]> git.apps.os.sepia.ceph.com Git - ceph.git/log
ceph.git
20 months agorgw: beast frontend checks for local_endpoint() errors 54167/head
Casey Bodley [Thu, 6 Oct 2022 17:22:35 +0000 (13:22 -0400)]
rgw: beast frontend checks for local_endpoint() errors

socket.local_endpoint() throws on error. use the error_code overload
instead and return on failure

Fixes: https://tracker.ceph.com/issues/57784
Signed-off-by: Casey Bodley <cbodley@redhat.com>
(cherry picked from commit 60af907c91210f60d0009318b8ca2ccd87941bb9)

20 months agoMerge pull request #53758 from cbodley/wip-63040-pacific
Yuri Weinstein [Mon, 23 Oct 2023 15:26:06 +0000 (08:26 -0700)]
Merge pull request #53758 from cbodley/wip-63040-pacific

pacific: [CVE-2023-43040] rgw: Fix bucket validation against POST policies

Reviewed-by: Casey Bodley <cbodley@redhat.com>
20 months agoMerge pull request #49477 from aaSharma14/wip-58299-pacific
Pedro Gonzalez Gomez [Mon, 23 Oct 2023 08:23:05 +0000 (10:23 +0200)]
Merge pull request #49477 from aaSharma14/wip-58299-pacific

pacific: mgr/dashboard: Fix CephPoolGrowthWarning alert

Reviewed-by: Avan Thakkar <athakkar@redhat.com>
Reviewed-by: Nizamudeen A <nia@redhat.com>
21 months agoMerge pull request #53808 from cfsnyder/wip-62945-pacific
Yuri Weinstein [Fri, 20 Oct 2023 14:53:53 +0000 (07:53 -0700)]
Merge pull request #53808 from cfsnyder/wip-62945-pacific

pacific: rgw: add radosgw-admin bucket check olh/unlinked commands

Reviewed-by: Casey Bodley <cbodley@redhat.com>
21 months agoMerge pull request #53784 from idryomov/wip-63010-pacific
Yuri Weinstein [Fri, 20 Oct 2023 14:53:04 +0000 (07:53 -0700)]
Merge pull request #53784 from idryomov/wip-63010-pacific

pacific: qa/suites/krbd: stress test for recovering from watch errors

Reviewed-by: Mykola Golub <mgolub@suse.com>
21 months agoMerge pull request #53562 from cfsnyder/wip-58787-pacific
Yuri Weinstein [Fri, 20 Oct 2023 14:51:43 +0000 (07:51 -0700)]
Merge pull request #53562 from cfsnyder/wip-58787-pacific

pacific: rgwlc: prevent lc for one bucket from exceeding time budget

Reviewed-by: Daniel Gryniewicz <dang@redhat.com>
21 months agoMerge pull request #53295 from ajarr/wip-62686-pacific
Yuri Weinstein [Fri, 20 Oct 2023 14:50:25 +0000 (07:50 -0700)]
Merge pull request #53295 from ajarr/wip-62686-pacific

pacific: librbd: kick ExclusiveLock state machine on client being blocklisted when waiting for lock

Reviewed-by: Ilya Dryomov <idryomov@redhat.com>
21 months agoMerge pull request #53274 from idryomov/wip-61707-pacific
Yuri Weinstein [Fri, 20 Oct 2023 14:49:22 +0000 (07:49 -0700)]
Merge pull request #53274 from idryomov/wip-61707-pacific

pacific: librbd: make CreatePrimaryRequest remove any unlinked mirror snapshots

Reviewed-by: Ramana Raja <rraja@redhat.com>
21 months agoMerge pull request #53978 from adk3798/wip-63115-pacific
Adam King [Tue, 17 Oct 2023 19:14:10 +0000 (15:14 -0400)]
Merge pull request #53978 from adk3798/wip-63115-pacific

pacific: mgr/cephadm: ceph orch add fails when ipv6 address is surrounded by square brackets.

Reviewed-by: John Mulligan <jmulligan@redhat.com>
21 months agoMerge pull request #53977 from adk3798/wip-62802-pacific
Adam King [Tue, 17 Oct 2023 19:13:25 +0000 (15:13 -0400)]
Merge pull request #53977 from adk3798/wip-62802-pacific

pacific: cephadm: run tcmu-runner through script to do restart on failure

Reviewed-by: Guillaume Abrioux <gabrioux@ibm.com>
21 months agoMerge pull request #53975 from adk3798/wip-62469-pacific
Adam King [Tue, 17 Oct 2023 19:12:14 +0000 (15:12 -0400)]
Merge pull request #53975 from adk3798/wip-62469-pacific

pacific: cephadm: add tcmu-runner to logrotate config

Reviewed-by: Guillaume Abrioux <gabrioux@redhat.com>
21 months agoMerge pull request #53974 from adk3798/wip-62448-pacific
Adam King [Tue, 17 Oct 2023 19:11:24 +0000 (15:11 -0400)]
Merge pull request #53974 from adk3798/wip-62448-pacific

pacific: mgr/cephadm: Add "networks" parameter to orch apply rgw

Reviewed-by: Guillaume Abrioux <gabrioux@redhat.com>
21 months agoMerge pull request #53469 from adk3798/pacific-tcmu-custom-configs
Adam King [Tue, 17 Oct 2023 19:10:24 +0000 (15:10 -0400)]
Merge pull request #53469 from adk3798/pacific-tcmu-custom-configs

pacific: cephadm: make custom_configs work for tcmu-runner container

Reviewed-by: John Mulligan <jmulligan@redhat.com>
21 months agoMerge pull request #52413 from adk3798/wip-61686-pacific
Adam King [Tue, 17 Oct 2023 19:09:29 +0000 (15:09 -0400)]
Merge pull request #52413 from adk3798/wip-61686-pacific

pacific: python-common/drive_group: handle fields outside of 'spec' even when 'spec' is provided

Reviewed-by: Guillaume Abrioux <gabrioux@ibm.com>
21 months agoMerge pull request #52412 from adk3798/wip-61683-pacific
Adam King [Tue, 17 Oct 2023 19:08:48 +0000 (15:08 -0400)]
Merge pull request #52412 from adk3798/wip-61683-pacific

pacific: python-common/drive_selection: lower log level of limit policy message

Reviewed-by: Guillaume Abrioux <gabrioux@ibm.com>
21 months agoMerge pull request #52411 from adk3798/wip-61544-pacific
Adam King [Tue, 17 Oct 2023 19:07:30 +0000 (15:07 -0400)]
Merge pull request #52411 from adk3798/wip-61544-pacific

pacific: cephadm: Adding support to configure public_network cfg section

Reviewed-by: Guillaume Abrioux <gabrioux@ibm.com>
21 months agoMerge pull request #52083 from adk3798/wip-61677-pacific
Adam King [Tue, 17 Oct 2023 19:06:04 +0000 (15:06 -0400)]
Merge pull request #52083 from adk3798/wip-61677-pacific

pacific: cephadm: allow ports to be opened in firewall during adoption, reconfig, redeploy

Reviewed-by: John Mulligan <jmulligan@redhat.com>
Reviewed-by: Redouane Kachach <rkachach@redhat.com>
21 months agocephadm: make custom_configs work for tcmu-runner container 53469/head
Adam King [Mon, 21 Aug 2023 17:48:56 +0000 (13:48 -0400)]
cephadm: make custom_configs work for tcmu-runner container

This is intended to be a temporary workaround to make
custom config files be able to be mounted into
the tcmu-runner container. The hope is to refactor
cephadm's iscsi handling for squid, but a patch
like this could be useful for iscsi in older
releases where currently custom config files
are unusable for the tcmu-runner container

What this patch actually does is have us write the
custom config files to a dir for the tcmu-runner
container so that the rest of the logic works without
change. I thought this would be easier to remove later
than a patch that integrates more with the container
mounts or general deployment

The use case in mind is something like

service_type: iscsi
service_id: foo
service_name: iscsi.foo
placement:
  hosts:
  - host1
custom_configs:
  -  mount_path: /etc/tcmu/tcmu.conf
     content: |
       log_level = 4
spec:
  api_password: admin
  api_port: 5000
  api_user: admin
  pool: foo

which would allow users to modify the logging of the
tcmu-runner container for debugging purposes

Signed-off-by: Adam King <adking@redhat.com>
(cherry picked from commit de92392708bf456bba975cc18b3138035d79ae05)

21 months agoceph orch add fails when ipv6 address is surrounded by square brackets. 53978/head
Teoman ONAY [Mon, 3 Jul 2023 14:00:20 +0000 (16:00 +0200)]
ceph orch add fails when ipv6 address is surrounded by square brackets.

fixes: https://tracker.ceph.com/issues/61885
fixes: https://bugzilla.redhat.com/show_bug.cgi?id=2153448

Signed-off-by: Teoman ONAY <tonay@ibm.com>
(cherry picked from commit 1ea71bee6197ed0357b586498a43d9d726160a43)

21 months agocephadm: run tcmu-runner through script to do restart on failure 53977/head
Adam King [Tue, 13 Jun 2023 23:54:30 +0000 (19:54 -0400)]
cephadm: run tcmu-runner through script to do restart on failure

Currently, cephadm runs tcmu-runner as a background
process inside the unit file deployed for iscsi
(rbd-target-api is the primary process). This means
if tcmu-runner crashes for whatever reason, systemd
will not attempt to restart it. This commits sets
up a script to serve as the container entrypoint
for the tcmu-runner container that will run
tcmu-runner and also restart it on failure
(unless there are too many failures in a short
period, at which point it gives up).

The hope is to eventually drop use of this script
for a better solution in squid onward, but this
should be helpful on older releases (quincy and
pacific at least) where we won't be able to
bring that better solution

Fixes: https://tracker.ceph.com/issues/61667
Signed-off-by: Adam King <adking@redhat.com>
(cherry picked from commit 47eb6b3f62afe993073429b02051ae0343d7aea3)

Conflicts:
src/cephadm/cephadm
src/cephadm/tests/test_cephadm.py

21 months agocephadm: Fix extra_container_args for iSCSI
Raimund Sacherer [Fri, 26 May 2023 15:52:57 +0000 (17:52 +0200)]
cephadm: Fix extra_container_args for iSCSI

extra_container_args where only applied for rbd_target_api container and not for
tcmu-runner container.

Signed-off-by: Raimund Sacherer <rsachere@redhat.com>
(cherry picked from commit ad60fc3db644b8bf44a582e79888e2fb15d7ce3a)

Conflicts:
src/cephadm/cephadm

21 months agocephadm: add tcmu-runner to logrotate config 53975/head
Adam King [Fri, 2 Jun 2023 00:06:35 +0000 (20:06 -0400)]
cephadm: add tcmu-runner to logrotate config

This process could be used to set up the tcmu-runner
to log to a file much like other ceph daemons

- create /etc/tcmu directory
- create /etc/tcmu/tcmu.conf directory with default options
- change dir to /var/log
- change log level to 4
- add -v /etc/tcmu:/etc/tcmu to tcmu-runner container podman line in unit.run

In order to support this (mostly for debugging) we should
add tcmu-runner to the logrotate config

Fixes: https://tracker.ceph.com/issues/61571
Signed-off-by: Adam King <adking@redhat.com>
(cherry picked from commit d5d40e07cae8a1d6a94029c4354d146b0baa3971)

21 months agomgr/cephadm: Add "networks" parameter to orch apply rgw 53974/head
Teoman ONAY [Wed, 26 Jul 2023 14:40:11 +0000 (16:40 +0200)]
mgr/cephadm: Add "networks" parameter to orch apply rgw

This parameter is available in specs but not available as a parameter.
Having it will ease its use in cephadm-adopt playbook in ceph-ansible.

fixes: https://tracker.ceph.com/issues/62185

Signed-off-by: Teoman ONAY <tonay@ibm.com>
(cherry picked from commit 7f33397c76540dff8ed724caf2aa14ac94c73e03)

21 months agolibrbd/ManagedLock: kickstart ExclusiveLock state machine 53295/head
Ramana Raja [Mon, 2 Oct 2023 16:39:26 +0000 (12:39 -0400)]
librbd/ManagedLock: kickstart ExclusiveLock state machine

... that is stalled waiting for lock. Do this when trying to reacquire
lock in the ImageWatcher's rewatch mechanism. This would enable the
ExclusiveLock state machine to propagate the blocklist error to the
caller trying to perform an image operation requiring an exclusive
lock.

Previous attempt, e66db763, to fix the hang due to exclusive lock
acquisiton (stuck waiting for lock) racing with client blocklisting
did not always work. e66db763 kickstarted the ExclusiveLock state
machine when the ImageWatcher tried to schedule a exclusive lock
request and the blocklisting was detected. However, there is a short
window between a watch getting deregistered and client blocklisting
getting detected as part of rewatching. If hit when trying to schedule
a lock request, the ExclusiveLock state machine wasn't kickstarted,
blocklist error wasn't propagated, and the hang resurfaced.

A more robust approach is taken to resume the ExclusiveLock state
machine stuck waiting for lock during client blocklisting. Whenever
a client's ImageWatcher loses connection to the cluster, as it happens
during blocklising, the ImageWatcher initiates a mechanism to rewatch
the image and tries to reacquire the lock. Piggyback on this rewatch
mechanism that gets triggered during client blocklisting. And when
trying to reacquire the lock, kickstart the ExclusiveLock state
machine stalled waiting for lock (STATE_WAITING_FOR_LOCK).

Fixes: https://tracker.ceph.com/issues/63009
Signed-off-by: Ramana Raja <rraja@redhat.com>
(cherry picked from commit 18b018578cf8ac51a7e7a7d25f62d7bde345461a)

21 months agoMerge pull request #49478 from aaSharma14/wip-58301-pacific
Pedro Gonzalez Gomez [Tue, 10 Oct 2023 08:23:59 +0000 (10:23 +0200)]
Merge pull request #49478 from aaSharma14/wip-58301-pacific

pacific: mgr/dashboard: fix CephPGImbalance alert

Reviewed-by: Pedro Gonzalez Gomez <pegonzal@redhat.com>
Reviewed-by: Nizamudeen A <nia@redhat.com>
21 months agoMerge pull request #48524 from k0ste/wip-57887-pacific
Avan [Thu, 5 Oct 2023 09:35:07 +0000 (15:05 +0530)]
Merge pull request #48524 from k0ste/wip-57887-pacific

pacific: mgr/prometheus: avoid duplicates and deleted entries for rbd_stats_pools

Reviewed-by: Avan Thakkar <athakkar@redhat.com>
21 months agorgw: fix output formatting of bucket index check admin api 53808/head
Cory Snyder [Mon, 25 Sep 2023 10:06:41 +0000 (10:06 +0000)]
rgw: fix output formatting of bucket index check admin api

The bucket index check admin API was previously returning invalid
JSON.

Signed-off-by: Cory Snyder <csnyder@1111systems.com>
(cherry picked from commit 32fb6a1a68398a99324b2e64ebe3bcf3a9ccf02a)

21 months agorgw: fix radosgw-admin bucket check stat calculation bug
Cory Snyder [Fri, 22 Sep 2023 21:08:25 +0000 (21:08 +0000)]
rgw: fix radosgw-admin bucket check stat calculation bug

Fixes a regression with radosgw-admin bucket check stat
calculation and bucket reshard stat calculation when
there are objects that have transitioned from unversioned
to versioned. The bug was introduced in
152aadb71b61c53a4832a1c8cf82fce3d64b68d1.

Signed-off-by: Cory Snyder <csnyder@1111systems.com>
(cherry picked from commit 4728daa5557bfb79a608dd903b8630e2b15fcb2c)

21 months agorgw: add test case to reproduce bucket check stats bug for versioned bucket
Cory Snyder [Fri, 22 Sep 2023 21:00:46 +0000 (21:00 +0000)]
rgw: add test case to reproduce bucket check stats bug for versioned bucket

Reproduces a regression where radosgw-admin bucket check incorrectly counts
objects that started as unversioned and later transitioned to versioned.

Signed-off-by: Cory Snyder <csnyder@1111systems.com>
(cherry picked from commit 340522f9aed50d65137568c1f9dcf4b1e7945a79)

21 months agorgw: radosgw-admin bucket check should only print index entries with --check-objects...
Cory Snyder [Fri, 22 Sep 2023 08:35:16 +0000 (08:35 +0000)]
rgw: radosgw-admin bucket check should only print index entries with --check-objects flag

Printing all index entries can be very time consuming for large
buckets and the inability to switch this behavior off makes it
cumbersome to use the command for fixing bucket stats. This was
also preventing the command from outputting recalculated bucket
stats when the --fix flag wasn't specified.

Signed-off-by: Cory Snyder <csnyder@1111systems.com>
(cherry picked from commit 6b057fe55413c0eaf9959f006584cba6cc4c192a)

Conflicts:
src/rgw/driver/rados/rgw_bucket.cc

Cherry-pick notes:
- Conflicts due to rgw_bucket.cc moved into driver dir in later versions

21 months agorgw: prevent another leftover bucket index olh entry scenario
Cory Snyder [Thu, 21 Sep 2023 19:27:51 +0000 (19:27 +0000)]
rgw: prevent another leftover bucket index olh entry scenario

If a call to bucket_index_link_olh or bucket_index_unlink_instance
fails, its associated pending xattr may have prevented the olh object
from being removed by another thread. We should do a best effort
cleanup attempt for this case by calling update_olh before returning
an error to the caller.

Signed-off-by: Cory Snyder <csnyder@1111systems.com>
(cherry picked from commit 570adec5bb8142f5baf1f05f0040e8afdb11ec05)

Conflicts:
src/rgw/driver/rados/rgw_rados.cc

Cherry-pick notes:
- Conflicts due to rgw_rados file being moved into driver dir in later versions

21 months agorgw: fix rgw versioned bucket stat accounting during reshard and check index
Cory Snyder [Thu, 7 Sep 2023 17:23:14 +0000 (17:23 +0000)]
rgw: fix rgw versioned bucket stat accounting during reshard and check index

Fixes: https://tracker.ceph.com/issues/62760
Signed-off-by: Cory Snyder <csnyder@1111systems.com>
(cherry picked from commit 152aadb71b61c53a4832a1c8cf82fce3d64b68d1)

Conflicts:
src/cls/rgw/cls_rgw.cc

Cherry-pick notes:
- Some function ordering changed

21 months agoqa/workunits/rgw: add tests that reproduce bucket stats inconsistency bugs
Cory Snyder [Thu, 7 Sep 2023 14:43:23 +0000 (14:43 +0000)]
qa/workunits/rgw: add tests that reproduce bucket stats inconsistency bugs

Signed-off-by: Cory Snyder <csnyder@1111systems.com>
(cherry picked from commit b79dcf640ac2cc3dacf1b87bbe351db823c445d0)

21 months agorgw: add radosgw-admin bucket check olh/unlinked commands
Cory Snyder [Thu, 25 May 2023 16:59:04 +0000 (16:59 +0000)]
rgw: add radosgw-admin bucket check olh/unlinked commands

Adds commands to radosgw-admin for checking for and fixing leftover
entries in the bucket index (and associated RADOS objects).

Fixes: https://tracker.ceph.com/issues/62075
Signed-off-by: Cory Snyder <csnyder@1111systems.com>
(cherry picked from commit 9b2042a0750109f575b02c9c4b127dd941994662)

Conflicts:
src/rgw/driver/rados/rgw_bucket.cc
src/rgw/driver/rados/rgw_bucket.h
src/rgw/driver/rados/rgw_rados.cc
src/rgw/rgw_admin.cc

Cherry-pick notes:
- conflicts due to rados files being moved into driver directory
- conflicts due to rename of rados classes

21 months agoMerge pull request #53781 from rhcs-dashboard/wip-63070-pacific
Nizamudeen A [Tue, 3 Oct 2023 11:12:36 +0000 (16:42 +0530)]
Merge pull request #53781 from rhcs-dashboard/wip-63070-pacific

pacific: mgr/dashboard: allow tls 1.2 with a config option

Reviewed-by: Ankush Behl <cloudbehl@gmail.com>
21 months agoqa/suites/krbd: stress test for recovering from watch errors 53784/head
Ilya Dryomov [Wed, 27 Sep 2023 18:17:11 +0000 (20:17 +0200)]
qa/suites/krbd: stress test for recovering from watch errors

Fixes: https://tracker.ceph.com/issues/63010
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
(cherry picked from commit 237aa221ebad429457a621d2e38cfdf0025e38f9)

21 months agoqa/suites/krbd: rename singleton to singleton-msgr-failures
Ilya Dryomov [Thu, 28 Sep 2023 09:52:06 +0000 (11:52 +0200)]
qa/suites/krbd: rename singleton to singleton-msgr-failures

A "singleton without msgr-failures" is wanted in the next commit.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
(cherry picked from commit 2094a0450d071ed5fc430a5cdfa524a69098fbd4)

21 months agomgr/dashboard: allow tls 1.2 with a config option 53781/head
Nizamudeen A [Wed, 27 Sep 2023 11:27:32 +0000 (16:57 +0530)]
mgr/dashboard: allow tls 1.2 with a config option

Provide the option to allow tls1.2

`ceph dashboard set-enable-unsafe-tls-v1-2 True` followed with a mgr
restart will enable tls 1.2.

With tls1.2 enabled
```
╰─$ nmap -sV --script ssl-enum-ciphers -p 11000 127.0.0.1
Starting Nmap 7.93 ( https://nmap.org ) at 2023-09-27 16:56 IST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.00018s latency).

PORT      STATE SERVICE  VERSION
11000/tcp open  ssl/http CherryPy wsgiserver
|_http-server-header: Ceph-Dashboard
| ssl-enum-ciphers:
|   TLSv1.2:
|     ciphers:
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors:
|       NULL
|     cipher preference: server
|   TLSv1.3:
|     ciphers:
|       TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|       TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
|     cipher preference: server
|_  least strength: A

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 16.55 seconds
```

Without tls1.2 enabled (which defaults to tls 1.3)
```
╰─$ nmap -sV --script ssl-enum-ciphers -p 11000 127.0.0.1
Starting Nmap 7.93 ( https://nmap.org ) at 2023-09-27 16:54 IST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000075s latency).

PORT      STATE SERVICE  VERSION
11000/tcp open  ssl/http CherryPy wsgiserver
| ssl-enum-ciphers:
|   TLSv1.3:
|     ciphers:
|       TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|       TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) - A
|     cipher preference: server
|_  least strength: A
|_http-server-header: Ceph-Dashboard
```

Fixes: https://tracker.ceph.com/issues/62940
Signed-off-by: Nizamudeen A <nia@redhat.com>
(cherry picked from commit 219c62bea60083c0e59a86454b0cecf8afaf9780)

21 months agorgw: Fix bucket validation against POST policies 53758/head
Joshua Baergen [Wed, 17 May 2023 18:17:09 +0000 (12:17 -0600)]
rgw: Fix bucket validation against POST policies

It's possible that user could provide a form part as a part of a POST
object upload that uses 'bucket' as a key; in this case, it was
overriding what was being set in the validation env (which is the real
bucket being modified). The result of this is that a user could actually
upload to any bucket accessible by the specified access key by matching
the bucket in the POST policy in said POST form part.

Fix this simply by setting the bucket to the correct value after the
POST form parts are processed, ignoring the form part above if
specified.

Fixes: https://tracker.ceph.com/issues/63004
Signed-off-by: Joshua Baergen <jbaergen@digitalocean.com>
(cherry picked from commit 98bfb71cb38899333deb58dd2562037450fd7fa8)

Conflicts:
src/rgw/rgw_rest_s3.cc get_params() conflict with sse-s3 stuff

21 months agoMerge pull request #52750 from mchangir/wip-61989-pacific
Venky Shankar [Mon, 25 Sep 2023 07:49:08 +0000 (13:19 +0530)]
Merge pull request #52750 from mchangir/wip-61989-pacific

pacific: mgr/snap_schedule: allow retention spec 'n' to be user defined

Reviewed-by: Venky Shankar <vshankar@redhat.com>
21 months agoMerge pull request #53560 from batrick/wip-57776-pacific
zdover23 [Thu, 21 Sep 2023 05:01:51 +0000 (15:01 +1000)]
Merge pull request #53560 from batrick/wip-57776-pacific

pacific: doc: discuss the standard multi-tenant CephFS security model

Reviewed-by: Anthony D'Atri <anthony.datri@gmail.com>
22 months agorgwlc: prevent lc for one bucket from exceeding time budget 53562/head
Matt Benjamin [Mon, 31 Oct 2022 16:40:50 +0000 (12:40 -0400)]
rgwlc: prevent lc for one bucket from exceeding time budget

Fixes: https://tracker.ceph.com/issues/57951
Signed-off-by: Matt Benjamin <mbenjamin@redhat.com>
(cherry picked from commit 617ffccbca0169ac0f1cd713962d44e8cc74a8af)

22 months agodoc: discuss the standard multi-tenant CephFS security model 53560/head
Greg Farnum [Fri, 30 Sep 2022 19:34:27 +0000 (19:34 +0000)]
doc: discuss the standard multi-tenant CephFS security model

Fixes: https://tracker.ceph.com/issues/57737
Signed-off-by: Greg Farnum <gfarnum@redhat.com>
(cherry picked from commit 91e7c7de6a5ccb44e9cbf3fffe258c952f733fe8)

22 months agoMerge pull request #52949 from k0ste/wip-61723-pacific
Adam Kupczyk [Tue, 19 Sep 2023 13:29:44 +0000 (15:29 +0200)]
Merge pull request #52949 from k0ste/wip-61723-pacific

pacific: Bluestore: fix bluestore collection_list latency perf counter

22 months agoMerge pull request #52821 from rishabh-d-dave/wip-62337-pacific
Laura Flores [Sun, 17 Sep 2023 22:34:33 +0000 (18:34 -0400)]
Merge pull request #52821 from rishabh-d-dave/wip-62337-pacific

pacific: mds: use variable g_ceph_context directly in MDSAuthCaps

22 months agoMerge pull request #53416 from trociny/wip-62505-pacific
Casey Bodley [Fri, 15 Sep 2023 15:03:48 +0000 (16:03 +0100)]
Merge pull request #53416 from trociny/wip-62505-pacific

pacific: rgw: handle http options CORS with v4 auth

Reviewed-by: Casey Bodley <cbodley@redhat.com>
22 months agoMerge PR #53447 into pacific
Patrick Donnelly [Wed, 13 Sep 2023 18:17:10 +0000 (14:17 -0400)]
Merge PR #53447 into pacific

* refs/pull/53447/head:
qa: remove duplicate import

Reviewed-by: Casey Bodley <cbodley@redhat.com>
22 months agoqa: remove duplicate import 53447/head
Patrick Donnelly [Wed, 13 Sep 2023 16:36:04 +0000 (12:36 -0400)]
qa: remove duplicate import

To fix tox error.

Fixes: c09558d8de0defb2695bb345c30387843e65cd93
Fixes: 469f3502d48d6ccfeba4d2ac2446ef4e47665f53
Signed-off-by: Patrick Donnelly <pdonnell@redhat.com>
22 months agoMerge pull request #53403 from rishabh-d-dave/wip-62807-pacific
zdover23 [Tue, 12 Sep 2023 10:39:13 +0000 (20:39 +1000)]
Merge pull request #53403 from rishabh-d-dave/wip-62807-pacific

pacific: doc/cephfs: write cephfs commands fully in docs

Reviewed-by: Anthony D'Atri <anthony.datri@gmail.com>
22 months agorgw/auth: move http options v4 logic to get_v4_canonical_method() 53416/head
Tobias Urdin [Thu, 17 Aug 2023 11:45:06 +0000 (11:45 +0000)]
rgw/auth: move http options v4 logic to get_v4_canonical_method()

Signed-off-by: Tobias Urdin <tobias.urdin@binero.com>
(cherry picked from commit dbc0a4ed2dd6a92d06e585dda25b1325464efefb)

Conflicts:
src/rgw/rgw_auth_s3.cc (trivial)
src/rgw/rgw_auth_s3.h (trivial)

22 months agorgw/auth: handle HTTP OPTIONS with v4 auth
Tobias Urdin [Mon, 7 Aug 2023 20:34:43 +0000 (20:34 +0000)]
rgw/auth: handle HTTP OPTIONS with v4 auth

This adds code to properly verify the signature
for HTTP OPTIONS calls that is preflight CORS
requests passing the expected method in the
access-control-request-method header.

Fixes: https://tracker.ceph.com/issues/62033
Signed-off-by: Tobias Urdin <tobias.urdin@binero.com>
(cherry picked from commit 814cae52baf04d9c3f0f3bd04b8e2daf16eb3874)

Conflicts:
src/rgw/rgw_cors.h (trivial)
src/rgw/rgw_op.cc (different signature for validate_cors_rule_method)
src/rgw/rgw_rest_s3.cc (trivial)

22 months agorgw/auth: check auth for http options requests
Tobias Urdin [Thu, 27 Jul 2023 14:59:45 +0000 (14:59 +0000)]
rgw/auth: check auth for http options requests

If we get a HTTP OPTIONS request we previously always
allowed the anonymous engine to handle the request even
if other auth was given in the request.

Fixes: https://tracker.ceph.com/issues/62033
Signed-off-by: Tobias Urdin <tobias.urdin@binero.com>
(cherry picked from commit 135b6fc20e8ad094ed94e05bfb1975578abbbdab)

22 months agodoc/cephfs: write cephfs commands fully in docs 53403/head
Rishabh Dave [Mon, 11 Sep 2023 09:55:46 +0000 (15:25 +0530)]
doc/cephfs: write cephfs commands fully in docs

We write CephFS commands incompletely in docs. For example, "ceph tell
mds.a help" is simply written as "tell mds.a help". This might confuse
the reader and it won't harm to write the command in full.

Fixes: https://tracker.ceph.com/issues/62791
Signed-off-by: Rishabh Dave <ridave@redhat.com>
(cherry picked from commit e63b573d3edc272d83ee1b5eb3dace037f762d87)

22 months agoMerge pull request #53204 from idryomov/wip-62586-pacific
Ilya Dryomov [Fri, 8 Sep 2023 10:12:50 +0000 (12:12 +0200)]
Merge pull request #53204 from idryomov/wip-62586-pacific

pacific: qa/suites/upgrade/pacific-p2p: skip TestClsRbd.mirror_snapshot test

Reviewed-by: Mykola Golub <mgolub@suse.com>
Reviewed-by: Ramana Raja <rraja@redhat.com>
22 months agoMerge PR #51045 into pacific
Patrick Donnelly [Wed, 6 Sep 2023 00:45:57 +0000 (20:45 -0400)]
Merge PR #51045 into pacific

* refs/pull/51045/head:
qa: Add test for per-module finisher thread
qa: allow check_counter to look at nested keys
qa: allow specifying min for check-counter
mgr: Add one finisher thread per module

Reviewed-by: Venky Shankar <vshankar@redhat.com>
Reviewed-by: Brad Hubbard <bhubbard@redhat.com>
22 months agoMerge PR #52744 into pacific
Patrick Donnelly [Tue, 5 Sep 2023 19:42:17 +0000 (15:42 -0400)]
Merge PR #52744 into pacific

* refs/pull/52744/head:
qa: wait for file to have correct size

Reviewed-by: Venky Shankar <vshankar@redhat.com>
22 months agoMerge PR #53185 into pacific
Patrick Donnelly [Tue, 5 Sep 2023 19:41:42 +0000 (15:41 -0400)]
Merge PR #53185 into pacific

* refs/pull/53185/head:
mds: acquire inode snaplock in open

Reviewed-by: Venky Shankar <vshankar@redhat.com>
22 months agoMerge PR #53243 into pacific
Patrick Donnelly [Tue, 5 Sep 2023 19:40:57 +0000 (15:40 -0400)]
Merge PR #53243 into pacific

* refs/pull/53243/head:
mds: drop locks and retry when lock set changes

Reviewed-by: Venky Shankar <vshankar@redhat.com>
22 months agolibrbd/ImageWatcher: kick-start ExclusiveLock state machine
Ramana Raja [Mon, 14 Aug 2023 15:27:13 +0000 (11:27 -0400)]
librbd/ImageWatcher: kick-start ExclusiveLock state machine

... that is stalled on waiting for lock and let it detect client
blocklisting. This would propagate the blocklist error to the caller
requesting an operation needing an exclusive lock.

When a caller requests a librbd operation that requires an exclusive
lock, the librbd client checks whether the exclusive lock is
held by another client. If the lock is held by another client, librbd
stalls its ExclusiveLock state machine and through its ImageWatcher
notifies the lock owner that it wants the exclusive lock. After
receiving the response from the lock owner, the ImageWatcher schedules
another lock request. Meanwhile if the client gets blocklisted, the
ImageWatcher fails to schedule another lock request and returns. The
ExclusiveLock state machine remains stalled and the blocklist error is
not propagated to the caller. Instead, when scheduling another lock
request, make the ImageWatcher call the ExclusiveLock state machine's
peer notification handler if the client is blocklisted. This allows
the Exclusive lock state machine to detect that the client has been
blocklisted in its send_acquire_lock() member function and propagate
the blocklist error to the caller.

Fixes: https://tracker.ceph.com/issues/61607
Signed-off-by: Ramana Raja <rraja@redhat.com>
(cherry picked from commit e66db76354093009c254aabce9e4654e27045375)

22 months agoqa: add "failover / failback loop" test for rbd-mirror 53274/head
Ilya Dryomov [Fri, 1 Sep 2023 12:53:33 +0000 (14:53 +0200)]
qa: add "failover / failback loop" test for rbd-mirror

For snapshot-based mirroring, check that demote (or other mirror
snapshots) don't pile up.  Nothing in particular to assert on for
journal-based mirroring but the test is still useful.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
(cherry picked from commit 153df2d64b8cb51b5ce7559576613788795a4967)

22 months agolibrbd: make CreatePrimaryRequest remove any unlinked mirror snapshots
Ilya Dryomov [Sat, 26 Aug 2023 11:04:52 +0000 (13:04 +0200)]
librbd: make CreatePrimaryRequest remove any unlinked mirror snapshots

After commit ac552c9b4d65 ("librbd: localize snap_remove op for mirror
snapshots"), rbd-mirror daemon no longer removes mirror snapshots when
it's done syncing them -- instead it only unlinks from them.  However,
CreatePrimaryRequest state machine was not adjusted to compensate and
hence two cases were missed:

- primary demotion snapshot (rbd-mirror daemon unlinks from primary
  demotion snapshots just like it does from regular primary snapshots);
  this comes up when an image is demoted but then promoted on the same
  cluster

- non-primary demotion snapshot (unlike regular non-primary snapshots,
  non-primary demotion snapshots store peer uuids and rbd-mirror daemon
  does unlinking just like in the case of primary snapshots); this
  comes up when an image is demoted and promoted on the other cluster

Related is the case of orphan snapshots.  Since they are dummy to begin
with, CreatePrimaryRequest would now clean up the orphan snapshot after
the creation of the force promote snapshot.

Fixes: https://tracker.ceph.com/issues/61707
Co-authored-by: Christopher Hoffman <choffman@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
(cherry picked from commit 9c05d3d81f4b06af2cfd47376e9ad86369bdf8cf)

Conflicts:
src/librbd/mirror/snapshot/CreatePrimaryRequest.cc [ commit
  3a93b40721a1 ("librbd: s/boost::variant/std::variant/") not
  in pacific ]

22 months agolibrbd: don't attempt to remove image state on orphan snapshots
Ilya Dryomov [Tue, 22 Aug 2023 15:27:50 +0000 (17:27 +0200)]
librbd: don't attempt to remove image state on orphan snapshots

Despite being mirror snapshots, orphan snapshots don't have image
state: see CreateNonPrimaryRequest::write_image_state() for a similar
is_orphan() check.  Attempting to remove image state generates bogus
"failed to read image state object" and "failed to remove image state"
errors.

Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
(cherry picked from commit cfae3f79bd0513e2753b0deb8c2624ab07cf2d1b)

Conflicts:
src/librbd/operation/SnapshotRemoveRequest.cc [ commit
  3a93b40721a1 ("librbd: s/boost::variant/std::variant/") not
  in pacific ]

22 months agoMerge PR #53189 into pacific
Patrick Donnelly [Fri, 1 Sep 2023 19:06:27 +0000 (15:06 -0400)]
Merge PR #53189 into pacific

* refs/pull/53189/head:
mgr: register OSDs in ms_handle_accept
msg: indicate ms_handle_authentication is fast

Reviewed-by: Ilya Dryomov <idryomov@redhat.com>
22 months agomds: drop locks and retry when lock set changes 53243/head
Patrick Donnelly [Mon, 17 Jul 2023 20:10:59 +0000 (16:10 -0400)]
mds: drop locks and retry when lock set changes

An optimization was added to avoid an unnecessary gather on the inode
filelock when the client can safely get the file size without also
getting issued the requested caps. However, if a retry of getattr
is necessary, this conditional inclusion of the inode filelock
can cause lock-order violations resulting in deadlock.

So, if we've already acquired some of the inode's locks then we must
drop locks and retry.

Fixes: https://tracker.ceph.com/issues/62052
Fixes: c822b3e2573578c288d170d1031672b74e02dced
Signed-off-by: Patrick Donnelly <pdonnell@redhat.com>
(cherry picked from commit b5719ac32fe6431131842d62ffaf7101c03e9bac)

22 months agoqa: Add test for per-module finisher thread 51045/head
Kotresh HR [Fri, 4 Nov 2022 10:36:20 +0000 (16:06 +0530)]
qa: Add test for per-module finisher thread

Fixes: https://tracker.ceph.com/issues/51177
Signed-off-by: Kotresh HR <khiremat@redhat.com>
(cherry picked from commit 2c2ef6d56b583a7a27fd7e99359cdabb2fd37fb5)

Conflicts:
  Removed 'telemetry diff' command used for testing
as it's not present in pacific.

22 months agoMerge pull request #53210 from ceph/pacific-release
Laura Flores [Wed, 30 Aug 2023 22:25:45 +0000 (17:25 -0500)]
Merge pull request #53210 from ceph/pacific-release

v16.2.14

22 months agoMerge pull request #53215 from rhcs-dashboard/wip-62632-pacific
Nizamudeen A [Wed, 30 Aug 2023 11:05:11 +0000 (16:35 +0530)]
Merge pull request #53215 from rhcs-dashboard/wip-62632-pacific

pacific: mgr/dashboard: fix rgw page issues when hostname not resolvable

Reviewed-by: Avan Thakkar <athakkar@redhat.com>
22 months agomgr/dashboard: fix rgw page issues when hostname not resolvable 53215/head
Nizamudeen A [Thu, 24 Aug 2023 11:47:29 +0000 (17:17 +0530)]
mgr/dashboard: fix rgw page issues when hostname not resolvable

Part of the fix is copied from https://github.com/ceph/ceph/pull/47495/files#diff-ba538532bb5450d415ab80916916bd68fe51d195e57c9aa34effaa8789d7a392R705

Fixes: https://tracker.ceph.com/issues/62396
Signed-off-by: Nizamudeen A <nia@redhat.com>
(cherry picked from commit 78cfeb6372707ec3f997d28ad617367feb3a983e)

 Conflicts:
src/pybind/mgr/dashboard/services/rgw_client.py
  - only keep the CephService import

22 months ago16.2.14 53210/head v16.2.14
Ceph Release Team [Tue, 29 Aug 2023 15:43:59 +0000 (15:43 +0000)]
16.2.14

Signed-off-by: Ceph Release Team <ceph-maintainers@ceph.io>
22 months agoMerge pull request #53202 from rhcs-dashboard/wip-62618-pacific
Nizamudeen A [Tue, 29 Aug 2023 13:45:00 +0000 (19:15 +0530)]
Merge pull request #53202 from rhcs-dashboard/wip-62618-pacific

pacific: mgr/dashboard: set CORS header for unauthorized access

Reviewed-by: Pedro Gonzalez Gomez <pegonzal@redhat.com>
22 months agoqa/suites/upgrade/pacific-p2p: skip TestClsRbd.mirror_snapshot test 53204/head
Ilya Dryomov [Sun, 27 Aug 2023 17:09:15 +0000 (19:09 +0200)]
qa/suites/upgrade/pacific-p2p: skip TestClsRbd.mirror_snapshot test

The behavior of the class method changed in reef; the change was
backported to pacific and quincy.  An older pacific binary used against
newer pacific OSDs produces an expected failure:

    [ RUN      ] TestClsRbd.mirror_snapshot
    .../ceph-16.2.7/src/test/cls_rbd/test_cls_rbd.cc:2278: Failure
    Expected equality of these values:
      -85
      mirror_image_snapshot_unlink_peer(&ioctx, oid, 1, "peer2")
        Which is: 0
    [  FAILED  ] TestClsRbd.mirror_snapshot (30 ms)

TestClsRbd.snapshots_namespaces test was removed in commit 4ad9d565a15c
("librbd: simplified retrieving snapshots from image header") many years
ago.

Fixes: https://tracker.ceph.com/issues/62586
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
22 months agomgr/dashboard: allow CORS for unauthorized access 53202/head
Nizamudeen A [Mon, 28 Aug 2023 05:15:28 +0000 (10:45 +0530)]
mgr/dashboard: allow CORS for unauthorized access

Fixes: https://tracker.ceph.com/issues/62612
Signed-off-by: Nizamudeen A <nia@redhat.com>
(cherry picked from commit 8158bdab7134714dc2a9f155e599cc2838c3358d)

22 months agoMerge pull request #53197 from ljflores/wip-liburing-pacific
Yuri Weinstein [Tue, 29 Aug 2023 00:03:19 +0000 (17:03 -0700)]
Merge pull request #53197 from ljflores/wip-liburing-pacific

pacific: make-dist: download liburing from kernel.io instead of github

Reviewed-by: Yuri Weinstein <yweinste@redhat.com>
22 months agomake-dist: download liburing from kernel.io instead of github 53197/head
Laura Flores [Mon, 28 Aug 2023 22:13:09 +0000 (17:13 -0500)]
make-dist: download liburing from kernel.io instead of github

Due to a bug with github.com, wget does not reliably download
packages. See https://github.com/orgs/community/discussions/65227

This change is motivated by this error that occurs when trying
to download liburing from github.com on an ubuntu jammy machine:
```
$ wget https://github.com/axboe/liburing/archive/liburing-0.7.tar.gz
--2023-08-28 21:26:02--  https://github.com/axboe/liburing/archive/liburing-0.7.tar.gz
Resolving github.com (github.com)... 140.82.113.3
Connecting to github.com (github.com)|140.82.113.3|:443... connected.
HTTP request sent, awaiting response... 302 Found
Location: https://codeload.github.com/axboe/liburing/tar.gz/refs/tags/liburing-0.7 [following]
--2023-08-28 21:26:02--  https://codeload.github.com/axboe/liburing/tar.gz/refs/tags/liburing-0.7
Resolving codeload.github.com (codeload.github.com)... 140.82.112.10
Connecting to codeload.github.com (codeload.github.com)|140.82.112.10|:443... connected.
HTTP request sent, awaiting response... 403 Forbidden
2023-08-28 21:26:02 ERROR 403: Forbidden.
```

The same does not happen on centos 8 or fedora.

Downloading from kernel.io works on every distro.

Signed-off-by: Laura Flores <lflores@ibm.com>
(cherry picked from commit 7f109dc612d9590f84a8fe7a047a78c7d621fcab)

22 months agoMerge pull request #53157 from ljflores/wip-62591-pacific
Laura Flores [Mon, 28 Aug 2023 16:37:58 +0000 (11:37 -0500)]
Merge pull request #53157 from ljflores/wip-62591-pacific

pacific: python-common: drive_selection: fix KeyError when osdspec_affinity is not set

22 months agomgr: register OSDs in ms_handle_accept 53189/head
Patrick Donnelly [Mon, 3 Jul 2023 00:48:44 +0000 (20:48 -0400)]
mgr: register OSDs in ms_handle_accept

It's a no-no to acquire locks in these "fast" messenger methods. This
can lead to messenger slow downs in the best case as it's blocking reads
on the wire. In the worse case, the messenger may deadlock with other
threads, preventing any further message reads off the wire.

It's not obvious this method is "fast" so I've added a comment regarding
this.

Fixes: https://tracker.ceph.com/issues/61874
Signed-off-by: Patrick Donnelly <pdonnell@redhat.com>
(cherry picked from commit 69980823e62f67d502c4045e15c41c5c44cd5127)

22 months agomsg: indicate ms_handle_authentication is fast
Patrick Donnelly [Mon, 10 Jul 2023 20:56:43 +0000 (16:56 -0400)]
msg: indicate ms_handle_authentication is fast

Like other fast Dispatcher methods, it must not acquire locks or do
anything that might take a long time.

Signed-off-by: Patrick Donnelly <pdonnell@redhat.com>
(cherry picked from commit 3e2075103a0ab6b7ced5800db1d44d13b1c8b7e6)

22 months agomds: acquire inode snaplock in open 53185/head
Patrick Donnelly [Tue, 18 Jul 2023 00:52:13 +0000 (20:52 -0400)]
mds: acquire inode snaplock in open

It doesn't make sense that

   open("file", O_CREAT|...)

will acquire a readlock on the file's snaplock when the file already
exists, but:

   open("file", ...)

will not.

Fixes: https://tracker.ceph.com/issues/62058
Fixes: c1d7f93d7bd06d773b8035359548c0c9216398e3
Signed-off-by: Patrick Donnelly <pdonnell@redhat.com>
(cherry picked from commit c04ab6f0868a7385e695c85486cf3e7bbdfa9ab5)

22 months agopython-common: drive_selection: fix KeyError when osdspec_affinity is not set 53157/head
Guillaume Abrioux [Wed, 19 Jul 2023 09:27:19 +0000 (09:27 +0000)]
python-common: drive_selection: fix KeyError when osdspec_affinity is not set

When osdspec_affinity is not set, the drive selection code will fail.
This can happen when a device has multiple LVs where some of are used
by Ceph and at least one LV isn't used by Ceph.

Fixes: https://tracker.ceph.com/issues/58946
Signed-off-by: Guillaume Abrioux <gabrioux@ibm.com>
(cherry picked from commit 908f1d17a15a9d4c9bf603aa45e5f246bb0263e7)

22 months agoMerge pull request #51509 from mchangir/wip-59202-pacific
Venky Shankar [Tue, 22 Aug 2023 04:20:51 +0000 (09:50 +0530)]
Merge pull request #51509 from mchangir/wip-59202-pacific

pacific: qa: add subvolume option flavors

Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>
Reviewed-by: Venky Shankar <vshankar@redhat.com>
22 months agoMerge pull request #52979 from k0ste/wip-50915-pacific
Yuri Weinstein [Mon, 21 Aug 2023 16:08:10 +0000 (09:08 -0700)]
Merge pull request #52979 from k0ste/wip-50915-pacific

pacific: mds: fix cpu_profiler asok crash

Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>
22 months agoMerge pull request #52974 from batrick/wip-62421-pacific
Yuri Weinstein [Mon, 21 Aug 2023 16:07:37 +0000 (09:07 -0700)]
Merge pull request #52974 from batrick/wip-62421-pacific

pacific: mds: adjust cap acquisition throttles

Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>
22 months agoMerge pull request #52270 from dparmar18/wip-61841-pacific
Yuri Weinstein [Mon, 21 Aug 2023 16:06:30 +0000 (09:06 -0700)]
Merge pull request #52270 from dparmar18/wip-61841-pacific

pacific: do not evict clients if OSDs are laggy

Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
22 months agomgr/snap_schedule: rephrase log message when pruning 52750/head
Milind Changire [Fri, 9 Jun 2023 11:40:19 +0000 (17:10 +0530)]
mgr/snap_schedule: rephrase log message when pruning

Signed-off-by: Milind Changire <mchangir@redhat.com>
(cherry picked from commit af9dbaf318a9b11e6b5c89ad23b6af91cfb5fdfa)

22 months agodoc: add note about snap-schedule snapshot retention
Milind Changire [Tue, 16 May 2023 07:55:59 +0000 (13:25 +0530)]
doc: add note about snap-schedule snapshot retention

Signed-off-by: Milind Changire <mchangir@redhat.com>
(cherry picked from commit 414ad9619b42d3cdf7e1ceab9a05d1830b63d82d)

22 months agoqa: test user defined number of snaps retention spec
Milind Changire [Mon, 22 May 2023 06:04:31 +0000 (11:34 +0530)]
qa: test user defined number of snaps retention spec

Signed-off-by: Milind Changire <mchangir@redhat.com>
(cherry picked from commit a63ffd40799dd520c934881abea4e805d8dff7fa)

22 months agomgr/snap_schedule: adapt test to new argument list
Jakob Haufe [Mon, 8 May 2023 21:07:33 +0000 (23:07 +0200)]
mgr/snap_schedule: adapt test to new argument list

ca0889635f5f23153b648c77b80223939696f17c introduced a new argument to
get_prune_set, the maximum number of snapshots to ratin.

Adapt test accordingly by providing the default value.

Signed-off-by: Jakob Haufe <sur5r@sur5r.net>
(cherry picked from commit 7c5ad8d2c463f672f6b83a40c12c5110216257b9)

22 months agodoc/cephfs: Add note how mds_max_snaps_per_dir affects snapshot retention
Jakob Haufe [Tue, 16 May 2023 03:10:54 +0000 (08:40 +0530)]
doc/cephfs: Add note how mds_max_snaps_per_dir affects snapshot retention

Signed-off-by: Jakob Haufe <sur5r@sur5r.net>
(cherry picked from commit 2e8af66ed4678775a3f686738c12ac04abfd770e)

22 months agomgr/snap_schedule: Use mds_max_snaps_per_dir as snapshot count limit
Jakob Haufe [Thu, 11 May 2023 07:52:11 +0000 (13:22 +0530)]
mgr/snap_schedule: Use mds_max_snaps_per_dir as snapshot count limit

The module currently hardcodes a limit of 50 snapshots. Use
mds_max_snaps_per_dir instead to make this configurable.

Fixes: https://tracker.ceph.com/issues/59582
Signed-off-by: Jakob Haufe <sur5r@sur5r.net>
(cherry picked from commit dabac4c8dff527ffa5a2c2141e4a6e1896f00f71)

Conflicts:
src/pybind/mgr/snap_schedule/fs/schedule_client.py
- mostly type hinting additions

22 months agoMerge pull request #52753 from mchangir/wip-61793-pacific
Yuri Weinstein [Mon, 21 Aug 2023 15:36:16 +0000 (08:36 -0700)]
Merge pull request #52753 from mchangir/wip-61793-pacific

pacific: mgr/snap_schedule: catch all exceptions for cli

Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>
22 months agoMerge pull request #52552 from cfsnyder/wip-62064-pacific
Yuri Weinstein [Mon, 21 Aug 2023 14:30:53 +0000 (07:30 -0700)]
Merge pull request #52552 from cfsnyder/wip-62064-pacific

pacific: rgw: fix consistency bug with OLH objects

Reviewed-by: Casey Bodley <cbodley@redhat.com>
22 months agoMerge pull request #52878 from idryomov/wip-52913-pacific
Yuri Weinstein [Mon, 21 Aug 2023 14:28:40 +0000 (07:28 -0700)]
Merge pull request #52878 from idryomov/wip-52913-pacific

pacific: rbd-mirror: fix image replayer shut down description on force promote

Reviewed-by: Ramana Raja <rraja@redhat.com>
22 months agoMerge pull request #52625 from nbalacha/wip-62111-pacific
Yuri Weinstein [Mon, 21 Aug 2023 14:27:23 +0000 (07:27 -0700)]
Merge pull request #52625 from nbalacha/wip-62111-pacific

pacific: rbd-mirror: fix race preventing local image deletion

Reviewed-by: Ilya Dryomov <idryomov@redhat.com>
Reviewed-by: Mykola Golub <mgolub@suse.com>
22 months agoMerge pull request #52883 from ajarr/wip-59737-pacific
Yuri Weinstein [Mon, 21 Aug 2023 14:26:14 +0000 (07:26 -0700)]
Merge pull request #52883 from ajarr/wip-59737-pacific

pacific: mgr: store names of modules that register RADOS clients in the MgrMap

Reviewed-by: Ilya Dryomov <idryomov@redhat.com>
22 months agoMerge pull request #51464 from ajarr/wip-59712-pacific
Yuri Weinstein [Mon, 21 Aug 2023 14:25:47 +0000 (07:25 -0700)]
Merge pull request #51464 from ajarr/wip-59712-pacific

pacific:  mgr/rbd_support: fixes related to recover from rados client blocklisting

Reviewed-by: Ilya Dryomov <idryomov@redhat.com>
23 months agorgw: fix/improve test_rgw_versioning.py tests 52552/head
Cory Snyder [Wed, 12 Jul 2023 14:08:07 +0000 (14:08 +0000)]
rgw: fix/improve test_rgw_versioning.py tests

Signed-off-by: Cory Snyder <csnyder@1111systems.com>
(cherry picked from commit aa1f40e80d78ce08a2f51dad6fadf620866d17a3)

23 months agoMerge pull request #52943 from YiteGu/fix-duplicate-onode-miss-statistics
Yuri Weinstein [Thu, 17 Aug 2023 21:15:37 +0000 (14:15 -0700)]
Merge pull request #52943 from YiteGu/fix-duplicate-onode-miss-statistics

pacific: os/bluestore: don't need separate variable to mark hits when lookup oid.

Reviewed-by: Igor Fedotov <ifedotov@suse.com>
23 months agoMerge pull request #51487 from vshankar/tr-59720
Yuri Weinstein [Thu, 17 Aug 2023 16:17:48 +0000 (09:17 -0700)]
Merge pull request #51487 from vshankar/tr-59720

pacific: client: use deep-copy when setting permission during make_request

Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>
23 months agoMerge pull request #52953 from k0ste/wip-62116-pacific
Yuri Weinstein [Thu, 17 Aug 2023 15:36:55 +0000 (08:36 -0700)]
Merge pull request #52953 from k0ste/wip-62116-pacific

pacific: qa: use parallel gzip for compressing logs

Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>
23 months agoMerge pull request #52900 from leonid-s-usov/backport/bulk-data-pool/pacific
Yuri Weinstein [Thu, 17 Aug 2023 15:36:13 +0000 (08:36 -0700)]
Merge pull request #52900 from leonid-s-usov/backport/bulk-data-pool/pacific

pacific: Consider setting "bulk" autoscale pool flag when automatically creating a data pool for CephFS

Reviewed-by: Patrick Donnelly <pdonnell@redhat.com>