1 // -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*-
2 // vim: ts=8 sw=2 smarttab ft=cpp
4 #include "rgw_common.h"
5 #include "rgw_rest_client.h"
6 #include "rgw_auth_s3.h"
7 #include "rgw_http_errors.h"
10 #include "common/armor.h"
11 #include "common/strtol.h"
12 #include "include/str_list.h"
13 #include "rgw_crypt_sanitize.h"
15 #define dout_context g_ceph_context
16 #define dout_subsys ceph_subsys_rgw
18 int RGWHTTPSimpleRequest::get_status()
20 int retcode
= get_req_retcode();
27 int RGWHTTPSimpleRequest::handle_header(const string
& name
, const string
& val
)
29 if (name
== "CONTENT_LENGTH") {
31 long len
= strict_strtol(val
.c_str(), 10, &err
);
33 ldout(cct
, 0) << "ERROR: failed converting content length (" << val
<< ") to int " << dendl
;
43 int RGWHTTPSimpleRequest::receive_header(void *ptr
, size_t len
)
45 unique_lock
guard(out_headers_lock
);
49 char *s
= (char *)ptr
, *end
= (char *)ptr
+ len
;
51 ldout(cct
, 10) << "receive_http_header" << dendl
;
60 ldout(cct
, 10) << "received header:" << line
<< dendl
;
61 // TODO: fill whatever data required here
63 char *tok
= strsep(&l
, " \t:");
68 if (strcmp(tok
, "HTTP") == 0 || strncmp(tok
, "HTTP/", 5) == 0) {
69 http_status
= atoi(l
);
70 if (http_status
== 100) /* 100-continue response */
72 status
= rgw_http_error_to_errno(http_status
);
74 /* convert header field name to upper case */
78 for (i
= 0; i
< len
&& *src
; ++i
, ++src
) {
84 buf
[i
] = toupper(*src
);
89 int r
= handle_header(buf
, l
);
101 static void get_new_date_str(string
& date_str
)
103 date_str
= rgw_to_asctime(ceph_clock_now());
106 static void get_gmt_date_str(string
& date_str
)
108 auto now_time
= ceph::real_clock::now();
109 time_t rawtime
= ceph::real_clock::to_time_t(now_time
);
114 gmtime_r(&rawtime
, &timeInfo
);
115 strftime(buffer
, sizeof(buffer
), "%a, %d %b %Y %H:%M:%S %z", &timeInfo
);
120 int RGWRESTSimpleRequest::execute(RGWAccessKey
& key
, const char *_method
, const char *resource
)
123 string new_url
= url
;
124 string new_resource
= resource
;
126 if (new_url
[new_url
.size() - 1] == '/' && resource
[0] == '/') {
127 new_url
= new_url
.substr(0, new_url
.size() - 1);
128 } else if (resource
[0] != '/') {
130 new_resource
.append(resource
);
132 new_url
.append(new_resource
);
136 get_new_date_str(date_str
);
137 headers
.push_back(pair
<string
, string
>("HTTP_DATE", date_str
));
139 string canonical_header
;
141 map
<string
, string
> sub_resources
;
143 rgw_create_s3_canonical_header(method
.c_str(), NULL
, NULL
, date_str
.c_str(),
144 meta_map
, meta_map
, url
.c_str(), sub_resources
,
149 digest
= rgw::auth::s3::get_v2_signature(cct
, key
.key
, canonical_header
);
154 string auth_hdr
= "AWS " + key
.id
+ ":" + digest
;
156 ldout(cct
, 15) << "generated auth header: " << auth_hdr
<< dendl
;
158 headers
.push_back(pair
<string
, string
>("AUTHORIZATION", auth_hdr
));
159 int r
= process(null_yield
);
166 int RGWHTTPSimpleRequest::send_data(void *ptr
, size_t len
, bool* pause
)
171 if (len
> send_iter
->get_remaining())
172 len
= send_iter
->get_remaining();
174 send_iter
->copy(len
, (char *)ptr
);
179 int RGWHTTPSimpleRequest::receive_data(void *ptr
, size_t len
, bool *pause
)
181 size_t cp_len
, left_len
;
183 left_len
= max_response
> response
.length() ? (max_response
- response
.length()) : 0;
185 return 0; /* don't read extra data */
187 cp_len
= (len
> left_len
) ? left_len
: len
;
188 bufferptr
p((char *)ptr
, cp_len
);
195 static void append_param(string
& dest
, const string
& name
, const string
& val
)
203 url_encode(name
, url_name
);
204 dest
.append(url_name
);
208 url_encode(val
, url_val
);
210 dest
.append(url_val
);
214 static void do_get_params_str(const param_vec_t
& params
, map
<string
, string
>& extra_args
, string
& dest
)
216 map
<string
, string
>::iterator miter
;
217 for (miter
= extra_args
.begin(); miter
!= extra_args
.end(); ++miter
) {
218 append_param(dest
, miter
->first
, miter
->second
);
220 for (auto iter
= params
.begin(); iter
!= params
.end(); ++iter
) {
221 append_param(dest
, iter
->first
, iter
->second
);
225 void RGWHTTPSimpleRequest::get_params_str(map
<string
, string
>& extra_args
, string
& dest
)
227 do_get_params_str(params
, extra_args
, dest
);
230 void RGWHTTPSimpleRequest::get_out_headers(map
<string
, string
> *pheaders
)
232 unique_lock
guard(out_headers_lock
);
233 pheaders
->swap(out_headers
);
237 static int sign_request(CephContext
*cct
, RGWAccessKey
& key
, RGWEnv
& env
, req_info
& info
)
239 /* don't sign if no key is provided */
240 if (key
.key
.empty()) {
244 if (cct
->_conf
->subsys
.should_gather
<ceph_subsys_rgw
, 20>()) {
245 for (const auto& i
: env
.get_map()) {
246 ldout(cct
, 20) << "> " << i
.first
<< " -> " << rgw::crypt_sanitize::x_meta_map
{i
.first
, i
.second
} << dendl
;
250 string canonical_header
;
251 if (!rgw_create_s3_canonical_header(info
, NULL
, canonical_header
, false)) {
252 ldout(cct
, 0) << "failed to create canonical s3 header" << dendl
;
256 ldout(cct
, 10) << "generated canonical header: " << canonical_header
<< dendl
;
260 digest
= rgw::auth::s3::get_v2_signature(cct
, key
.key
, canonical_header
);
265 string auth_hdr
= "AWS " + key
.id
+ ":" + digest
;
266 ldout(cct
, 15) << "generated auth header: " << auth_hdr
<< dendl
;
268 env
.set("AUTHORIZATION", auth_hdr
);
273 int RGWRESTSimpleRequest::forward_request(RGWAccessKey
& key
, req_info
& info
, size_t max_response
, bufferlist
*inbl
, bufferlist
*outbl
)
277 get_new_date_str(date_str
);
280 req_info
new_info(cct
, &new_env
);
281 new_info
.rebuild_from(info
);
283 new_env
.set("HTTP_DATE", date_str
.c_str());
285 int ret
= sign_request(cct
, key
, new_env
, new_info
);
287 ldout(cct
, 0) << "ERROR: failed to sign request" << dendl
;
291 for (const auto& kv
: new_env
.get_map()) {
292 headers
.emplace_back(kv
);
295 meta_map_t
& meta_map
= new_info
.x_meta_map
;
296 for (const auto& kv
: meta_map
) {
297 headers
.emplace_back(kv
);
301 get_params_str(info
.args
.get_params(), params_str
);
303 string new_url
= url
;
304 string
& resource
= new_info
.request_uri
;
305 string new_resource
= resource
;
306 if (new_url
[new_url
.size() - 1] == '/' && resource
[0] == '/') {
307 new_url
= new_url
.substr(0, new_url
.size() - 1);
308 } else if (resource
[0] != '/') {
310 new_resource
.append(resource
);
312 new_url
.append(new_resource
+ params_str
);
314 bufferlist::iterator bliter
;
317 bliter
= inbl
->begin();
320 set_send_length(inbl
->length());
323 method
= new_info
.method
;
326 int r
= process(null_yield
);
329 // curl_easy has errored, generally means the service is not available
330 r
= -ERR_SERVICE_UNAVAILABLE
;
335 response
.append((char)0); /* NULL terminate response */
338 outbl
->claim(response
);
344 class RGWRESTStreamOutCB
: public RGWGetDataCB
{
345 RGWRESTStreamS3PutObj
*req
;
347 explicit RGWRESTStreamOutCB(RGWRESTStreamS3PutObj
*_req
) : req(_req
) {}
348 int handle_data(bufferlist
& bl
, off_t bl_ofs
, off_t bl_len
) override
; /* callback for object iteration when sending data */
351 int RGWRESTStreamOutCB::handle_data(bufferlist
& bl
, off_t bl_ofs
, off_t bl_len
)
353 dout(20) << "RGWRESTStreamOutCB::handle_data bl.length()=" << bl
.length() << " bl_ofs=" << bl_ofs
<< " bl_len=" << bl_len
<< dendl
;
354 if (!bl_ofs
&& bl_len
== bl
.length()) {
355 req
->add_send_data(bl
);
359 bufferptr
bp(bl
.c_str() + bl_ofs
, bl_len
);
361 new_bl
.push_back(bp
);
363 req
->add_send_data(new_bl
);
367 RGWRESTStreamS3PutObj::~RGWRESTStreamS3PutObj()
372 static void grants_by_type_add_one_grant(map
<int, string
>& grants_by_type
, int perm
, ACLGrant
& grant
)
374 string
& s
= grants_by_type
[perm
];
380 ACLGranteeType
& type
= grant
.get_type();
381 switch (type
.get_type()) {
385 case ACL_TYPE_EMAIL_USER
:
386 id_type_str
= "emailAddress";
393 s
.append(id_type_str
+ "=\"" + id
.to_str() + "\"");
396 struct grant_type_to_header
{
401 struct grant_type_to_header grants_headers_def
[] = {
402 { RGW_PERM_FULL_CONTROL
, "x-amz-grant-full-control"},
403 { RGW_PERM_READ
, "x-amz-grant-read"},
404 { RGW_PERM_WRITE
, "x-amz-grant-write"},
405 { RGW_PERM_READ_ACP
, "x-amz-grant-read-acp"},
406 { RGW_PERM_WRITE_ACP
, "x-amz-grant-write-acp"},
410 static bool grants_by_type_check_perm(map
<int, string
>& grants_by_type
, int perm
, ACLGrant
& grant
, int check_perm
)
412 if ((perm
& check_perm
) == check_perm
) {
413 grants_by_type_add_one_grant(grants_by_type
, check_perm
, grant
);
419 static void grants_by_type_add_perm(map
<int, string
>& grants_by_type
, int perm
, ACLGrant
& grant
)
421 struct grant_type_to_header
*t
;
423 for (t
= grants_headers_def
; t
->header
; t
++) {
424 if (grants_by_type_check_perm(grants_by_type
, perm
, grant
, t
->type
))
429 static void add_grants_headers(map
<int, string
>& grants
, RGWEnv
& env
, meta_map_t
& meta_map
)
431 struct grant_type_to_header
*t
;
433 for (t
= grants_headers_def
; t
->header
; t
++) {
434 map
<int, string
>::iterator iter
= grants
.find(t
->type
);
435 if (iter
!= grants
.end()) {
436 env
.set(t
->header
,iter
->second
);
437 meta_map
[t
->header
] = iter
->second
;
442 void RGWRESTGenerateHTTPHeaders::init(const string
& _method
, const string
& _url
, const string
& resource
, const param_vec_t
& params
)
445 map
<string
, string
>& args
= new_info
->args
.get_params();
446 do_get_params_str(params
, args
, params_str
);
448 /* merge params with extra args so that we can sign correctly */
449 for (auto iter
= params
.begin(); iter
!= params
.end(); ++iter
) {
450 new_info
->args
.append(iter
->first
, iter
->second
);
453 url
= _url
+ resource
+ params_str
;
456 get_gmt_date_str(date_str
);
458 new_env
->set("HTTP_DATE", date_str
.c_str());
461 new_info
->method
= method
.c_str();
463 new_info
->script_uri
= "/";
464 new_info
->script_uri
.append(resource
);
465 new_info
->request_uri
= new_info
->script_uri
;
468 static bool is_x_amz(const string
& s
) {
469 return boost::algorithm::starts_with(s
, "x-amz-");
472 void RGWRESTGenerateHTTPHeaders::set_extra_headers(const map
<string
, string
>& extra_headers
)
474 for (auto iter
: extra_headers
) {
475 const string
& name
= lowercase_dash_http_attr(iter
.first
);
476 new_env
->set(name
, iter
.second
.c_str());
477 if (is_x_amz(name
)) {
478 new_info
->x_meta_map
[name
] = iter
.second
;
483 int RGWRESTGenerateHTTPHeaders::set_obj_attrs(map
<string
, bufferlist
>& rgw_attrs
)
485 map
<string
, string
> new_attrs
;
487 /* merge send headers */
488 for (auto& attr
: rgw_attrs
) {
489 bufferlist
& bl
= attr
.second
;
490 const string
& name
= attr
.first
;
491 string val
= bl
.c_str();
492 if (name
.compare(0, sizeof(RGW_ATTR_META_PREFIX
) - 1, RGW_ATTR_META_PREFIX
) == 0) {
493 string header_name
= RGW_AMZ_META_PREFIX
;
494 header_name
.append(name
.substr(sizeof(RGW_ATTR_META_PREFIX
) - 1));
495 new_attrs
[header_name
] = val
;
499 RGWAccessControlPolicy policy
;
500 int ret
= rgw_policy_from_attrset(cct
, rgw_attrs
, &policy
);
502 ldout(cct
, 0) << "ERROR: couldn't get policy ret=" << ret
<< dendl
;
506 set_http_attrs(new_attrs
);
512 static std::set
<string
> keep_headers
= { "content-type",
514 "content-disposition",
515 "content-language" };
517 void RGWRESTGenerateHTTPHeaders::set_http_attrs(const map
<string
, string
>& http_attrs
)
519 /* merge send headers */
520 for (auto& attr
: http_attrs
) {
521 const string
& val
= attr
.second
;
522 const string
& name
= lowercase_dash_http_attr(attr
.first
);
523 if (is_x_amz(name
)) {
524 new_env
->set(name
, val
);
525 new_info
->x_meta_map
[name
] = val
;
527 new_env
->set(attr
.first
, val
); /* Ugh, using the uppercase representation,
528 as the signing function calls info.env.get("CONTENT_TYPE").
529 This needs to be cleaned up! */
534 void RGWRESTGenerateHTTPHeaders::set_policy(RGWAccessControlPolicy
& policy
)
536 /* update acl headers */
537 RGWAccessControlList
& acl
= policy
.get_acl();
538 multimap
<string
, ACLGrant
>& grant_map
= acl
.get_grant_map();
539 multimap
<string
, ACLGrant
>::iterator giter
;
540 map
<int, string
> grants_by_type
;
541 for (giter
= grant_map
.begin(); giter
!= grant_map
.end(); ++giter
) {
542 ACLGrant
& grant
= giter
->second
;
543 ACLPermission
& perm
= grant
.get_permission();
544 grants_by_type_add_perm(grants_by_type
, perm
.get_permissions(), grant
);
546 add_grants_headers(grants_by_type
, *new_env
, new_info
->x_meta_map
);
549 int RGWRESTGenerateHTTPHeaders::sign(RGWAccessKey
& key
)
551 int ret
= sign_request(cct
, key
, *new_env
, *new_info
);
553 ldout(cct
, 0) << "ERROR: failed to sign request" << dendl
;
560 void RGWRESTStreamS3PutObj::send_init(rgw_obj
& obj
)
564 string new_url
= url
;
566 if (host_style
== VirtualStyle
) {
567 resource_str
= obj
.get_oid();
568 new_url
= obj
.bucket
.name
+ "." + new_url
;
570 resource_str
= obj
.bucket
.name
+ "/" + obj
.get_oid();
573 //do not encode slash in object key name
574 url_encode(resource_str
, resource
, false);
576 if (new_url
[new_url
.size() - 1] != '/')
580 headers_gen
.init(method
, new_url
, resource
, params
);
582 url
= headers_gen
.get_url();
585 int RGWRESTStreamS3PutObj::send_ready(RGWAccessKey
& key
, map
<string
, bufferlist
>& rgw_attrs
, bool send
)
587 headers_gen
.set_obj_attrs(rgw_attrs
);
589 return send_ready(key
, send
);
592 int RGWRESTStreamS3PutObj::send_ready(RGWAccessKey
& key
, const map
<string
, string
>& http_attrs
,
593 RGWAccessControlPolicy
& policy
, bool send
)
595 headers_gen
.set_http_attrs(http_attrs
);
596 headers_gen
.set_policy(policy
);
598 return send_ready(key
, send
);
601 int RGWRESTStreamS3PutObj::send_ready(RGWAccessKey
& key
, bool send
)
603 headers_gen
.sign(key
);
605 for (const auto& kv
: new_env
.get_map()) {
606 headers
.emplace_back(kv
);
609 out_cb
= new RGWRESTStreamOutCB(this);
612 int r
= RGWHTTP::send(this);
620 int RGWRESTStreamS3PutObj::put_obj_init(RGWAccessKey
& key
, rgw_obj
& obj
, uint64_t obj_size
, map
<string
, bufferlist
>& attrs
, bool send
)
623 return send_ready(key
, attrs
, send
);
626 void set_str_from_headers(map
<string
, string
>& out_headers
, const string
& header_name
, string
& str
)
628 map
<string
, string
>::iterator iter
= out_headers
.find(header_name
);
629 if (iter
!= out_headers
.end()) {
636 static int parse_rgwx_mtime(CephContext
*cct
, const string
& s
, ceph::real_time
*rt
)
641 get_str_vec(s
, ".", vec
);
647 long secs
= strict_strtol(vec
[0].c_str(), 10, &err
);
650 ldout(cct
, 0) << "ERROR: failed converting mtime (" << s
<< ") to real_time " << dendl
;
654 if (vec
.size() > 1) {
655 nsecs
= strict_strtol(vec
[1].c_str(), 10, &err
);
657 ldout(cct
, 0) << "ERROR: failed converting mtime (" << s
<< ") to real_time " << dendl
;
662 *rt
= utime_t(secs
, nsecs
).to_real_time();
667 static void send_prepare_convert(const rgw_obj
& obj
, string
*resource
)
669 string urlsafe_bucket
, urlsafe_object
;
670 url_encode(obj
.bucket
.get_key(':', 0), urlsafe_bucket
);
671 url_encode(obj
.key
.name
, urlsafe_object
);
672 *resource
= urlsafe_bucket
+ "/" + urlsafe_object
;
675 int RGWRESTStreamRWRequest::send_request(RGWAccessKey
& key
, map
<string
, string
>& extra_headers
, const rgw_obj
& obj
, RGWHTTPManager
*mgr
)
678 send_prepare_convert(obj
, &resource
);
680 return send_request(&key
, extra_headers
, resource
, mgr
);
683 int RGWRESTStreamRWRequest::send_prepare(RGWAccessKey
& key
, map
<string
, string
>& extra_headers
, const rgw_obj
& obj
)
686 send_prepare_convert(obj
, &resource
);
688 return do_send_prepare(&key
, extra_headers
, resource
);
691 int RGWRESTStreamRWRequest::send_prepare(RGWAccessKey
*key
, map
<string
, string
>& extra_headers
, const string
& resource
,
692 bufferlist
*send_data
)
695 //do not encode slash
696 url_encode(resource
, new_resource
, false);
698 return do_send_prepare(key
, extra_headers
, new_resource
, send_data
);
701 int RGWRESTStreamRWRequest::do_send_prepare(RGWAccessKey
*key
, map
<string
, string
>& extra_headers
, const string
& resource
,
702 bufferlist
*send_data
)
704 string new_url
= url
;
705 if (new_url
[new_url
.size() - 1] != '/')
709 req_info
new_info(cct
, &new_env
);
713 string old_resource
= resource
;
715 if (resource
[0] == '/') {
716 new_resource
= resource
.substr(1);
718 new_resource
= resource
;
721 size_t pos
= new_resource
.find("/");
722 bucket_name
= new_resource
.substr(0, pos
);
724 //when dest is a bucket with out other params, uri should end up with '/'
725 if(pos
== string::npos
&& params
.size() == 0 && host_style
== VirtualStyle
) {
726 new_resource
.append("/");
729 if (host_style
== VirtualStyle
) {
730 new_url
= bucket_name
+ "." + new_url
;
731 if(pos
== string::npos
) {
734 new_resource
= new_resource
.substr(pos
+1);
738 RGWRESTGenerateHTTPHeaders
headers_gen(cct
, &new_env
, &new_info
);
740 headers_gen
.init(method
, new_url
, new_resource
, params
);
742 headers_gen
.set_http_attrs(extra_headers
);
746 new_info
.init_meta_info(nullptr);
749 int ret
= headers_gen
.sign(*key
);
751 ldout(cct
, 0) << "ERROR: failed to sign request" << dendl
;
756 for (const auto& kv
: new_env
.get_map()) {
757 headers
.emplace_back(kv
);
761 set_send_length(send_data
->length());
762 set_outbl(*send_data
);
763 set_send_data_hint(true);
767 method
= new_info
.method
;
768 url
= headers_gen
.get_url();
773 int RGWRESTStreamRWRequest::send_request(RGWAccessKey
*key
, map
<string
, string
>& extra_headers
, const string
& resource
,
774 RGWHTTPManager
*mgr
, bufferlist
*send_data
)
776 int ret
= send_prepare(key
, extra_headers
, resource
, send_data
);
785 int RGWRESTStreamRWRequest::send(RGWHTTPManager
*mgr
)
788 return RGWHTTP::send(this);
791 int r
= mgr
->add_request(this);
798 int RGWRESTStreamRWRequest::complete_request(string
*etag
,
801 map
<string
, string
> *pattrs
,
802 map
<string
, string
> *pheaders
)
804 int ret
= wait(null_yield
);
809 unique_lock
guard(out_headers_lock
);
812 set_str_from_headers(out_headers
, "ETAG", *etag
);
817 set_str_from_headers(out_headers
, "RGWX_MTIME", mtime_str
);
818 if (!mtime_str
.empty()) {
819 int ret
= parse_rgwx_mtime(cct
, mtime_str
, mtime
);
824 *mtime
= real_time();
829 set_str_from_headers(out_headers
, "RGWX_OBJECT_SIZE", size_str
);
831 *psize
= strict_strtoll(size_str
.c_str(), 10, &err
);
833 ldout(cct
, 0) << "ERROR: failed parsing embedded metadata object size (" << size_str
<< ") to int " << dendl
;
839 for (auto iter
= out_headers
.begin(); pattrs
&& iter
!= out_headers
.end(); ++iter
) {
840 const string
& attr_name
= iter
->first
;
841 if (attr_name
.compare(0, sizeof(RGW_HTTP_RGWX_ATTR_PREFIX
) - 1, RGW_HTTP_RGWX_ATTR_PREFIX
) == 0) {
842 string name
= attr_name
.substr(sizeof(RGW_HTTP_RGWX_ATTR_PREFIX
) - 1);
843 const char *src
= name
.c_str();
844 char buf
[name
.size() + 1];
846 for (; *src
; ++src
, ++dest
) {
852 *dest
= tolower(*src
);
856 (*pattrs
)[buf
] = iter
->second
;
861 *pheaders
= std::move(out_headers
);
866 int RGWHTTPStreamRWRequest::handle_header(const string
& name
, const string
& val
)
868 if (name
== "RGWX_EMBEDDED_METADATA_LEN") {
870 long len
= strict_strtol(val
.c_str(), 10, &err
);
872 ldout(cct
, 0) << "ERROR: failed converting embedded metadata len (" << val
<< ") to int " << dendl
;
876 cb
->set_extra_data_len(len
);
881 int RGWHTTPStreamRWRequest::receive_data(void *ptr
, size_t len
, bool *pause
)
883 size_t orig_len
= len
;
886 in_data
.append((const char *)ptr
, len
);
888 size_t orig_in_data_len
= in_data
.length();
890 int ret
= cb
->handle_data(in_data
, pause
);
897 ceph_assert(in_data
.length() <= orig_in_data_len
);
900 size_t left_to_read
= orig_in_data_len
- len
;
901 if (in_data
.length() > left_to_read
) {
902 in_data
.splice(0, in_data
.length() - left_to_read
, &bl
);
910 void RGWHTTPStreamRWRequest::set_stream_write(bool s
) {
911 std::lock_guard wl
{write_lock
};
915 void RGWHTTPStreamRWRequest::unpause_receive()
917 std::lock_guard req_locker
{get_req_lock()};
919 _set_read_paused(false);
923 void RGWHTTPStreamRWRequest::add_send_data(bufferlist
& bl
)
925 std::scoped_lock locker
{get_req_lock(), write_lock
};
926 outbl
.claim_append(bl
);
927 _set_write_paused(false);
930 uint64_t RGWHTTPStreamRWRequest::get_pending_send_size()
932 std::lock_guard wl
{write_lock
};
933 return outbl
.length();
936 void RGWHTTPStreamRWRequest::finish_write()
938 std::scoped_lock locker
{get_req_lock(), write_lock
};
939 write_stream_complete
= true;
940 _set_write_paused(false);
943 int RGWHTTPStreamRWRequest::send_data(void *ptr
, size_t len
, bool *pause
)
948 std::lock_guard wl
{write_lock
};
950 if (outbl
.length() == 0) {
951 if ((stream_writes
&& !write_stream_complete
) ||
952 (write_ofs
< send_len
)) {
958 len
= std::min(len
, (size_t)outbl
.length());
961 outbl
.splice(0, len
, &bl
);
962 send_size
= bl
.length();
964 memcpy(ptr
, bl
.c_str(), send_size
);
965 write_ofs
+= send_size
;
968 out_len
= outbl
.length();
970 /* don't need to be under write_lock here, avoid deadlocks in case notify callback
972 if (write_drain_cb
) {
973 write_drain_cb
->notify(out_len
);
978 class StreamIntoBufferlist
: public RGWGetDataCB
{
981 explicit StreamIntoBufferlist(bufferlist
& _bl
) : bl(_bl
) {}
982 int handle_data(bufferlist
& inbl
, off_t bl_ofs
, off_t bl_len
) override
{
983 bl
.claim_append(inbl
);