summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Peter Michael Green [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
Merge ceph (10.2.5-7.2+rpi1) import into refs/heads/workingbranch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
detect-raspbian
Gbp-Pq: Name detect-raspbian.diff
weiqiaomiao [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
rgw: for the create_bucket api, if the input creation_time is zero, we should set it to 'now"
Fixes: http://tracker.ceph.com/issues/16597
Signed-off-by: weiqiaomiao <wei.qiaomiao@zte.com.cn>
Gbp-Pq: Name rgw_rados-creation_time.patch
Wanlong Gao [Thu, 23 Jun 2016 12:04:25 +0000 (20:04 +0800)]
osd: limit omap data in push op
We already have the config osd_recovery_max_chunk to limit the total
size of omap entries and omap data. But we need an individual config
to limit the number of omap entries independently. We call this config
osd_recovery_max_omap_entries_per_chunk here with the default number
of 64000.
Signed-off-by: Wanlong Gao <wanlong.gao@easystack.cn>
Gbp-Pq: Name osd-limit-omap-data-in-push-op.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
disable-openssl-linking
Gbp-Pq: Name disable-openssl-linking.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
skip-setup.py-makefiles
Gbp-Pq: Name skip-setup.py-makefiles.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
fix-cycles-arch
Gbp-Pq: Name fix-cycles-arch.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
fix-init-system-detection
Gbp-Pq: Name fix-init-system-detection.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
mips_mipsel_libatomic
Gbp-Pq: Name mips_mipsel_libatomic.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
softfp-armel
Gbp-Pq: Name softfp-armel.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
tests-disable
Gbp-Pq: Name tests-disable.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
virtualenv-never-download
Gbp-Pq: Name virtualenv-never-download.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
sample.ceph.conf
* corrected URLs.
* more options and descriptions.
Gbp-Pq: Name sample.ceph.conf.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
arch
Gbp-Pq: Name arch.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
cve-2016-9579_short_cors_request
commit
67d4d9e64bc224e047cf333e673bb22cd6290789
Author: LiuYang <yippeetry@gmail.com>
Date: Thu Dec 8 14:21:43 2016 +0800
rgw: do not abort when accept a CORS request with short origin
Fixed: #18187
when accept a CROS request, the request http origin shorter than the bucket's corsrule
(eg. origin: http://s.com corsrule: <AllowedOrigin>*.verylongdomain.com</AllowedOrigin>).
the rgw_cors.cc::is_string_in_set() will have a wrong index, the radosrgw server will
abort.
$ curl http://test.localhost:8000/app.data -H "Origin:http://s.com"
0> 2016-12-05 03:22:29.548138
7f6add05d700 -1 *** Caught signal (Aborted) **
in thread
7f6add05d700 thread_name:civetweb-worker
ceph version
11.0.2-2168-gd2f8fb4 (
d2f8fb4a6ba75af7e6da0f5a7f1b49ec998b1631)
1: (()+0x50720a) [0x7f6b147c420a]
2: (()+0xf370) [0x7f6b09a33370]
3: (gsignal()+0x37) [0x7f6b081ca1d7]
4: (abort()+0x148) [0x7f6b081cb8c8]
5: (__gnu_cxx::__verbose_terminate_handler()+0x165) [0x7f6b08ace9d5]
6: (()+0x5e946) [0x7f6b08acc946]
7: (()+0x5e973) [0x7f6b08acc973]
8: (()+0x5eb93) [0x7f6b08accb93]
9: (std::__throw_out_of_range(char const*)+0x77) 0x7f6b08b21a17]
10: (()+0xbd97a) [0x7f6b08b2b97a]
11: (()+0x449c1e) [0x7f6b14706c1e]
12: (RGWCORSRule::is_origin_present(char const*)+0x48) [0x7f6b147073b8]
13: (RGWCORSConfiguration::host_name_rule(char const*)+0x37) [0x7f6b147074e7]
14: (RGWOp::generate_cors_headers(std::string&, std::string&, std::string&, std::string&, unsigned int*)+0xa3) [0x7f6b14593e63]
15: (dump_access_control(req_state*, RGWOp*)+0x61) [0x7f6b14653f91]
Signed-off-by: LiuYang <yippeetry@gmail.com>
Gbp-Pq: Name cve-2016-9579_short_cors_request.patch
Ceph Maintainers [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
sleep-recover
Gbp-Pq: Name sleep-recover.patch
Peter Michael Green [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
ceph (10.2.5-7.2+rpi1) buster-staging; urgency=medium
* Add Raspbian to lists of "debian-like" distros.
+ Hopefully this will fix site-packages vs dist-packages
build failure in Raspbian.
[dgit import unpatched ceph 10.2.5-7.2+rpi1]
Peter Michael Green [Sun, 30 Jul 2017 09:48:17 +0000 (10:48 +0100)]
Import ceph_10.2.5-7.2+rpi1.debian.tar.xz
[dgit import tarball ceph 10.2.5-7.2+rpi1 ceph_10.2.5-7.2+rpi1.debian.tar.xz]
weiqiaomiao [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
rgw: for the create_bucket api, if the input creation_time is zero, we should set it to 'now"
Fixes: http://tracker.ceph.com/issues/16597
Signed-off-by: weiqiaomiao <wei.qiaomiao@zte.com.cn>
Gbp-Pq: Name rgw_rados-creation_time.patch
Wanlong Gao [Thu, 23 Jun 2016 12:04:25 +0000 (20:04 +0800)]
osd: limit omap data in push op
We already have the config osd_recovery_max_chunk to limit the total
size of omap entries and omap data. But we need an individual config
to limit the number of omap entries independently. We call this config
osd_recovery_max_omap_entries_per_chunk here with the default number
of 64000.
Signed-off-by: Wanlong Gao <wanlong.gao@easystack.cn>
Gbp-Pq: Name osd-limit-omap-data-in-push-op.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
disable-openssl-linking
Gbp-Pq: Name disable-openssl-linking.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
skip-setup.py-makefiles
Gbp-Pq: Name skip-setup.py-makefiles.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
fix-cycles-arch
Gbp-Pq: Name fix-cycles-arch.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
fix-init-system-detection
Gbp-Pq: Name fix-init-system-detection.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
mips_mipsel_libatomic
Gbp-Pq: Name mips_mipsel_libatomic.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
softfp-armel
Gbp-Pq: Name softfp-armel.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
tests-disable
Gbp-Pq: Name tests-disable.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
virtualenv-never-download
Gbp-Pq: Name virtualenv-never-download.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
sample.ceph.conf
* corrected URLs.
* more options and descriptions.
Gbp-Pq: Name sample.ceph.conf.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
arch
Gbp-Pq: Name arch.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
cve-2016-9579_short_cors_request
commit
67d4d9e64bc224e047cf333e673bb22cd6290789
Author: LiuYang <yippeetry@gmail.com>
Date: Thu Dec 8 14:21:43 2016 +0800
rgw: do not abort when accept a CORS request with short origin
Fixed: #18187
when accept a CROS request, the request http origin shorter than the bucket's corsrule
(eg. origin: http://s.com corsrule: <AllowedOrigin>*.verylongdomain.com</AllowedOrigin>).
the rgw_cors.cc::is_string_in_set() will have a wrong index, the radosrgw server will
abort.
$ curl http://test.localhost:8000/app.data -H "Origin:http://s.com"
0> 2016-12-05 03:22:29.548138
7f6add05d700 -1 *** Caught signal (Aborted) **
in thread
7f6add05d700 thread_name:civetweb-worker
ceph version
11.0.2-2168-gd2f8fb4 (
d2f8fb4a6ba75af7e6da0f5a7f1b49ec998b1631)
1: (()+0x50720a) [0x7f6b147c420a]
2: (()+0xf370) [0x7f6b09a33370]
3: (gsignal()+0x37) [0x7f6b081ca1d7]
4: (abort()+0x148) [0x7f6b081cb8c8]
5: (__gnu_cxx::__verbose_terminate_handler()+0x165) [0x7f6b08ace9d5]
6: (()+0x5e946) [0x7f6b08acc946]
7: (()+0x5e973) [0x7f6b08acc973]
8: (()+0x5eb93) [0x7f6b08accb93]
9: (std::__throw_out_of_range(char const*)+0x77) 0x7f6b08b21a17]
10: (()+0xbd97a) [0x7f6b08b2b97a]
11: (()+0x449c1e) [0x7f6b14706c1e]
12: (RGWCORSRule::is_origin_present(char const*)+0x48) [0x7f6b147073b8]
13: (RGWCORSConfiguration::host_name_rule(char const*)+0x37) [0x7f6b147074e7]
14: (RGWOp::generate_cors_headers(std::string&, std::string&, std::string&, std::string&, unsigned int*)+0xa3) [0x7f6b14593e63]
15: (dump_access_control(req_state*, RGWOp*)+0x61) [0x7f6b14653f91]
Signed-off-by: LiuYang <yippeetry@gmail.com>
Gbp-Pq: Name cve-2016-9579_short_cors_request.patch
Ceph Maintainers [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
sleep-recover
Gbp-Pq: Name sleep-recover.patch
Adrian Bunk [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
ceph (10.2.5-7.2) unstable; urgency=medium
* Non-maintainer upload.
* Build with -g1 instead of -g on 32bit architectures to fix
FTBFS due to the 2GB/3GB address space limits.
[dgit import unpatched ceph 10.2.5-7.2]
Adrian Bunk [Wed, 7 Jun 2017 08:39:39 +0000 (09:39 +0100)]
Import ceph_10.2.5-7.2.debian.tar.xz
[dgit import tarball ceph 10.2.5-7.2 ceph_10.2.5-7.2.debian.tar.xz]
Gaudenz Steinlin [Sat, 17 Dec 2016 21:40:22 +0000 (21:40 +0000)]
Import ceph_10.2.5.orig.tar.gz
[dgit import orig ceph_10.2.5.orig.tar.gz]