// our response before seeing us disappear from mdsmap
sleep(1);
std::lock_guard l(mds_lock);
+ derr << "Exiting due to admin socket command" << dendl;
suicide();
});
t.detach();
r = admin_socket->register_command("dump_ops_in_flight", asok_hook,
"show the ops currently in flight");
ceph_assert(r == 0);
- r = admin_socket->register_command("ops", asok_hook,
+ r = admin_socket->register_command("ops "
+ "name=flags,type=CephChoices,strings=locks,n=N,req=false ",
+ asok_hook,
"show the ops currently in flight");
ceph_assert(r == 0);
r = admin_socket->register_command("dump_blocked_ops",
ceph_assert(r == 0);
r = admin_socket->register_command("scrub start "
"name=path,type=CephString "
- "name=scrubops,type=CephChoices,strings=force|recursive|repair,n=N,req=false "
+ "name=scrubops,type=CephChoices,strings=force|recursive|repair|scrub_mdsdir,n=N,req=false "
"name=tag,type=CephString,req=false",
asok_hook,
"scrub and inode and output results");
asok_hook,
"Evict a client session by id");
ceph_assert(r == 0);
- r = admin_socket->register_command("session ls name=cap_dump,type=CephBool,req=false",
- asok_hook,
- "Enumerate connected CephFS clients");
- ceph_assert(r == 0);
r = admin_socket->register_command("session config "
"name=client_id,type=CephInt,req=true "
"name=option,type=CephString,req=true "
dout(10) << __func__ << ": parsing auth_cap_str='" << auth_cap_str << "'" << dendl;
CachedStackStringStream cs;
- if (caps.parse(g_ceph_context, auth_cap_str, cs.get())) {
+ if (caps.parse(auth_cap_str, cs.get())) {
return true;
} else {
dout(1) << __func__ << ": auth cap parse error: " << cs->strv() << " parsing '" << auth_cap_str << "'" << dendl;
}
}
-int MDSDaemon::ms_handle_authentication(Connection *con)
+int MDSDaemon::ms_handle_fast_authentication(Connection *con)
{
/* N.B. without mds_lock! */
MDSAuthCaps caps;