1 // -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*-
2 // vim: ts=8 sw=2 smarttab ft=cpp
4 #include "rgw_common.h"
5 #include "rgw_rest_client.h"
6 #include "rgw_auth_s3.h"
7 #include "rgw_http_errors.h"
9 #include "common/armor.h"
10 #include "common/strtol.h"
11 #include "include/str_list.h"
12 #include "rgw_crypt_sanitize.h"
14 #define dout_context g_ceph_context
15 #define dout_subsys ceph_subsys_rgw
17 int RGWHTTPSimpleRequest::get_status()
19 int retcode
= get_req_retcode();
26 int RGWHTTPSimpleRequest::handle_header(const string
& name
, const string
& val
)
28 if (name
== "CONTENT_LENGTH") {
30 long len
= strict_strtol(val
.c_str(), 10, &err
);
32 ldout(cct
, 0) << "ERROR: failed converting content length (" << val
<< ") to int " << dendl
;
42 int RGWHTTPSimpleRequest::receive_header(void *ptr
, size_t len
)
44 unique_lock
guard(out_headers_lock
);
48 char *s
= (char *)ptr
, *end
= (char *)ptr
+ len
;
50 ldout(cct
, 10) << "receive_http_header" << dendl
;
59 ldout(cct
, 10) << "received header:" << line
<< dendl
;
60 // TODO: fill whatever data required here
62 char *tok
= strsep(&l
, " \t:");
67 if (strcmp(tok
, "HTTP") == 0 || strncmp(tok
, "HTTP/", 5) == 0) {
68 http_status
= atoi(l
);
69 if (http_status
== 100) /* 100-continue response */
71 status
= rgw_http_error_to_errno(http_status
);
73 /* convert header field name to upper case */
77 for (i
= 0; i
< len
&& *src
; ++i
, ++src
) {
83 buf
[i
] = toupper(*src
);
88 int r
= handle_header(buf
, l
);
100 static void get_new_date_str(string
& date_str
)
102 date_str
= rgw_to_asctime(ceph_clock_now());
105 static void get_gmt_date_str(string
& date_str
)
107 auto now_time
= ceph::real_clock::now();
108 time_t rawtime
= ceph::real_clock::to_time_t(now_time
);
113 gmtime_r(&rawtime
, &timeInfo
);
114 strftime(buffer
, sizeof(buffer
), "%a, %d %b %Y %H:%M:%S %z", &timeInfo
);
119 int RGWRESTSimpleRequest::execute(RGWAccessKey
& key
, const char *_method
, const char *resource
, optional_yield y
)
122 string new_url
= url
;
123 string new_resource
= resource
;
125 if (new_url
[new_url
.size() - 1] == '/' && resource
[0] == '/') {
126 new_url
= new_url
.substr(0, new_url
.size() - 1);
127 } else if (resource
[0] != '/') {
129 new_resource
.append(resource
);
131 new_url
.append(new_resource
);
135 get_new_date_str(date_str
);
136 headers
.push_back(pair
<string
, string
>("HTTP_DATE", date_str
));
138 string canonical_header
;
140 map
<string
, string
> sub_resources
;
142 rgw_create_s3_canonical_header(method
.c_str(), NULL
, NULL
, date_str
.c_str(),
143 meta_map
, meta_map
, url
.c_str(), sub_resources
,
148 digest
= rgw::auth::s3::get_v2_signature(cct
, key
.key
, canonical_header
);
153 string auth_hdr
= "AWS " + key
.id
+ ":" + digest
;
155 ldout(cct
, 15) << "generated auth header: " << auth_hdr
<< dendl
;
157 headers
.push_back(pair
<string
, string
>("AUTHORIZATION", auth_hdr
));
165 int RGWHTTPSimpleRequest::send_data(void *ptr
, size_t len
, bool* pause
)
170 if (len
> send_iter
->get_remaining())
171 len
= send_iter
->get_remaining();
173 send_iter
->copy(len
, (char *)ptr
);
178 int RGWHTTPSimpleRequest::receive_data(void *ptr
, size_t len
, bool *pause
)
180 size_t cp_len
, left_len
;
182 left_len
= max_response
> response
.length() ? (max_response
- response
.length()) : 0;
184 return 0; /* don't read extra data */
186 cp_len
= (len
> left_len
) ? left_len
: len
;
187 bufferptr
p((char *)ptr
, cp_len
);
194 static void append_param(string
& dest
, const string
& name
, const string
& val
)
202 url_encode(name
, url_name
);
203 dest
.append(url_name
);
207 url_encode(val
, url_val
);
209 dest
.append(url_val
);
213 static void do_get_params_str(const param_vec_t
& params
, map
<string
, string
>& extra_args
, string
& dest
)
215 map
<string
, string
>::iterator miter
;
216 for (miter
= extra_args
.begin(); miter
!= extra_args
.end(); ++miter
) {
217 append_param(dest
, miter
->first
, miter
->second
);
219 for (auto iter
= params
.begin(); iter
!= params
.end(); ++iter
) {
220 append_param(dest
, iter
->first
, iter
->second
);
224 void RGWHTTPSimpleRequest::get_params_str(map
<string
, string
>& extra_args
, string
& dest
)
226 do_get_params_str(params
, extra_args
, dest
);
229 void RGWHTTPSimpleRequest::get_out_headers(map
<string
, string
> *pheaders
)
231 unique_lock
guard(out_headers_lock
);
232 pheaders
->swap(out_headers
);
236 static int sign_request(CephContext
*cct
, RGWAccessKey
& key
, RGWEnv
& env
, req_info
& info
)
238 /* don't sign if no key is provided */
239 if (key
.key
.empty()) {
243 if (cct
->_conf
->subsys
.should_gather
<ceph_subsys_rgw
, 20>()) {
244 for (const auto& i
: env
.get_map()) {
245 ldout(cct
, 20) << "> " << i
.first
<< " -> " << rgw::crypt_sanitize::x_meta_map
{i
.first
, i
.second
} << dendl
;
249 string canonical_header
;
250 if (!rgw_create_s3_canonical_header(info
, NULL
, canonical_header
, false)) {
251 ldout(cct
, 0) << "failed to create canonical s3 header" << dendl
;
255 ldout(cct
, 10) << "generated canonical header: " << canonical_header
<< dendl
;
259 digest
= rgw::auth::s3::get_v2_signature(cct
, key
.key
, canonical_header
);
264 string auth_hdr
= "AWS " + key
.id
+ ":" + digest
;
265 ldout(cct
, 15) << "generated auth header: " << auth_hdr
<< dendl
;
267 env
.set("AUTHORIZATION", auth_hdr
);
272 int RGWRESTSimpleRequest::forward_request(RGWAccessKey
& key
, req_info
& info
, size_t max_response
, bufferlist
*inbl
, bufferlist
*outbl
, optional_yield y
)
276 get_new_date_str(date_str
);
279 req_info
new_info(cct
, &new_env
);
280 new_info
.rebuild_from(info
);
281 string bucket_encode
;
282 string request_uri_encode
;
283 size_t pos
= new_info
.request_uri
.substr(1, new_info
.request_uri
.size() - 1).find("/");
284 string bucket
= new_info
.request_uri
.substr(1, pos
);
285 url_encode(bucket
, bucket_encode
);
286 if (std::string::npos
!= pos
)
287 request_uri_encode
= string("/") + bucket_encode
+ new_info
.request_uri
.substr(pos
+ 1);
289 request_uri_encode
= string("/") + bucket_encode
;
290 new_info
.request_uri
= request_uri_encode
;
291 new_env
.set("HTTP_DATE", date_str
.c_str());
292 const char* const content_md5
= info
.env
->get("HTTP_CONTENT_MD5");
294 new_env
.set("HTTP_CONTENT_MD5", content_md5
);
296 int ret
= sign_request(cct
, key
, new_env
, new_info
);
298 ldout(cct
, 0) << "ERROR: failed to sign request" << dendl
;
302 for (const auto& kv
: new_env
.get_map()) {
303 headers
.emplace_back(kv
);
306 meta_map_t
& meta_map
= new_info
.x_meta_map
;
307 for (const auto& kv
: meta_map
) {
308 headers
.emplace_back(kv
);
312 get_params_str(info
.args
.get_params(), params_str
);
314 string new_url
= url
;
315 string
& resource
= new_info
.request_uri
;
316 string new_resource
= resource
;
317 if (new_url
[new_url
.size() - 1] == '/' && resource
[0] == '/') {
318 new_url
= new_url
.substr(0, new_url
.size() - 1);
319 } else if (resource
[0] != '/') {
321 new_resource
.append(resource
);
323 new_url
.append(new_resource
+ params_str
);
325 bufferlist::iterator bliter
;
328 bliter
= inbl
->begin();
331 set_send_length(inbl
->length());
334 method
= new_info
.method
;
340 // curl_easy has errored, generally means the service is not available
341 r
= -ERR_SERVICE_UNAVAILABLE
;
346 response
.append((char)0); /* NULL terminate response */
349 *outbl
= std::move(response
);
355 class RGWRESTStreamOutCB
: public RGWGetDataCB
{
356 RGWRESTStreamS3PutObj
*req
;
358 explicit RGWRESTStreamOutCB(RGWRESTStreamS3PutObj
*_req
) : req(_req
) {}
359 int handle_data(bufferlist
& bl
, off_t bl_ofs
, off_t bl_len
) override
; /* callback for object iteration when sending data */
362 int RGWRESTStreamOutCB::handle_data(bufferlist
& bl
, off_t bl_ofs
, off_t bl_len
)
364 dout(20) << "RGWRESTStreamOutCB::handle_data bl.length()=" << bl
.length() << " bl_ofs=" << bl_ofs
<< " bl_len=" << bl_len
<< dendl
;
365 if (!bl_ofs
&& bl_len
== bl
.length()) {
366 req
->add_send_data(bl
);
370 bufferptr
bp(bl
.c_str() + bl_ofs
, bl_len
);
372 new_bl
.push_back(bp
);
374 req
->add_send_data(new_bl
);
378 RGWRESTStreamS3PutObj::~RGWRESTStreamS3PutObj()
383 static void grants_by_type_add_one_grant(map
<int, string
>& grants_by_type
, int perm
, ACLGrant
& grant
)
385 string
& s
= grants_by_type
[perm
];
391 ACLGranteeType
& type
= grant
.get_type();
392 switch (type
.get_type()) {
396 case ACL_TYPE_EMAIL_USER
:
397 id_type_str
= "emailAddress";
404 s
.append(id_type_str
+ "=\"" + id
.to_str() + "\"");
407 struct grant_type_to_header
{
412 struct grant_type_to_header grants_headers_def
[] = {
413 { RGW_PERM_FULL_CONTROL
, "x-amz-grant-full-control"},
414 { RGW_PERM_READ
, "x-amz-grant-read"},
415 { RGW_PERM_WRITE
, "x-amz-grant-write"},
416 { RGW_PERM_READ_ACP
, "x-amz-grant-read-acp"},
417 { RGW_PERM_WRITE_ACP
, "x-amz-grant-write-acp"},
421 static bool grants_by_type_check_perm(map
<int, string
>& grants_by_type
, int perm
, ACLGrant
& grant
, int check_perm
)
423 if ((perm
& check_perm
) == check_perm
) {
424 grants_by_type_add_one_grant(grants_by_type
, check_perm
, grant
);
430 static void grants_by_type_add_perm(map
<int, string
>& grants_by_type
, int perm
, ACLGrant
& grant
)
432 struct grant_type_to_header
*t
;
434 for (t
= grants_headers_def
; t
->header
; t
++) {
435 if (grants_by_type_check_perm(grants_by_type
, perm
, grant
, t
->type
))
440 static void add_grants_headers(map
<int, string
>& grants
, RGWEnv
& env
, meta_map_t
& meta_map
)
442 struct grant_type_to_header
*t
;
444 for (t
= grants_headers_def
; t
->header
; t
++) {
445 map
<int, string
>::iterator iter
= grants
.find(t
->type
);
446 if (iter
!= grants
.end()) {
447 env
.set(t
->header
,iter
->second
);
448 meta_map
[t
->header
] = iter
->second
;
453 void RGWRESTGenerateHTTPHeaders::init(const string
& _method
, const string
& _url
, const string
& resource
, const param_vec_t
& params
)
456 map
<string
, string
>& args
= new_info
->args
.get_params();
457 do_get_params_str(params
, args
, params_str
);
459 /* merge params with extra args so that we can sign correctly */
460 for (auto iter
= params
.begin(); iter
!= params
.end(); ++iter
) {
461 new_info
->args
.append(iter
->first
, iter
->second
);
464 url
= _url
+ resource
+ params_str
;
467 get_gmt_date_str(date_str
);
469 new_env
->set("HTTP_DATE", date_str
.c_str());
472 new_info
->method
= method
.c_str();
474 new_info
->script_uri
= "/";
475 new_info
->script_uri
.append(resource
);
476 new_info
->request_uri
= new_info
->script_uri
;
479 static bool is_x_amz(const string
& s
) {
480 return boost::algorithm::starts_with(s
, "x-amz-");
483 void RGWRESTGenerateHTTPHeaders::set_extra_headers(const map
<string
, string
>& extra_headers
)
485 for (auto iter
: extra_headers
) {
486 const string
& name
= lowercase_dash_http_attr(iter
.first
);
487 new_env
->set(name
, iter
.second
.c_str());
488 if (is_x_amz(name
)) {
489 new_info
->x_meta_map
[name
] = iter
.second
;
494 int RGWRESTGenerateHTTPHeaders::set_obj_attrs(map
<string
, bufferlist
>& rgw_attrs
)
496 map
<string
, string
> new_attrs
;
498 /* merge send headers */
499 for (auto& attr
: rgw_attrs
) {
500 bufferlist
& bl
= attr
.second
;
501 const string
& name
= attr
.first
;
502 string val
= bl
.c_str();
503 if (name
.compare(0, sizeof(RGW_ATTR_META_PREFIX
) - 1, RGW_ATTR_META_PREFIX
) == 0) {
504 string header_name
= RGW_AMZ_META_PREFIX
;
505 header_name
.append(name
.substr(sizeof(RGW_ATTR_META_PREFIX
) - 1));
506 new_attrs
[header_name
] = val
;
510 RGWAccessControlPolicy policy
;
511 int ret
= rgw_policy_from_attrset(cct
, rgw_attrs
, &policy
);
513 ldout(cct
, 0) << "ERROR: couldn't get policy ret=" << ret
<< dendl
;
517 set_http_attrs(new_attrs
);
523 static std::set
<string
> keep_headers
= { "content-type",
525 "content-disposition",
526 "content-language" };
528 void RGWRESTGenerateHTTPHeaders::set_http_attrs(const map
<string
, string
>& http_attrs
)
530 /* merge send headers */
531 for (auto& attr
: http_attrs
) {
532 const string
& val
= attr
.second
;
533 const string
& name
= lowercase_dash_http_attr(attr
.first
);
534 if (is_x_amz(name
)) {
535 new_env
->set(name
, val
);
536 new_info
->x_meta_map
[name
] = val
;
538 new_env
->set(attr
.first
, val
); /* Ugh, using the uppercase representation,
539 as the signing function calls info.env.get("CONTENT_TYPE").
540 This needs to be cleaned up! */
545 void RGWRESTGenerateHTTPHeaders::set_policy(RGWAccessControlPolicy
& policy
)
547 /* update acl headers */
548 RGWAccessControlList
& acl
= policy
.get_acl();
549 multimap
<string
, ACLGrant
>& grant_map
= acl
.get_grant_map();
550 multimap
<string
, ACLGrant
>::iterator giter
;
551 map
<int, string
> grants_by_type
;
552 for (giter
= grant_map
.begin(); giter
!= grant_map
.end(); ++giter
) {
553 ACLGrant
& grant
= giter
->second
;
554 ACLPermission
& perm
= grant
.get_permission();
555 grants_by_type_add_perm(grants_by_type
, perm
.get_permissions(), grant
);
557 add_grants_headers(grants_by_type
, *new_env
, new_info
->x_meta_map
);
560 int RGWRESTGenerateHTTPHeaders::sign(RGWAccessKey
& key
)
562 int ret
= sign_request(cct
, key
, *new_env
, *new_info
);
564 ldout(cct
, 0) << "ERROR: failed to sign request" << dendl
;
571 void RGWRESTStreamS3PutObj::send_init(rgw::sal::RGWObject
* obj
)
575 string new_url
= url
;
577 if (host_style
== VirtualStyle
) {
578 resource_str
= obj
->get_oid();
579 new_url
= obj
->get_bucket()->get_name() + "." + new_url
;
581 resource_str
= obj
->get_bucket()->get_name() + "/" + obj
->get_oid();
584 //do not encode slash in object key name
585 url_encode(resource_str
, resource
, false);
587 if (new_url
[new_url
.size() - 1] != '/')
591 headers_gen
.init(method
, new_url
, resource
, params
);
593 url
= headers_gen
.get_url();
596 int RGWRESTStreamS3PutObj::send_ready(RGWAccessKey
& key
, map
<string
, bufferlist
>& rgw_attrs
, bool send
)
598 headers_gen
.set_obj_attrs(rgw_attrs
);
600 return send_ready(key
, send
);
603 int RGWRESTStreamS3PutObj::send_ready(RGWAccessKey
& key
, const map
<string
, string
>& http_attrs
,
604 RGWAccessControlPolicy
& policy
, bool send
)
606 headers_gen
.set_http_attrs(http_attrs
);
607 headers_gen
.set_policy(policy
);
609 return send_ready(key
, send
);
612 int RGWRESTStreamS3PutObj::send_ready(RGWAccessKey
& key
, bool send
)
614 headers_gen
.sign(key
);
616 for (const auto& kv
: new_env
.get_map()) {
617 headers
.emplace_back(kv
);
620 out_cb
= new RGWRESTStreamOutCB(this);
623 int r
= RGWHTTP::send(this);
631 int RGWRESTStreamS3PutObj::put_obj_init(RGWAccessKey
& key
, rgw::sal::RGWObject
* obj
, uint64_t obj_size
, map
<string
, bufferlist
>& attrs
, bool send
)
634 return send_ready(key
, attrs
, send
);
637 void set_str_from_headers(map
<string
, string
>& out_headers
, const string
& header_name
, string
& str
)
639 map
<string
, string
>::iterator iter
= out_headers
.find(header_name
);
640 if (iter
!= out_headers
.end()) {
647 static int parse_rgwx_mtime(CephContext
*cct
, const string
& s
, ceph::real_time
*rt
)
652 get_str_vec(s
, ".", vec
);
658 long secs
= strict_strtol(vec
[0].c_str(), 10, &err
);
661 ldout(cct
, 0) << "ERROR: failed converting mtime (" << s
<< ") to real_time " << dendl
;
665 if (vec
.size() > 1) {
666 nsecs
= strict_strtol(vec
[1].c_str(), 10, &err
);
668 ldout(cct
, 0) << "ERROR: failed converting mtime (" << s
<< ") to real_time " << dendl
;
673 *rt
= utime_t(secs
, nsecs
).to_real_time();
678 static void send_prepare_convert(const rgw_obj
& obj
, string
*resource
)
680 string urlsafe_bucket
, urlsafe_object
;
681 url_encode(obj
.bucket
.get_key(':', 0), urlsafe_bucket
);
682 url_encode(obj
.key
.name
, urlsafe_object
);
683 *resource
= urlsafe_bucket
+ "/" + urlsafe_object
;
686 int RGWRESTStreamRWRequest::send_request(RGWAccessKey
& key
, map
<string
, string
>& extra_headers
, const rgw_obj
& obj
, RGWHTTPManager
*mgr
)
689 send_prepare_convert(obj
, &resource
);
691 return send_request(&key
, extra_headers
, resource
, mgr
);
694 int RGWRESTStreamRWRequest::send_prepare(RGWAccessKey
& key
, map
<string
, string
>& extra_headers
, const rgw_obj
& obj
)
697 send_prepare_convert(obj
, &resource
);
699 return do_send_prepare(&key
, extra_headers
, resource
);
702 int RGWRESTStreamRWRequest::send_prepare(RGWAccessKey
*key
, map
<string
, string
>& extra_headers
, const string
& resource
,
703 bufferlist
*send_data
)
706 //do not encode slash
707 url_encode(resource
, new_resource
, false);
709 return do_send_prepare(key
, extra_headers
, new_resource
, send_data
);
712 int RGWRESTStreamRWRequest::do_send_prepare(RGWAccessKey
*key
, map
<string
, string
>& extra_headers
, const string
& resource
,
713 bufferlist
*send_data
)
715 string new_url
= url
;
716 if (new_url
[new_url
.size() - 1] != '/')
720 req_info
new_info(cct
, &new_env
);
724 string old_resource
= resource
;
726 if (resource
[0] == '/') {
727 new_resource
= resource
.substr(1);
729 new_resource
= resource
;
732 size_t pos
= new_resource
.find("/");
733 bucket_name
= new_resource
.substr(0, pos
);
735 //when dest is a bucket with out other params, uri should end up with '/'
736 if(pos
== string::npos
&& params
.size() == 0 && host_style
== VirtualStyle
) {
737 new_resource
.append("/");
740 if (host_style
== VirtualStyle
) {
741 new_url
= bucket_name
+ "." + new_url
;
742 if(pos
== string::npos
) {
745 new_resource
= new_resource
.substr(pos
+1);
749 RGWRESTGenerateHTTPHeaders
headers_gen(cct
, &new_env
, &new_info
);
751 headers_gen
.init(method
, new_url
, new_resource
, params
);
753 headers_gen
.set_http_attrs(extra_headers
);
757 new_info
.init_meta_info(nullptr);
760 int ret
= headers_gen
.sign(*key
);
762 ldout(cct
, 0) << "ERROR: failed to sign request" << dendl
;
767 for (const auto& kv
: new_env
.get_map()) {
768 headers
.emplace_back(kv
);
772 set_send_length(send_data
->length());
773 set_outbl(*send_data
);
774 set_send_data_hint(true);
778 method
= new_info
.method
;
779 url
= headers_gen
.get_url();
784 int RGWRESTStreamRWRequest::send_request(RGWAccessKey
*key
, map
<string
, string
>& extra_headers
, const string
& resource
,
785 RGWHTTPManager
*mgr
, bufferlist
*send_data
)
787 int ret
= send_prepare(key
, extra_headers
, resource
, send_data
);
796 int RGWRESTStreamRWRequest::send(RGWHTTPManager
*mgr
)
799 return RGWHTTP::send(this);
802 int r
= mgr
->add_request(this);
809 int RGWRESTStreamRWRequest::complete_request(optional_yield y
,
813 map
<string
, string
> *pattrs
,
814 map
<string
, string
> *pheaders
)
821 unique_lock
guard(out_headers_lock
);
824 set_str_from_headers(out_headers
, "ETAG", *etag
);
829 set_str_from_headers(out_headers
, "RGWX_MTIME", mtime_str
);
830 if (!mtime_str
.empty()) {
831 int ret
= parse_rgwx_mtime(cct
, mtime_str
, mtime
);
836 *mtime
= real_time();
841 set_str_from_headers(out_headers
, "RGWX_OBJECT_SIZE", size_str
);
843 *psize
= strict_strtoll(size_str
.c_str(), 10, &err
);
845 ldout(cct
, 0) << "ERROR: failed parsing embedded metadata object size (" << size_str
<< ") to int " << dendl
;
851 for (auto iter
= out_headers
.begin(); pattrs
&& iter
!= out_headers
.end(); ++iter
) {
852 const string
& attr_name
= iter
->first
;
853 if (attr_name
.compare(0, sizeof(RGW_HTTP_RGWX_ATTR_PREFIX
) - 1, RGW_HTTP_RGWX_ATTR_PREFIX
) == 0) {
854 string name
= attr_name
.substr(sizeof(RGW_HTTP_RGWX_ATTR_PREFIX
) - 1);
855 const char *src
= name
.c_str();
856 char buf
[name
.size() + 1];
858 for (; *src
; ++src
, ++dest
) {
864 *dest
= tolower(*src
);
868 (*pattrs
)[buf
] = iter
->second
;
873 *pheaders
= std::move(out_headers
);
878 int RGWHTTPStreamRWRequest::handle_header(const string
& name
, const string
& val
)
880 if (name
== "RGWX_EMBEDDED_METADATA_LEN") {
882 long len
= strict_strtol(val
.c_str(), 10, &err
);
884 ldout(cct
, 0) << "ERROR: failed converting embedded metadata len (" << val
<< ") to int " << dendl
;
888 cb
->set_extra_data_len(len
);
893 int RGWHTTPStreamRWRequest::receive_data(void *ptr
, size_t len
, bool *pause
)
895 size_t orig_len
= len
;
898 in_data
.append((const char *)ptr
, len
);
900 size_t orig_in_data_len
= in_data
.length();
902 int ret
= cb
->handle_data(in_data
, pause
);
909 ceph_assert(in_data
.length() <= orig_in_data_len
);
912 size_t left_to_read
= orig_in_data_len
- len
;
913 if (in_data
.length() > left_to_read
) {
914 in_data
.splice(0, in_data
.length() - left_to_read
, &bl
);
922 void RGWHTTPStreamRWRequest::set_stream_write(bool s
) {
923 std::lock_guard wl
{write_lock
};
927 void RGWHTTPStreamRWRequest::unpause_receive()
929 std::lock_guard req_locker
{get_req_lock()};
931 _set_read_paused(false);
935 void RGWHTTPStreamRWRequest::add_send_data(bufferlist
& bl
)
937 std::scoped_lock locker
{get_req_lock(), write_lock
};
938 outbl
.claim_append(bl
);
939 _set_write_paused(false);
942 uint64_t RGWHTTPStreamRWRequest::get_pending_send_size()
944 std::lock_guard wl
{write_lock
};
945 return outbl
.length();
948 void RGWHTTPStreamRWRequest::finish_write()
950 std::scoped_lock locker
{get_req_lock(), write_lock
};
951 write_stream_complete
= true;
952 _set_write_paused(false);
955 int RGWHTTPStreamRWRequest::send_data(void *ptr
, size_t len
, bool *pause
)
960 std::lock_guard wl
{write_lock
};
962 if (outbl
.length() == 0) {
963 if ((stream_writes
&& !write_stream_complete
) ||
964 (write_ofs
< send_len
)) {
970 len
= std::min(len
, (size_t)outbl
.length());
973 outbl
.splice(0, len
, &bl
);
974 send_size
= bl
.length();
976 memcpy(ptr
, bl
.c_str(), send_size
);
977 write_ofs
+= send_size
;
980 out_len
= outbl
.length();
982 /* don't need to be under write_lock here, avoid deadlocks in case notify callback
984 if (write_drain_cb
) {
985 write_drain_cb
->notify(out_len
);
990 class StreamIntoBufferlist
: public RGWGetDataCB
{
993 explicit StreamIntoBufferlist(bufferlist
& _bl
) : bl(_bl
) {}
994 int handle_data(bufferlist
& inbl
, off_t bl_ofs
, off_t bl_len
) override
{
995 bl
.claim_append(inbl
);