermann/osdc_uninline
osdc: uninline methods to reduce header dependencies and compile times
Reviewed-by: Greg Farnum <gfarnum@redhat.com>
Anthony D'Atri [Tue, 30 Sep 2025 15:58:29 +0000 (11:58 -0400)]
Merge pull request #64727 from bluikko/doc-mount-ceph-formatting-man
doc/man/8: Fix small errors and small improvements in mount.ceph.rst
Samuel Just [Tue, 30 Sep 2025 15:53:34 +0000 (08:53 -0700)]
Merge pull request #65134 from xxhdx1985126/wip-seastore-clone-range-latest
crimson/os/seastore: OP_CLONERANGE2 support ---- another approach
Reviewed-by: Samuel Just <sjust@redhat.com>
Anthony D'Atri [Tue, 30 Sep 2025 15:26:31 +0000 (11:26 -0400)]
doc: Fix typo in src/common/options/global.yaml.in
Signed-off-by: Anthony D'Atri <anthonyeleven@users.noreply.github.com>
Casey Bodley [Tue, 30 Sep 2025 14:10:26 +0000 (10:10 -0400)]
Merge pull request #65479 from smanjara/wip-fix-object-sync-trace
rgw/multisite: fix sync requests on existing objects
Reviewed-by: Casey Bodley <cbodley@redhat.com>
Kefu Chai [Tue, 30 Sep 2025 12:57:41 +0000 (20:57 +0800)]
mailmap: update affiliation for Kefu Chai
he's now affiliated to Proxmox, so map his contribution to
his employer email address.
Signed-off-by: Kefu Chai <k.chai@proxmox.com>
afreen23 [Tue, 30 Sep 2025 09:43:13 +0000 (15:13 +0530)]
Merge pull request #65459 from rhcs-dashboard/72944-hide-suppresed-alerts-on-dashboard
mgr/dashboard : Hide suppressed alert on landing page
Reviewed-by: Afreen Misbah <afreen@ibm.com>
Reviewed-by: Nizamudeen A <nia@redhat.com>
Jose Juan Palacios-Perez [Tue, 30 Sep 2025 09:31:28 +0000 (10:31 +0100)]
Merge pull request #65700 from a16bitsysop/crimson-systemd
crimson: fix building without systemd
afreen23 [Tue, 30 Sep 2025 08:02:38 +0000 (13:32 +0530)]
Merge pull request #65612 from Hezko/nvmeof-cli-fix-aliases-help
mgr/dashboard: fix command alias help message
Reviewed-by: Afreen Misbah <afreen@ibm.com>
afreen23 [Tue, 30 Sep 2025 08:02:19 +0000 (13:32 +0530)]
Merge pull request #65610 from Hezko/nvmeof-cli-ns-list-nsid-param
mgr/dashboard: add nsid param to ns list command
Reviewed-by: Nizamudeen A <nia@redhat.com>
Ernesto Puerta [Mon, 29 Sep 2025 15:58:35 +0000 (17:58 +0200)]
scripts: add script to fix GH workflows
Fixes: https://tracker.ceph.com/issues/73307
Signed-off-by: Ernesto Puerta <epuertat@redhat.com>
Ernesto Puerta [Mon, 29 Sep 2025 15:55:48 +0000 (17:55 +0200)]
.github: pin GH Actions to SHA-1 commit
Fixes: https://tracker.ceph.com/issues/73307
Signed-off-by: Ernesto Puerta <epuertat@redhat.com>
Venky Shankar [Mon, 29 Sep 2025 15:56:03 +0000 (21:26 +0530)]
Merge PR #59676 into main
* refs/pull/59676/head:
Reviewed-by: Rishabh Dave <ridave@redhat.com>
Reviewed-by: Kotresh Hiremath Ravishankar <khiremat@redhat.com>
Reviewed-by: Venky Shankar <vshankar@redhat.com>
Venky Shankar [Mon, 29 Sep 2025 15:54:12 +0000 (21:24 +0530)]
Merge PR #65232 into main
* refs/pull/65232/head:
Reviewed-by: Venky Shankar <vshankar@redhat.com>
Reviewed-by: Mark Nelson <mnelson@redhat.com>
Anthony D'Atri [Mon, 29 Sep 2025 15:50:04 +0000 (11:50 -0400)]
Merge pull request #65410 from anthonyeleven/ec-overwrite
doc/rados/operations: Clarify overwrites in erasure-code.rst
Anthony D'Atri [Mon, 29 Sep 2025 15:49:47 +0000 (11:49 -0400)]
Merge pull request #65501 from anthonyeleven/ceph-osd-df
doc: Enhance the ceph df and ceph osd commands
Venky Shankar [Mon, 29 Sep 2025 14:10:20 +0000 (19:40 +0530)]
Merge PR #65483 into main
* refs/pull/65483/head:
Reviewed-by: Patrick Donnelly <pdonnell@ibm.com>
Reviewed-by: Venky Shankar <vshankar@redhat.com>
Venky Shankar [Mon, 29 Sep 2025 14:08:35 +0000 (19:38 +0530)]
Merge PR #61173 into main
* refs/pull/61173/head:
Reviewed-by: Venky Shankar <vshankar@redhat.com>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Reviewed-by: Anthony D Atri <anthony.datri@gmail.com>
Casey Bodley [Mon, 29 Sep 2025 13:30:13 +0000 (09:30 -0400)]
Merge pull request #64830 from AliMasarweh/wip-alimasa-conditional
RGW | fix conditional MultiWrite
Reviewed-by: Casey Bodley <cbodley@redhat.com>
Max Kellermann [Mon, 29 Sep 2025 11:11:45 +0000 (13:11 +0200)]
Merge pull request #65403 from MaxKellermann/Formatter__split
common/Formatter: move {JSON,Table,XML}Formatter to separate files
Reviewed-by: Adam Emerson <aemerson@redhat.com>
Reviewed-by: Ilya Dryomov <idryomov@gmail.com>
Tested-by: anrao19
Redouane Kachach [Mon, 29 Sep 2025 10:40:22 +0000 (12:40 +0200)]
Merge pull request #64912 from cloudbehl/Cephadm-daemon-status-metric
prometheus: Add Cephadm orch ps output metric to prometheus
Reviewed-by: Afreen Misbah <afreen23.git@gmail.com>
Reviewed-by: Anmol Babu <anmolbudugutta@gmail.com>
Reviewed-by: Redouane Kachach <rkachach@ibm.com>
Adam Lyon-Jones [Mon, 29 Sep 2025 09:20:15 +0000 (10:20 +0100)]
Merge pull request #64562 from adam-lj/ceph_test_rados_io_sequence_copy_from
test/osd: Extend ceph_test_rados_io_sequence to support copy operations
Yuval Lifshitz [Mon, 29 Sep 2025 08:37:40 +0000 (11:37 +0300)]
Merge pull request #65649 from nbalacha/wip-nbalacha-cleanup-2
rgw/bucket-logging: fix typos
Aashish Sharma [Mon, 29 Sep 2025 07:43:22 +0000 (13:13 +0530)]
Merge pull request #64467 from ceph/fix-mtu-alert
monitoring: fix MTU Mismatch alert rule and expr
Reviewed-by: Afreen Misbah <afreen@ibm.com>
Nizamudeen A [Mon, 29 Sep 2025 07:29:48 +0000 (12:59 +0530)]
Merge pull request #65669 from rhcs-dashboard/inline-edit-fixes
mgr/dashboard: fix duplicated editing of cell
Reviewed-by: Afreen Misbah <afreen@ibm.com>
Aashish Sharma [Wed, 2 Jul 2025 11:05:14 +0000 (16:35 +0530)]
monitoring: fix MTU Mismatch alert rule and expr
Fixes: https://tracker.ceph.com/issues/73290
Signed-off-by: Aashish Sharma <aasharma@redhat.com>
Nizamudeen A [Thu, 25 Sep 2025 04:34:10 +0000 (10:04 +0530)]
mgr/dashboard: fix duplicated editing of cell
form control is applied with unique identifier. In the table where the
issue is present, let's support adding the `unique_identifier`.
Fixes: https://tracker.ceph.com/issues/73250
Signed-off-by: Nizamudeen A <nia@redhat.com>
Duncan Bellamy [Sat, 27 Sep 2025 21:38:39 +0000 (21:38 +0000)]
crimson: fix building without systemd
Use BOOL WITH_SYSTEMD guard before including Jounald.cc in sources for crimson-common
Fixes: https://tracker.ceph.com/issues/73148
Signed-off-by: Duncan Bellamy <dunk@denkimushi.com>
Xuehan Xu [Wed, 10 Sep 2025 08:04:23 +0000 (16:04 +0800)]
qa/suites/crimson-rados/thrash_simple: enable osd down
Signed-off-by: Xuehan Xu <xuxuehan@qianxin.com>
Xuehan Xu [Wed, 29 May 2024 06:20:29 +0000 (14:20 +0800)]
test/crimson/seastore/test_seastore: add the clone_range UT case
Signed-off-by: Xuehan Xu <xuxuehan@qianxin.com>
Xuehan Xu [Thu, 14 Aug 2025 05:34:31 +0000 (13:34 +0800)]
crimson/os/seastore: support OP_CLONERANGE2
Signed-off-by: Xuehan Xu <xuxuehan@qianxin.com>
Xuehan Xu [Mon, 21 Apr 2025 04:26:52 +0000 (12:26 +0800)]
crimson/os/seastore/lba_manager: allow cloning part of the mapping
Signed-off-by: Xuehan Xu <xuxuehan@qianxin.com>
Xuehan Xu [Wed, 13 Aug 2025 03:49:23 +0000 (11:49 +0800)]
crimson/os/seastore: do "copy_on_write" if the to-be-modified object
needs it
At present, only clone objects may need COW, as HEAD objects won't be
sharing any direct lba mapping with other objects in non-recovery
scenarios.
Although the HEAD object may share its direct mappings with the temp
object that's going to be recovered and replace it, it won't be
accepting any modifications at that time.
Signed-off-by: Xuehan Xu <xuxuehan@qianxin.com>
Xuehan Xu [Wed, 13 Aug 2025 06:46:23 +0000 (14:46 +0800)]
crimson/osd/osd_meta: change osd_superblock to be a head object
Signed-off-by: Xuehan Xu <xuxuehan@qianxin.com>
Xuehan Xu [Tue, 12 Aug 2025 08:24:08 +0000 (16:24 +0800)]
crimson/os/seastore/object_data_handler: we don't have to maintain the
symmetric indirect lba relationship at the time of clone
OP_CLONE is done in the following way:
1. First, swap the layout of the head onode and the clone onode, so that
clone onode's object_data, omap_root, xattr_root and log_root all
point to the head onode's corresponding fields;
2. Do SeaStore::_clone() from the clone onode to the head onode, which
is exactly what rollback is done.
This makes the code of ObjectDataHandler::clone() and
ObjectDataHandler::copy_on_write() even simpler, and can facilitate the
clone/rollback scenarios when the "128-bit" lba key layout is involved.
Signed-off-by: Xuehan Xu <xuxuehan@qianxin.com>
Xuehan Xu [Sat, 23 Aug 2025 05:31:40 +0000 (13:31 +0800)]
crimson/os/seastore/onode: add the interface for swapping onode layouts
Signed-off-by: Xuehan Xu <xuxuehan@qianxin.com>
Xuehan Xu [Tue, 12 Aug 2025 06:51:15 +0000 (14:51 +0800)]
crimson/os/seastore/onode: add the "need_cow" field to indicate whether
the onode's object data space needs to do clone before modification
At present, it's only when the onode's object data space is sharing its
own direct lba mappings with other onodes that the "need_cow" field
would be true.
Signed-off-by: Xuehan Xu <xuxuehan@qianxin.com>
Tomer Haskalovitch [Sun, 21 Sep 2025 09:49:29 +0000 (12:49 +0300)]
mgr/dashboard: fix command alias help message
Signed-off-by: Tomer Haskalovitch <tomer.haska@ibm.com>
Daniel Gryniewicz [Fri, 26 Sep 2025 16:43:39 +0000 (12:43 -0400)]
Merge pull request #65586 from dang/wip-dang-posix-cleanup
RGW - POSIXDriver - Cleanup vstart
Reviewed-by: Casey Bodley <cbodley@redhat.com>
Daniel Gryniewicz [Fri, 26 Sep 2025 16:42:52 +0000 (12:42 -0400)]
Merge pull request #65643 from dang/wip-dang-dedup
RGW - Fix dedup build
Reviewed by: Casey Bodley <cbodley@redhat.com>
Shilpa Jagannath [Fri, 26 Sep 2025 16:27:05 +0000 (09:27 -0700)]
Merge pull request #65593 from smanjara/wip-fix-period-pull
rgw/multisite: fix period pull command
Adam King [Fri, 26 Sep 2025 15:04:34 +0000 (11:04 -0400)]
Merge pull request #65631 from phlogistonjohn/jjm-fix-71992
mgr/smb: fix error handling for fundamental resource parsing
Reviewed-by: Adam King <adking@redhat.com>
Reviewed-by: Anoop C S <anoopcs@samba.org>
Reviewed-by: Avan Thakkar <athakkar@redhat.com>
Jos Collin [Fri, 26 Sep 2025 14:53:41 +0000 (20:23 +0530)]
Merge pull request #65309 from joscollin/wip-72683-peer-add-deprecate
cephfs_mirror: deprecate peer_add command
Reviewed-by: Venky Shankar <vshankar@redhat.com>
Reviewed-by: Anthony D'Atri <anthony.datri@gmail.com>
Adam King [Fri, 26 Sep 2025 14:31:02 +0000 (10:31 -0400)]
Merge pull request #65567 from rkachach/fix_issue_certs_migration
mgr/cephadm: cleaning up old migration logic and improving upgrade handling with certmgr
Reviewed-by: Adam King <adking@redhat.com>
Adam King [Fri, 26 Sep 2025 14:23:45 +0000 (10:23 -0400)]
Merge pull request #65599 from bachmanity1/cephadm-support-custom-distro
cephadm: support custom distros by falling back to `ID_LIKE`
Reviewed-by: Adam King <adking@redhat.com>
Reviewed-by: John Mulligan <jmulligan@redhat.com>