1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
|
// -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*-
// vim: ts=8 sw=2 smarttab
/*
* Ceph - scalable distributed file system
*
* Copyright (C) 2013 Inktank, Inc
*
* This is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License version 2.1, as published by the Free Software
* Foundation. See file COPYING.
*
*/
#include <sstream>
#include <stdlib.h>
#include <limits.h>
#include "mon/Monitor.h"
#include "mon/ConfigKeyService.h"
#include "mon/MonitorDBStore.h"
#include "mon/OSDMonitor.h"
#include "common/errno.h"
#include "include/stringify.h"
#include "include/ceph_assert.h" // re-clobber ceph_assert()
#define dout_subsys ceph_subsys_mon
#undef dout_prefix
#define dout_prefix _prefix(_dout, mon, this)
static ostream& _prefix(std::ostream *_dout, const Monitor *mon,
const ConfigKeyService *service) {
return *_dout << "mon." << mon->name << "@" << mon->rank
<< "(" << mon->get_state_name() << ")." << service->get_name()
<< "(" << service->get_epoch() << ") ";
}
const string CONFIG_PREFIX = "mon_config_key";
int ConfigKeyService::store_get(const string &key, bufferlist &bl)
{
return mon->store->get(CONFIG_PREFIX, key, bl);
}
void ConfigKeyService::get_store_prefixes(set<string>& s) const
{
s.insert(CONFIG_PREFIX);
}
void ConfigKeyService::store_put(const string &key, bufferlist &bl, Context *cb)
{
MonitorDBStore::TransactionRef t = paxos->get_pending_transaction();
t->put(CONFIG_PREFIX, key, bl);
if (cb)
paxos->queue_pending_finisher(cb);
paxos->trigger_propose();
}
void ConfigKeyService::store_delete(const string &key, Context *cb)
{
MonitorDBStore::TransactionRef t = paxos->get_pending_transaction();
store_delete(t, key);
if (cb)
paxos->queue_pending_finisher(cb);
paxos->trigger_propose();
}
void ConfigKeyService::store_delete(
MonitorDBStore::TransactionRef t,
const string &key)
{
t->erase(CONFIG_PREFIX, key);
}
bool ConfigKeyService::store_exists(const string &key)
{
return mon->store->exists(CONFIG_PREFIX, key);
}
void ConfigKeyService::store_list(stringstream &ss)
{
KeyValueDB::Iterator iter =
mon->store->get_iterator(CONFIG_PREFIX);
JSONFormatter f(true);
f.open_array_section("keys");
while (iter->valid()) {
string key(iter->key());
f.dump_string("key", key);
iter->next();
}
f.close_section();
f.flush(ss);
}
bool ConfigKeyService::store_has_prefix(const string &prefix)
{
KeyValueDB::Iterator iter =
mon->store->get_iterator(CONFIG_PREFIX);
while (iter->valid()) {
string key(iter->key());
size_t p = key.find(prefix);
if (p != string::npos && p == 0) {
return true;
}
iter->next();
}
return false;
}
static bool is_binary_string(const string& s)
{
for (auto c : s) {
// \n and \t are escaped in JSON; other control characters are not.
if ((c < 0x20 && c != '\n' && c != '\t') || c >= 0x7f) {
return true;
}
}
return false;
}
void ConfigKeyService::store_dump(stringstream &ss, const string& prefix)
{
KeyValueDB::Iterator iter =
mon->store->get_iterator(CONFIG_PREFIX);
dout(10) << __func__ << " prefix '" << prefix << "'" << dendl;
if (prefix.size()) {
iter->lower_bound(prefix);
}
JSONFormatter f(true);
f.open_object_section("config-key store");
while (iter->valid()) {
if (prefix.size() &&
iter->key().find(prefix) != 0) {
break;
}
string s = iter->value().to_str();
if (is_binary_string(s)) {
ostringstream ss;
ss << "<<< binary blob of length " << s.size() << " >>>";
f.dump_string(iter->key().c_str(), ss.str());
} else {
f.dump_string(iter->key().c_str(), s);
}
iter->next();
}
f.close_section();
f.flush(ss);
}
void ConfigKeyService::store_delete_prefix(
MonitorDBStore::TransactionRef t,
const string &prefix)
{
KeyValueDB::Iterator iter =
mon->store->get_iterator(CONFIG_PREFIX);
while (iter->valid()) {
string key(iter->key());
size_t p = key.find(prefix);
if (p != string::npos && p == 0) {
store_delete(t, key);
}
iter->next();
}
}
bool ConfigKeyService::service_dispatch(MonOpRequestRef op)
{
Message *m = op->get_req();
ceph_assert(m != NULL);
dout(10) << __func__ << " " << *m << dendl;
if (!in_quorum()) {
dout(1) << __func__ << " not in quorum -- waiting" << dendl;
paxos->wait_for_readable(op, new Monitor::C_RetryMessage(mon, op));
return false;
}
ceph_assert(m->get_type() == MSG_MON_COMMAND);
MMonCommand *cmd = static_cast<MMonCommand*>(m);
ceph_assert(!cmd->cmd.empty());
int ret = 0;
stringstream ss;
bufferlist rdata;
string prefix;
cmdmap_t cmdmap;
if (!cmdmap_from_json(cmd->cmd, &cmdmap, ss)) {
return false;
}
cmd_getval(g_ceph_context, cmdmap, "prefix", prefix);
string key;
cmd_getval(g_ceph_context, cmdmap, "key", key);
if (prefix == "config-key get") {
ret = store_get(key, rdata);
if (ret < 0) {
ceph_assert(!rdata.length());
ss << "error obtaining '" << key << "': " << cpp_strerror(ret);
goto out;
}
ss << "obtained '" << key << "'";
} else if (prefix == "config-key put" ||
prefix == "config-key set") {
if (!mon->is_leader()) {
mon->forward_request_leader(op);
// we forward the message; so return now.
return true;
}
bufferlist data;
string val;
if (cmd_getval(g_ceph_context, cmdmap, "val", val)) {
// they specified a value in the command instead of a file
data.append(val);
} else if (cmd->get_data_len() > 0) {
// they specified '-i <file>'
data = cmd->get_data();
}
if (data.length() > (size_t) g_conf()->mon_config_key_max_entry_size) {
ret = -EFBIG; // File too large
ss << "error: entry size limited to "
<< g_conf()->mon_config_key_max_entry_size << " bytes. "
<< "Use 'mon config key max entry size' to manually adjust";
goto out;
}
std::string mgr_prefix = "mgr/";
if (key.size() >= mgr_prefix.size() &&
key.substr(0, mgr_prefix.size()) == mgr_prefix) {
// In <= mimic, we used config-key for mgr module configuration,
// and we bring values forward in an upgrade, but subsequent
// `set` operations will not be picked up. Warn user about this.
ss << "WARNING: it looks like you might be trying to set a ceph-mgr "
"module configuration key. Since Ceph 13.0.0 (Mimic), mgr module "
"configuration is done with `config set`, and new values "
"set using `config-key set` will be ignored.\n";
}
ss << "set " << key;
// we'll reply to the message once the proposal has been handled
store_put(key, data,
new Monitor::C_Command(mon, op, 0, ss.str(), 0));
// return for now; we'll put the message once it's done.
return true;
} else if (prefix == "config-key del" ||
prefix == "config-key rm") {
if (!mon->is_leader()) {
mon->forward_request_leader(op);
return true;
}
if (!store_exists(key)) {
ret = 0;
ss << "no such key '" << key << "'";
goto out;
}
store_delete(key, new Monitor::C_Command(mon, op, 0, "key deleted", 0));
// return for now; we'll put the message once it's done
return true;
} else if (prefix == "config-key exists") {
bool exists = store_exists(key);
ss << "key '" << key << "'";
if (exists) {
ss << " exists";
ret = 0;
} else {
ss << " doesn't exist";
ret = -ENOENT;
}
} else if (prefix == "config-key list" ||
prefix == "config-key ls") {
stringstream tmp_ss;
store_list(tmp_ss);
rdata.append(tmp_ss);
ret = 0;
} else if (prefix == "config-key dump") {
string prefix;
cmd_getval(g_ceph_context, cmdmap, "key", prefix);
stringstream tmp_ss;
store_dump(tmp_ss, prefix);
rdata.append(tmp_ss);
ret = 0;
}
out:
if (!cmd->get_source().is_mon()) {
string rs = ss.str();
mon->reply_command(op, ret, rs, rdata, 0);
}
return (ret == 0);
}
string _get_dmcrypt_prefix(const uuid_d& uuid, const string k)
{
return "dm-crypt/osd/" + stringify(uuid) + "/" + k;
}
int ConfigKeyService::validate_osd_destroy(
const int32_t id,
const uuid_d& uuid)
{
string dmcrypt_prefix = _get_dmcrypt_prefix(uuid, "");
string daemon_prefix =
"daemon-private/osd." + stringify(id) + "/";
if (!store_has_prefix(dmcrypt_prefix) &&
!store_has_prefix(daemon_prefix)) {
return -ENOENT;
}
return 0;
}
void ConfigKeyService::do_osd_destroy(int32_t id, uuid_d& uuid)
{
string dmcrypt_prefix = _get_dmcrypt_prefix(uuid, "");
string daemon_prefix =
"daemon-private/osd." + stringify(id) + "/";
MonitorDBStore::TransactionRef t = paxos->get_pending_transaction();
for (auto p : { dmcrypt_prefix, daemon_prefix }) {
store_delete_prefix(t, p);
}
paxos->trigger_propose();
}
int ConfigKeyService::validate_osd_new(
const uuid_d& uuid,
const string& dmcrypt_key,
stringstream& ss)
{
string dmcrypt_prefix = _get_dmcrypt_prefix(uuid, "luks");
bufferlist value;
value.append(dmcrypt_key);
if (store_exists(dmcrypt_prefix)) {
bufferlist existing_value;
int err = store_get(dmcrypt_prefix, existing_value);
if (err < 0) {
dout(10) << __func__ << " unable to get dm-crypt key from store (r = "
<< err << ")" << dendl;
return err;
}
if (existing_value.contents_equal(value)) {
// both values match; this will be an idempotent op.
return EEXIST;
}
ss << "dm-crypt key already exists and does not match";
return -EEXIST;
}
return 0;
}
void ConfigKeyService::do_osd_new(
const uuid_d& uuid,
const string& dmcrypt_key)
{
ceph_assert(paxos->is_plugged());
string dmcrypt_key_prefix = _get_dmcrypt_prefix(uuid, "luks");
bufferlist dmcrypt_key_value;
dmcrypt_key_value.append(dmcrypt_key);
// store_put() will call trigger_propose
store_put(dmcrypt_key_prefix, dmcrypt_key_value, nullptr);
}
|