]> git.apps.os.sepia.ceph.com Git - ceph.git/log
ceph.git
4 years agodoc/dev: t8y interactive-on-error rewrite 39719/head
Zac Dover [Fri, 26 Feb 2021 13:47:01 +0000 (23:47 +1000)]
doc/dev: t8y interactive-on-error rewrite

This PR rewrites the section of the Teuthology
documentation that is about the --interactive-
on-error flag.

Signed-off-by: Zac Dover <zac.dover@gmail.com>
4 years agoMerge pull request #39770 from liewegas/bug-46745
Sebastian Wagner [Wed, 3 Mar 2021 09:51:47 +0000 (10:51 +0100)]
Merge pull request #39770 from liewegas/bug-46745

cephadm: add docker.service dependency in systemd units

Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #39795 from dillaman/wip-migration-import-docs
Mykola Golub [Wed, 3 Mar 2021 08:45:35 +0000 (10:45 +0200)]
Merge pull request #39795 from dillaman/wip-migration-import-docs

doc/rbd: clarify QCOW2 migration support

Reviewed-by: Mykola Golub <mgolub@suse.com>
4 years agoMerge pull request #39555 from tchaikov/wip-drop-pre-nautilus
Kefu Chai [Wed, 3 Mar 2021 08:39:46 +0000 (16:39 +0800)]
Merge pull request #39555 from tchaikov/wip-drop-pre-nautilus

*: drop backward compatibility with pre-nautilus versions

Reviewed-by: Josh Durgin <jdurgin@redhat.com>
4 years agoMerge pull request #39798 from tchaikov/wip-crimson-monc-copy-sent
Kefu Chai [Wed, 3 Mar 2021 04:31:39 +0000 (12:31 +0800)]
Merge pull request #39798 from tchaikov/wip-crimson-monc-copy-sent

crimson/mon: keep a copy of sent MMonCommand messages

Reviewed-by: Yingxin Cheng <yingxin.cheng@intel.com>
4 years agocrimson/mon: keep a copy of sent MMonCommand messages 39798/head
Kefu Chai [Wed, 3 Mar 2021 03:39:36 +0000 (11:39 +0800)]
crimson/mon: keep a copy of sent MMonCommand messages

as per Yingxin Cheng,

> The send process can be asynchronous (there is a conn.out_q, or if the
> underlying socket lives in a different core in the m:n model to be
> ordered there). If user really wants to reuse a message, they must be
> careful not to modify it because it may result in modifing the pending
> messages.
>
> I think the best way is to copy the message if user want to resend it,
> and keep the ceph_assert(!msg->get_seq()). It may looks good to reuse a
> message under lossy policy, but the correctness is now up to user not to
> modify it inplace.

see also https://github.com/ceph/ceph/pull/39786

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agodoc/rbd: clarify QCOW2 migration support 39795/head
Jason Dillaman [Tue, 2 Mar 2021 22:29:29 +0000 (17:29 -0500)]
doc/rbd: clarify QCOW2 migration support

Signed-off-by: Jason Dillaman <dillaman@redhat.com>
4 years agoMerge PR #39730 into master
Sage Weil [Tue, 2 Mar 2021 18:56:01 +0000 (13:56 -0500)]
Merge PR #39730 into master

* refs/pull/39730/head:
cephadm: fix escaping/quoting of stderr-prefix arg for ceph daemons

Reviewed-by: Michael Fritch <mfritch@suse.com>
Reviewed-by: Sebastian Wagner <swagner@suse.com>
4 years agoMerge pull request #39781 from idryomov/wip-krbd-xfstests-fixes
Ilya Dryomov [Tue, 2 Mar 2021 17:43:20 +0000 (18:43 +0100)]
Merge pull request #39781 from idryomov/wip-krbd-xfstests-fixes

qa/suites/krbd: address recent issues caused by newer kernels

Reviewed-by: Jason Dillaman <dillaman@redhat.com>
4 years agoMerge PR #39723 into master
Sage Weil [Tue, 2 Mar 2021 17:08:52 +0000 (12:08 -0500)]
Merge PR #39723 into master

* refs/pull/39723/head:
mon/ConfigMonitor: make config changes via KVMonitor's pending set

Reviewed-by: Neha Ojha <nojha@redhat.com>
4 years agocephadm: fix escaping/quoting of stderr-prefix arg for ceph daemons 39730/head
Sage Weil [Tue, 2 Mar 2021 16:35:41 +0000 (10:35 -0600)]
cephadm: fix escaping/quoting of stderr-prefix arg for ceph daemons

On some versions of podman doing

   --default-log-stderr-prefix="debug "

seems to work okay, but on others it does not, producing lines like

   /usr/bin/ceph-mon: "debug "2021-02-26T15:30:36.266+0000 7f3d8a955700  4 rocksdb:                    Options.db_write_buffer_size: 0

Quote things properly for the unit.run bash script.

Signed-off-by: Sage Weil <sage@newdream.net>
4 years agoMerge PR #39739 into master
Sage Weil [Tue, 2 Mar 2021 16:32:12 +0000 (11:32 -0500)]
Merge PR #39739 into master

* refs/pull/39739/head:
cephadm: set CEPH_USE_RANDOM_NONCE if using --init
msg/Messenger: use random nonce if CEPH_USE_RANDOM_NONCE or pid == 1
Revert "Merge PR #39482 into master"

Reviewed-by: Michael Fritch <mfritch@suse.com>
Reviewed-by: Sebastian Wagner <swagner@suse.com>
4 years agocephadm: add docker.service dependency in systemd units 39770/head
Sage Weil [Mon, 1 Mar 2021 22:42:15 +0000 (17:42 -0500)]
cephadm: add docker.service dependency in systemd units

This ensures that (1) we start after the docker daemon is running, and
(2) a restart of docker will also restart the ceph services.

Fixes: https://tracker.ceph.com/issues/46745
Signed-off-by: Sage Weil <sage@newdream.net>
4 years agoMerge PR #39679 into master
Patrick Donnelly [Tue, 2 Mar 2021 14:40:50 +0000 (06:40 -0800)]
Merge PR #39679 into master

* refs/pull/39679/head:
Revert "mon/MDSMonitor: add missing frozen checks"

Reviewed-by: Rishabh Dave <ridave@redhat.com>
Reviewed-by: Jos Collin <jcollin@redhat.com>
4 years agoMerge pull request #38995 from mgfritch/cephadm-check-host-errors
Sebastian Wagner [Tue, 2 Mar 2021 14:33:04 +0000 (15:33 +0100)]
Merge pull request #38995 from mgfritch/cephadm-check-host-errors

cephadm: remove redundant `ERROR` during check-host

Reviewed-by: Juan Miguel Olmo Martínez <jolmomar@redhat.com>
Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #39722 from p-se/wip-pse-cephadm-SUSE-alertmanager
Sebastian Wagner [Tue, 2 Mar 2021 14:30:17 +0000 (15:30 +0100)]
Merge pull request #39722 from p-se/wip-pse-cephadm-SUSE-alertmanager

cephadm: `cephadm ls` broken for SUSE downstream alertmanager container

Reviewed-by: Michael Fritch <mfritch@suse.com>
Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #38915 from Daniel-Pivonka/clientsoktostop
Sebastian Wagner [Tue, 2 Mar 2021 14:28:58 +0000 (15:28 +0100)]
Merge pull request #38915 from Daniel-Pivonka/clientsoktostop

mgr/cephadm: add ok-to-stop functions for ceph client services

Reviewed-by: Juan Miguel Olmo Martínez <jolmomar@redhat.com>
Reviewed-by: Michael Fritch <mfritch@suse.com>
Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #39352 from sebastian-philipp/orch-remove-promise
Sebastian Wagner [Tue, 2 Mar 2021 14:25:02 +0000 (15:25 +0100)]
Merge pull request #39352 from sebastian-philipp/orch-remove-promise

mgr/orch: Make orchestrator interface synchronous

Reviewed-by: Varsha Rao <varao@redhat.com>
4 years agoMerge pull request #39612 from jmolmo/fix_rook_orch_ls
Sebastian Wagner [Tue, 2 Mar 2021 13:47:25 +0000 (14:47 +0100)]
Merge pull request #39612 from jmolmo/fix_rook_orch_ls

mgr/orchestrator: Fix ceph orch ls in Rook

Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
Reviewed-by: Varsha Rao <varao@redhat.com>
4 years agoMerge pull request #39784 from rzarzynski/wip-crimson-monc-close-active-conn-on-reset
Kefu Chai [Tue, 2 Mar 2021 12:48:35 +0000 (20:48 +0800)]
Merge pull request #39784 from rzarzynski/wip-crimson-monc-close-active-conn-on-reset

crimson/monc: close() active_con before destructing it on resets.

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39783 from tchaikov/wip-crimson-clang
Kefu Chai [Tue, 2 Mar 2021 12:45:24 +0000 (20:45 +0800)]
Merge pull request #39783 from tchaikov/wip-crimson-clang

crimson/os: fix clang build and cleanups.

Reviewed-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson/monc: close() active_con before destructing it on resets. 39784/head
Radoslaw Zarzynski [Mon, 1 Mar 2021 21:50:36 +0000 (21:50 +0000)]
crimson/monc: close() active_con before destructing it on resets.

`ProtocolV2` expects `AuthClient` implementations to withstand
calling `get_auth_request()` and `handle_auth_reply_more()` even
if `handle_auth_done()` had been already called. This is because
a network fault may happen on e.g. `AuthSignatureFrame` which is
put on the wire after the `AuthDone` handling.

`crimson::mon::Client` deals with that by returning `auth::error`
from both `get_auth_request()` and `handle_auth_reply_more()` as
the preceding invocation of `handle_auth_done()` had already
cleared `pending_conns` (and set `active_con`). This leads to
`abort_in_close()` and finally to dispatching `ms_handle_reset()`
on `mon::Client` which is fine in general but, when comes to the
current implementation, it destroys `active_con` without closing
it first.
One of the consequence is breaking the `mon::Connection::reply`
promise; another one is missed `mark_down()` call.

```
DEBUG 2021-03-01 18:10:50,489 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@56752 >> mon.? v2:172.21.15.110:3300/0] GOT AuthDoneFrame: gid=4121, con_mode=se
cure, payload_len=995
DEBUG 2021-03-01 18:10:50,489 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@56752 >> mon.? v2:172.21.15.110:3300/0] WRITE AuthSignatureFrame: signature=60ca
f49e5a6cf3cc39c4160cb9d09032db5f794e29655dc0124cf5f42b7546fb
DEBUG 2021-03-01 18:10:50,489 [shard 0] ms - authenticated_encrypt_update plaintext.length()=80 buffer.length()=80
DEBUG 2021-03-01 18:10:50,489 [shard 0] ms - authenticated_encrypt_final buffer.length()=96 final_len=0
INFO  2021-03-01 18:10:50,489 [shard 0] monc - found mon.noname-a
INFO  2021-03-01 18:10:50,489 [shard 0] monc - sending auth(proto 2 2 bytes epoch 0) v1
INFO  2021-03-01 18:10:50,489 [shard 0] monc - waiting
DEBUG 2021-03-01 18:10:50,489 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@56752 >> mon.? v2:172.21.15.110:3300/0] GOT AuthSignatureFrame: signature=ea04f1
318cf76808414a853ed37fd232ae886bef036cb4248079c6cba89d669a
DEBUG 2021-03-01 18:10:50,490 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@56752 >> mon.? v2:172.21.15.110:3300/0] WRITE ClientIdentFrame: addrs=v2:172.21.
15.110:6800/33954, target=v2:172.21.15.110:3300/0, gid=0, gs=1, features_supported=4540138303579357183, features_required=576460752303432193, flags=1, cookie=9231904580
14536120
...
INFO  2021-03-01 18:10:50,490 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@56752 >> mon.? v2:172.21.15.110:3300/0] execute_connecting(): fault at CONNECTIN
G, going to WAIT -- std::system_error (error crimson::net:4, read eof)
...
DEBUG 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@0 >> mon.? v2:172.21.15.110:3300/0] GOT HelloFrame: my_type=mon peer_addr=v2:172.21.15.110:63960/0
INFO  2021-03-01 18:10:50,690 [shard 0] monc - get_auth_request(con=[osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0], auth_method=0)
ERROR 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] get_initial_auth_request returned crimson::auth::error (unknown connection)
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] closing: reset yes, replace no
DEBUG 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] TRIGGER CLOSING, was CONNECTING
...
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] write_event: dropped
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] execute_connecting(): protocol aborted at CLOSING -- std::system_error (error crimson::net:6, protocol aborted)
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] closing: reset yes, replace no
DEBUG 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] TRIGGER CLOSING, was CONNECTING
WARN  2021-03-01 18:10:50,690 [shard 0] osd - ms_handle_reset
WARN  2021-03-01 18:10:50,690 [shard 0] monc - active conn reset v2:172.21.15.110:3300/0
INFO  2021-03-01 18:10:50,690 [shard 0] monc - reopen_session to mon.-1
WARN  2021-03-01 18:10:50,690 [shard 0] monc - mon.0 does not have an addr compatible with me
INFO  2021-03-01 18:10:50,690 [shard 0] monc - connecting to mon.1
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954 >> mon.? v2:172.21.15.110:3300/0] ProtocolV2::start_connect(): peer_addr=v2:172.21.15.110:3300/0, peer_name=mon.?, cc=14512795460730278364 policy(lossy=true, server=false, standby=false, resetcheck=false)
DEBUG 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954 >> mon.? v2:172.21.15.110:3300/0] TRIGGER CONNECTING, was NONE
DEBUG 2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954 >> mon.? v2:172.21.15.110:3300/0] UPDATE: gs=3 for connect
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954 >> mon.? v2:172.21.15.110:3300/0] write_event: delay ...
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] write_event: dropped
INFO  2021-03-01 18:10:50,690 [shard 0] ms - [osd.0(client) v2:172.21.15.110:6800/33954@63960 >> mon.? v2:172.21.15.110:3300/0] execute_connecting(): protocol aborted at CLOSING -- std::system_error (error crimson::net:6, protocol aborted)
...
"
WARN  2021-03-01 18:10:50,690 [shard 0] seastar - Exceptional future ignored: seastar::broken_promise (broken promise), backtrace:    0x146f364
   0x146f6e1
   0x146fb01
   0x135c2fe
   0x135c481
   0x6ee079
   0x137db87
   0x137def2
   0x13ab085
   0x1347b27
   0x6619f5
   /lib64/libc.so.6+0x237b2
   0x6b217d
   --------
   N7seastar12continuationINS_8internal22promise_base_with_typeIvEENS_6futureIvE12finally_bodyIZNS_5asyncIZZ4mainENKUlvE_clEvEUlvE_JEEENS_8futurizeINSt9result_ofIFNSt5decayIT_E4typeEDpNSC_IT0_E4typeEEE4typeEE4typeENS_17thread_attributesEOSD_DpOSG_EUlvE1_Lb0EEEZNS5_17then_wrapped_nrvoIS5_SU_EENSA_ISD_E4typeEOT0_EUlOS3_RSU_ONS_12future_stateINS1_9monostateEEEE_vEE

```

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agoMerge pull request #39779 from tchaikov/wip-crimson-monc-cleanup
Kefu Chai [Tue, 2 Mar 2021 12:32:25 +0000 (20:32 +0800)]
Merge pull request #39779 from tchaikov/wip-crimson-monc-cleanup

crimson/mon: resend mon command when connected and cleanups

Reviewed-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
Reviewed-by: Xuehan Xu <xxhdx1985126@gmail.com>
4 years agocrimson/os: return an errorator::future in an erroratorized chain 39783/head
Kefu Chai [Tue, 2 Mar 2021 11:48:18 +0000 (19:48 +0800)]
crimson/os: return an errorator::future in an erroratorized chain

errorator does not convert a "void" continuation to a ready future at
the time of writing.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/os: capture structured binding labels with new variable
Kefu Chai [Tue, 2 Mar 2021 11:46:40 +0000 (19:46 +0800)]
crimson/os: capture structured binding labels with new variable

structured binding does not define variables. unlike GCC, Clang does
not allow this.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/os: mark unused variable with [[maybe_unused]]
Kefu Chai [Tue, 2 Mar 2021 11:46:01 +0000 (19:46 +0800)]
crimson/os: mark unused variable with [[maybe_unused]]

`MAX_FLAT_BLOCK_SIZE` is only used in Debug builds.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/os: do not capture unused variables
Kefu Chai [Tue, 2 Mar 2021 11:45:44 +0000 (19:45 +0800)]
crimson/os: do not capture unused variables

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: do not use futurize_invoke 39779/head
Kefu Chai [Tue, 2 Mar 2021 11:03:38 +0000 (19:03 +0800)]
crimson/mon: do not use futurize_invoke

flatten the call in seastar::futurize_invoke().

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39744 from zdover23/wip-doc-cephadm-install-install-cephadm-rewri...
Sebastian Wagner [Tue, 2 Mar 2021 11:05:30 +0000 (12:05 +0100)]
Merge pull request #39744 from zdover23/wip-doc-cephadm-install-install-cephadm-rewrite-2021-Feb-28

doc/cephadm: rewrite "install cephadm"

Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agocrimson/mon: let reopen_session() return future<bool>
Kefu Chai [Tue, 2 Mar 2021 10:53:48 +0000 (18:53 +0800)]
crimson/mon: let reopen_session() return future<bool>

this change is for improve the readability. to emphasis that the
next steps are performed only if a connection to monitor is
established.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: use a vector for mon_commands
Kefu Chai [Tue, 2 Mar 2021 10:08:27 +0000 (18:08 +0800)]
crimson/mon: use a vector for mon_commands

for smaller memory foot print. as we don't have lots of mon_command in
flight, hence not likely to benefit from a O(log(n)) lookup.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: resend mon command when session established
Kefu Chai [Tue, 2 Mar 2021 09:52:36 +0000 (17:52 +0800)]
crimson/mon: resend mon command when session established

this behavior matches that of `MonClient::_resend_mon_commands()`. so
far the only user which sends mon command in crimson is
`OSD::_add_me_to_crush()`, but there is still (rare) chance that the connected
monitor cannot be reached when we send the command to it, in that case,
we should retry when the connection is re-established.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: pass a string to Client::run_command()
Kefu Chai [Tue, 2 Mar 2021 09:00:51 +0000 (17:00 +0800)]
crimson/mon: pass a string to Client::run_command()

as the reason why MMonCommand uses a vector is but for legacy reasons,
there is no need to expose this via the interface.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: move keyring and sub renewals into on_session_opened()
Kefu Chai [Tue, 2 Mar 2021 08:38:04 +0000 (16:38 +0800)]
crimson/mon: move keyring and sub renewals into on_session_opened()

both of them fall into the category of jobs which we should do after
the connection to monitor is established.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: let on_session_opened() return a future
Kefu Chai [Tue, 2 Mar 2021 08:31:00 +0000 (16:31 +0800)]
crimson/mon: let on_session_opened() return a future

so we can expand its responsibility to perform some async calls.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: s/send_pendings/on_session_opened/
Kefu Chai [Tue, 2 Mar 2021 08:23:20 +0000 (16:23 +0800)]
crimson/mon: s/send_pendings/on_session_opened/

will use this method also for sending requests which are not acked

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: pending_messages should not be empty if active_conn
Kefu Chai [Tue, 2 Mar 2021 08:18:20 +0000 (16:18 +0800)]
crimson/mon: pending_messages should not be empty if active_conn

we always send all pending_messages, and clear it when establishing a
connection to mon, so there is no need to check for it when calling
`send_message()`.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/mon: check for active_con before calling send_pendings()
Kefu Chai [Tue, 2 Mar 2021 08:07:25 +0000 (16:07 +0800)]
crimson/mon: check for active_con before calling send_pendings()

before this change, we guard the `send_pendings()` call only in
`Client::send_message()`, after this change, all of the
`send_pendings()` calls are guarded with this check.

more consistent this way.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39760 from zdover23/wip-doc-cephadm-install-bootstrap-rewrite...
Sebastian Wagner [Tue, 2 Mar 2021 10:46:08 +0000 (11:46 +0100)]
Merge pull request #39760 from zdover23/wip-doc-cephadm-install-bootstrap-rewrite-2021-Mar-01

doc/cephadm: rewrite "b.strap a new cluster"

Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #39685 from tchaikov/wip-mgr-dashboard-requests
Kefu Chai [Tue, 2 Mar 2021 10:31:39 +0000 (18:31 +0800)]
Merge pull request #39685 from tchaikov/wip-mgr-dashboard-requests

pybind/mgr/dashboard: bump up requests to 2.25.1

Reviewed-by: Laura Paduano <lpaduano@suse.com>
4 years agoMerge pull request #39673 from rzarzynski/wip-crimson-drop-protocol-v1
Kefu Chai [Tue, 2 Mar 2021 04:44:31 +0000 (12:44 +0800)]
Merge pull request #39673 from rzarzynski/wip-crimson-drop-protocol-v1

crimson: drop the support of ProtocolV1

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39768 from rzarzynski/wip-crimson-monc-renew-subs
Kefu Chai [Tue, 2 Mar 2021 03:25:26 +0000 (11:25 +0800)]
Merge pull request #39768 from rzarzynski/wip-crimson-monc-renew-subs

crimson/monc: renew subscriptions when reopening a session.

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39718 from zdover23/wip-doc-dev-t8y-label-in-toc-2021-Feb-26
Josh Durgin [Tue, 2 Mar 2021 00:26:46 +0000 (16:26 -0800)]
Merge pull request #39718 from zdover23/wip-doc-dev-t8y-label-in-toc-2021-Feb-26

doc/dev: add t8y label to index.rst

Reviewed-by: Josh Durgin <jdurgin@redhat.com>
4 years agoMerge pull request #39601 from badone/wip-ceph_test_rados_api_watch_notify-enoent...
Brad Hubbard [Mon, 1 Mar 2021 22:10:10 +0000 (08:10 +1000)]
Merge pull request #39601 from badone/wip-ceph_test_rados_api_watch_notify-enoent-failure

tests: ceph_test_rados_api_watch_notify: Allow for reconnect

Reviewed-by: Neha Ojha <nojha@redhat.com>
4 years agocrimson/monc: renew subscriptions when reopening a session. 39768/head
Radoslaw Zarzynski [Mon, 1 Mar 2021 14:09:22 +0000 (14:09 +0000)]
crimson/monc: renew subscriptions when reopening a session.

Lack of this feature was the root cause of an issue in
teuthology testing in which a socket failure injection
happened exactly during `mon_subscribe`; after the OSD
reconnected, the message hasn't been resent and entire
boot process has frozen.

```
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - [osd.2(client) v2:172.21.15.204:6804/33459@57376 >> mon.0 v2:172.21.15.204:3300/0] --> #6 === mon_subscribe({osdmap=1}) v3
(15)
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - authenticated_encrypt_update plaintext.length()=80 buffer.length()=80
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - authenticated_encrypt_final buffer.length()=96 final_len=0
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - authenticated_encrypt_update plaintext.length()=48 buffer.length()=48
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - authenticated_encrypt_update plaintext.length()=16 buffer.length()=64
DEBUG 2021-02-25 11:42:53,757 [shard 0] ms - authenticated_encrypt_final buffer.length()=80 final_len=0
INFO  2021-02-25 11:42:53,758 [shard 0] ms - [osd.2(client) v2:172.21.15.204:6804/33459@57376 >> mon.0 v2:172.21.15.204:3300/0] execute_ready(): fault at READY on lossy
 channel, going to CLOSING -- std::system_error (error crimson::net:4, read eof)
```

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agoMerge PR #39680 into master
Patrick Donnelly [Mon, 1 Mar 2021 20:07:32 +0000 (12:07 -0800)]
Merge PR #39680 into master

* refs/pull/39680/head:
mds: allow `fs authorize` command to work

Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>
Reviewed-by: Rishabh Dave <ridave@redhat.com>
4 years agoMerge PR #39710 into master
Patrick Donnelly [Mon, 1 Mar 2021 20:05:47 +0000 (12:05 -0800)]
Merge PR #39710 into master

* refs/pull/39710/head:
qa: run fs:verify on all distros

Reviewed-by: Venky Shankar <vshankar@redhat.com>
Reviewed-by: Yuri Weinstein <yweins@redhat.com>
Reviewed-by: Rishabh Dave <ridave@redhat.com>
4 years agoMerge PR #39725 into master
Patrick Donnelly [Mon, 1 Mar 2021 19:35:58 +0000 (11:35 -0800)]
Merge PR #39725 into master

* refs/pull/39725/head:
qa: delete all fs during tearDown

Reviewed-by: Ramana Raja <rraja@redhat.com>
Reviewed-by: Rishabh Dave <ridave@redhat.com>
4 years agodoc/cephadm: rewrite "install cephadm" 39744/head
Zac Dover [Sun, 28 Feb 2021 12:13:39 +0000 (22:13 +1000)]
doc/cephadm: rewrite "install cephadm"

This PR breaks the "Deploying a New Ceph Cluster"
section into several sub-sections, so that each sub-section
pertains to only one subject. I've also added some explanatory
text that puts the instructions into context more than they were
before.

Signed-off-by: Zac Dover <zac.dover@gmail.com>
4 years agoMerge pull request #39732 from mychoxin/resolve_compile_error
Jason Dillaman [Mon, 1 Mar 2021 18:25:25 +0000 (13:25 -0500)]
Merge pull request #39732 from mychoxin/resolve_compile_error

test/librbd: resolve compile error on centos

Reviewed-by: Jason Dillaman <dillaman@redhat.com>
4 years agoMerge pull request #39731 from mychoxin/use_unified_zero_func
Jason Dillaman [Mon, 1 Mar 2021 18:24:46 +0000 (13:24 -0500)]
Merge pull request #39731 from mychoxin/use_unified_zero_func

rbd: use portable zero-ing memory function

Reviewed-by: Jason Dillaman <dillaman@redhat.com>
4 years agodoc/cephadm: rewrite "b.strap a new cluster" 39760/head
Zac Dover [Mon, 1 Mar 2021 14:01:05 +0000 (00:01 +1000)]
doc/cephadm: rewrite "b.strap a new cluster"

This PR rewrites the section "Bootstrap A New
Cluster" in the Cephadm Guide, in the Install
Chapter. I've broken this section up into what
seem to me to be the topics that the content
naturally divides into.

Signed-off-by: Zac Dover <zac.dover@gmail.com>
4 years agocephadm: set CEPH_USE_RANDOM_NONCE if using --init 39739/head
Sage Weil [Sat, 27 Feb 2021 20:44:22 +0000 (15:44 -0500)]
cephadm: set CEPH_USE_RANDOM_NONCE if using --init

This ensures that daemon messenger nonces don't collide by using PIDs that are
no longer unique for the IP address.

Signed-off-by: Sage Weil <sage@newdream.net>
4 years agomsg/Messenger: use random nonce if CEPH_USE_RANDOM_NONCE or pid == 1
Sage Weil [Sat, 27 Feb 2021 20:45:47 +0000 (15:45 -0500)]
msg/Messenger: use random nonce if CEPH_USE_RANDOM_NONCE or pid == 1

If we are in a container, then we do not have a unique pid, and need to
use a random nonce.  We normally detect this if our pid is 1, but that
doesn't work when we have a init process--we'll (probably?) have a small
pid (in my tests, the OSDs were getting pid 7).

To be safe, also check for an environment variable set by cephadm.

This avoids problems that arise when we don't have a unique address.

Fixes: https://tracker.ceph.com/issues/49534
Signed-off-by: Sage Weil <sage@newdream.net>
4 years agoRevert "Merge PR #39482 into master"
Sage Weil [Sat, 27 Feb 2021 20:54:21 +0000 (15:54 -0500)]
Revert "Merge PR #39482 into master"

This reverts commit 9200b1ea8e5, reversing
changes made to e42bbba9ca8.

For running tests to narrow down the root cause of:
https://tracker.ceph.com/issues/49237

Signed-off-by: Michael Fritch <mfritch@suse.com>
4 years agomgr/test_orchestrator: Refactor create_osds 39352/head
Sebastian Wagner [Mon, 1 Mar 2021 12:56:51 +0000 (13:56 +0100)]
mgr/test_orchestrator: Refactor create_osds

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/volumes: adapt to now orch interface
Sebastian Wagner [Wed, 10 Feb 2021 12:39:44 +0000 (13:39 +0100)]
mgr/volumes: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agodoc/mgr/orchestrator_modules: adapt to now orch interface
Sebastian Wagner [Tue, 9 Feb 2021 11:02:02 +0000 (12:02 +0100)]
doc/mgr/orchestrator_modules: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/selftest: adapt to now orch interface
Sebastian Wagner [Tue, 9 Feb 2021 10:58:31 +0000 (11:58 +0100)]
mgr/selftest: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/dashboard: adapt to now orch interface
Sebastian Wagner [Mon, 8 Feb 2021 09:00:21 +0000 (10:00 +0100)]
mgr/dashboard: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/mds_autoscaler: Add to tox.ini
Sebastian Wagner [Mon, 1 Mar 2021 13:10:19 +0000 (14:10 +0100)]
mgr/mds_autoscaler: Add to tox.ini

Fixes: f69abe6291958a9ccfb85ce77c9b86e8af8ecf21
Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/mds_autoscaler: adapt to now orch interface
Sebastian Wagner [Mon, 8 Feb 2021 08:54:07 +0000 (09:54 +0100)]
mgr/mds_autoscaler: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/test_orchestrator: adapt to now orch interface
Sebastian Wagner [Mon, 8 Feb 2021 00:56:16 +0000 (01:56 +0100)]
mgr/test_orchestrator: adapt to now orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/rook: Adapt to new orch interface
Sebastian Wagner [Mon, 8 Feb 2021 00:47:42 +0000 (01:47 +0100)]
mgr/rook: Adapt to new orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/cephadm: Adapt cephadm to new orch interface
Sebastian Wagner [Mon, 8 Feb 2021 00:37:07 +0000 (01:37 +0100)]
mgr/cephadm: Adapt cephadm to new orch interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/orch: Remove old tests
Sebastian Wagner [Mon, 8 Feb 2021 00:24:38 +0000 (01:24 +0100)]
mgr/orch: Remove old tests

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agocrimson/monc: drop misleading comment about Connection::reply. 39673/head
Radoslaw Zarzynski [Wed, 24 Feb 2021 19:40:56 +0000 (19:40 +0000)]
crimson/monc: drop misleading comment about Connection::reply.

Before the commit the `crimson::mon:Connection::reply`
was commented as being specific to the ProtocolV1.
However, the code suggests this member participates also
in V2-related paths like `Connection::renew_tickets()`
where `do_auth()` is called from. `do_auth()` generates
`MAuth` which causes a monitor to send `MAuthReply`.
The `Connection::reply` synchronizes sending the auth
request with response handling.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agomon: drop the unnecessary inclusion of MAuthReply.h.
Radoslaw Zarzynski [Wed, 24 Feb 2021 17:15:01 +0000 (17:15 +0000)]
mon: drop the unnecessary inclusion of MAuthReply.h.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agoauth: drop unnecessary forward declaration from AuthClientHandler.
Radoslaw Zarzynski [Wed, 24 Feb 2021 16:49:13 +0000 (16:49 +0000)]
auth: drop unnecessary forward declaration from AuthClientHandler.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson/monc: fix debugs in Connection::do_auth_single().
Radoslaw Zarzynski [Wed, 24 Feb 2021 15:22:48 +0000 (15:22 +0000)]
crimson/monc: fix debugs in Connection::do_auth_single().

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson/monc: drop the support for ProtocolV1.
Radoslaw Zarzynski [Wed, 24 Feb 2021 15:22:27 +0000 (15:22 +0000)]
crimson/monc: drop the support for ProtocolV1.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson/net: drop the implementation of ProtocolV1.
Radoslaw Zarzynski [Wed, 24 Feb 2021 14:31:41 +0000 (14:31 +0000)]
crimson/net: drop the implementation of ProtocolV1.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson/tests: drop the v1 support in unittest-seastar-messenger.
Radoslaw Zarzynski [Mon, 1 Mar 2021 15:12:28 +0000 (15:12 +0000)]
crimson/tests: drop the v1 support in unittest-seastar-messenger.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agocrimson: do not use ProtocolV1 anymore.
Radoslaw Zarzynski [Wed, 24 Feb 2021 14:16:04 +0000 (14:16 +0000)]
crimson: do not use ProtocolV1 anymore.

At the moment crimson offers only a partial and buggy
support for ProtocolV1. When it enters the production,
V1 will be long obsolete, so spending time on improving
it doesn't seem to be a sound investment while offering
half-baked feature can be worse that lacking it entirely.

Signed-off-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
4 years agoMerge pull request #39521 from yuvalif/wip-yuval-fix-49322
Casey Bodley [Mon, 1 Mar 2021 15:05:48 +0000 (10:05 -0500)]
Merge pull request #39521 from yuvalif/wip-yuval-fix-49322

rgw/notification: add exception handling for persistent notification thread

Reviewed-by: Casey Bodley <cbodley@redhat.com>
4 years agotest/librbd: resolve compile error on centos 39732/head
YuanXin [Sat, 27 Feb 2021 04:01:40 +0000 (12:01 +0800)]
test/librbd: resolve compile error on centos

Signed-off-by: YuanXin <yuanxin@didiglobal.com>
4 years agocephadm: remove unused imports 39722/head
Patrick Seidensal [Mon, 1 Mar 2021 14:36:18 +0000 (15:36 +0100)]
cephadm: remove unused imports

Signed-off-by: Patrick Seidensal <pseidensal@suse.com>
4 years agocephadm: `cephadm ls` broken for SUSE downstream alertmanager container
Patrick Seidensal [Fri, 26 Feb 2021 16:27:17 +0000 (17:27 +0100)]
cephadm: `cephadm ls` broken for SUSE downstream alertmanager container

Fixes: https://tracker.ceph.com/issues/49506
Signed-off-by: Patrick Seidensal <pseidensal@suse.com>
4 years agomgr/orch: adapt orchestrator CLI to new interface
Sebastian Wagner [Mon, 8 Feb 2021 00:21:37 +0000 (01:21 +0100)]
mgr/orch: adapt orchestrator CLI to new interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agomgr/orch: replace Completion with OrchResult(Generic[T])
Sebastian Wagner [Mon, 8 Feb 2021 00:01:08 +0000 (01:01 +0100)]
mgr/orch: replace Completion with OrchResult(Generic[T])

Greatly simplify the orchestrator interface

Signed-off-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agoMerge pull request #39743 from tchaikov/wip-crimson-cleanup
Kefu Chai [Mon, 1 Mar 2021 08:39:41 +0000 (16:39 +0800)]
Merge pull request #39743 from tchaikov/wip-crimson-cleanup

crimson/osd: capturing this in a better way

Reviewed-by: Ronen Friedman <rfriedma@redhat.com>
Reviewed-by: Xuehan Xu <xxhdx1985126@gmail.com>
4 years agoMerge pull request #39652 from athanatos/sjust/wip-crimson-omap
Kefu Chai [Mon, 1 Mar 2021 07:48:40 +0000 (15:48 +0800)]
Merge pull request #39652 from athanatos/sjust/wip-crimson-omap

crimson: btree omap_manager rework with other misc fixes

Reviewed-by: Chunmei Liu <chunmei.liu@intel.com>
Reviewed-by: Yingxin Cheng <yingxin.cheng@intel.com>
Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge PR #39631 into master
Sage Weil [Mon, 1 Mar 2021 00:00:29 +0000 (19:00 -0500)]
Merge PR #39631 into master

* refs/pull/39631/head:
osd/OSDMap: don't warn on NEW osd ids
mon/OSDMonitor: behave if inc map sets weight on not-yet-existing OSD
mon/OSDMonitor: do not mark newly created OSDs OUT

Reviewed-by: Josh Durgin <jdurgin@redhat.com>
4 years agoMerge PR #39696 into master
Sage Weil [Mon, 1 Mar 2021 00:00:16 +0000 (19:00 -0500)]
Merge PR #39696 into master

* refs/pull/39696/head:
qa/suites/rados/monthrash: crank up client side debugging w/ mon thrashing

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoosd/OSDMap: don't warn on NEW osd ids 39631/head
Sage Weil [Sun, 28 Feb 2021 16:29:53 +0000 (11:29 -0500)]
osd/OSDMap: don't warn on NEW osd ids

If we allocate a new OSD, don't raise a health alert about it.

Signed-off-by: Sage Weil <sage@newdream.net>
4 years agocrimson/osd: keep ClientRequest alive during `seastar::repeat()` 39743/head
Kefu Chai [Sun, 28 Feb 2021 05:23:29 +0000 (13:23 +0800)]
crimson/osd: keep ClientRequest alive during `seastar::repeat()`

before this change, `this` is wrapped by a smart pointer which is
in turn captured by multiple continuations. the continuation with the
longest life cycle is the one passed to `seastar::repeat()`. where
the underlying `repeater` captures the continuation as its member variable.
and `repeater` is not destroyed before `seastar::repeat()` returns.

so, we only need to capture `opref` in the continuation passed to
`seastar::repeat()`.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/osd: use finally for capturing this
Kefu Chai [Sun, 28 Feb 2021 05:20:41 +0000 (13:20 +0800)]
crimson/osd: use finally for capturing this

* no need to capture this, it is already enclosed by `ref`
* use finally for capturing `ref`, and for printing out the "complete"
  logging message. we could use a different branch for printing out
  the failure message if any.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agocrimson/osd: reduce the indent
Kefu Chai [Sun, 28 Feb 2021 05:19:56 +0000 (13:19 +0800)]
crimson/osd: reduce the indent

instead of using a lambda, use a future variable for reducing the indent
level.

Signed-off-by: Kefu Chai <kchai@redhat.com>
4 years agorbd: use portable zero-ing memory function 39731/head
YuanXin [Sat, 27 Feb 2021 03:37:19 +0000 (11:37 +0800)]
rbd: use portable zero-ing memory function

Signed-off-by: YuanXin <yuanxin@didiglobal.com>
4 years agoMerge PR #39455 into master
Sage Weil [Sat, 27 Feb 2021 15:15:27 +0000 (10:15 -0500)]
Merge PR #39455 into master

* refs/pull/39455/head:
doc/man/8/ceph: document --max option
src/test/osd/safe-to-destroy: adjust test
ceph: print command output to stdout even on error
mgr/DaemonServer: include details in 'osd ok-to-stop' output
mgr: add --max <n> to 'osd ok-to-stop' command
mgr: relax osd ok-to-stop condition on degraded pgs

Reviewed-by: Neha Ojha <nojha@redhat.com>
Reviewed-by: Josh Durgin <jdurgin@redhat.com>
Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge PR #39629 into master
Sage Weil [Sat, 27 Feb 2021 15:13:43 +0000 (10:13 -0500)]
Merge PR #39629 into master

* refs/pull/39629/head:
crush/CrushWrapper: rebuild shadow tree on 'osd crush reweight-subtree'
crush/CrushWrapper: update shadow trees on update_item()

Reviewed-by: Mykola Golub <mgolub@suse.com>
Reviewed-by: Neha Ojha <nojha@redhat.com>
4 years agoMerge PR #39674 into master
Sage Weil [Sat, 27 Feb 2021 15:12:08 +0000 (10:12 -0500)]
Merge PR #39674 into master

* refs/pull/39674/head:
mon/OSDMonitor: fix safety/idempotency of {set,rm}-device-class

Reviewed-by: xie xingguo <xie.xingguo@zte.com.cn>
Reviewed-by: João Eduardo Luís <joao@suse.de>
4 years agoMerge PR #39728 into master
Sage Weil [Sat, 27 Feb 2021 15:10:18 +0000 (10:10 -0500)]
Merge PR #39728 into master

* refs/pull/39728/head:
mon/PGMap: include the per-pool usage breakdown in pg dump

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoMerge pull request #39705 from smithfarm/wip-fix-s390x-build-regression
Nathan Cutler [Sat, 27 Feb 2021 14:35:34 +0000 (15:35 +0100)]
Merge pull request #39705 from smithfarm/wip-fix-s390x-build-regression

rpm: re-disable SUSE lttng build on z390x

Reviewed-by: Kefu Chai <kchai@redhat.com>
4 years agoqa/suites/krbd: bump scratch image size to 15G 39781/head
Ilya Dryomov [Wed, 24 Feb 2021 10:41:24 +0000 (11:41 +0100)]
qa/suites/krbd: bump scratch image size to 15G

Allow generic/038 and generic/048 to run.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
4 years agoqa/suites/krbd: exclude ext4/002
Ilya Dryomov [Fri, 26 Feb 2021 12:54:49 +0000 (13:54 +0100)]
qa/suites/krbd: exclude ext4/002

ext4/002 exercises obsolete EXT4_EOFBLOCKS_FL feature that was removed
in kernel 5.7 and therefore always fails.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
4 years agoqa/run_xfstests.sh: mount ext4 with dioread_nolock
Ilya Dryomov [Fri, 26 Feb 2021 12:39:06 +0000 (13:39 +0100)]
qa/run_xfstests.sh: mount ext4 with dioread_nolock

dioread_nolock was made default in kernel 5.6, changing the expected
output of ext4/001: for dioread_nolock we want 001.out.nozero instead
of 001.out.default.  Add dioread_nolock to EXT_MOUNT_OPTIONS so that
_link_out_file() selects 001.out.nozero.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
4 years agoqa/tasks/rbd: fix xfstests_branch/url example
Ilya Dryomov [Sat, 27 Feb 2021 13:58:45 +0000 (14:58 +0100)]
qa/tasks/rbd: fix xfstests_branch/url example

- don't mention xfstests_branch together with xfstests_url as
  xfstests_branch gets superseded by xfstests_url
- make xfstests_url example more clear

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
4 years agoMerge pull request #39733 from mgfritch/cephadm-test-multiple-digest
Sebastian Wagner [Sat, 27 Feb 2021 10:00:12 +0000 (11:00 +0100)]
Merge pull request #39733 from mgfritch/cephadm-test-multiple-digest

cephadm: add multi-digest test

Reviewed-by: Sebastian Wagner <sebastian.wagner@suse.com>
4 years agocephadm: add multi-digest test 39733/head
Michael Fritch [Sat, 27 Feb 2021 05:16:41 +0000 (22:16 -0700)]
cephadm: add multi-digest test

quick unit test for inspect of a container with multiple digests

Signed-off-by: Michael Fritch <mfritch@suse.com>