]> git.apps.os.sepia.ceph.com Git - ceph.git/log
ceph.git
2 years agodoc/rados: add prompts to placement-groups.rst 49269/head
Zac Dover [Tue, 6 Dec 2022 07:07:18 +0000 (17:07 +1000)]
doc/rados: add prompts to placement-groups.rst

Add unselectable prompts to doc/rados/operations/placement-groups.rst.
(2 of 3)

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agoMerge pull request #49264 from zdover23/wip-doc-2022-12-06-glossary-rbd
zdover23 [Tue, 6 Dec 2022 06:09:08 +0000 (16:09 +1000)]
Merge pull request #49264 from zdover23/wip-doc-2022-12-06-glossary-rbd

doc/glossary: add matter to "RBD"

Reviewed-by: Anthony D'Atri <anthony.datri@gmail.com>
2 years agoMerge pull request #48628 from lxbsz/kclient_fscrypt
Venky Shankar [Tue, 6 Dec 2022 05:36:58 +0000 (11:06 +0530)]
Merge pull request #48628 from lxbsz/kclient_fscrypt

qa: cephfs add fscrypt test suite support for kclient

Reviewed-by: Venky Shankar <vshankar@redhat.com>
Reviewed-by: Rishabh Dave <ridave@redhat.com>
2 years agodoc/glossary: add matter to "RBD" 49264/head
Zac Dover [Tue, 6 Dec 2022 04:15:43 +0000 (14:15 +1000)]
doc/glossary: add matter to "RBD"

Clarify that "RBD" and "Ceph Block Device" and "RADOS Block Device" all
refer to the same thing.

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agoMerge pull request #48223 from myoungwon/wip-fix-tier-evict-range
Laura Flores [Tue, 6 Dec 2022 00:13:21 +0000 (18:13 -0600)]
Merge pull request #48223 from myoungwon/wip-fix-tier-evict-range

osd: mark modified region as dirty when tier-evict is called

2 years agoMerge pull request #48467 from baergj/fix-read-error-code
Igor Fedotov [Mon, 5 Dec 2022 23:46:16 +0000 (02:46 +0300)]
Merge pull request #48467 from baergj/fix-read-error-code

blk/kernel: Fix error code mapping in KernelDevice::read.

Reviewed-by: Robin H. Johnson <robbat2@orbis-terrarum.net>
Reviewed-by: Igor Fedotov <igor.fedotov@croit.io>
2 years agoMerge pull request #48817 from adk3798/device-refresh-message
Adam King [Mon, 5 Dec 2022 19:38:48 +0000 (14:38 -0500)]
Merge pull request #48817 from adk3798/device-refresh-message

mgr/cephadm: fix check for if devices have changed

Reviewed-by: Redouane Kachach <rkachach@redhat.com>
2 years agoMerge pull request #48874 from senax/ingress_backend_ssl
Adam King [Mon, 5 Dec 2022 19:35:07 +0000 (14:35 -0500)]
Merge pull request #48874 from senax/ingress_backend_ssl

mgr/cephadm: add ingress support for ssl rgw service

Reviewed-by: Adam King <adking@redhat.com>
Reviewed-by: Redouane Kachach <rkachach@redhat.com>
2 years agoMerge pull request #48899 from ivancich/wip-fix-old-shard
J. Eric Ivancich [Mon, 5 Dec 2022 18:51:05 +0000 (13:51 -0500)]
Merge pull request #48899 from ivancich/wip-fix-old-shard

rgw: address bug where object puts could write to decommissioned shard

Reviewed-by: Casey Bodley <cbodley@redhat.com>
2 years agoMerge pull request #48585 from cbodley/wip-test-librados-asio-spawn
Yuri Weinstein [Mon, 5 Dec 2022 17:16:03 +0000 (09:16 -0800)]
Merge pull request #48585 from cbodley/wip-test-librados-asio-spawn

test/librados: use spawn submodule instead of boost::asio::spawn

Reviewed-by: Adam Emerson <aemerson@redhat.com>
2 years agoMerge pull request #48708 from sseshasa/wip-fix-osd-capacity-display
Yuri Weinstein [Mon, 5 Dec 2022 17:15:01 +0000 (09:15 -0800)]
Merge pull request #48708 from sseshasa/wip-fix-osd-capacity-display

osd: Reset mClock's OSD capacity config option for inactive device type

Reviewed-by: Neha Ojha <nojha@redhat.com>
Reviewed-by: Laura Flores <lflores@redhat.com>
2 years agoMerge pull request #48623 from batrick/i57923
Yuri Weinstein [Mon, 5 Dec 2022 17:13:49 +0000 (09:13 -0800)]
Merge pull request #48623 from batrick/i57923

log: use non-blocking atomic writes to stderr fifos

Reviewed-by: Sage Weil <sage@redhat.com>
2 years agoMerge pull request #48513 from ideepika/wip-crush-debug
Yuri Weinstein [Mon, 5 Dec 2022 17:12:26 +0000 (09:12 -0800)]
Merge pull request #48513 from ideepika/wip-crush-debug

src/crush: extra logging to debug CPU burn in test_with_fork()

Reviewed-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
2 years agoMerge pull request #49253 from kvanals/update-board-softiron
Anthony D'Atri [Mon, 5 Dec 2022 17:06:16 +0000 (12:06 -0500)]
Merge pull request #49253 from kvanals/update-board-softiron

doc: Update Foundation member for SoftIron

2 years agoMerge pull request #48618 from idryomov/rbd-clone-encryption-part2
Ilya Dryomov [Mon, 5 Dec 2022 16:47:19 +0000 (17:47 +0100)]
Merge pull request #48618 from idryomov/rbd-clone-encryption-part2

 librbd: add encryption format support for clones (part 2/2)

Reviewed-by: Mykola Golub <mgolub@suse.com>
Acked-by: Or Ozeri <oro@il.ibm.com>
2 years agoMerge pull request #49252 from zdover23/wip-doc-2022-12-05-glossary-das
zdover23 [Mon, 5 Dec 2022 16:38:53 +0000 (02:38 +1000)]
Merge pull request #49252 from zdover23/wip-doc-2022-12-05-glossary-das

doc/glossary: add DAS

Reviewed-by: Anthony D'Atri <anthony.datri@gmail.com>
2 years agodoc/glossary: add DAS 49252/head
Zac Dover [Mon, 5 Dec 2022 13:43:29 +0000 (23:43 +1000)]
doc/glossary: add DAS

Add a definition for "DAS" (directly attached storage).

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agodoc: Update Foundation member for SoftIron 49253/head
kvanals [Mon, 5 Dec 2022 15:59:41 +0000 (10:59 -0500)]
doc: Update Foundation member for SoftIron

Signed-off-by: kvanals <Kenny.VanAlstyne@softiron.com>
2 years agoMerge pull request #49235 from idryomov/wip-rbd-groups-bash
Ilya Dryomov [Mon, 5 Dec 2022 14:59:29 +0000 (15:59 +0100)]
Merge pull request #49235 from idryomov/wip-rbd-groups-bash

qa: rbd_groups.sh: change interpreter to bash

Reviewed-by: Ramana Raja <rraja@redhat.com>
2 years agoMerge pull request #49204 from Tooa/adapt_keepalived_reference
Anthony D'Atri [Mon, 5 Dec 2022 14:43:31 +0000 (09:43 -0500)]
Merge pull request #49204 from Tooa/adapt_keepalived_reference

containers: use quay.io/ceph/keepalived in docs

2 years agoMerge pull request #49249 from krambrod/main
Anthony D'Atri [Mon, 5 Dec 2022 14:05:01 +0000 (09:05 -0500)]
Merge pull request #49249 from krambrod/main

doc/cephadm: fix initial-ceph.conf example

2 years agoMerge pull request #49076 from Matan-B/wip-matanb-crimson-suite-adjust
Matan [Mon, 5 Dec 2022 10:19:36 +0000 (12:19 +0200)]
Merge pull request #49076 from Matan-B/wip-matanb-crimson-suite-adjust

crimson: Suite testing minor adjustment

Reviewed-by: Samuel Just <sjust@redhat.com>
Reviewed-by: Ilya Dryomov <idryomov@gmail.com>
2 years agodoc/cephadm: fix initial-ceph.conf example 49249/head
krambrod [Mon, 5 Dec 2022 08:36:10 +0000 (09:36 +0100)]
doc/cephadm: fix initial-ceph.conf example

Signed-off-by: krambrod <114069812+krambrod@users.noreply.github.com>
2 years agoMerge pull request #49241 from zdover23/wip-doc-2022-12-05-rados-ops-monitoring-prompts
colemitchell [Mon, 5 Dec 2022 03:07:29 +0000 (22:07 -0500)]
Merge pull request #49241 from zdover23/wip-doc-2022-12-05-rados-ops-monitoring-prompts

doc/rados: add prompts to monitoring.rst

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agoMerge pull request #49243 from zdover23/wip-doc-2022-12-05-rados-pg-repair-prompts
colemitchell [Mon, 5 Dec 2022 03:07:05 +0000 (22:07 -0500)]
Merge pull request #49243 from zdover23/wip-doc-2022-12-05-rados-pg-repair-prompts

doc/rados: add prompts to pg-repair.rst

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agodoc/rados: add prompts to pg-repair.rst 49243/head
Zac Dover [Mon, 5 Dec 2022 02:44:01 +0000 (12:44 +1000)]
doc/rados: add prompts to pg-repair.rst

Add unselectable prompts to doc/rados/operations/pg-repair.rst.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agodoc/rados: add prompts to monitoring.rst 49241/head
Zac Dover [Mon, 5 Dec 2022 02:30:35 +0000 (12:30 +1000)]
doc/rados: add prompts to monitoring.rst

Add unselectable prompts to doc/rados/operations/monitoring.rst.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agoMerge pull request #49238 from zdover23/wip-doc-2022-12-05-rados-ops-monitoring-osd...
zdover23 [Sun, 4 Dec 2022 19:30:28 +0000 (05:30 +1000)]
Merge pull request #49238 from zdover23/wip-doc-2022-12-05-rados-ops-monitoring-osd-pg-prompts

doc/rados: add prompts to monitoring-osd-pg.rst

Reviewed-by: Cole Mtichell <cole.mitchell@gmail.com>
2 years agodoc/rados: add prompts to monitoring-osd-pg.rst 49238/head
Zac Dover [Sun, 4 Dec 2022 19:18:36 +0000 (05:18 +1000)]
doc/rados: add prompts to monitoring-osd-pg.rst

Add unselectable prompts to doc/rados/operations/monitoring-osd-pg.rst.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agoqa/workunits/rbd: add encryption-aware resize test 48618/head
Ilya Dryomov [Sat, 3 Dec 2022 14:37:14 +0000 (15:37 +0100)]
qa/workunits/rbd: add encryption-aware resize test

Note that we are hitting https://tracker.ceph.com/issues/58160 here
because by the time we get to "rbd resize" RAW_DEV mapping owns the
lock (due to a write to /dev/mapper/cryptsetupdev being last).

While at it, resurrect the ability to easily run this script on
vstart clusters -- see commit f737c2855a19 ("qa/workunits/rbd: make
luks-encryption test work on vstart cluster").

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agodoc/rbd: add clone encryption details and examples
Ilya Dryomov [Fri, 28 Oct 2022 10:42:14 +0000 (12:42 +0200)]
doc/rbd: add clone encryption details and examples

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agorbd, rbd-nbd: make --encryption-format optional
Ilya Dryomov [Mon, 21 Nov 2022 19:31:18 +0000 (20:31 +0100)]
rbd, rbd-nbd: make --encryption-format optional

If no --encryption-format specified at all, default to "luks" for each
specified --encryption-passphrase-file.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agorbd, rbd-nbd: accept "luks", "luks1" and "luks2" formats
Ilya Dryomov [Sat, 19 Nov 2022 12:30:55 +0000 (13:30 +0100)]
rbd, rbd-nbd: accept "luks", "luks1" and "luks2" formats

Since RBD_ENCRYPTION_FORMAT_LUKS1, RBD_ENCRYPTION_FORMAT_LUKS2
and RBD_ENCRYPTION_FORMAT_LUKS aren't treated the same when loading
encryption anymore, "luks1" and "luks2" formats need to be accepted
in addition to "luks" format.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: don't decay LUKS{1,2}EncryptionFormat into LUKSEncryptionFormat
Ilya Dryomov [Fri, 18 Nov 2022 13:53:24 +0000 (14:53 +0100)]
librbd: don't decay LUKS{1,2}EncryptionFormat into LUKSEncryptionFormat

Commit 9892ead7fcd9 ("librbd/crypto: allow loading luks format
without specifying version") introduced RBD_ENCRYPTION_FORMAT_LUKS
format identifier, matching cryptsetup's CRYPT_LUKS ("load any LUKS
version happens to be there").  However, in an effort to enable an
obscure "layered encryption with the same passphrase + old QEMU" use
case, it also introduced decaying of RBD_ENCRYPTION_FORMAT_LUKS1 and
RBD_ENCRYPTION_FORMAT_LUKS2 format identifiers, making it impossible
to assert on the format that is being loaded.  This new behavior was
then extended to standalone images.

Treating RBD_ENCRYPTION_FORMAT_LUKS1, RBD_ENCRYPTION_FORMAT_LUKS2
and RBD_ENCRYPTION_FORMAT_LUKS the same when loading encryption can
be construed as an opening for a format downgrade attack.  Let's
resurrect the previous standalone images behavior and extend it to
layered encryption instead.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agorbd: fix passphrase zeroing in "rbd encryption format" handler
Ilya Dryomov [Mon, 14 Nov 2022 13:14:10 +0000 (14:14 +0100)]
rbd: fix passphrase zeroing in "rbd encryption format" handler

"rbd encryption format" handler sets up a scope guard to zero out
the passphrase string on return but also makes a copy of same which
isn't zeroed out.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agorbd, rbd-nbd: don't strip trailing newline in passphrase files
Ilya Dryomov [Mon, 14 Nov 2022 12:24:00 +0000 (13:24 +0100)]
rbd, rbd-nbd: don't strip trailing newline in passphrase files

One of the stated goals is compatibility with standard LUKS tools,
in particular being able to load encryption on images formatted with
cryptsetup.  cryptsetup doesn't do this and this really interferes
with randomly generated (binary) passphrases.

While at it, open passphrase files as binary -- it communicates the
intent if nothing else on POSIX.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: constify specs array in rbd_encryption_load2()
Ilya Dryomov [Sun, 13 Nov 2022 16:10:05 +0000 (17:10 +0100)]
librbd: constify specs array in rbd_encryption_load2()

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: remove unused trim_image() method
Ilya Dryomov [Mon, 17 Oct 2022 15:52:24 +0000 (17:52 +0200)]
librbd: remove unused trim_image() method

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: non-pruning parent overlap handling fixes
Ilya Dryomov [Mon, 17 Oct 2022 13:51:04 +0000 (15:51 +0200)]
librbd: non-pruning parent overlap handling fixes

Apply similar "reduce overlap and respect area" logic to places
that don't use prune_parent_extents().  Changes to FlattenRequest
and TrimRequest here should complete the long tail of encrypted
I/O path and flatten fixes.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: reduce overlap and respect area when pruning parent extents
Ilya Dryomov [Sat, 15 Oct 2022 16:31:45 +0000 (18:31 +0200)]
librbd: reduce overlap and respect area when pruning parent extents

DATA area in the parent may be smaller than the part of DATA area in
the clone that is still within the overlap.  This would occur e.g. in
LUKS2-formatted parent + LUKS1-formatted clone case, due to LUKS2
header usually being bigger than LUKS1 header:

parent: raw size = 64M
        LUKS2 header area = 16M
        data area = 48M

clone:  raw size = 64M (raw overlap 64M)
        LUKS1 header area = 4M
        data area = 60M

Currently, because parent extents are pruned only according to raw
overlap (64M), the clone ends up attempting to reach the parent for all
of its data area (60M < 64M) even though the parent only has 48M worth
of data.  All kinds of bugs ensue for 48M..60M offsets and this range
basically becomes inaccessible to the user.

A related issue is that prune_parent_extents() ignores area.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: clip extents to their area instead of DATA area
Ilya Dryomov [Wed, 28 Sep 2022 08:31:45 +0000 (10:31 +0200)]
librbd: clip extents to their area instead of DATA area

This fixes cases where CRYPTO HEADER area is larger than DATA area.
In particular, it was effectively impossible to flatten unformatted
clones of such images.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: introduce reduce_parent_overlap() and switch overlap API
Ilya Dryomov [Fri, 14 Oct 2022 14:20:24 +0000 (16:20 +0200)]
librbd: introduce reduce_parent_overlap() and switch overlap API

When encryption is loaded, rbd_get_overlap() and Image::overlap() now
return "effective" overlap, similar to rbd_get_size() and Image::size().
Previously, returned overlap could have been bigger than "effective"
size.

Note that get_effective_image_size() successor doesn't take snap_id
because passing anything but ictx->snap_id was broken.  Since the size
of the crypto header is stored in the crypto header itself, image areas
are defined only for the "opened at" snap_id.  Getting "effective" size
for an arbitrary snapshot requires actually opening it and loading
encryption on it.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: tweak get_parent_overlap() signature
Ilya Dryomov [Fri, 14 Oct 2022 14:01:45 +0000 (16:01 +0200)]
librbd: tweak get_parent_overlap() signature

Make it clear that get_parent_overlap() returns the raw parent overlap
value (i.e. physical offset into the parent image).  Also drop redundant
ceph_mutex_is_locked assert -- get_parent_info() already has one.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: remap resize target size if encryption is loaded
Ilya Dryomov [Thu, 20 Oct 2022 15:25:46 +0000 (17:25 +0200)]
librbd: remap resize target size if encryption is loaded

When encryption is loaded, rbd_get_size() and Image::size() return
"effective" size, but rbd_resize() and Image::resize() continue to take
raw size.  The user has to constantly keep these domains in mind.

Saying that resize must be done without encryption loaded is not an
answer because shrinking a clone that has snapshots involves copying up
objects in the affected range (identical to flattening).  In addition,
even if a clone doesn't have snapshots, shrinking it to a size that
isn't an object boundary is going to involve a copyup for the victim
object as well.

To avoid subtle data corruption on shrink, treat resize operation the
same as flatten operation (including on the CLI).

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: check stripe pattern when loading encryption
Ilya Dryomov [Fri, 16 Sep 2022 16:07:03 +0000 (18:07 +0200)]
librbd: check stripe pattern when loading encryption

Currently it's done in FormatRequest but not in LoadRequest.  However
an image can be deep copied or exported and imported with a different
stripe pattern such that an area boundary would fall in the middle of
an object.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: check image size when loading encryption
Ilya Dryomov [Fri, 16 Sep 2022 11:44:23 +0000 (13:44 +0200)]
librbd: check image size when loading encryption

Currently it's done in FormatRequest but not in LoadRequest.  However
an image can be shrunk to a size such that encryption can loaded (i.e.
enough of the header is still present) but nothing else can, breaking
implicit assumptions all around.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: relax image size check in luks::FormatRequest
Ilya Dryomov [Fri, 7 Oct 2022 09:56:27 +0000 (11:56 +0200)]
librbd: relax image size check in luks::FormatRequest

Proceed with formatting an image even if all space would be consumed by
the crypto header.  There is no reason to be strict here since we allow
creating zero-sized images as well as shrinking any image to 0.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: no need to return format from ShutDownCryptoRequest
Ilya Dryomov [Thu, 15 Sep 2022 08:05:56 +0000 (10:05 +0200)]
librbd: no need to return format from ShutDownCryptoRequest

luks::FlattenRequest was the only user of this interface.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: don't temporarily shut down crypto when flattening
Ilya Dryomov [Thu, 15 Sep 2022 07:33:01 +0000 (09:33 +0200)]
librbd: don't temporarily shut down crypto when flattening

(Temporarily) shutting down crypto can lead to data corruption in the
face of concurrent I/O, especially when flatten operation is proxied to
the remote lock owner.  This was added to be able to read, optionally
modify and write crypto header without it being subjected to remapping
and encryption itself.  read_header() and write_header() now achieve
that by specifying CRYPTO_HEADER area explicitly.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: move get_file_offset() into CryptoObjectDispatch
Ilya Dryomov [Mon, 26 Sep 2022 10:57:16 +0000 (12:57 +0200)]
librbd: move get_file_offset() into CryptoObjectDispatch

This method doesn't propagate area.  Since its only user is
CryptoObjectDispatch which is now applied only to DATA area,
move get_file_offset() there to avoid misuse in the future.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: apply CryptoObjectDispatch layer only to DATA area
Ilya Dryomov [Fri, 9 Sep 2022 16:34:49 +0000 (18:34 +0200)]
librbd: apply CryptoObjectDispatch layer only to DATA area

Objects in CRYPTO_HEADER area should not be subjected to encryption.
Unit tests needed adjustment because MockCryptoInterface is configured
with DATA_OFFSET = 4 * 1024 * 1024, thus disqualifying object 0.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: propagate area down to file_to_extents()
Ilya Dryomov [Wed, 14 Sep 2022 12:55:56 +0000 (14:55 +0200)]
librbd: propagate area down to file_to_extents()

- readahead and PWL cache are limited to DATA area as explained in
  the previous commit
- DATA area is assumed for the journal as encryption can't be used
  with journaling anyway

To postpone the churn associated with passing area through
ImageDispatchInterface (where only WriteLogImageDispatch and
ImageDispatch care), add a new image dispatch flag.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: pass area to ImageDispatchSpec::create_*()
Ilya Dryomov [Wed, 14 Sep 2022 10:40:58 +0000 (12:40 +0200)]
librbd: pass area to ImageDispatchSpec::create_*()

- DATA area is assumed at the API layer as there is no way to pass
  an area
- DATA area is assumed by ImageWriteback because PWL cache persists
  image extents as provided by the user without any kind of designator
  and therefore can be active only in either area
- luks::FlattenRequest operates on CRYPTO_HEADER area

The passed area is acted upon in ImageDispatchSpec constructor in the
next commit.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: return area from extents_to_file()
Ilya Dryomov [Mon, 12 Sep 2022 19:05:44 +0000 (21:05 +0200)]
librbd: return area from extents_to_file()

Note that, as suggested by extents_to_file() signature, all returned
image extents would pertain to the same area.  This means that an area
boundary must coincide with an object boundary.

luks::FormatRequest is actually more strict: crypto header area size is
set to a multiple of stripe period (i.e. one or more whole objects).

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: introduce ImageArea and split remap_extents() into two methods
Ilya Dryomov [Mon, 12 Sep 2022 18:24:29 +0000 (20:24 +0200)]
librbd: introduce ImageArea and split remap_extents() into two methods

Since remap in either direction can really be done only once, iterating
through image dispatch layers in ImageDispatcher::remap_extents() makes
no sense.  For now, just replace the iteration with CryptoImageDispatch
lookup.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: pass image_extents to create_{discard,write_same}()
Ilya Dryomov [Sun, 11 Sep 2022 10:10:27 +0000 (12:10 +0200)]
librbd: pass image_extents to create_{discard,write_same}()

These are still taking off and len separately which is inconsistent
with the rest of ImageDispatchSpec and also ImageDiscardRequest and
ImageWriteSameRequest.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agolibrbd: CopyupRequest can move image_extents instead of copying
Ilya Dryomov [Sun, 11 Sep 2022 08:10:25 +0000 (10:10 +0200)]
librbd: CopyupRequest can move image_extents instead of copying

image_extents is already taken by rvalue reference.
CopyupRequest::create() callers are prepared for the move.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agoMerge pull request #48551 from ronen-fr/wip-rf-rep-machine
Ronen Friedman [Sun, 4 Dec 2022 14:49:33 +0000 (16:49 +0200)]
Merge pull request #48551 from ronen-fr/wip-rf-rep-machine

osd/scrub: no 'ScrubFinish' transition in ActiveReplica state

Reviewed-by: Radoslaw Zarzynski <rzarzyns@redhat.com>
2 years agoosd/scrub: no 'ScrubFinish' transition in ActiveReplica state 48551/head
Ronen Friedman [Wed, 19 Oct 2022 09:49:39 +0000 (12:49 +0300)]
osd/scrub: no 'ScrubFinish' transition in ActiveReplica state

That event is not generated for a replica.

Signed-off-by: Ronen Friedman <rfriedma@redhat.com>
2 years agoqa: rbd_groups.sh: change interpreter to bash 49235/head
Ilya Dryomov [Sun, 4 Dec 2022 10:40:24 +0000 (11:40 +0100)]
qa: rbd_groups.sh: change interpreter to bash

Commit e0da2a4e8cae ("qa/workunits/rbd: Add test to list snapshots of
consistency group") added bash-specific syntax.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2 years agoMerge pull request #49217 from zdover23/wip-doc-2022-12-04-rados-ops-health-check...
zdover23 [Sat, 3 Dec 2022 18:30:27 +0000 (04:30 +1000)]
Merge pull request #49217 from zdover23/wip-doc-2022-12-04-rados-ops-health-check-5-of-5-prompts

doc/rados: add prompts to health-checks (5 of 5)

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agoMerge pull request #49216 from zdover23/wip-doc-2022-12-04-rados-ops-health-check...
zdover23 [Sat, 3 Dec 2022 18:27:11 +0000 (04:27 +1000)]
Merge pull request #49216 from zdover23/wip-doc-2022-12-04-rados-ops-health-check-4-of-5-prompts

doc/rados: add prompts to health-checks (4 of 5)

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agoMerge pull request #49215 from zdover23/wip-doc-2022-12-04-rados-ops-health-check...
zdover23 [Sat, 3 Dec 2022 18:22:18 +0000 (04:22 +1000)]
Merge pull request #49215 from zdover23/wip-doc-2022-12-04-rados-ops-health-check-3-of-5-prompts

doc/rados: add prompts to health-checks (3 of 5)

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agoMerge pull request #49214 from zdover23/wip-doc-2022-12-04-rados-ops-health-chech...
zdover23 [Sat, 3 Dec 2022 18:21:16 +0000 (04:21 +1000)]
Merge pull request #49214 from zdover23/wip-doc-2022-12-04-rados-ops-health-chech-2-of-5-prompts

doc/rados: add prompts to health-checks (2 of 5)

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agoMerge pull request #49213 from zdover23/wip-doc-2022-12-04-rados-ops-health-chech...
zdover23 [Sat, 3 Dec 2022 18:15:06 +0000 (04:15 +1000)]
Merge pull request #49213 from zdover23/wip-doc-2022-12-04-rados-ops-health-chech-1-of-4-prompts

doc/rados: add prompts to health-checks (1 of 5)

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agoMerge pull request #49212 from zdover23/wip-doc-2022-12-04-rados-ops-erasure-code...
zdover23 [Sat, 3 Dec 2022 18:09:25 +0000 (04:09 +1000)]
Merge pull request #49212 from zdover23/wip-doc-2022-12-04-rados-ops-erasure-code-shec-prompts

doc/rados: add prompts to erasure-code-shec.rst

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agoMerge pull request #49211 from zdover23/wip-doc-2022-12-04-rados-ops-erasure-code...
zdover23 [Sat, 3 Dec 2022 18:00:52 +0000 (04:00 +1000)]
Merge pull request #49211 from zdover23/wip-doc-2022-12-04-rados-ops-erasure-code-erasure-code-lrc-prompts

doc/rados: add prompts to erasure-code-lrc.rst

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agodoc/rados: add prompts to health-checks (5 of 5) 49217/head
Zac Dover [Sat, 3 Dec 2022 17:03:53 +0000 (03:03 +1000)]
doc/rados: add prompts to health-checks (5 of 5)

Add unselectable prompts to doc/rados/operations/health-checks.rst,
fifth 300 lines.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agodoc/rados: add prompts to health-checks (4 of 5) 49216/head
Zac Dover [Sat, 3 Dec 2022 16:56:31 +0000 (02:56 +1000)]
doc/rados: add prompts to health-checks (4 of 5)

Add unselectable prompts to doc/rados/operations/health-checks.rst,
fourth 300 lines.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agodoc/rados: add prompts to health-checks (3 of 5) 49215/head
Zac Dover [Sat, 3 Dec 2022 16:49:02 +0000 (02:49 +1000)]
doc/rados: add prompts to health-checks (3 of 5)

Add unselectable prompts to doc/rados/operations/health-checks.rst,
third 300 lines.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agodoc/rados: add prompts to health-checks (2 of 5) 49214/head
Zac Dover [Sat, 3 Dec 2022 16:33:42 +0000 (02:33 +1000)]
doc/rados: add prompts to health-checks (2 of 5)

Add unselectable prompts to doc/rados/operations/health-checks.rst,
second 300 lines.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agodoc/rados: add prompts to health-checks (1 of 5) 49213/head
Zac Dover [Sat, 3 Dec 2022 16:13:08 +0000 (02:13 +1000)]
doc/rados: add prompts to health-checks (1 of 5)

Add unselectable prompts to doc/rados/operations/health-checks.rst,
first 300 lines.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agodoc/rados: add prompts to erasure-code-shec.rst 49212/head
Zac Dover [Sat, 3 Dec 2022 15:57:13 +0000 (01:57 +1000)]
doc/rados: add prompts to erasure-code-shec.rst

Add unselectable prompts to doc/rados/operations/erasure-code-shec.rst.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agodoc/rados: add prompts to erasure-code-lrc.rst 49211/head
Zac Dover [Sat, 3 Dec 2022 15:28:11 +0000 (01:28 +1000)]
doc/rados: add prompts to erasure-code-lrc.rst

Add unselectable prompts to doc/rados/operations/erasure-code-lrc.rst.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agoMerge pull request #49202 from zdover23/wip-doc-2022-12-01-rados-ops-erasure-code...
zdover23 [Sat, 3 Dec 2022 03:10:05 +0000 (13:10 +1000)]
Merge pull request #49202 from zdover23/wip-doc-2022-12-01-rados-ops-erasure-code-jerasure-prompts

doc/rados: add prompts to erasure-code-jerasure.rst

Reviewed-by: Anthony D'Atri <anthony.datri@gmail.com>
2 years agoMerge pull request #49201 from zdover23/wip-doc-2022-12-01-rados-ops-erasure-code...
zdover23 [Sat, 3 Dec 2022 03:07:32 +0000 (13:07 +1000)]
Merge pull request #49201 from zdover23/wip-doc-2022-12-01-rados-ops-erasure-code-isa-prompts

doc/rados: add prompts to erasure-code-isa

Reviewed-by: Anthony D'Atri <anthony.datri@gmail.com>
2 years agoMerge pull request #49200 from zdover23/wip-doc-2022-12-01-rados-ops-erasure-code...
zdover23 [Sat, 3 Dec 2022 03:02:27 +0000 (13:02 +1000)]
Merge pull request #49200 from zdover23/wip-doc-2022-12-01-rados-ops-erasure-code-clay-prompts

doc/rados: add prompts to erasure-code-clay.rst

Reviewed-by: Anthony D'Atri <anthony.datri@gmail.com>
2 years agocontainers: use quay.io/ceph/keepalived in docs 49204/head
Uli Fahrer [Fri, 2 Dec 2022 21:22:04 +0000 (22:22 +0100)]
containers: use quay.io/ceph/keepalived in docs

the documentation should reflect the keepalived
container image fork rather than arcts/keepalived

Signed-off-by: Uli Fahrer <github@uli-fahrer.de>
2 years agoMerge pull request #49162 from Gaoweinan/main-rgw-rgwerror-StatementRepetition-gaoweinan
Daniel Gryniewicz [Fri, 2 Dec 2022 16:47:26 +0000 (11:47 -0500)]
Merge pull request #49162 from Gaoweinan/main-rgw-rgwerror-StatementRepetition-gaoweinan

radosgw:Fix repeated statement

Reviewed-by: Daniel Gryniewicz <dang@redhat.com>
2 years agodoc/rados: add prompts to erasure-code-jerasure.rst 49202/head
Zac Dover [Fri, 2 Dec 2022 16:27:59 +0000 (02:27 +1000)]
doc/rados: add prompts to erasure-code-jerasure.rst

Add unselectable prompts to
doc/rados/operations/erasure-code-jerasure.rst.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agodoc/rados: add prompts to erasure-code-isa 49201/head
Zac Dover [Fri, 2 Dec 2022 16:16:43 +0000 (02:16 +1000)]
doc/rados: add prompts to erasure-code-isa

Add unselectable prompts to doc/rados/operations/erasure-code-isa.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agodoc/rados: add prompts to erasure-code-clay.rst 49200/head
Zac Dover [Fri, 2 Dec 2022 16:11:49 +0000 (02:11 +1000)]
doc/rados: add prompts to erasure-code-clay.rst

Add unselectable prompts to doc/rados/operations/erasure-code-clay.rst.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agomgr/cephadm: fix check for if devices have changed 48817/head
Adam King [Wed, 9 Nov 2022 18:24:25 +0000 (13:24 -0500)]
mgr/cephadm: fix check for if devices have changed

Directly comparing the dicts doesn't work since the
"created" field was added in. We should instead make use
of the existing Devices equality function.

Fixes: https://tracker.ceph.com/issues/57999
Signed-off-by: Adam King <adking@redhat.com>
2 years agoMerge pull request #48549 from pkalever/snap-list
Ilya Dryomov [Fri, 2 Dec 2022 12:18:08 +0000 (13:18 +0100)]
Merge pull request #48549 from pkalever/snap-list

cls/rbd: update last_read in group::snap_list

Reviewed-by: Mykola Golub <mgolub@suse.com>
Reviewed-by: Ilya Dryomov <idryomov@gmail.com>
2 years agoMerge pull request #49177 from yuvalif/remove-pubsub-release-notes
Yuval Lifshitz [Fri, 2 Dec 2022 06:00:03 +0000 (08:00 +0200)]
Merge pull request #49177 from yuvalif/remove-pubsub-release-notes

rgw: update release notes on the removal of pubsub

2 years agoMerge pull request #49052 from tchaikov/wip-fmt-v9
Kefu Chai [Fri, 2 Dec 2022 05:03:50 +0000 (13:03 +0800)]
Merge pull request #49052 from tchaikov/wip-fmt-v9

*: include fmt/ostream.h if FMT_VERSION >= 9

Reviewed-by: Tim Serong <tserong@suse.com>
2 years agoMerge pull request #49185 from zdover23/wip-doc-2022-12-01-rados-ops-devices-prompts
zdover23 [Fri, 2 Dec 2022 02:45:41 +0000 (12:45 +1000)]
Merge pull request #49185 from zdover23/wip-doc-2022-12-01-rados-ops-devices-prompts

doc/rados: add prompts to devices.rst

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agodoc/rados: add prompts to devices.rst 49185/head
Zac Dover [Fri, 2 Dec 2022 02:28:58 +0000 (12:28 +1000)]
doc/rados: add prompts to devices.rst

Add unselectable prompts to doc/rados/operations/devices.rst.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agoMerge pull request #49182 from zdover23/wip-doc-2022-12-01-rados-ops-crush-map-prompts
zdover23 [Fri, 2 Dec 2022 02:28:06 +0000 (12:28 +1000)]
Merge pull request #49182 from zdover23/wip-doc-2022-12-01-rados-ops-crush-map-prompts

doc/rados: add prompts to crush-map.rst

Reviewed-by: Cole Mitchell <cole.mitchell@gmail.com>
2 years agodoc/rados: add prompts to crush-map.rst 49182/head
Zac Dover [Fri, 2 Dec 2022 02:15:52 +0000 (12:15 +1000)]
doc/rados: add prompts to crush-map.rst

Add unselectable prompts to doc/rados/operations/crush-map.rst.

https://tracker.ceph.com/issues/57108

Signed-off-by: Zac Dover <zac.dover@gmail.com>
2 years agoMerge pull request #48838 from badone/wip-ceph-ansible-suite-nightlies-disable
Brad Hubbard [Fri, 2 Dec 2022 01:51:57 +0000 (11:51 +1000)]
Merge pull request #48838 from badone/wip-ceph-ansible-suite-nightlies-disable

qa/tests: Remove octopus ceph-ansible tests

Reviewed-by: Neha Ojha <nojha@redhat.com>
2 years agorgw: update release notes on the removal of pubsub 49177/head
yuval Lifshitz [Thu, 1 Dec 2022 15:43:35 +0000 (17:43 +0200)]
rgw: update release notes on the removal of pubsub

Signed-off-by: yuval Lifshitz <ylifshit@redhat.com>
2 years agoMerge pull request #48609 from cbodley/wip-rgw-encrypt-compress-release-note
Casey Bodley [Thu, 1 Dec 2022 18:43:18 +0000 (13:43 -0500)]
Merge pull request #48609 from cbodley/wip-rgw-encrypt-compress-release-note

PendingReleaseNotes: add note for rgw compression+encryption

Reviewed-by: Yuval Lifshitz <ylifshit@redhat.com>
2 years agoPendingReleaseNotes: add note for rgw compression+encryption 48609/head
Casey Bodley [Mon, 24 Oct 2022 16:40:07 +0000 (12:40 -0400)]
PendingReleaseNotes: add note for rgw compression+encryption

adds release notes for the feature added in
https://github.com/ceph/ceph/pull/46188

Signed-off-by: Casey Bodley <cbodley@redhat.com>
2 years agoMerge pull request #48996 from yuvalif/wip-yuval-remove-pubsub
Casey Bodley [Thu, 1 Dec 2022 14:00:26 +0000 (09:00 -0500)]
Merge pull request #48996 from yuvalif/wip-yuval-remove-pubsub

remove pubsub from the RGW

Reviewed-by: Casey Bodley <cbodley@redhat.com>
Reviewed-by: Daniel Gryniewicz <dang@redhat.com>
Reviewed-by: Ronen Friedman <rfriedma@redhat.com>
2 years agoqa: remove unused 'teuthology.orchestra.run' in xfstests_dev.py 48628/head
Xiubo Li [Thu, 1 Dec 2022 09:42:03 +0000 (17:42 +0800)]
qa: remove unused 'teuthology.orchestra.run' in xfstests_dev.py

Fixes: https://tracker.ceph.com/issues/58133
Signed-off-by: Xiubo Li <xiubli@redhat.com>
2 years agoqa: cephfs add fscrypt test suite for kclient
Xiubo Li [Tue, 25 Oct 2022 06:39:53 +0000 (14:39 +0800)]
qa: cephfs add fscrypt test suite for kclient

For both io path and common test cases in xfstests. Currently only
support the centos and ubuntu distros. But for rhel we couldn't
install the 'userspace-rcu-devel', 'device-mapper-devel' and
'libedit-devel' dependency packages.

Fixes: https://tracker.ceph.com/issues/58133
Signed-off-by: Xiubo Li <xiubli@redhat.com>
2 years agoqa: add xfstests fscrypt test cases support
Xiubo Li [Wed, 26 Oct 2022 06:48:02 +0000 (14:48 +0800)]
qa: add xfstests fscrypt test cases support

This will test the common fscrypt features such as the set_encpolicy,
get_encpolicy,etc only.

Will run the IO path test in another test suite.

Fixes: https://tracker.ceph.com/issues/58133
Signed-off-by: Xiubo Li <xiubli@redhat.com>
2 years agoqa: cephfs add filesystem encryption test support
Xiubo Li [Mon, 24 Oct 2022 12:56:16 +0000 (20:56 +0800)]
qa: cephfs add filesystem encryption test support

This will allow us to create a encrypted test directory to do the
I/O test.

More coplex fscrypt tests we will use the xfstest-dev later.

Fixes: https://tracker.ceph.com/issues/58133
Signed-off-by: Xiubo Li <xiubli@redhat.com>
2 years agoqa: install the dependency packages required by xfsprogs-dev repo
Xiubo Li [Wed, 30 Nov 2022 00:34:31 +0000 (08:34 +0800)]
qa: install the dependency packages required by xfsprogs-dev repo

We need to install the xfsprogs-dev from source to make the xfs_io
command to support the 'add_enckey'.

Currently we couldn't install 'userspace-rcu-devel', 'libedit-devel'
and 'device-mapper-devel' from rhel distos. So the file encyrpt test
cases will skip the rhel distos for now. And it works well on centos
and ubuntu.

Fixes: https://tracker.ceph.com/issues/58133
Signed-off-by: Xiubo Li <xiubli@redhat.com>