]> git.apps.os.sepia.ceph.com Git - ceph.git/log
ceph.git
4 years agoqa/rgw: notifications suite runs single job 39139/head
Casey Bodley [Mon, 1 Mar 2021 17:19:25 +0000 (12:19 -0500)]
qa/rgw: notifications suite runs single job

pin to the beast frontend, default bluestore, replicated pools, and run
against a random distro

Signed-off-by: Casey Bodley <cbodley@redhat.com>
4 years agoqa: Kafka task files for bucket notification tests
root [Mon, 28 Dec 2020 12:41:15 +0000 (18:11 +0530)]
qa: Kafka task files for bucket notification tests

This commit consists of 3 things:
1. Files required for setting up new directory (in order to run the task in teuthology)
2. Kafka task file
3. The new files conataining tests and it's infrastructure for separation of bucket notification tests from pubsub tests

Signed-off-by: Kalpesh Pandya <kapandya@redhat.com>
4 years agotest/rgw: Bucket notification tests separation
root [Wed, 2 Dec 2020 09:29:18 +0000 (14:59 +0530)]
test/rgw: Bucket notification tests separation

Signed-off-by: Kalpesh Pandya <kapandya@redhat.com>
4 years agoMerge pull request #39789 from zdover23/wip-doc-cephadm-convert--bash-shells-2021...
Sebastian Wagner [Wed, 3 Mar 2021 15:45:00 +0000 (16:45 +0100)]
Merge pull request #39789 from zdover23/wip-doc-cephadm-convert--bash-shells-2021-Mar-03

doc/cephadm: add prompts to adoption.rst

Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #39794 from cbodley/wip-qa-rgw-valgrind-supp-librados-delete
Casey Bodley [Wed, 3 Mar 2021 15:38:36 +0000 (10:38 -0500)]
Merge pull request #39794 from cbodley/wip-qa-rgw-valgrind-supp-librados-delete

valgrind: suppress operator delete[] for tcmalloc

Reviewed-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoMerge pull request #39558 from sebastian-philipp/doc-rados-rm-toctree-cephadm
Sebastian Wagner [Wed, 3 Mar 2021 15:17:51 +0000 (16:17 +0100)]
Merge pull request #39558 from sebastian-philipp/doc-rados-rm-toctree-cephadm

doc/rados: avoid including cephadm into the toctree

Reviewed-by: Kefu Chai <kchai@redhat.com>
Reviewed-by: Neha Ojha <nojha@redhat.com>
Reviewed-by: Zac Dover <zac.dover@gmail.com>
4 years agoMerge pull request #39399 from dang/wip-dang-zipper-10
Daniel Gryniewicz [Wed, 3 Mar 2021 13:56:04 +0000 (08:56 -0500)]
Merge pull request #39399 from dang/wip-dang-zipper-10

RGW - Zipper 10: The Great Zippening

4 years agoMerge PR #38909 into master
Sage Weil [Wed, 3 Mar 2021 13:38:58 +0000 (08:38 -0500)]
Merge PR #38909 into master

* refs/pull/38909/head:
PendingReleaseNotes: document option osd_fast_shutdown_notify_mon
osd: add osd_fast_shutdown_notify_mon option (default false)

Reviewed-by: Neha Ojha <nojha@redhat.com>
4 years agoMerge PR #39654 into master
Sage Weil [Wed, 3 Mar 2021 13:38:20 +0000 (08:38 -0500)]
Merge PR #39654 into master

* refs/pull/39654/head:
common/options: drop ms_async_max_op_threads
msg/async: drop Stack::num_workers
msg/async: s/num_workers/workers.size()/
msg/async: use range-based loop in NetworkStack
msg/async: do not pass worker id to Stack::spawn_worker()
async/Stack: pass Worker* to NetworkStack::add_thread()
async/rdma: do not reference worker id in RDMAStack::spawn_worker()
async/dpdk: do not use worker id when creating worker
async/PosixStack: do not reference worker id in ctor
async/rdma: initialize worker in RDMAStack::create_worker()
async/rdma: move RDMAStack::create_worker() to .cc

Reviewed-by: luo runbing <luo.runbing@zte.com.cn>
Reviewed-by: Haomai Wang <haomai@xsky.com>
4 years agoMerge PR #39665 into master
Sage Weil [Wed, 3 Mar 2021 13:35:51 +0000 (08:35 -0500)]
Merge PR #39665 into master

* refs/pull/39665/head:
qa/rados/dashbord use "random" objectore

Reviewed-by: Ernesto Puerta <epuertat@redhat.com>
Reviewed-by: Laura Paduano <lpaduano@suse.com>
Reviewed-by: Kefu Chai <kchai@redhat.com>
Reviewed-by: Josh Durgin <jdurgin@redhat.com>
Reviewed-by: Neha Ojha <nojha@redhat.com>
4 years agoMerge PR #39689 into master
Sage Weil [Wed, 3 Mar 2021 13:33:28 +0000 (08:33 -0500)]
Merge PR #39689 into master

* refs/pull/39689/head:
src/global/signal_handler.h: fix preprocessor logic for alpine

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge PR #39750 into master
Sage Weil [Wed, 3 Mar 2021 13:32:41 +0000 (08:32 -0500)]
Merge PR #39750 into master

* refs/pull/39750/head:
mgr: create client messenger using ms_public_type

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39770 from liewegas/bug-46745
Sebastian Wagner [Wed, 3 Mar 2021 09:51:47 +0000 (10:51 +0100)]
Merge pull request #39770 from liewegas/bug-46745

cephadm: add docker.service dependency in systemd units

Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #39795 from dillaman/wip-migration-import-docs
Mykola Golub [Wed, 3 Mar 2021 08:45:35 +0000 (10:45 +0200)]
Merge pull request #39795 from dillaman/wip-migration-import-docs

doc/rbd: clarify QCOW2 migration support

Reviewed-by: Mykola Golub <mgolub@suse.com>
4 years agoMerge pull request #39555 from tchaikov/wip-drop-pre-nautilus
Kefu Chai [Wed, 3 Mar 2021 08:39:46 +0000 (16:39 +0800)]
Merge pull request #39555 from tchaikov/wip-drop-pre-nautilus

*: drop backward compatibility with pre-nautilus versions

Reviewed-by: Josh Durgin <jdurgin@redhat.com>
4 years agoMerge pull request #39798 from tchaikov/wip-crimson-monc-copy-sent
Kefu Chai [Wed, 3 Mar 2021 04:31:39 +0000 (12:31 +0800)]
Merge pull request #39798 from tchaikov/wip-crimson-monc-copy-sent

crimson/mon: keep a copy of sent MMonCommand messages

Reviewed-by: Yingxin Cheng <yingxin.cheng@intel.com>
4 years agocrimson/mon: keep a copy of sent MMonCommand messages 39798/head
Kefu Chai [Wed, 3 Mar 2021 03:39:36 +0000 (11:39 +0800)]
crimson/mon: keep a copy of sent MMonCommand messages

as per Yingxin Cheng,

> The send process can be asynchronous (there is a conn.out_q, or if the
> underlying socket lives in a different core in the m:n model to be
> ordered there). If user really wants to reuse a message, they must be
> careful not to modify it because it may result in modifing the pending
> messages.
>
> I think the best way is to copy the message if user want to resend it,
> and keep the ceph_assert(!msg->get_seq()). It may looks good to reuse a
> message under lossy policy, but the correctness is now up to user not to
> modify it inplace.

see also https://github.com/ceph/ceph/pull/39786

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agodoc/rbd: clarify QCOW2 migration support 39795/head
Jason Dillaman [Tue, 2 Mar 2021 22:29:29 +0000 (17:29 -0500)]
doc/rbd: clarify QCOW2 migration support

Signed-off-by: Jason Dillaman <dillaman@redhat.com>
4 years agovalgrind: suppress operator delete[] for tcmalloc 39794/head
Casey Bodley [Tue, 2 Mar 2021 14:31:08 +0000 (09:31 -0500)]
valgrind: suppress operator delete[] for tcmalloc

suppresses a mismatched operator delete[] from the librados client's
destructor:

<error>
  <unique>0xeef7eb</unique>
  <tid>1</tid>
  <kind>MismatchedFree</kind>
  <what>Mismatched free() / delete / delete []</what>
  <stack>
    <frame>
      <ip>0x4C32EA0</ip>
      <obj>/usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so</obj>
      <fn>operator delete[](void*, unsigned long)</fn>
      <dir>/builddir/build/BUILD/valgrind-3.16.0/coregrind/m_replacemalloc</dir>
      <file>vg_replace_malloc.c</file>
      <line>660</line>
    </frame>
    <frame>
      <ip>0x5FBEB86</ip>
      <obj>/usr/lib64/librados.so.2.0.0</obj>
    </frame>
    <frame>
      <ip>0x5FBEF2C</ip>
      <obj>/usr/lib64/librados.so.2.0.0</obj>
    </frame>
    <frame>
      <ip>0x5F7F7C5</ip>
      <obj>/usr/lib64/librados.so.2.0.0</obj>
      <fn>librados::v14_2_0::Rados::shutdown()</fn>
    </frame>

Fixes: https://tracker.ceph.com/issues/49501
Signed-off-by: Casey Bodley <cbodley@redhat.com>
4 years agoMerge PR #39730 into master
Sage Weil [Tue, 2 Mar 2021 18:56:01 +0000 (13:56 -0500)]
Merge PR #39730 into master

* refs/pull/39730/head:
cephadm: fix escaping/quoting of stderr-prefix arg for ceph daemons

Reviewed-by: Michael Fritch <mfritch@suse.com>
Reviewed-by: Sebastian Wagner <swagner@suse.com>
4 years agodoc/cephadm: add prompts to adoption.rst 39789/head
Zac Dover [Tue, 2 Mar 2021 18:16:27 +0000 (04:16 +1000)]
doc/cephadm: add prompts to adoption.rst

This PR formats the bash prompts. It also formats the
bash output so that it appears in the correct (easily
copy-and-pasteable) format. This PR will be followed by
a grammar-improving PR, but this PR is just a
formatting PR.

Signed-off-by: Zac Dover <zac.dover@gmail.com>
4 years agoMerge pull request #39781 from idryomov/wip-krbd-xfstests-fixes
Ilya Dryomov [Tue, 2 Mar 2021 17:43:20 +0000 (18:43 +0100)]
Merge pull request #39781 from idryomov/wip-krbd-xfstests-fixes

qa/suites/krbd: address recent issues caused by newer kernels

Reviewed-by: Jason Dillaman <dillaman@redhat.com>
4 years agoMerge PR #39723 into master
Sage Weil [Tue, 2 Mar 2021 17:08:52 +0000 (12:08 -0500)]
Merge PR #39723 into master

* refs/pull/39723/head:
mon/ConfigMonitor: make config changes via KVMonitor's pending set

Reviewed-by: Neha Ojha <nojha@redhat.com>
4 years agocephadm: fix escaping/quoting of stderr-prefix arg for ceph daemons 39730/head
Sage Weil [Tue, 2 Mar 2021 16:35:41 +0000 (10:35 -0600)]
cephadm: fix escaping/quoting of stderr-prefix arg for ceph daemons

On some versions of podman doing

   --default-log-stderr-prefix="debug "

seems to work okay, but on others it does not, producing lines like

   /usr/bin/ceph-mon: "debug "2021-02-26T15:30:36.266+0000 7f3d8a955700  4 rocksdb:                    Options.db_write_buffer_size: 0

Quote things properly for the unit.run bash script.

Signed-off-by: Sage Weil <sage@newdream.net>
4 years agoMerge PR #39739 into master
Sage Weil [Tue, 2 Mar 2021 16:32:12 +0000 (11:32 -0500)]
Merge PR #39739 into master

* refs/pull/39739/head:
cephadm: set CEPH_USE_RANDOM_NONCE if using --init
msg/Messenger: use random nonce if CEPH_USE_RANDOM_NONCE or pid == 1
Revert "Merge PR #39482 into master"

Reviewed-by: Michael Fritch <mfritch@suse.com>
Reviewed-by: Sebastian Wagner <swagner@suse.com>
4 years agoRGW - Fix mock User class in Lua test 39399/head
Daniel Gryniewicz [Tue, 2 Mar 2021 15:51:12 +0000 (10:51 -0500)]
RGW - Fix mock User class in Lua test

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agocephadm: add docker.service dependency in systemd units 39770/head
Sage Weil [Mon, 1 Mar 2021 22:42:15 +0000 (17:42 -0500)]
cephadm: add docker.service dependency in systemd units

This ensures that (1) we start after the docker daemon is running, and
(2) a restart of docker will also restart the ceph services.

Fixes: https://tracker.ceph.com/issues/46745
Signed-off-by: Sage Weil <sage@newdream.net>
4 years agoMerge PR #39679 into master
Patrick Donnelly [Tue, 2 Mar 2021 14:40:50 +0000 (06:40 -0800)]
Merge PR #39679 into master

* refs/pull/39679/head:
Revert "mon/MDSMonitor: add missing frozen checks"

Reviewed-by: Rishabh Dave <ridave@redhat.com>
Reviewed-by: Jos Collin <jcollin@redhat.com>
4 years agoMerge pull request #38995 from mgfritch/cephadm-check-host-errors
Sebastian Wagner [Tue, 2 Mar 2021 14:33:04 +0000 (15:33 +0100)]
Merge pull request #38995 from mgfritch/cephadm-check-host-errors

cephadm: remove redundant `ERROR` during check-host

Reviewed-by: Juan Miguel Olmo Martínez <jolmomar@redhat.com>
Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #39722 from p-se/wip-pse-cephadm-SUSE-alertmanager
Sebastian Wagner [Tue, 2 Mar 2021 14:30:17 +0000 (15:30 +0100)]
Merge pull request #39722 from p-se/wip-pse-cephadm-SUSE-alertmanager

cephadm: `cephadm ls` broken for SUSE downstream alertmanager container

Reviewed-by: Michael Fritch <mfritch@suse.com>
Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #38915 from Daniel-Pivonka/clientsoktostop
Sebastian Wagner [Tue, 2 Mar 2021 14:28:58 +0000 (15:28 +0100)]
Merge pull request #38915 from Daniel-Pivonka/clientsoktostop

mgr/cephadm: add ok-to-stop functions for ceph client services

Reviewed-by: Juan Miguel Olmo Martínez <jolmomar@redhat.com>
Reviewed-by: Michael Fritch <mfritch@suse.com>
Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #39352 from sebastian-philipp/orch-remove-promise
Sebastian Wagner [Tue, 2 Mar 2021 14:25:02 +0000 (15:25 +0100)]
Merge pull request #39352 from sebastian-philipp/orch-remove-promise

mgr/orch: Make orchestrator interface synchronous

Reviewed-by: Varsha Rao <varao@redhat.com>
4 years agoMerge pull request #39612 from jmolmo/fix_rook_orch_ls
Sebastian Wagner [Tue, 2 Mar 2021 13:47:25 +0000 (14:47 +0100)]
Merge pull request #39612 from jmolmo/fix_rook_orch_ls

mgr/orchestrator: Fix ceph orch ls in Rook

Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
Reviewed-by: Varsha Rao <varao@redhat.com>
4 years agoMerge pull request #39784 from rzarzynski/wip-crimson-monc-close-active-conn-on-reset
Kefu Chai [Tue, 2 Mar 2021 12:48:35 +0000 (20:48 +0800)]
Merge pull request #39784 from rzarzynski/wip-crimson-monc-close-active-conn-on-reset

crimson/monc: close() active_con before destructing it on resets.

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39783 from tchaikov/wip-crimson-clang
Kefu Chai [Tue, 2 Mar 2021 12:45:24 +0000 (20:45 +0800)]
Merge pull request #39783 from tchaikov/wip-crimson-clang

crimson/os: fix clang build and cleanups.

Reviewed-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson/monc: close() active_con before destructing it on resets. 39784/head
Radoslaw Zarzynski [Mon, 1 Mar 2021 21:50:36 +0000 (21:50 +0000)]
crimson/monc: close() active_con before destructing it on resets.

`ProtocolV2` expects `AuthClient` implementations to withstand
calling `get_auth_request()` and `handle_auth_reply_more()` even
if `handle_auth_done()` had been already called. This is because
a network fault may happen on e.g. `AuthSignatureFrame` which is
put on the wire after the `AuthDone` handling.

`crimson::mon::Client` deals with that by returning `auth::error`
from both `get_auth_request()` and `handle_auth_reply_more()` as
the preceding invocation of `handle_auth_done()` had already
cleared `pending_conns` (and set `active_con`). This leads to
`abort_in_close()` and finally to dispatching `ms_handle_reset()`
on `mon::Client` which is fine in general but, when comes to the
current implementation, it destroys `active_con` without closing
it first.
One of the consequence is breaking the `mon::Connection::reply`
promise; another one is missed `mark_down()` call.

```
DEBUG 2021-03-01 18:10:50,489 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@56752 >> mon.? v2:172.21.15.110:3300/0] GOT AuthDoneFrame: gid=4121, con_mode=se
cure, payload_len=995
DEBUG 2021-03-01 18:10:50,489 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@56752 >> mon.? v2:172.21.15.110:3300/0] WRITE AuthSignatureFrame: signature=60ca
f49e5a6cf3cc39c4160cb9d09032db5f794e29655dc0124cf5f42b7546fb
DEBUG 2021-03-01 18:10:50,489 [shard 0] ms - authenticated_encrypt_update plaintext.length()=80 buffer.length()=80
DEBUG 2021-03-01 18:10:50,489 [shard 0] ms - authenticated_encrypt_final buffer.length()=96 final_len=0
INFO  2021-03-01 18:10:50,489 [shard 0] monc - found mon.noname-a
INFO  2021-03-01 18:10:50,489 [shard 0] monc - sending auth(proto 2 2 bytes epoch 0) v1
INFO  2021-03-01 18:10:50,489 [shard 0] monc - waiting
DEBUG 2021-03-01 18:10:50,489 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@56752 >> mon.? v2:172.21.15.110:3300/0] GOT AuthSignatureFrame: signature=ea04f1
318cf76808414a853ed37fd232ae886bef036cb4248079c6cba89d669a
DEBUG 2021-03-01 18:10:50,490 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@56752 >> mon.? v2:172.21.15.110:3300/0] WRITE ClientIdentFrame: addrs=v2:172.21.
15.110:6800/33954, target=v2:172.21.15.110:3300/0, gid=0, gs=1, features_supported=4540138303579357183, features_required=576460752303432193, flags=1, cookie=9231904580
14536120
...
INFO  2021-03-01 18:10:50,490 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@56752 >> mon.? v2:172.21.15.110:3300/0] execute_connecting(): fault at CONNECTIN
G, going to WAIT -- std::system_error (error crimson::net:4, read eof)
...
DEBUG 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@0 >> mon.? v2:172.21.15.110:3300/0] GOT HelloFrame: my_type=mon peer_addr=v2:172.21.15.110:63960/0
INFO  2021-03-01 18:10:50,690 [shard 0] monc - get_auth_request(con=[osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0], auth_method=0)
ERROR 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] get_initial_auth_request returned crimson::auth::error (unknown connection)
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] closing: reset yes, replace no
DEBUG 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] TRIGGER CLOSING, was CONNECTING
...
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] write_event: dropped
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] execute_connecting(): protocol aborted at CLOSING -- std::system_error (error crimson::net:6, protocol aborted)
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] closing: reset yes, replace no
DEBUG 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] TRIGGER CLOSING, was CONNECTING
WARN  2021-03-01 18:10:50,690 [shard 0] osd - ms_handle_reset
WARN  2021-03-01 18:10:50,690 [shard 0] monc - active conn reset v2:172.21.15.110:3300/0
INFO  2021-03-01 18:10:50,690 [shard 0] monc - reopen_session to mon.-1
WARN  2021-03-01 18:10:50,690 [shard 0] monc - mon.0 does not have an addr compatible with me
INFO  2021-03-01 18:10:50,690 [shard 0] monc - connecting to mon.1
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954 >> mon.? v2:172.21.15.110:3300/0] ProtocolV2::start_connect(): peer_addr=v2:172.21.15.110:3300/0, peer_name=mon.?, cc=14512795460730278364 policy(lossy=true, server=false, standby=false, resetcheck=false)
DEBUG 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954 >> mon.? v2:172.21.15.110:3300/0] TRIGGER CONNECTING, was NONE
DEBUG 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954 >> mon.? v2:172.21.15.110:3300/0] UPDATE: gs=3 for connect
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954 >> mon.? v2:172.21.15.110:3300/0] write_event: delay ...
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] write_event: dropped
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] execute_connecting(): protocol aborted at CLOSING -- std::system_error (error crimson::net:6, protocol aborted)
...
"
WARN  2021-03-01 18:10:50,690 [shard 0] seastar - Exceptional future ignored: seastar::broken_promise (broken promise), backtrace:    0x146f364
   0x146f6e1
   0x146fb01
   0x135c2fe
   0x135c481
   0x6ee079
   0x137db87
   0x137def2
   0x13ab085
   0x1347b27
   0x6619f5
   /lib64/libc.so.6+0x237b2
   0x6b217d
   --------
   N7seastar12continuationINS_8internal22promise_base_with_typeIvEENS_6futureIvE12finally_bodyIZNS_5asyncIZZ4mainENKUlvE_clEvEUlvE_JEEENS_8futurizeINSt9result_ofIFNSt5decayIT_E4typeEDpNSC_IT0_E4typeEEE4typeEE4typeENS_17thread_attributesEOSD_DpOSG_EUlvE1_Lb0EEEZNS5_17then_wrapped_nrvoIS5_SU_EENSA_ISD_E4typeEOT0_EUlOS3_RSU_ONS_12future_stateINS1_9monostateEEEE_vEE

```

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agoRGW Zipper - get_ctl() no longer needed
Daniel Gryniewicz [Fri, 19 Feb 2021 14:40:57 +0000 (09:40 -0500)]
RGW Zipper - get_ctl() no longer needed

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoRGW Zipper - user.empty()
Daniel Gryniewicz [Tue, 26 Jan 2021 19:10:12 +0000 (14:10 -0500)]
RGW Zipper - user.empty()

Add an empty() method for user, and use it in admin code.

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoRGW Zipper - Wrap zoneutils
Daniel Gryniewicz [Fri, 22 Jan 2021 15:36:23 +0000 (10:36 -0500)]
RGW Zipper - Wrap zoneutils

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoRGW Zipper - Add zone abstraction
Daniel Gryniewicz [Thu, 21 Jan 2021 17:11:30 +0000 (12:11 -0500)]
RGW Zipper - Add zone abstraction

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoRGW Zipper - random cleanups
Daniel Gryniewicz [Thu, 21 Jan 2021 14:40:36 +0000 (09:40 -0500)]
RGW Zipper - random cleanups

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoRGW Zipper - Meta list API
Daniel Gryniewicz [Wed, 20 Jan 2021 17:04:26 +0000 (12:04 -0500)]
RGW Zipper - Meta list API

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoRGW Zipper - zipify RGWUserAdminOpState
Daniel Gryniewicz [Tue, 19 Jan 2021 19:58:39 +0000 (14:58 -0500)]
RGW Zipper - zipify RGWUserAdminOpState

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoRGW Zipper - Clean up get_user* APIs.
Daniel Gryniewicz [Tue, 19 Jan 2021 18:13:37 +0000 (13:13 -0500)]
RGW Zipper - Clean up get_user* APIs.

The main get_user() function doesn't query the cluster, but the rest of
them do.  Rename the functions to match, and add comments to clarify.

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoZipper - zipperify the Auth code
Daniel Gryniewicz [Tue, 19 Jan 2021 15:35:16 +0000 (10:35 -0500)]
Zipper - zipperify the Auth code

This also removes the only user of s->sysobj_ctx, so that can be removed
as well.

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoZipper - remove duplicate get_user()
Daniel Gryniewicz [Mon, 18 Jan 2021 18:31:22 +0000 (13:31 -0500)]
Zipper - remove duplicate get_user()

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoRGW - Zipper 10: Pull The Thread
Daniel Gryniewicz [Mon, 18 Jan 2021 17:25:39 +0000 (12:25 -0500)]
RGW - Zipper 10: Pull The Thread

This commit changes the RGWStoreManager to return a RGWStore* rather
than a RGWRadosStore*.  This is the thread that unravels the rest of the
Zipper work, removing hard-coded uses of the RGWRados* classes.

Signed-off-by: Daniel Gryniewicz <dang@redhat.com>
4 years agoMerge pull request #39779 from tchaikov/wip-crimson-monc-cleanup
Kefu Chai [Tue, 2 Mar 2021 12:32:25 +0000 (20:32 +0800)]
Merge pull request #39779 from tchaikov/wip-crimson-monc-cleanup

crimson/mon: resend mon command when connected and cleanups

Reviewed-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
Reviewed-by: Xuehan Xu <xxhdx1985126@gmail.com>
4 years agocrimson/os: return an errorator::future in an erroratorized chain 39783/head
Kefu Chai [Tue, 2 Mar 2021 11:48:18 +0000 (19:48 +0800)]
crimson/os: return an errorator::future in an erroratorized chain

errorator does not convert a "void" continuation to a ready future at
the time of writing.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/os: capture structured binding labels with new variable
Kefu Chai [Tue, 2 Mar 2021 11:46:40 +0000 (19:46 +0800)]
crimson/os: capture structured binding labels with new variable

structured binding does not define variables. unlike GCC, Clang does
not allow this.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/os: mark unused variable with [[maybe_unused]]
Kefu Chai [Tue, 2 Mar 2021 11:46:01 +0000 (19:46 +0800)]
crimson/os: mark unused variable with [[maybe_unused]]

`MAX_FLAT_BLOCK_SIZE` is only used in Debug builds.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/os: do not capture unused variables
Kefu Chai [Tue, 2 Mar 2021 11:45:44 +0000 (19:45 +0800)]
crimson/os: do not capture unused variables

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: do not use futurize_invoke 39779/head
Kefu Chai [Tue, 2 Mar 2021 11:03:38 +0000 (19:03 +0800)]
crimson/mon: do not use futurize_invoke

flatten the call in seastar::futurize_invoke().

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39744 from zdover23/wip-doc-cephadm-install-install-cephadm-rewri...
Sebastian Wagner [Tue, 2 Mar 2021 11:05:30 +0000 (12:05 +0100)]
Merge pull request #39744 from zdover23/wip-doc-cephadm-install-install-cephadm-rewrite-2021-Feb-28

doc/cephadm: rewrite "install cephadm"

Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agocrimson/mon: let reopen_session() return future<bool>
Kefu Chai [Tue, 2 Mar 2021 10:53:48 +0000 (18:53 +0800)]
crimson/mon: let reopen_session() return future<bool>

this change is for improve the readability. to emphasis that the
next steps are performed only if a connection to monitor is
established.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: use a vector for mon_commands
Kefu Chai [Tue, 2 Mar 2021 10:08:27 +0000 (18:08 +0800)]
crimson/mon: use a vector for mon_commands

for smaller memory foot print. as we don't have lots of mon_command in
flight, hence not likely to benefit from a O(log(n)) lookup.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: resend mon command when session established
Kefu Chai [Tue, 2 Mar 2021 09:52:36 +0000 (17:52 +0800)]
crimson/mon: resend mon command when session established

this behavior matches that of `MonClient::_resend_mon_commands()`. so
far the only user which sends mon command in crimson is
`OSD::_add_me_to_crush()`, but there is still (rare) chance that the connected
monitor cannot be reached when we send the command to it, in that case,
we should retry when the connection is re-established.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: pass a string to Client::run_command()
Kefu Chai [Tue, 2 Mar 2021 09:00:51 +0000 (17:00 +0800)]
crimson/mon: pass a string to Client::run_command()

as the reason why MMonCommand uses a vector is but for legacy reasons,
there is no need to expose this via the interface.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: move keyring and sub renewals into on_session_opened()
Kefu Chai [Tue, 2 Mar 2021 08:38:04 +0000 (16:38 +0800)]
crimson/mon: move keyring and sub renewals into on_session_opened()

both of them fall into the category of jobs which we should do after
the connection to monitor is established.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: let on_session_opened() return a future
Kefu Chai [Tue, 2 Mar 2021 08:31:00 +0000 (16:31 +0800)]
crimson/mon: let on_session_opened() return a future

so we can expand its responsibility to perform some async calls.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: s/send_pendings/on_session_opened/
Kefu Chai [Tue, 2 Mar 2021 08:23:20 +0000 (16:23 +0800)]
crimson/mon: s/send_pendings/on_session_opened/

will use this method also for sending requests which are not acked

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: pending_messages should not be empty if active_conn
Kefu Chai [Tue, 2 Mar 2021 08:18:20 +0000 (16:18 +0800)]
crimson/mon: pending_messages should not be empty if active_conn

we always send all pending_messages, and clear it when establishing a
connection to mon, so there is no need to check for it when calling
`send_message()`.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: check for active_con before calling send_pendings()
Kefu Chai [Tue, 2 Mar 2021 08:07:25 +0000 (16:07 +0800)]
crimson/mon: check for active_con before calling send_pendings()

before this change, we guard the `send_pendings()` call only in
`Client::send_message()`, after this change, all of the
`send_pendings()` calls are guarded with this check.

more consistent this way.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39760 from zdover23/wip-doc-cephadm-install-bootstrap-rewrite...
Sebastian Wagner [Tue, 2 Mar 2021 10:46:08 +0000 (11:46 +0100)]
Merge pull request #39760 from zdover23/wip-doc-cephadm-install-bootstrap-rewrite-2021-Mar-01

doc/cephadm: rewrite "b.strap a new cluster"

Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #39685 from tchaikov/wip-mgr-dashboard-requests
Kefu Chai [Tue, 2 Mar 2021 10:31:39 +0000 (18:31 +0800)]
Merge pull request #39685 from tchaikov/wip-mgr-dashboard-requests

pybind/mgr/dashboard: bump up requests to 2.25.1

Reviewed-by: Laura Paduano <lpaduano@suse.com>
4 years agoMerge pull request #39673 from rzarzynski/wip-crimson-drop-protocol-v1
Kefu Chai [Tue, 2 Mar 2021 04:44:31 +0000 (12:44 +0800)]
Merge pull request #39673 from rzarzynski/wip-crimson-drop-protocol-v1

crimson: drop the support of ProtocolV1

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39768 from rzarzynski/wip-crimson-monc-renew-subs
Kefu Chai [Tue, 2 Mar 2021 03:25:26 +0000 (11:25 +0800)]
Merge pull request #39768 from rzarzynski/wip-crimson-monc-renew-subs

crimson/monc: renew subscriptions when reopening a session.

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39718 from zdover23/wip-doc-dev-t8y-label-in-toc-2021-Feb-26
Josh Durgin [Tue, 2 Mar 2021 00:26:46 +0000 (16:26 -0800)]
Merge pull request #39718 from zdover23/wip-doc-dev-t8y-label-in-toc-2021-Feb-26

doc/dev: add t8y label to index.rst

Reviewed-by: Josh Durgin <jdurgin@redhat.com>
4 years agoMerge pull request #39601 from badone/wip-ceph_test_rados_api_watch_notify-enoent...
Brad Hubbard [Mon, 1 Mar 2021 22:10:10 +0000 (08:10 +1000)]
Merge pull request #39601 from badone/wip-ceph_test_rados_api_watch_notify-enoent-failure

tests: ceph_test_rados_api_watch_notify: Allow for reconnect

Reviewed-by: Neha Ojha <nojha@redhat.com>
4 years agocrimson/monc: renew subscriptions when reopening a session. 39768/head
Radoslaw Zarzynski [Mon, 1 Mar 2021 14:09:22 +0000 (14:09 +0000)]
crimson/monc: renew subscriptions when reopening a session.

Lack of this feature was the root cause of an issue in
teuthology testing in which a socket failure injection
happened exactly during `mon_subscribe`; after the OSD
reconnected, the message hasn't been resent and entire
boot process has frozen.

```
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - [osd.2(client) v2:172.21.15.204:6804/33459@57376 >> mon.0 v2:172.21.15.204:3300/0] --> #6 === mon_subscribe({osdmap=1}) v3
(15)
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - authenticated_encrypt_update plaintext.length()=80 buffer.length()=80
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - authenticated_encrypt_final buffer.length()=96 final_len=0
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - authenticated_encrypt_update plaintext.length()=48 buffer.length()=48
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - authenticated_encrypt_update plaintext.length()=16 buffer.length()=64
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - authenticated_encrypt_final buffer.length()=80 final_len=0
INFO  2021-02-25 11:42:53,758 [shard 0] ms - [osd.2(client) v2:172.21.15.204:6804/33459@57376 >> mon.0 v2:172.21.15.204:3300/0] execute_ready(): fault at READY on lossy
 channel, going to CLOSING -- std::system_error (error crimson::net:4, read eof)
```

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agoMerge PR #39680 into master
Patrick Donnelly [Mon, 1 Mar 2021 20:07:32 +0000 (12:07 -0800)]
Merge PR #39680 into master

* refs/pull/39680/head:
mds: allow `fs authorize` command to work

Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>
Reviewed-by: Rishabh Dave <ridave@redhat.com>
4 years agoMerge PR #39710 into master
Patrick Donnelly [Mon, 1 Mar 2021 20:05:47 +0000 (12:05 -0800)]
Merge PR #39710 into master

* refs/pull/39710/head:
qa: run fs:verify on all distros

Reviewed-by: Venky Shankar <vshankar@redhat.com>
Reviewed-by: Yuri Weinstein <yweins@redhat.com>
Reviewed-by: Rishabh Dave <ridave@redhat.com>
4 years agoMerge PR #39725 into master
Patrick Donnelly [Mon, 1 Mar 2021 19:35:58 +0000 (11:35 -0800)]
Merge PR #39725 into master

* refs/pull/39725/head:
qa: delete all fs during tearDown

Reviewed-by: Ramana Raja <rraja@redhat.com>
Reviewed-by: Rishabh Dave <ridave@redhat.com>
4 years agodoc/cephadm: rewrite "install cephadm" 39744/head
Zac Dover [Sun, 28 Feb 2021 12:13:39 +0000 (22:13 +1000)]
doc/cephadm: rewrite "install cephadm"

This PR breaks the "Deploying a New Ceph Cluster"
section into several sub-sections, so that each sub-section
pertains to only one subject. I've also added some explanatory
text that puts the instructions into context more than they were
before.

Signed-off-by: Zac Dover <zac.dover@gmail.com>
4 years agoMerge pull request #39732 from mychoxin/resolve_compile_error
Jason Dillaman [Mon, 1 Mar 2021 18:25:25 +0000 (13:25 -0500)]
Merge pull request #39732 from mychoxin/resolve_compile_error

test/librbd: resolve compile error on centos

Reviewed-by: Jason Dillaman <dillaman@redhat.com>
4 years agoMerge pull request #39731 from mychoxin/use_unified_zero_func
Jason Dillaman [Mon, 1 Mar 2021 18:24:46 +0000 (13:24 -0500)]
Merge pull request #39731 from mychoxin/use_unified_zero_func

rbd: use portable zero-ing memory function

Reviewed-by: Jason Dillaman <dillaman@redhat.com>
4 years agodoc/cephadm: rewrite "b.strap a new cluster" 39760/head
Zac Dover [Mon, 1 Mar 2021 14:01:05 +0000 (00:01 +1000)]
doc/cephadm: rewrite "b.strap a new cluster"

This PR rewrites the section "Bootstrap A New
Cluster" in the Cephadm Guide, in the Install
Chapter. I've broken this section up into what
seem to me to be the topics that the content
naturally divides into.

Signed-off-by: Zac Dover <zac.dover@gmail.com>
4 years agocephadm: set CEPH_USE_RANDOM_NONCE if using --init 39739/head
Sage Weil [Sat, 27 Feb 2021 20:44:22 +0000 (15:44 -0500)]
cephadm: set CEPH_USE_RANDOM_NONCE if using --init

This ensures that daemon messenger nonces don't collide by using PIDs that are
no longer unique for the IP address.

Signed-off-by: Sage Weil <sage@newdream.net>
4 years agomsg/Messenger: use random nonce if CEPH_USE_RANDOM_NONCE or pid == 1
Sage Weil [Sat, 27 Feb 2021 20:45:47 +0000 (15:45 -0500)]
msg/Messenger: use random nonce if CEPH_USE_RANDOM_NONCE or pid == 1

If we are in a container, then we do not have a unique pid, and need to
use a random nonce.  We normally detect this if our pid is 1, but that
doesn't work when we have a init process--we'll (probably?) have a small
pid (in my tests, the OSDs were getting pid 7).

To be safe, also check for an environment variable set by cephadm.

This avoids problems that arise when we don't have a unique address.

Fixes: https://tracker.ceph.com/issues/49534
Signed-off-by: Sage Weil <sage@newdream.net>
4 years agoRevert "Merge PR #39482 into master"
Sage Weil [Sat, 27 Feb 2021 20:54:21 +0000 (15:54 -0500)]
Revert "Merge PR #39482 into master"

This reverts commit 9200b1ea8e5, reversing
changes made to e42bbba9ca8.

For running tests to narrow down the root cause of:
https://tracker.ceph.com/issues/49237

Signed-off-by: Michael Fritch <mfritch@suse.com>
4 years agomgr/test_orchestrator: Refactor create_osds 39352/head
Sebastian Wagner [Mon, 1 Mar 2021 12:56:51 +0000 (13:56 +0100)]
mgr/test_orchestrator: Refactor create_osds

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/volumes: adapt to now orch interface
Sebastian Wagner [Wed, 10 Feb 2021 12:39:44 +0000 (13:39 +0100)]
mgr/volumes: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agodoc/mgr/orchestrator_modules: adapt to now orch interface
Sebastian Wagner [Tue, 9 Feb 2021 11:02:02 +0000 (12:02 +0100)]
doc/mgr/orchestrator_modules: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/selftest: adapt to now orch interface
Sebastian Wagner [Tue, 9 Feb 2021 10:58:31 +0000 (11:58 +0100)]
mgr/selftest: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/dashboard: adapt to now orch interface
Sebastian Wagner [Mon, 8 Feb 2021 09:00:21 +0000 (10:00 +0100)]
mgr/dashboard: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/mds_autoscaler: Add to tox.ini
Sebastian Wagner [Mon, 1 Mar 2021 13:10:19 +0000 (14:10 +0100)]
mgr/mds_autoscaler: Add to tox.ini

Fixes: f69abe6291958a9ccfb85ce77c9b86e8af8ecf21
Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/mds_autoscaler: adapt to now orch interface
Sebastian Wagner [Mon, 8 Feb 2021 08:54:07 +0000 (09:54 +0100)]
mgr/mds_autoscaler: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/test_orchestrator: adapt to now orch interface
Sebastian Wagner [Mon, 8 Feb 2021 00:56:16 +0000 (01:56 +0100)]
mgr/test_orchestrator: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/rook: Adapt to new orch interface
Sebastian Wagner [Mon, 8 Feb 2021 00:47:42 +0000 (01:47 +0100)]
mgr/rook: Adapt to new orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/cephadm: Adapt cephadm to new orch interface
Sebastian Wagner [Mon, 8 Feb 2021 00:37:07 +0000 (01:37 +0100)]
mgr/cephadm: Adapt cephadm to new orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/orch: Remove old tests
Sebastian Wagner [Mon, 8 Feb 2021 00:24:38 +0000 (01:24 +0100)]
mgr/orch: Remove old tests

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agocrimson/monc: drop misleading comment about Connection::reply. 39673/head
Radoslaw Zarzynski [Wed, 24 Feb 2021 19:40:56 +0000 (19:40 +0000)]
crimson/monc: drop misleading comment about Connection::reply.

Before the commit the `crimson::mon:Connection::reply`
was commented as being specific to the ProtocolV1.
However, the code suggests this member participates also
in V2-related paths like `Connection::renew_tickets()`
where `do_auth()` is called from. `do_auth()` generates
`MAuth` which causes a monitor to send `MAuthReply`.
The `Connection::reply` synchronizes sending the auth
request with response handling.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agomon: drop the unnecessary inclusion of MAuthReply.h.
Radoslaw Zarzynski [Wed, 24 Feb 2021 17:15:01 +0000 (17:15 +0000)]
mon: drop the unnecessary inclusion of MAuthReply.h.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agoauth: drop unnecessary forward declaration from AuthClientHandler.
Radoslaw Zarzynski [Wed, 24 Feb 2021 16:49:13 +0000 (16:49 +0000)]
auth: drop unnecessary forward declaration from AuthClientHandler.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson/monc: fix debugs in Connection::do_auth_single().
Radoslaw Zarzynski [Wed, 24 Feb 2021 15:22:48 +0000 (15:22 +0000)]
crimson/monc: fix debugs in Connection::do_auth_single().

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson/monc: drop the support for ProtocolV1.
Radoslaw Zarzynski [Wed, 24 Feb 2021 15:22:27 +0000 (15:22 +0000)]
crimson/monc: drop the support for ProtocolV1.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson/net: drop the implementation of ProtocolV1.
Radoslaw Zarzynski [Wed, 24 Feb 2021 14:31:41 +0000 (14:31 +0000)]
crimson/net: drop the implementation of ProtocolV1.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson/tests: drop the v1 support in unittest-seastar-messenger.
Radoslaw Zarzynski [Mon, 1 Mar 2021 15:12:28 +0000 (15:12 +0000)]
crimson/tests: drop the v1 support in unittest-seastar-messenger.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson: do not use ProtocolV1 anymore.
Radoslaw Zarzynski [Wed, 24 Feb 2021 14:16:04 +0000 (14:16 +0000)]
crimson: do not use ProtocolV1 anymore.

At the moment crimson offers only a partial and buggy
support for ProtocolV1. When it enters the production,
V1 will be long obsolete, so spending time on improving
it doesn't seem to be a sound investment while offering
half-baked feature can be worse that lacking it entirely.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agoMerge pull request #39521 from yuvalif/wip-yuval-fix-49322
Casey Bodley [Mon, 1 Mar 2021 15:05:48 +0000 (10:05 -0500)]
Merge pull request #39521 from yuvalif/wip-yuval-fix-49322

rgw/notification: add exception handling for persistent notification thread

Reviewed-by: Casey Bodley <cbodley@redhat.com>