summaryrefslogtreecommitdiffstats
path: root/src/mds/MDSAuthCaps.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* mds/MDSAuthCaps: parse and enforce network restrictionSage Weil2018-08-131-2/+16
| | | | Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCaps: pass addr to is_capableSage Weil2018-08-131-1/+2
| | | | Signed-off-by: Sage Weil <sage@redhat.com>
* mds: add MAY_SNAPSHOT in MDSAuthCapsYan, Zheng2018-06-191-20/+41
| | | | | | | | For controlling whether a client is allowed to create or delete snapshots Fixes: http://tracker.ceph.com/issues/24284 Signed-off-by: "Yan, Zheng" <zyan@redhat.com>
* src: Added const references to various function parametersWilson E. Alvarez2018-04-061-2/+2
| | | | | | | Added const references to various function parameters in order to avoid copying data unnecessarily and enhancing performance Signed-off-by: Wilson E. Alvarez <wilson.e.alvarez1@gmail.com>
* mds: convert to allocator agnostic string_viewPatrick Donnelly2018-02-071-7/+9
| | | | | | This is necessary to allow many interfaces to take mempool allocated strings. Signed-off-by: Patrick Donnelly <pdonnell@redhat.com>
* mds: extend 'p' auth cap to cover all vxattr stuffJohn Spray2017-03-081-7/+7
| | | | | Fixes: http://tracker.ceph.com/issues/19075 Signed-off-by: John Spray <john.spray@redhat.com>
* mds: pass full gid list to MDSAuthCap checks, when presentGreg Farnum2016-09-221-3/+4
| | | | Signed-off-by: Greg Farnum <gfarnum@redhat.com>
* make ctors with one argument explicitDanny Al-Gaaf2016-01-291-3/+3
| | | | | | | Use explicit keyword for constructors with one argument to prevent implicit usage as conversion functions. Signed-off-by: Danny Al-Gaaf <danny.al-gaaf@bisect.de>
* mds: add docstring for MDSAuthCaps::path_capableJohn Spray2016-01-051-0/+6
| | | | Signed-off-by: John Spray <john.spray@redhat.com>
* mds: add MDSAuthCaps.maybe_capable(path)John Spray2016-01-051-0/+3
| | | | | | | | | To allow us to query whether a client is potentially capable of accessing a particular path, ignoring uids/gids (used to validate the client's claims about its mounted root) Signed-off-by: John Spray <john.spray@redhat.com>
* mds: add MAY_SET_POOL in MDSAuthCapsJohn Spray2015-11-131-3/+13
| | | | | | | For controlling whether a client is allowed to modify the pool field in file/dir layouts. Signed-off-by: John Spray <john.spray@redhat.com>
* mds: drop MAY_CREATESage Weil2015-10-011-1/+0
| | | | | | | | The check is a no-op. We already verify the uid/gid combo is valid and that the dir is writeable with MAY_WRITE. The new file is always set to the caller uid:gid. Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCap: verify the caller_gid is validSage Weil2015-10-011-1/+5
| | | | | | Verify both the caller uid and gid are a match for the given rule. Signed-off-by: Sage Weil <sage@redhat.com>
* mds: fix chown/chgrp check and testsSage Weil2015-10-011-1/+2
| | | | Signed-off-by: Sage Weil <sage@redhat.com>
* mds/Server: add chown and chgrp check access to setattrNishtha Rai2015-10-011-1/+3
|
* MDSAuthCaps: validate create accessNishtha Rai2015-10-011-1/+2
| | | | Signed-off-by: Nishtha Rai <nishtha3rai@gmail.com>
* mds/MDSAuthCaps: fix allow_allSage Weil2015-10-011-1/+1
| | | | | | Empty path is '', not '/'. Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCaps: add cct for debug contextSage Weil2015-10-011-3/+11
| | | | | signed-off-by: Nishtha Rai <nishtha3rai@gmail.com> Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCaps: normalize path, drop useless constant.Sage Weil2015-10-011-8/+13
| | | | | | | Use an empty string for no path--this is more efficient. This generalizes to losing any leading '/' character. Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCaps: pass down inode uid.gid and modeSage Weil2015-10-011-1/+3
| | | | | | We will need this to evaluate the unix permissions. Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCap: fix uid and gid typesSage Weil2015-10-011-7/+8
| | | | | | | int64_t for uid, so we can do a negative "none" value. gid_t (uint32_t) for gid. Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCaps: cosmeticSage Weil2015-10-011-4/+2
| | | | Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCaps: use bitmask for is_capable()Sage Weil2015-10-011-3/+8
| | | | Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCap: fix path matchSage Weil2015-10-011-6/+1
| | | | Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCaps: move allows() into MDSCapSpecSage Weil2015-10-011-0/+9
| | | | | | Also, fix this so that 'any' implies that we can read or write. Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCaps: parse optional gid listSage Weil2015-10-011-4/+8
| | | | Signed-off-by: Sage Weil <sage@redhat.com>
* mds/MDSAuthCaps: whitespaceSage Weil2015-10-011-15/+23
| | | | Signed-off-by: Sage Weil <sage@redhat.com>
* mds: MDSAuthCaps: init "read" param in default constructorGreg Farnum2014-10-091-1/+1
| | | | | | | CID 1244228: Uninitialized scalar field (UNINIT_CTOR) /mds/MDSAuthCaps.h: 29 in MDSCapSpec::MDSCapSpec()() Signed-off-by: Greg Farnum <greg@inktank.com>
* mds: fix MDSAuthCap when cephx is disabledJohn Spray2014-10-081-0/+1
| | | | Signed-off-by: John Spray <john.spray@redhat.com>
* mds: introduce MDS auth capsJohn Spray2014-10-081-0/+86
Signed-off-by: John Spray <john.spray@redhat.com>