summaryrefslogtreecommitdiffstats
path: root/src/ceph/doc/radosgw
diff options
context:
space:
mode:
Diffstat (limited to 'src/ceph/doc/radosgw')
-rw-r--r--src/ceph/doc/radosgw/admin.rst528
-rw-r--r--src/ceph/doc/radosgw/adminops.rst1946
-rw-r--r--src/ceph/doc/radosgw/api.rst14
-rw-r--r--src/ceph/doc/radosgw/barbican.rst120
-rw-r--r--src/ceph/doc/radosgw/bucketpolicy.rst133
-rw-r--r--src/ceph/doc/radosgw/compression.rst79
-rw-r--r--src/ceph/doc/radosgw/config-ref.rst850
-rw-r--r--src/ceph/doc/radosgw/encryption.rst56
-rw-r--r--src/ceph/doc/radosgw/index.rst59
-rw-r--r--src/ceph/doc/radosgw/keystone.rst145
-rw-r--r--src/ceph/doc/radosgw/layout.rst208
-rw-r--r--src/ceph/doc/radosgw/ldap-auth.rst138
-rw-r--r--src/ceph/doc/radosgw/multisite.rst1459
-rw-r--r--src/ceph/doc/radosgw/multitenancy.rst107
-rw-r--r--src/ceph/doc/radosgw/nfs.rst366
-rw-r--r--src/ceph/doc/radosgw/pools.rst55
-rw-r--r--src/ceph/doc/radosgw/s3.rst95
-rw-r--r--src/ceph/doc/radosgw/s3/authentication.rst75
-rw-r--r--src/ceph/doc/radosgw/s3/bucketops.rst377
-rw-r--r--src/ceph/doc/radosgw/s3/commons.rst111
-rw-r--r--src/ceph/doc/radosgw/s3/cpp.rst331
-rw-r--r--src/ceph/doc/radosgw/s3/csharp.rst199
-rw-r--r--src/ceph/doc/radosgw/s3/java.rst212
-rw-r--r--src/ceph/doc/radosgw/s3/objectops.rst403
-rw-r--r--src/ceph/doc/radosgw/s3/perl.rst192
-rw-r--r--src/ceph/doc/radosgw/s3/php.rst208
-rw-r--r--src/ceph/doc/radosgw/s3/python.rst171
-rw-r--r--src/ceph/doc/radosgw/s3/ruby.rst364
-rw-r--r--src/ceph/doc/radosgw/s3/serviceops.rst39
-rw-r--r--src/ceph/doc/radosgw/swift.rst75
-rw-r--r--src/ceph/doc/radosgw/swift/auth.rst77
-rw-r--r--src/ceph/doc/radosgw/swift/containerops.rst279
-rw-r--r--src/ceph/doc/radosgw/swift/java.rst175
-rw-r--r--src/ceph/doc/radosgw/swift/objectops.rst271
-rw-r--r--src/ceph/doc/radosgw/swift/python.rst114
-rw-r--r--src/ceph/doc/radosgw/swift/ruby.rst119
-rw-r--r--src/ceph/doc/radosgw/swift/serviceops.rst76
-rw-r--r--src/ceph/doc/radosgw/swift/tempurl.rst84
-rw-r--r--src/ceph/doc/radosgw/swift/tutorial.rst60
-rw-r--r--src/ceph/doc/radosgw/troubleshooting.rst179
40 files changed, 0 insertions, 10549 deletions
diff --git a/src/ceph/doc/radosgw/admin.rst b/src/ceph/doc/radosgw/admin.rst
deleted file mode 100644
index c1f1904..0000000
--- a/src/ceph/doc/radosgw/admin.rst
+++ /dev/null
@@ -1,528 +0,0 @@
-=============
- Admin Guide
-=============
-
-Once you have your Ceph Object Storage service up and running, you may
-administer the service with user management, access controls, quotas
-and usage tracking among other features.
-
-
-User Management
-===============
-
-Ceph Object Storage user management refers to users of the Ceph Object Storage
-service (i.e., not the Ceph Object Gateway as a user of the Ceph Storage
-Cluster). You must create a user, access key and secret to enable end users to
-interact with Ceph Object Gateway services.
-
-There are two user types:
-
-- **User:** The term 'user' reflects a user of the S3 interface.
-
-- **Subuser:** The term 'subuser' reflects a user of the Swift interface. A subuser
- is associated to a user .
-
-.. ditaa:: +---------+
- | User |
- +----+----+
- |
- | +-----------+
- +-----+ Subuser |
- +-----------+
-
-You can create, modify, view, suspend and remove users and subusers. In addition
-to user and subuser IDs, you may add a display name and an email address for a
-user. You can specify a key and secret, or generate a key and secret
-automatically. When generating or specifying keys, note that user IDs correspond
-to an S3 key type and subuser IDs correspond to a swift key type. Swift keys
-also have access levels of ``read``, ``write``, ``readwrite`` and ``full``.
-
-
-Create a User
--------------
-
-To create a user (S3 interface), execute the following::
-
- radosgw-admin user create --uid={username} --display-name="{display-name}" [--email={email}]
-
-For example::
-
- radosgw-admin user create --uid=johndoe --display-name="John Doe" --email=john@example.com
-
-.. code-block:: javascript
-
- { "user_id": "johndoe",
- "display_name": "John Doe",
- "email": "john@example.com",
- "suspended": 0,
- "max_buckets": 1000,
- "auid": 0,
- "subusers": [],
- "keys": [
- { "user": "johndoe",
- "access_key": "11BS02LGFB6AL6H1ADMW",
- "secret_key": "vzCEkuryfn060dfee4fgQPqFrncKEIkh3ZcdOANY"}],
- "swift_keys": [],
- "caps": [],
- "op_mask": "read, write, delete",
- "default_placement": "",
- "placement_tags": [],
- "bucket_quota": { "enabled": false,
- "max_size_kb": -1,
- "max_objects": -1},
- "user_quota": { "enabled": false,
- "max_size_kb": -1,
- "max_objects": -1},
- "temp_url_keys": []}
-
-Creating a user also creates an ``access_key`` and ``secret_key`` entry for use
-with any S3 API-compatible client.
-
-.. important:: Check the key output. Sometimes ``radosgw-admin``
- generates a JSON escape (``\``) character, and some clients
- do not know how to handle JSON escape characters. Remedies include
- removing the JSON escape character (``\``), encapsulating the string
- in quotes, regenerating the key and ensuring that it
- does not have a JSON escape character or specify the key and secret
- manually.
-
-
-Create a Subuser
-----------------
-
-To create a subuser (Swift interface) for the user, you must specify the user ID
-(``--uid={username}``), a subuser ID and the access level for the subuser. ::
-
- radosgw-admin subuser create --uid={uid} --subuser={uid} --access=[ read | write | readwrite | full ]
-
-For example::
-
- radosgw-admin subuser create --uid=johndoe --subuser=johndoe:swift --access=full
-
-
-.. note:: ``full`` is not ``readwrite``, as it also includes the access control policy.
-
-.. code-block:: javascript
-
- { "user_id": "johndoe",
- "display_name": "John Doe",
- "email": "john@example.com",
- "suspended": 0,
- "max_buckets": 1000,
- "auid": 0,
- "subusers": [
- { "id": "johndoe:swift",
- "permissions": "full-control"}],
- "keys": [
- { "user": "johndoe",
- "access_key": "11BS02LGFB6AL6H1ADMW",
- "secret_key": "vzCEkuryfn060dfee4fgQPqFrncKEIkh3ZcdOANY"}],
- "swift_keys": [],
- "caps": [],
- "op_mask": "read, write, delete",
- "default_placement": "",
- "placement_tags": [],
- "bucket_quota": { "enabled": false,
- "max_size_kb": -1,
- "max_objects": -1},
- "user_quota": { "enabled": false,
- "max_size_kb": -1,
- "max_objects": -1},
- "temp_url_keys": []}
-
-
-Get User Info
--------------
-
-To get information about a user, you must specify ``user info`` and the user ID
-(``--uid={username}``) . ::
-
- radosgw-admin user info --uid=johndoe
-
-
-
-Modify User Info
-----------------
-
-To modify information about a user, you must specify the user ID (``--uid={username}``)
-and the attributes you want to modify. Typical modifications are to keys and secrets,
-email addresses, display names and access levels. For example::
-
- radosgw-admin user modify --uid=johndoe --display-name="John E. Doe"
-
-To modify subuser values, specify ``subuser modify`` and the subuser ID. For example::
-
- radosgw-admin subuser modify --uid=johndoe:swift --access=full
-
-
-User Enable/Suspend
--------------------
-
-When you create a user, the user is enabled by default. However, you may suspend
-user privileges and re-enable them at a later time. To suspend a user, specify
-``user suspend`` and the user ID. ::
-
- radosgw-admin user suspend --uid=johndoe
-
-To re-enable a suspended user, specify ``user enable`` and the user ID. ::
-
- radosgw-admin user enable --uid=johndoe
-
-.. note:: Disabling the user disables the subuser.
-
-
-Remove a User
--------------
-
-When you remove a user, the user and subuser are removed from the system.
-However, you may remove just the subuser if you wish. To remove a user (and
-subuser), specify ``user rm`` and the user ID. ::
-
- radosgw-admin user rm --uid=johndoe
-
-To remove the subuser only, specify ``subuser rm`` and the subuser ID. ::
-
- radosgw-admin subuser rm --subuser=johndoe:swift
-
-
-Options include:
-
-- **Purge Data:** The ``--purge-data`` option purges all data associated
- to the UID.
-
-- **Purge Keys:** The ``--purge-keys`` option purges all keys associated
- to the UID.
-
-
-Remove a Subuser
-----------------
-
-When you remove a sub user, you are removing access to the Swift interface.
-The user will remain in the system. To remove the subuser, specify
-``subuser rm`` and the subuser ID. ::
-
- radosgw-admin subuser rm --subuser=johndoe:swift
-
-
-
-Options include:
-
-- **Purge Keys:** The ``--purge-keys`` option purges all keys associated
- to the UID.
-
-
-Add / Remove a Key
-------------------------
-
-Both users and subusers require the key to access the S3 or Swift interface. To
-use S3, the user needs a key pair which is composed of an access key and a
-secret key. On the other hand, to use Swift, the user typically needs a secret
-key (password), and use it together with the associated user ID. You may create
-a key and either specify or generate the access key and/or secret key. You may
-also remove a key. Options include:
-
-- ``--key-type=<type>`` specifies the key type. The options are: s3, swift
-- ``--access-key=<key>`` manually specifies an S3 access key.
-- ``--secret-key=<key>`` manually specifies a S3 secret key or a Swift secret key.
-- ``--gen-access-key`` automatically generates a S3 key.
-- ``--gen-secret`` automatically generates a S3 secret key or a Swift secret key.
-
-An example how to add a specified S3 key pair for a user. ::
-
- radosgw-admin key create --uid=foo --key-type=s3 --access-key fooAccessKey --secret-key fooSecretKey
-
-.. code-block:: javascript
-
- { "user_id": "foo",
- "rados_uid": 0,
- "display_name": "foo",
- "email": "foo@example.com",
- "suspended": 0,
- "keys": [
- { "user": "foo",
- "access_key": "fooAccessKey",
- "secret_key": "fooSecretKey"}],
- }
-
-Note that you may create multiple S3 key pairs for a user.
-
-To attach a specified swift secret key for a subuser. ::
-
- radosgw-admin key create --subuser=foo:bar --key-type=swift --secret-key barSecret
-
-.. code-block:: javascript
-
- { "user_id": "foo",
- "rados_uid": 0,
- "display_name": "foo",
- "email": "foo@example.com",
- "suspended": 0,
- "subusers": [
- { "id": "foo:bar",
- "permissions": "full-control"}],
- "swift_keys": [
- { "user": "foo:bar",
- "secret_key": "asfghjghghmgm"}]}
-
-Note that a subuser can have only one swift secret key.
-
-Subusers can also be used with S3 APIs if the subuser is associated with a S3 key pair. ::
-
- radosgw-admin key create --subuser=foo:bar --key-type=s3 --access-key barAccessKey --secret-key barSecretKey
-
-.. code-block:: javascript
-
- { "user_id": "foo",
- "rados_uid": 0,
- "display_name": "foo",
- "email": "foo@example.com",
- "suspended": 0,
- "subusers": [
- { "id": "foo:bar",
- "permissions": "full-control"}],
- "keys": [
- { "user": "foo:bar",
- "access_key": "barAccessKey",
- "secret_key": "barSecretKey"}],
- }
-
-
-To remove a S3 key pair, specify the access key. ::
-
- radosgw-admin key rm --uid=foo --key-type=s3 --access-key=fooAccessKey
-
-To remove the swift secret key. ::
-
- radosgw-admin key rm -subuser=foo:bar --key-type=swift
-
-
-Add / Remove Admin Capabilities
--------------------------------
-
-The Ceph Storage Cluster provides an administrative API that enables users to
-execute administrative functions via the REST API. By default, users do NOT have
-access to this API. To enable a user to exercise administrative functionality,
-provide the user with administrative capabilities.
-
-To add administrative capabilities to a user, execute the following::
-
- radosgw-admin caps add --uid={uid} --caps={caps}
-
-
-You can add read, write or all capabilities to users, buckets, metadata and
-usage (utilization). For example::
-
- --caps="[users|buckets|metadata|usage|zone]=[*|read|write|read, write]"
-
-For example::
-
- radosgw-admin caps add --uid=johndoe --caps="users=*;buckets=*"
-
-
-To remove administrative capabilities from a user, execute the following::
-
- radosgw-admin caps rm --uid=johndoe --caps={caps}
-
-
-Quota Management
-================
-
-The Ceph Object Gateway enables you to set quotas on users and buckets owned by
-users. Quotas include the maximum number of objects in a bucket and the maximum
-storage size a bucket can hold.
-
-- **Bucket:** The ``--bucket`` option allows you to specify a quota for
- buckets the user owns.
-
-- **Maximum Objects:** The ``--max-objects`` setting allows you to specify
- the maximum number of objects. A negative value disables this setting.
-
-- **Maximum Size:** The ``--max-size`` option allows you to specify a quota
- size in B/K/M/G/T, where B is the default. A negative value disables this setting.
-
-- **Quota Scope:** The ``--quota-scope`` option sets the scope for the quota.
- The options are ``bucket`` and ``user``. Bucket quotas apply to buckets a
- user owns. User quotas apply to a user.
-
-
-Set User Quota
---------------
-
-Before you enable a quota, you must first set the quota parameters.
-For example::
-
- radosgw-admin quota set --quota-scope=user --uid=<uid> [--max-objects=<num objects>] [--max-size=<max size>]
-
-For example::
-
- radosgw-admin quota set --quota-scope=user --uid=johndoe --max-objects=1024 --max-size=1024B
-
-
-A negative value for num objects and / or max size means that the
-specific quota attribute check is disabled.
-
-
-Enable/Disable User Quota
--------------------------
-
-Once you set a user quota, you may enable it. For example::
-
- radosgw-admin quota enable --quota-scope=user --uid=<uid>
-
-You may disable an enabled user quota. For example::
-
- radosgw-admin quota disable --quota-scope=user --uid=<uid>
-
-
-Set Bucket Quota
-----------------
-
-Bucket quotas apply to the buckets owned by the specified ``uid``. They are
-independent of the user. ::
-
- radosgw-admin quota set --uid=<uid> --quota-scope=bucket [--max-objects=<num objects>] [--max-size=<max size]
-
-A negative value for num objects and / or max size means that the
-specific quota attribute check is disabled.
-
-
-Enable/Disable Bucket Quota
----------------------------
-
-Once you set a bucket quota, you may enable it. For example::
-
- radosgw-admin quota enable --quota-scope=bucket --uid=<uid>
-
-You may disable an enabled bucket quota. For example::
-
- radosgw-admin quota disable --quota-scope=bucket --uid=<uid>
-
-
-Get Quota Settings
-------------------
-
-You may access each user's quota settings via the user information
-API. To read user quota setting information with the CLI interface,
-execute the following::
-
- radosgw-admin user info --uid=<uid>
-
-
-Update Quota Stats
-------------------
-
-Quota stats get updated asynchronously. You can update quota
-statistics for all users and all buckets manually to retrieve
-the latest quota stats. ::
-
- radosgw-admin user stats --uid=<uid> --sync-stats
-
-
-Get User Usage Stats
---------------------
-
-To see how much of the quota a user has consumed, execute the following::
-
- radosgw-admin user stats --uid=<uid>
-
-.. note:: You should execute ``radosgw-admin user stats`` with the
- ``--sync-stats`` option to receive the latest data.
-
-Default Quotas
---------------
-
-You can set default quotas in the config. These defaults are used when
-creating a new user and have no effect on existing users. If the
-relevant default quota is set in config, then that quota is set on the
-new user, and that quota is enabled. See ``rgw bucket default quota max objects``,
-``rgw bucket default quota max size``, ``rgw user default quota max objects``, and
-``rgw user default quota max size`` in `Ceph Object Gateway Config Reference`_
-
-Quota Cache
------------
-
-Quota statistics are cached on each RGW instance. If there are multiple
-instances, then the cache can keep quotas from being perfectly enforced, as
-each instance will have a different view of quotas. The options that control
-this are ``rgw bucket quota ttl``, ``rgw user quota bucket sync interval`` and
-``rgw user quota sync interval``. The higher these values are, the more
-efficient quota operations are, but the more out-of-sync multiple instances
-will be. The lower these values are, the closer to perfect enforcement
-multiple instances will achieve. If all three are 0, then quota caching is
-effectively disabled, and multiple instances will have perfect quota
-enforcement. See `Ceph Object Gateway Config Reference`_
-
-Reading / Writing Global Quotas
--------------------------------
-
-You can read and write global quota settings in the period configuration. To
-view the global quota settings::
-
- radosgw-admin global quota get
-
-The global quota settings can be manipulated with the ``global quota``
-counterparts of the ``quota set``, ``quota enable``, and ``quota disable``
-commands. ::
-
- radosgw-admin global quota set --quota-scope bucket --max-objects 1024
- radosgw-admin global quota enable --quota-scope bucket
-
-.. note:: In a multisite configuration, where there is a realm and period
- present, changes to the global quotas must be committed using ``period
- update --commit``. If there is no period present, the rados gateway(s) must
- be restarted for the changes to take effect.
-
-
-Usage
-=====
-
-The Ceph Object Gateway logs usage for each user. You can track
-user usage within date ranges too.
-
-- Add ``rgw enable usage log = true`` in [client.rgw] section of ceph.conf and restart the radosgw service.
-
-Options include:
-
-- **Start Date:** The ``--start-date`` option allows you to filter usage
- stats from a particular start date (**format:** ``yyyy-mm-dd[HH:MM:SS]``).
-
-- **End Date:** The ``--end-date`` option allows you to filter usage up
- to a particular date (**format:** ``yyyy-mm-dd[HH:MM:SS]``).
-
-- **Log Entries:** The ``--show-log-entries`` option allows you to specify
- whether or not to include log entries with the usage stats
- (options: ``true`` | ``false``).
-
-.. note:: You may specify time with minutes and seconds, but it is stored
- with 1 hour resolution.
-
-
-Show Usage
-----------
-
-To show usage statistics, specify the ``usage show``. To show usage for a
-particular user, you must specify a user ID. You may also specify a start date,
-end date, and whether or not to show log entries.::
-
- radosgw-admin usage show --uid=johndoe --start-date=2012-03-01 --end-date=2012-04-01
-
-You may also show a summary of usage information for all users by omitting a user ID. ::
-
- radosgw-admin usage show --show-log-entries=false
-
-
-Trim Usage
-----------
-
-With heavy use, usage logs can begin to take up storage space. You can trim
-usage logs for all users and for specific users. You may also specify date
-ranges for trim operations. ::
-
- radosgw-admin usage trim --start-date=2010-01-01 --end-date=2010-12-31
- radosgw-admin usage trim --uid=johndoe
- radosgw-admin usage trim --uid=johndoe --end-date=2013-12-31
-
-
-.. _radosgw-admin: ../../man/8/radosgw-admin/
-.. _Pool Configuration: ../../rados/configuration/pool-pg-config-ref/
-.. _Ceph Object Gateway Config Reference: ../config-ref/
diff --git a/src/ceph/doc/radosgw/adminops.rst b/src/ceph/doc/radosgw/adminops.rst
deleted file mode 100644
index 422dd16..0000000
--- a/src/ceph/doc/radosgw/adminops.rst
+++ /dev/null
@@ -1,1946 +0,0 @@
-==================
- Admin Operations
-==================
-
-An admin API request will be done on a URI that starts with the configurable 'admin'
-resource entry point. Authorization for the admin API duplicates the S3 authorization
-mechanism. Some operations require that the user holds special administrative capabilities.
-The response entity type (XML or JSON) may be specified as the 'format' option in the
-request and defaults to JSON if not specified.
-
-Get Usage
-=========
-
-Request bandwidth usage information.
-
-Note: this feature is disabled by default, can be enabled by setting ``rgw
-enable usage log = true`` in the appropriate section of ceph.conf. For changes
-in ceph.conf to take effect, radosgw process restart is needed.
-
-:caps: usage=read
-
-Syntax
-~~~~~~
-
-::
-
- GET /{admin}/usage?format=json HTTP/1.1
- Host: {fqdn}
-
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user for which the information is requested. If not specified will apply to all users.
-:Type: String
-:Example: ``foo_user``
-:Required: No
-
-``start``
-
-:Description: Date and (optional) time that specifies the start time of the requested data.
-:Type: String
-:Example: ``2012-09-25 16:00:00``
-:Required: No
-
-``end``
-
-:Description: Date and (optional) time that specifies the end time of the requested data (non-inclusive).
-:Type: String
-:Example: ``2012-09-25 16:00:00``
-:Required: No
-
-
-``show-entries``
-
-:Description: Specifies whether data entries should be returned.
-:Type: Boolean
-:Example: True [True]
-:Required: No
-
-
-``show-summary``
-
-:Description: Specifies whether data summary should be returned.
-:Type: Boolean
-:Example: True [True]
-:Required: No
-
-
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-If successful, the response contains the requested information.
-
-``usage``
-
-:Description: A container for the usage information.
-:Type: Container
-
-``entries``
-
-:Description: A container for the usage entries information.
-:Type: Container
-
-``user``
-
-:Description: A container for the user data information.
-:Type: Container
-
-``owner``
-
-:Description: The name of the user that owns the buckets.
-:Type: String
-
-``bucket``
-
-:Description: The bucket name.
-:Type: String
-
-``time``
-
-:Description: Time lower bound for which data is being specified (rounded to the beginning of the first relevant hour).
-:Type: String
-
-``epoch``
-
-:Description: The time specified in seconds since 1/1/1970.
-:Type: String
-
-``categories``
-
-:Description: A container for stats categories.
-:Type: Container
-
-``entry``
-
-:Description: A container for stats entry.
-:Type: Container
-
-``category``
-
-:Description: Name of request category for which the stats are provided.
-:Type: String
-
-``bytes_sent``
-
-:Description: Number of bytes sent by the RADOS Gateway.
-:Type: Integer
-
-``bytes_received``
-
-:Description: Number of bytes received by the RADOS Gateway.
-:Type: Integer
-
-``ops``
-
-:Description: Number of operations.
-:Type: Integer
-
-``successful_ops``
-
-:Description: Number of successful operations.
-:Type: Integer
-
-``summary``
-
-:Description: A container for stats summary.
-:Type: Container
-
-``total``
-
-:Description: A container for stats summary aggregated total.
-:Type: Container
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-TBD.
-
-Trim Usage
-==========
-
-Remove usage information. With no dates specified, removes all usage
-information.
-
-Note: this feature is disabled by default, can be enabled by setting ``rgw
-enable usage log = true`` in the appropriate section of ceph.conf. For changes
-in ceph.conf to take effect, radosgw process restart is needed.
-
-:caps: usage=write
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{admin}/usage?format=json HTTP/1.1
- Host: {fqdn}
-
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user for which the information is requested. If not specified will apply to all users.
-:Type: String
-:Example: ``foo_user``
-:Required: No
-
-``start``
-
-:Description: Date and (optional) time that specifies the start time of the requested data.
-:Type: String
-:Example: ``2012-09-25 16:00:00``
-:Required: No
-
-``end``
-
-:Description: Date and (optional) time that specifies the end time of the requested data (none inclusive).
-:Type: String
-:Example: ``2012-09-25 16:00:00``
-:Required: No
-
-
-``remove-all``
-
-:Description: Required when uid is not specified, in order to acknowledge multi user data removal.
-:Type: Boolean
-:Example: True [False]
-:Required: No
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-TBD.
-
-Get User Info
-=============
-
-Get user information.
-
-:caps: users=read
-
-
-Syntax
-~~~~~~
-
-::
-
- GET /{admin}/user?format=json HTTP/1.1
- Host: {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user for which the information is requested.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-If successful, the response contains the user information.
-
-``user``
-
-:Description: A container for the user data information.
-:Type: Container
-
-``user_id``
-
-:Description: The user id.
-:Type: String
-:Parent: ``user``
-
-``display_name``
-
-:Description: Display name for the user.
-:Type: String
-:Parent: ``user``
-
-``suspended``
-
-:Description: True if the user is suspended.
-:Type: Boolean
-:Parent: ``user``
-
-``max_buckets``
-
-:Description: The maximum number of buckets to be owned by the user.
-:Type: Integer
-:Parent: ``user``
-
-``subusers``
-
-:Description: Subusers associated with this user account.
-:Type: Container
-:Parent: ``user``
-
-``keys``
-
-:Description: S3 keys associated with this user account.
-:Type: Container
-:Parent: ``user``
-
-``swift_keys``
-
-:Description: Swift keys associated with this user account.
-:Type: Container
-:Parent: ``user``
-
-``caps``
-
-:Description: User capabilities.
-:Type: Container
-:Parent: ``user``
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-None.
-
-Create User
-===========
-
-Create a new user. By default, a S3 key pair will be created automatically
-and returned in the response. If only one of ``access-key`` or ``secret-key``
-is provided, the omitted key will be automatically generated. By default, a
-generated key is added to the keyring without replacing an existing key pair.
-If ``access-key`` is specified and refers to an existing key owned by the user
-then it will be modified.
-
-.. versionadded:: Luminous
-
-A ``tenant`` may either be specified as a part of uid or as an additional
-request param.
-
-:caps: users=write
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{admin}/user?format=json HTTP/1.1
- Host: {fqdn}
-
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user ID to be created.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-A tenant name may also specified as a part of ``uid``, by following the syntax ``tenant$user``, refer to `Multitenancy`_ for more details.
-
-``display-name``
-
-:Description: The display name of the user to be created.
-:Type: String
-:Example: ``foo user``
-:Required: Yes
-
-
-``email``
-
-:Description: The email address associated with the user.
-:Type: String
-:Example: ``foo@bar.com``
-:Required: No
-
-``key-type``
-
-:Description: Key type to be generated, options are: swift, s3 (default).
-:Type: String
-:Example: ``s3`` [``s3``]
-:Required: No
-
-``access-key``
-
-:Description: Specify access key.
-:Type: String
-:Example: ``ABCD0EF12GHIJ2K34LMN``
-:Required: No
-
-
-``secret-key``
-
-:Description: Specify secret key.
-:Type: String
-:Example: ``0AbCDEFg1h2i34JklM5nop6QrSTUV+WxyzaBC7D8``
-:Required: No
-
-``user-caps``
-
-:Description: User capabilities.
-:Type: String
-:Example: ``usage=read, write; users=read``
-:Required: No
-
-``generate-key``
-
-:Description: Generate a new key pair and add to the existing keyring.
-:Type: Boolean
-:Example: True [True]
-:Required: No
-
-``max-buckets``
-
-:Description: Specify the maximum number of buckets the user can own.
-:Type: Integer
-:Example: 500 [1000]
-:Required: No
-
-``suspended``
-
-:Description: Specify whether the user should be suspended.
-:Type: Boolean
-:Example: False [False]
-:Required: No
-
-.. versionadded:: Jewel
-``tenant``
-
-:Description: the Tenant under which a user is a part of.
-:Type: string
-:Example: tenant1
-:Required: No
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-If successful, the response contains the user information.
-
-``user``
-
-:Description: A container for the user data information.
-:Type: Container
-
-``tenant``
-:Description: The tenant which user is a part of
-:Type: String
-:Parent: ``user``
-
-``user_id``
-
-:Description: The user id.
-:Type: String
-:Parent: ``user``
-
-``display_name``
-
-:Description: Display name for the user.
-:Type: String
-:Parent: ``user``
-
-``suspended``
-
-:Description: True if the user is suspended.
-:Type: Boolean
-:Parent: ``user``
-
-``max_buckets``
-
-:Description: The maximum number of buckets to be owned by the user.
-:Type: Integer
-:Parent: ``user``
-
-``subusers``
-
-:Description: Subusers associated with this user account.
-:Type: Container
-:Parent: ``user``
-
-``keys``
-
-:Description: S3 keys associated with this user account.
-:Type: Container
-:Parent: ``user``
-
-``swift_keys``
-
-:Description: Swift keys associated with this user account.
-:Type: Container
-:Parent: ``user``
-
-``caps``
-
-:Description: User capabilities.
-:Type: Container
-:Parent: ``user``
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``UserExists``
-
-:Description: Attempt to create existing user.
-:Code: 409 Conflict
-
-``InvalidAccessKey``
-
-:Description: Invalid access key specified.
-:Code: 400 Bad Request
-
-``InvalidKeyType``
-
-:Description: Invalid key type specified.
-:Code: 400 Bad Request
-
-``InvalidSecretKey``
-
-:Description: Invalid secret key specified.
-:Code: 400 Bad Request
-
-``InvalidKeyType``
-
-:Description: Invalid key type specified.
-:Code: 400 Bad Request
-
-``KeyExists``
-
-:Description: Provided access key exists and belongs to another user.
-:Code: 409 Conflict
-
-``EmailExists``
-
-:Description: Provided email address exists.
-:Code: 409 Conflict
-
-``InvalidCapability``
-
-:Description: Attempt to grant invalid admin capability.
-:Code: 400 Bad Request
-
-
-Modify User
-===========
-
-Modify a user.
-
-:caps: users=write
-
-Syntax
-~~~~~~
-
-::
-
- POST /{admin}/user?format=json HTTP/1.1
- Host: {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user ID to be modified.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-
-``display-name``
-
-:Description: The display name of the user to be modified.
-:Type: String
-:Example: ``foo user``
-:Required: No
-
-``email``
-
-:Description: The email address to be associated with the user.
-:Type: String
-:Example: ``foo@bar.com``
-:Required: No
-
-``generate-key``
-
-:Description: Generate a new key pair and add to the existing keyring.
-:Type: Boolean
-:Example: True [False]
-:Required: No
-
-``access-key``
-
-:Description: Specify access key.
-:Type: String
-:Example: ``ABCD0EF12GHIJ2K34LMN``
-:Required: No
-
-``secret-key``
-
-:Description: Specify secret key.
-:Type: String
-:Example: ``0AbCDEFg1h2i34JklM5nop6QrSTUV+WxyzaBC7D8``
-:Required: No
-
-``key-type``
-
-:Description: Key type to be generated, options are: swift, s3 (default).
-:Type: String
-:Example: ``s3``
-:Required: No
-
-``user-caps``
-
-:Description: User capabilities.
-:Type: String
-:Example: ``usage=read, write; users=read``
-:Required: No
-
-``max-buckets``
-
-:Description: Specify the maximum number of buckets the user can own.
-:Type: Integer
-:Example: 500 [1000]
-:Required: No
-
-``suspended``
-
-:Description: Specify whether the user should be suspended.
-:Type: Boolean
-:Example: False [False]
-:Required: No
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-If successful, the response contains the user information.
-
-``user``
-
-:Description: A container for the user data information.
-:Type: Container
-
-``user_id``
-
-:Description: The user id.
-:Type: String
-:Parent: ``user``
-
-``display_name``
-
-:Description: Display name for the user.
-:Type: String
-:Parent: ``user``
-
-
-``suspended``
-
-:Description: True if the user is suspended.
-:Type: Boolean
-:Parent: ``user``
-
-
-``max_buckets``
-
-:Description: The maximum number of buckets to be owned by the user.
-:Type: Integer
-:Parent: ``user``
-
-
-``subusers``
-
-:Description: Subusers associated with this user account.
-:Type: Container
-:Parent: ``user``
-
-
-``keys``
-
-:Description: S3 keys associated with this user account.
-:Type: Container
-:Parent: ``user``
-
-
-``swift_keys``
-
-:Description: Swift keys associated with this user account.
-:Type: Container
-:Parent: ``user``
-
-
-``caps``
-
-:Description: User capabilities.
-:Type: Container
-:Parent: ``user``
-
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``InvalidAccessKey``
-
-:Description: Invalid access key specified.
-:Code: 400 Bad Request
-
-``InvalidKeyType``
-
-:Description: Invalid key type specified.
-:Code: 400 Bad Request
-
-``InvalidSecretKey``
-
-:Description: Invalid secret key specified.
-:Code: 400 Bad Request
-
-``KeyExists``
-
-:Description: Provided access key exists and belongs to another user.
-:Code: 409 Conflict
-
-``EmailExists``
-
-:Description: Provided email address exists.
-:Code: 409 Conflict
-
-``InvalidCapability``
-
-:Description: Attempt to grant invalid admin capability.
-:Code: 400 Bad Request
-
-Remove User
-===========
-
-Remove an existing user.
-
-:caps: users=write
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{admin}/user?format=json HTTP/1.1
- Host: {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user ID to be removed.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes.
-
-``purge-data``
-
-:Description: When specified the buckets and objects belonging
- to the user will also be removed.
-:Type: Boolean
-:Example: True
-:Required: No
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-None
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-None.
-
-Create Subuser
-==============
-
-Create a new subuser (primarily useful for clients using the Swift API).
-Note that in general for a subuser to be useful, it must be granted
-permissions by specifying ``access``. As with user creation if
-``subuser`` is specified without ``secret``, then a secret key will
-be automatically generated.
-
-:caps: users=write
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{admin}/user?subuser&format=json HTTP/1.1
- Host {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user ID under which a subuser is to be created.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-
-
-``subuser``
-
-:Description: Specify the subuser ID to be created.
-:Type: String
-:Example: ``sub_foo``
-:Required: Yes
-
-``secret-key``
-
-:Description: Specify secret key.
-:Type: String
-:Example: ``0AbCDEFg1h2i34JklM5nop6QrSTUV+WxyzaBC7D8``
-:Required: No
-
-``key-type``
-
-:Description: Key type to be generated, options are: swift (default), s3.
-:Type: String
-:Example: ``swift`` [``swift``]
-:Required: No
-
-``access``
-
-:Description: Set access permissions for sub-user, should be one
- of ``read, write, readwrite, full``.
-:Type: String
-:Example: ``read``
-:Required: No
-
-``generate-secret``
-
-:Description: Generate the secret key.
-:Type: Boolean
-:Example: True [False]
-:Required: No
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-If successful, the response contains the subuser information.
-
-
-``subusers``
-
-:Description: Subusers associated with the user account.
-:Type: Container
-
-``id``
-
-:Description: Subuser id.
-:Type: String
-:Parent: ``subusers``
-
-``permissions``
-
-:Description: Subuser access to user account.
-:Type: String
-:Parent: ``subusers``
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``SubuserExists``
-
-:Description: Specified subuser exists.
-:Code: 409 Conflict
-
-``InvalidKeyType``
-
-:Description: Invalid key type specified.
-:Code: 400 Bad Request
-
-``InvalidSecretKey``
-
-:Description: Invalid secret key specified.
-:Code: 400 Bad Request
-
-``InvalidAccess``
-
-:Description: Invalid subuser access specified.
-:Code: 400 Bad Request
-
-Modify Subuser
-==============
-
-Modify an existing subuser
-
-:caps: users=write
-
-Syntax
-~~~~~~
-
-::
-
- POST /{admin}/user?subuser&format=json HTTP/1.1
- Host {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user ID under which the subuser is to be modified.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-
-``subuser``
-
-:Description: The subuser ID to be modified.
-:Type: String
-:Example: ``sub_foo``
-:Required: Yes
-
-``generate-secret``
-
-:Description: Generate a new secret key for the subuser,
- replacing the existing key.
-:Type: Boolean
-:Example: True [False]
-:Required: No
-
-``secret``
-
-:Description: Specify secret key.
-:Type: String
-:Example: ``0AbCDEFg1h2i34JklM5nop6QrSTUV+WxyzaBC7D8``
-:Required: No
-
-``key-type``
-
-:Description: Key type to be generated, options are: swift (default), s3 .
-:Type: String
-:Example: ``swift`` [``swift``]
-:Required: No
-
-``access``
-
-:Description: Set access permissions for sub-user, should be one
- of ``read, write, readwrite, full``.
-:Type: String
-:Example: ``read``
-:Required: No
-
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-If successful, the response contains the subuser information.
-
-
-``subusers``
-
-:Description: Subusers associated with the user account.
-:Type: Container
-
-``id``
-
-:Description: Subuser id.
-:Type: String
-:Parent: ``subusers``
-
-``permissions``
-
-:Description: Subuser access to user account.
-:Type: String
-:Parent: ``subusers``
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``InvalidKeyType``
-
-:Description: Invalid key type specified.
-:Code: 400 Bad Request
-
-``InvalidSecretKey``
-
-:Description: Invalid secret key specified.
-:Code: 400 Bad Request
-
-``InvalidAccess``
-
-:Description: Invalid subuser access specified.
-:Code: 400 Bad Request
-
-Remove Subuser
-==============
-
-Remove an existing subuser
-
-:caps: users=write
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{admin}/user?subuser&format=json HTTP/1.1
- Host {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user ID under which the subuser is to be removed.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-
-
-``subuser``
-
-:Description: The subuser ID to be removed.
-:Type: String
-:Example: ``sub_foo``
-:Required: Yes
-
-``purge-keys``
-
-:Description: Remove keys belonging to the subuser.
-:Type: Boolean
-:Example: True [True]
-:Required: No
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-None.
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-None.
-
-Create Key
-==========
-
-Create a new key. If a ``subuser`` is specified then by default created keys
-will be swift type. If only one of ``access-key`` or ``secret-key`` is provided the
-committed key will be automatically generated, that is if only ``secret-key`` is
-specified then ``access-key`` will be automatically generated. By default, a
-generated key is added to the keyring without replacing an existing key pair.
-If ``access-key`` is specified and refers to an existing key owned by the user
-then it will be modified. The response is a container listing all keys of the same
-type as the key created. Note that when creating a swift key, specifying the option
-``access-key`` will have no effect. Additionally, only one swift key may be held by
-each user or subuser.
-
-:caps: users=write
-
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{admin}/user?key&format=json HTTP/1.1
- Host {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user ID to receive the new key.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-
-``subuser``
-
-:Description: The subuser ID to receive the new key.
-:Type: String
-:Example: ``sub_foo``
-:Required: No
-
-``key-type``
-
-:Description: Key type to be generated, options are: swift, s3 (default).
-:Type: String
-:Example: ``s3`` [``s3``]
-:Required: No
-
-``access-key``
-
-:Description: Specify the access key.
-:Type: String
-:Example: ``AB01C2D3EF45G6H7IJ8K``
-:Required: No
-
-``secret-key``
-
-:Description: Specify the secret key.
-:Type: String
-:Example: ``0ab/CdeFGhij1klmnopqRSTUv1WxyZabcDEFgHij``
-:Required: No
-
-``generate-key``
-
-:Description: Generate a new key pair and add to the existing keyring.
-:Type: Boolean
-:Example: True [``True``]
-:Required: No
-
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-``keys``
-
-:Description: Keys of type created associated with this user account.
-:Type: Container
-
-``user``
-
-:Description: The user account associated with the key.
-:Type: String
-:Parent: ``keys``
-
-``access-key``
-
-:Description: The access key.
-:Type: String
-:Parent: ``keys``
-
-``secret-key``
-
-:Description: The secret key
-:Type: String
-:Parent: ``keys``
-
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``InvalidAccessKey``
-
-:Description: Invalid access key specified.
-:Code: 400 Bad Request
-
-``InvalidKeyType``
-
-:Description: Invalid key type specified.
-:Code: 400 Bad Request
-
-``InvalidSecretKey``
-
-:Description: Invalid secret key specified.
-:Code: 400 Bad Request
-
-``InvalidKeyType``
-
-:Description: Invalid key type specified.
-:Code: 400 Bad Request
-
-``KeyExists``
-
-:Description: Provided access key exists and belongs to another user.
-:Code: 409 Conflict
-
-Remove Key
-==========
-
-Remove an existing key.
-
-:caps: users=write
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{admin}/user?key&format=json HTTP/1.1
- Host {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``access-key``
-
-:Description: The S3 access key belonging to the S3 key pair to remove.
-:Type: String
-:Example: ``AB01C2D3EF45G6H7IJ8K``
-:Required: Yes
-
-``uid``
-
-:Description: The user to remove the key from.
-:Type: String
-:Example: ``foo_user``
-:Required: No
-
-``subuser``
-
-:Description: The subuser to remove the key from.
-:Type: String
-:Example: ``sub_foo``
-:Required: No
-
-``key-type``
-
-:Description: Key type to be removed, options are: swift, s3.
- NOTE: Required to remove swift key.
-:Type: String
-:Example: ``swift``
-:Required: No
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-None.
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-None.
-
-Get Bucket Info
-===============
-
-Get information about a subset of the existing buckets. If ``uid`` is specified
-without ``bucket`` then all buckets beloning to the user will be returned. If
-``bucket`` alone is specified, information for that particular bucket will be
-retrieved.
-
-:caps: buckets=read
-
-Syntax
-~~~~~~
-
-::
-
- GET /{admin}/bucket?format=json HTTP/1.1
- Host {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``bucket``
-
-:Description: The bucket to return info on.
-:Type: String
-:Example: ``foo_bucket``
-:Required: No
-
-``uid``
-
-:Description: The user to retrieve bucket information for.
-:Type: String
-:Example: ``foo_user``
-:Required: No
-
-``stats``
-
-:Description: Return bucket statistics.
-:Type: Boolean
-:Example: True [False]
-:Required: No
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-If successful the request returns a buckets container containing
-the desired bucket information.
-
-``stats``
-
-:Description: Per bucket information.
-:Type: Container
-
-``buckets``
-
-:Description: Contains a list of one or more bucket containers.
-:Type: Container
-
-``bucket``
-
-:Description: Container for single bucket information.
-:Type: Container
-:Parent: ``buckets``
-
-``name``
-
-:Description: The name of the bucket.
-:Type: String
-:Parent: ``bucket``
-
-``pool``
-
-:Description: The pool the bucket is stored in.
-:Type: String
-:Parent: ``bucket``
-
-``id``
-
-:Description: The unique bucket id.
-:Type: String
-:Parent: ``bucket``
-
-``marker``
-
-:Description: Internal bucket tag.
-:Type: String
-:Parent: ``bucket``
-
-``owner``
-
-:Description: The user id of the bucket owner.
-:Type: String
-:Parent: ``bucket``
-
-``usage``
-
-:Description: Storage usage information.
-:Type: Container
-:Parent: ``bucket``
-
-``index``
-
-:Description: Status of bucket index.
-:Type: String
-:Parent: ``bucket``
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``IndexRepairFailed``
-
-:Description: Bucket index repair failed.
-:Code: 409 Conflict
-
-Check Bucket Index
-==================
-
-Check the index of an existing bucket. NOTE: to check multipart object
-accounting with ``check-objects``, ``fix`` must be set to True.
-
-:caps: buckets=write
-
-Syntax
-~~~~~~
-
-::
-
- GET /{admin}/bucket?index&format=json HTTP/1.1
- Host {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``bucket``
-
-:Description: The bucket to return info on.
-:Type: String
-:Example: ``foo_bucket``
-:Required: Yes
-
-``check-objects``
-
-:Description: Check multipart object accounting.
-:Type: Boolean
-:Example: True [False]
-:Required: No
-
-``fix``
-
-:Description: Also fix the bucket index when checking.
-:Type: Boolean
-:Example: False [False]
-:Required: No
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-``index``
-
-:Description: Status of bucket index.
-:Type: String
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``IndexRepairFailed``
-
-:Description: Bucket index repair failed.
-:Code: 409 Conflict
-
-Remove Bucket
-=============
-
-Delete an existing bucket.
-
-:caps: buckets=write
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{admin}/bucket?format=json HTTP/1.1
- Host {fqdn}
-
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``bucket``
-
-:Description: The bucket to remove.
-:Type: String
-:Example: ``foo_bucket``
-:Required: Yes
-
-``purge-objects``
-
-:Description: Remove a buckets objects before deletion.
-:Type: Boolean
-:Example: True [False]
-:Required: No
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-None.
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``BucketNotEmpty``
-
-:Description: Attempted to delete non-empty bucket.
-:Code: 409 Conflict
-
-``ObjectRemovalFailed``
-
-:Description: Unable to remove objects.
-:Code: 409 Conflict
-
-Unlink Bucket
-=============
-
-Unlink a bucket from a specified user. Primarily useful for changing
-bucket ownership.
-
-:caps: buckets=write
-
-Syntax
-~~~~~~
-
-::
-
- POST /{admin}/bucket?format=json HTTP/1.1
- Host {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``bucket``
-
-:Description: The bucket to unlink.
-:Type: String
-:Example: ``foo_bucket``
-:Required: Yes
-
-``uid``
-
-:Description: The user ID to unlink the bucket from.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-None.
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``BucketUnlinkFailed``
-
-:Description: Unable to unlink bucket from specified user.
-:Code: 409 Conflict
-
-Link Bucket
-===========
-
-Link a bucket to a specified user, unlinking the bucket from
-any previous user.
-
-:caps: buckets=write
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{admin}/bucket?format=json HTTP/1.1
- Host {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``bucket``
-
-:Description: The bucket name to unlink.
-:Type: String
-:Example: ``foo_bucket``
-:Required: Yes
-
-``bucket-id``
-
-:Description: The bucket id to unlink.
-:Type: String
-:Example: ``dev.6607669.420``
-:Required: Yes
-
-``uid``
-
-:Description: The user ID to link the bucket to.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-``bucket``
-
-:Description: Container for single bucket information.
-:Type: Container
-
-``name``
-
-:Description: The name of the bucket.
-:Type: String
-:Parent: ``bucket``
-
-``pool``
-
-:Description: The pool the bucket is stored in.
-:Type: String
-:Parent: ``bucket``
-
-``id``
-
-:Description: The unique bucket id.
-:Type: String
-:Parent: ``bucket``
-
-``marker``
-
-:Description: Internal bucket tag.
-:Type: String
-:Parent: ``bucket``
-
-``owner``
-
-:Description: The user id of the bucket owner.
-:Type: String
-:Parent: ``bucket``
-
-``usage``
-
-:Description: Storage usage information.
-:Type: Container
-:Parent: ``bucket``
-
-``index``
-
-:Description: Status of bucket index.
-:Type: String
-:Parent: ``bucket``
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``BucketUnlinkFailed``
-
-:Description: Unable to unlink bucket from specified user.
-:Code: 409 Conflict
-
-``BucketLinkFailed``
-
-:Description: Unable to link bucket to specified user.
-:Code: 409 Conflict
-
-Remove Object
-=============
-
-Remove an existing object. NOTE: Does not require owner to be non-suspended.
-
-:caps: buckets=write
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{admin}/bucket?object&format=json HTTP/1.1
- Host {fqdn}
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``bucket``
-
-:Description: The bucket containing the object to be removed.
-:Type: String
-:Example: ``foo_bucket``
-:Required: Yes
-
-``object``
-
-:Description: The object to remove.
-:Type: String
-:Example: ``foo.txt``
-:Required: Yes
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-None.
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``NoSuchObject``
-
-:Description: Specified object does not exist.
-:Code: 404 Not Found
-
-``ObjectRemovalFailed``
-
-:Description: Unable to remove objects.
-:Code: 409 Conflict
-
-
-
-Get Bucket or Object Policy
-===========================
-
-Read the policy of an object or bucket.
-
-:caps: buckets=read
-
-Syntax
-~~~~~~
-
-::
-
- GET /{admin}/bucket?policy&format=json HTTP/1.1
- Host {fqdn}
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``bucket``
-
-:Description: The bucket to read the policy from.
-:Type: String
-:Example: ``foo_bucket``
-:Required: Yes
-
-``object``
-
-:Description: The object to read the policy from.
-:Type: String
-:Example: ``foo.txt``
-:Required: No
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-If successful, returns the object or bucket policy
-
-``policy``
-
-:Description: Access control policy.
-:Type: Container
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``IncompleteBody``
-
-:Description: Either bucket was not specified for a bucket policy request or bucket
- and object were not specified for an object policy request.
-:Code: 400 Bad Request
-
-Add A User Capability
-=====================
-
-Add an administrative capability to a specified user.
-
-:caps: users=write
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{admin}/user?caps&format=json HTTP/1.1
- Host {fqdn}
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user ID to add an administrative capability to.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-
-``user-caps``
-
-:Description: The administrative capability to add to the user.
-:Type: String
-:Example: ``usage=read,write;user=write``
-:Required: Yes
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-If successful, the response contains the user's capabilities.
-
-``user``
-
-:Description: A container for the user data information.
-:Type: Container
-:Parent: ``user``
-
-``user_id``
-
-:Description: The user id.
-:Type: String
-:Parent: ``user``
-
-``caps``
-
-:Description: User capabilities.
-:Type: Container
-:Parent: ``user``
-
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``InvalidCapability``
-
-:Description: Attempt to grant invalid admin capability.
-:Code: 400 Bad Request
-
-Example Request
-~~~~~~~~~~~~~~~
-
-::
-
- PUT /{admin}/user?caps&user-caps=usage=read,write;user=write&format=json HTTP/1.1
- Host: {fqdn}
- Content-Type: text/plain
- Authorization: {your-authorization-token}
-
-
-
-Remove A User Capability
-========================
-
-Remove an administrative capability from a specified user.
-
-:caps: users=write
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{admin}/user?caps&format=json HTTP/1.1
- Host {fqdn}
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``uid``
-
-:Description: The user ID to remove an administrative capability from.
-:Type: String
-:Example: ``foo_user``
-:Required: Yes
-
-``user-caps``
-
-:Description: The administrative capabilities to remove from the user.
-:Type: String
-:Example: ``usage=read, write``
-:Required: Yes
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-If successful, the response contains the user's capabilities.
-
-``user``
-
-:Description: A container for the user data information.
-:Type: Container
-:Parent: ``user``
-
-``user_id``
-
-:Description: The user id.
-:Type: String
-:Parent: ``user``
-
-``caps``
-
-:Description: User capabilities.
-:Type: Container
-:Parent: ``user``
-
-
-Special Error Responses
-~~~~~~~~~~~~~~~~~~~~~~~
-
-``InvalidCapability``
-
-:Description: Attempt to remove an invalid admin capability.
-:Code: 400 Bad Request
-
-``NoSuchCap``
-
-:Description: User does not possess specified capability.
-:Code: 404 Not Found
-
-
-Quotas
-======
-
-The Admin Operations API enables you to set quotas on users and on bucket owned
-by users. See `Quota Management`_ for additional details. Quotas include the
-maximum number of objects in a bucket and the maximum storage size in megabytes.
-
-To view quotas, the user must have a ``users=read`` capability. To set,
-modify or disable a quota, the user must have ``users=write`` capability.
-See the `Admin Guide`_ for details.
-
-Valid parameters for quotas include:
-
-- **Bucket:** The ``bucket`` option allows you to specify a quota for
- buckets owned by a user.
-
-- **Maximum Objects:** The ``max-objects`` setting allows you to specify
- the maximum number of objects. A negative value disables this setting.
-
-- **Maximum Size:** The ``max-size`` option allows you to specify a quota
- for the maximum number of bytes. A negative value disables this setting.
-
-- **Quota Type:** The ``quota-type`` option sets the scope for the quota.
- The options are ``bucket`` and ``user``.
-
-- **Enable/Disable Quota:** The ``enabled`` option specifies whether the
- quota should be enabled. The value should be either 'True' or 'False'.
-
-Get User Quota
-~~~~~~~~~~~~~~
-
-To get a quota, the user must have ``users`` capability set with ``read``
-permission. ::
-
- GET /admin/user?quota&uid=<uid>&quota-type=user
-
-
-Set User Quota
-~~~~~~~~~~~~~~
-
-To set a quota, the user must have ``users`` capability set with ``write``
-permission. ::
-
- PUT /admin/user?quota&uid=<uid>&quota-type=user
-
-
-The content must include a JSON representation of the quota settings
-as encoded in the corresponding read operation.
-
-
-Get Bucket Quota
-~~~~~~~~~~~~~~~~
-
-To get a quota, the user must have ``users`` capability set with ``read``
-permission. ::
-
- GET /admin/user?quota&uid=<uid>&quota-type=bucket
-
-
-Set Bucket Quota
-~~~~~~~~~~~~~~~~
-
-To set a quota, the user must have ``users`` capability set with ``write``
-permission. ::
-
- PUT /admin/user?quota&uid=<uid>&quota-type=bucket
-
-The content must include a JSON representation of the quota settings
-as encoded in the corresponding read operation.
-
-
-
-
-Standard Error Responses
-========================
-
-``AccessDenied``
-
-:Description: Access denied.
-:Code: 403 Forbidden
-
-``InternalError``
-
-:Description: Internal server error.
-:Code: 500 Internal Server Error
-
-``NoSuchUser``
-
-:Description: User does not exist.
-:Code: 404 Not Found
-
-``NoSuchBucket``
-
-:Description: Bucket does not exist.
-:Code: 404 Not Found
-
-``NoSuchKey``
-
-:Description: No such access key.
-:Code: 404 Not Found
-
-
-
-.. _Admin Guide: ../admin
-.. _Quota Management: ../admin#quota-management
-.. _Multitenancy: ./multitenancy
diff --git a/src/ceph/doc/radosgw/api.rst b/src/ceph/doc/radosgw/api.rst
deleted file mode 100644
index c01a3e5..0000000
--- a/src/ceph/doc/radosgw/api.rst
+++ /dev/null
@@ -1,14 +0,0 @@
-===============
-librgw (Python)
-===============
-
-.. highlight:: python
-
-The `rgw` python module provides file-like access to rgw.
-
-API Reference
-=============
-
-.. automodule:: rgw
- :members: LibRGWFS, FileHandle
-
diff --git a/src/ceph/doc/radosgw/barbican.rst b/src/ceph/doc/radosgw/barbican.rst
deleted file mode 100644
index 3a7fe6e..0000000
--- a/src/ceph/doc/radosgw/barbican.rst
+++ /dev/null
@@ -1,120 +0,0 @@
-==============================
-OpenStack Barbican Integration
-==============================
-
-OpenStack `Barbican`_ can be used as a secure key management service for
-`Server-Side Encryption`_.
-
-.. image:: ../images/rgw-encryption-barbican.png
-
-#. `Configure Keystone`_
-#. `Create a Keystone user`_
-#. `Configure the Ceph Object Gateway`_
-#. `Create a key in Barbican`_
-
-Configure Keystone
-==================
-
-Barbican depends on Keystone for authorization and access control of its keys.
-
-See `OpenStack Keystone Integration`_.
-
-Create a Keystone user
-======================
-
-Create a new user that will be used by the Ceph Object Gateway to retrieve
-keys.
-
-For example::
-
- user = rgwcrypt-user
- pass = rgwcrypt-password
- tenant = rgwcrypt
-
-See OpenStack documentation for `Manage projects, users, and roles`_.
-
-Create a key in Barbican
-========================
-
-See Barbican documentation for `How to Create a Secret`_. Requests to
-Barbican must include a valid Keystone token in the ``X-Auth-Token`` header.
-
-Example request::
-
- POST /v1/secrets HTTP/1.1
- Host: barbican.example.com:9311
- Accept: */*
- Content-Type: application/json
- X-Auth-Token: 7f7d588dd29b44df983bc961a6b73a10
- Content-Length: 299
-
- {
- "name": "my-key",
- "expiration": "2016-12-28T19:14:44.180394",
- "algorithm": "aes",
- "bit_length": 256,
- "mode": "cbc",
- "payload": "6b+WOZ1T3cqZMxgThRcXAQBrS5mXKdDUphvpxptl9/4=",
- "payload_content_type": "application/octet-stream",
- "payload_content_encoding": "base64"
- }
-
-Response::
-
- {"secret_ref": "http://barbican.example.com:9311/v1/secrets/d1e7ef3b-f841-4b7c-90b2-b7d90ca2d723"}
-
-In the response, ``d1e7ef3b-f841-4b7c-90b2-b7d90ca2d723`` is the key id that
-can be used in any `SSE-KMS`_ request.
-
-This newly created key is not accessible by user ``rgwcrypt-user``. This
-privilege must be added with an ACL. See `How to Set/Replace ACL`_ for more
-details.
-
-Example request (assuming that the Keystone id of ``rgwcrypt-user`` is
-``906aa90bd8a946c89cdff80d0869460f``)::
-
- PUT /v1/secrets/d1e7ef3b-f841-4b7c-90b2-b7d90ca2d723/acl HTTP/1.1
- Host: barbican.example.com:9311
- Accept: */*
- Content-Type: application/json
- X-Auth-Token: 7f7d588dd29b44df983bc961a6b73a10
- Content-Length: 101
-
- {
- "read":{
- "users":[ "906aa90bd8a946c89cdff80d0869460f" ],
- "project-access": true
- }
- }
-
-Response::
-
- {"acl_ref": "http://barbican.example.com:9311/v1/secrets/d1e7ef3b-f841-4b7c-90b2-b7d90ca2d723/acl"}
-
-Configure the Ceph Object Gateway
-=================================
-
-Edit the Ceph configuration file to add information about the Barbican server
-and Keystone user::
-
- rgw barbican url = http://barbican.example.com:9311
- rgw keystone barbican user = rgwcrypt-user
- rgw keystone barbican password = rgwcrypt-password
-
-When using Keystone API version 2::
-
- rgw keystone barbican tenant = rgwcrypt
-
-When using API version 3::
-
- rgw keystone barbican project
- rgw keystone barbican domain
-
-
-.. _Barbican: https://wiki.openstack.org/wiki/Barbican
-.. _Server-Side Encryption: ../encryption
-.. _OpenStack Keystone Integration: ../keystone
-.. _Manage projects, users, and roles: https://docs.openstack.org/admin-guide/cli-manage-projects-users-and-roles.html#create-a-user
-.. _How to Create a Secret: https://developer.openstack.org/api-guide/key-manager/secrets.html#how-to-create-a-secret
-.. _SSE-KMS: http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html
-.. _How to Set/Replace ACL: https://developer.openstack.org/api-guide/key-manager/acls.html#how-to-set-replace-acl
diff --git a/src/ceph/doc/radosgw/bucketpolicy.rst b/src/ceph/doc/radosgw/bucketpolicy.rst
deleted file mode 100644
index 85e7055..0000000
--- a/src/ceph/doc/radosgw/bucketpolicy.rst
+++ /dev/null
@@ -1,133 +0,0 @@
-===============
-Bucket Policies
-===============
-
-.. versionadded:: Luminous
-
-The Ceph Object Gateway supports a subset of the Amazon S3 policy
-language applied to buckets.
-
-
-Creation and Removal
-====================
-
-Bucket policies are managed through standard S3 operations rather than
-radosgw-admin.
-
-For example, one may use s3cmd to set or delete a policy thus::
-
- $ cat > examplepol
- {
- "Version": "2012-10-17",
- "Statement": [{
- "Effect": "Allow",
- "Principal": {"AWS": ["arn:aws:iam::usfolks:user/fred"]},
- "Action": "s3PutObjectAcl",
- "Resource": [
- "arn:aws:s3:::happybucket/*"
- ]
- }]
- }
-
- $ s3cmd setpolicy examplepol s3://happybucket
- $ s3cmd delpolicy s3://happybucket
-
-
-Limitations
-===========
-
-Currently, we support only the following actions:
-
-- s3:AbortMultipartUpload
-- s3:CreateBucket
-- s3:DeleteBucketPolicy
-- s3:DeleteBucket
-- s3:DeleteBucketWebsite
-- s3:DeleteObject
-- s3:DeleteObjectVersion
-- s3:DeleteReplicationConfiguration
-- s3:GetAccelerateConfiguration
-- s3:GetBucketAcl
-- s3:GetBucketCORS
-- s3:GetBucketLocation
-- s3:GetBucketLogging
-- s3:GetBucketNotification
-- s3:GetBucketPolicy
-- s3:GetBucketRequestPayment
-- s3:GetBucketTagging
-- s3:GetBucketVersioning
-- s3:GetBucketWebsite
-- s3:GetLifecycleConfiguration
-- s3:GetObjectAcl
-- s3:GetObject
-- s3:GetObjectTorrent
-- s3:GetObjectVersionAcl
-- s3:GetObjectVersion
-- s3:GetObjectVersionTorrent
-- s3:GetReplicationConfiguration
-- s3:ListAllMyBuckets
-- s3:ListBucketMultiPartUploads
-- s3:ListBucket
-- s3:ListBucketVersions
-- s3:ListMultipartUploadParts
-- s3:PutAccelerateConfiguration
-- s3:PutBucketAcl
-- s3:PutBucketCORS
-- s3:PutBucketLogging
-- s3:PutBucketNotification
-- s3:PutBucketPolicy
-- s3:PutBucketRequestPayment
-- s3:PutBucketTagging
-- s3:PutBucketVersioning
-- s3:PutBucketWebsite
-- s3:PutLifecycleConfiguration
-- s3:PutObjectAcl
-- s3:PutObject
-- s3:PutObjectVersionAcl
-- s3:PutReplicationConfiguration
-- s3:RestoreObject
-
-We do not yet support setting policies on users, groups, or roles.
-
-We use the RGW ‘tenant’ identifier in place of the Amazon twelve-digit
-account ID. In the future we may allow you to assign an account ID to
-a tenant, but for now if you want to use policies between AWS S3 and
-RGW S3 you will have to use the Amazon account ID as the tenant ID when
-creating users.
-
-Under AWS, all tenants share a single namespace. RGW gives every
-tenant its own namespace of buckets. There may be an option to enable
-an AWS-like 'flat' bucket namespace in future versions. At present, to
-access a bucket belonging to another tenant, address it as
-"tenant:bucket" in the S3 request.
-
-In AWS, a bucket policy can grant access to another account, and that
-account owner can then grant access to individual users with user
-permissions. Since we do not yet support user, role, and group
-permissions, account owners will currently need to grant access
-directly to individual users, and granting an entire account access to
-a bucket grants access to all users in that account.
-
-Bucket policies do not yet support string interpolation.
-
-Currently, the only condition keys we support are:
-- aws:CurrentTime
-- aws:EpochTime
-- aws:PrincipalType
-- aws:Referer
-- aws:SecureTransport
-- aws:SourceIp
-- aws:UserAgent
-- aws:username
-
-More may be supported soon as we integrate with the recently rewritten
-Authentication/Authorization subsystem.
-
-Swift
-=====
-
-There is no way to set bucket policies under Swift, but bucket
-policies that have been set govern Swift as well as S3 operations.
-
-Swift credentials are matched against Principals specified in a policy
-in a way specific to whatever backend is being used.
diff --git a/src/ceph/doc/radosgw/compression.rst b/src/ceph/doc/radosgw/compression.rst
deleted file mode 100644
index 41e535e..0000000
--- a/src/ceph/doc/radosgw/compression.rst
+++ /dev/null
@@ -1,79 +0,0 @@
-===========
-Compression
-===========
-
-.. versionadded:: Kraken
-
-The Ceph Object Gateway supports server-side compression of uploaded objects,
-using any of Ceph's existing compression plugins.
-
-
-Configuration
-=============
-
-Compression can be enabled on a Zone's placement target by providing the
-``--compression=<type>`` option to the ``radosgw-admin zone placement modify``
-command.
-
-The compression ``type`` refers to the name of the compression plugin to use
-when writing new object data. Each compressed object remembers which plugin
-was used, so changing this setting does not hinder the ability to decompress
-existing objects, not does it force existing objects to be recompressed.
-
-This compression setting applies to all new objects uploaded to buckets using
-this placement target. Compression can be disabled by setting the ``type`` to
-an empty string or ``none``.
-
-For example::
-
- $ radosgw-admin zone placement modify --rgw-zone=default --placement-id=default-placement --compression=zlib
- {
- ...
- "placement_pools": [
- {
- "key": "default-placement",
- "val": {
- "index_pool": "default.rgw.buckets.index",
- "data_pool": "default.rgw.buckets.data",
- "data_extra_pool": "default.rgw.buckets.non-ec",
- "index_type": 0,
- "compression": "zlib"
- }
- }
- ],
- ...
- }
-
-.. note:: A ``default`` zone is created for you if you have not done any
- previous `Multisite Configuration`_.
-
-
-Statistics
-==========
-
-While all existing commands and APIs continue to report object and bucket
-sizes based their uncompressed data, compression statistics for a given bucket
-are included in its ``bucket stats``::
-
- $ radosgw-admin bucket stats --bucket=<name>
- {
- ...
- "usage": {
- "rgw.main": {
- "size": 1075028,
- "size_actual": 1331200,
- "size_utilized": 592035,
- "size_kb": 1050,
- "size_kb_actual": 1300,
- "size_kb_utilized": 579,
- "num_objects": 104
- }
- },
- ...
- }
-
-The ``size_utilized`` and ``size_kb_utilized`` fields represent the total
-size of compressed data, in bytes and kilobytes respectively.
-
-
-.. _`Multisite Configuration`: ../multisite
diff --git a/src/ceph/doc/radosgw/config-ref.rst b/src/ceph/doc/radosgw/config-ref.rst
deleted file mode 100644
index ac96193..0000000
--- a/src/ceph/doc/radosgw/config-ref.rst
+++ /dev/null
@@ -1,850 +0,0 @@
-======================================
- Ceph Object Gateway Config Reference
-======================================
-
-The following settings may added to the Ceph configuration file (i.e., usually
-``ceph.conf``) under the ``[client.radosgw.{instance-name}]`` section. The
-settings may contain default values. If you do not specify each setting in the
-Ceph configuration file, the default value will be set automatically.
-
-Configuration variables set under the ``[client.radosgw.{instance-name}]``
-section will not apply to rgw or radosgw-admin commands without an instance-name
-specified in the command. Thus variables meant to be applied to all RGW
-instances or all radosgw-admin commands can be put into the ``[global]`` or the
-``[client]`` section to avoid specifying instance-name.
-
-``rgw data``
-
-:Description: Sets the location of the data files for Ceph Object Gateway.
-:Type: String
-:Default: ``/var/lib/ceph/radosgw/$cluster-$id``
-
-
-``rgw enable apis``
-
-:Description: Enables the specified APIs.
-:Type: String
-:Default: ``s3, swift, swift_auth, admin`` All APIs.
-
-
-``rgw cache enabled``
-
-:Description: Whether the Ceph Object Gateway cache is enabled.
-:Type: Boolean
-:Default: ``true``
-
-
-``rgw cache lru size``
-
-:Description: The number of entries in the Ceph Object Gateway cache.
-:Type: Integer
-:Default: ``10000``
-
-
-``rgw socket path``
-
-:Description: The socket path for the domain socket. ``FastCgiExternalServer``
- uses this socket. If you do not specify a socket path, Ceph
- Object Gateway will not run as an external server. The path you
- specify here must be the same as the path specified in the
- ``rgw.conf`` file.
-
-:Type: String
-:Default: N/A
-
-``rgw fcgi socket backlog``
-
-:Description: The socket backlog for fcgi.
-:Type: Integer
-:Default: ``1024``
-
-``rgw host``
-
-:Description: The host for the Ceph Object Gateway instance. Can be an IP
- address or a hostname.
-
-:Type: String
-:Default: ``0.0.0.0``
-
-
-``rgw port``
-
-:Description: Port the instance listens for requests. If not specified,
- Ceph Object Gateway runs external FastCGI.
-
-:Type: String
-:Default: None
-
-
-``rgw dns name``
-
-:Description: The DNS name of the served domain. See also the ``hostnames`` setting within regions.
-:Type: String
-:Default: None
-
-
-``rgw script uri``
-
-:Description: The alternative value for the ``SCRIPT_URI`` if not set
- in the request.
-
-:Type: String
-:Default: None
-
-
-``rgw request uri``
-
-:Description: The alternative value for the ``REQUEST_URI`` if not set
- in the request.
-
-:Type: String
-:Default: None
-
-
-``rgw print continue``
-
-:Description: Enable ``100-continue`` if it is operational.
-:Type: Boolean
-:Default: ``true``
-
-
-``rgw remote addr param``
-
-:Description: The remote address parameter. For example, the HTTP field
- containing the remote address, or the ``X-Forwarded-For``
- address if a reverse proxy is operational.
-
-:Type: String
-:Default: ``REMOTE_ADDR``
-
-
-``rgw op thread timeout``
-
-:Description: The timeout in seconds for open threads.
-:Type: Integer
-:Default: 600
-
-
-``rgw op thread suicide timeout``
-
-:Description: The time ``timeout`` in seconds before a Ceph Object Gateway
- process dies. Disabled if set to ``0``.
-
-:Type: Integer
-:Default: ``0``
-
-
-``rgw thread pool size``
-
-:Description: The size of the thread pool.
-:Type: Integer
-:Default: 100 threads.
-
-
-``rgw num rados handles``
-
-:Description: The number of `RADOS cluster handles`_ for Ceph Object Gateway.
- Having a configurable number of RADOS handles is resulting in
- significant performance boost for all types of workloads. Each RGW
- worker thread would now get to pick a RADOS handle for its lifetime,
- from the available bunch.
-
-:Type: Integer
-:Default: ``1``
-
-
-``rgw num control oids``
-
-:Description: The number of notification objects used for cache synchronization
- between different ``rgw`` instances.
-
-:Type: Integer
-:Default: ``8``
-
-
-``rgw init timeout``
-
-:Description: The number of seconds before Ceph Object Gateway gives up on
- initialization.
-
-:Type: Integer
-:Default: ``30``
-
-
-``rgw mime types file``
-
-:Description: The path and location of the MIME types. Used for Swift
- auto-detection of object types.
-
-:Type: String
-:Default: ``/etc/mime.types``
-
-
-``rgw gc max objs``
-
-:Description: The maximum number of objects that may be handled by
- garbage collection in one garbage collection processing cycle.
-
-:Type: Integer
-:Default: ``32``
-
-
-``rgw gc obj min wait``
-
-:Description: The minimum wait time before the object may be removed
- and handled by garbage collection processing.
-
-:Type: Integer
-:Default: ``2 * 3600``
-
-
-``rgw gc processor max time``
-
-:Description: The maximum time between the beginning of two consecutive garbage
- collection processing cycles.
-
-:Type: Integer
-:Default: ``3600``
-
-
-``rgw gc processor period``
-
-:Description: The cycle time for garbage collection processing.
-:Type: Integer
-:Default: ``3600``
-
-
-``rgw s3 success create obj status``
-
-:Description: The alternate success status response for ``create-obj``.
-:Type: Integer
-:Default: ``0``
-
-
-``rgw resolve cname``
-
-:Description: Whether ``rgw`` should use DNS CNAME record of the request
- hostname field (if hostname is not equal to ``rgw dns name``).
-
-:Type: Boolean
-:Default: ``false``
-
-
-``rgw obj stripe size``
-
-:Description: The size of an object stripe for Ceph Object Gateway objects.
- See `Architecture`_ for details on striping.
-
-:Type: Integer
-:Default: ``4 << 20``
-
-
-``rgw extended http attrs``
-
-:Description: Add new set of attributes that could be set on an entity
- (user, bucket or object). These extra attributes can be set
- through HTTP header fields when putting the entity or modifying
- it using POST method. If set, these attributes will return as
- HTTP fields when doing GET/HEAD on the entity.
-
-:Type: String
-:Default: None
-:Example: "content_foo, content_bar, x-foo-bar"
-
-
-``rgw exit timeout secs``
-
-:Description: Number of seconds to wait for a process before exiting
- unconditionally.
-
-:Type: Integer
-:Default: ``120``
-
-
-``rgw get obj window size``
-
-:Description: The window size in bytes for a single object request.
-:Type: Integer
-:Default: ``16 << 20``
-
-
-``rgw get obj max req size``
-
-:Description: The maximum request size of a single get operation sent to the
- Ceph Storage Cluster.
-
-:Type: Integer
-:Default: ``4 << 20``
-
-
-``rgw relaxed s3 bucket names``
-
-:Description: Enables relaxed S3 bucket names rules for US region buckets.
-:Type: Boolean
-:Default: ``false``
-
-
-``rgw list buckets max chunk``
-
-:Description: The maximum number of buckets to retrieve in a single operation
- when listing user buckets.
-
-:Type: Integer
-:Default: ``1000``
-
-
-``rgw override bucket index max shards``
-
-:Description: Represents the number of shards for the bucket index object,
- a value of zero indicates there is no sharding. It is not
- recommended to set a value too large (e.g. thousand) as it
- increases the cost for bucket listing.
- This variable should be set in the client or global sections
- so that it is automatically applied to radosgw-admin commands.
-
-:Type: Integer
-:Default: ``0``
-
-
-``rgw curl wait timeout ms``
-
-:Description: The timeout in milliseconds for certain ``curl`` calls.
-:Type: Integer
-:Default: ``1000``
-
-
-``rgw copy obj progress``
-
-:Description: Enables output of object progress during long copy operations.
-:Type: Boolean
-:Default: ``true``
-
-
-``rgw copy obj progress every bytes``
-
-:Description: The minimum bytes between copy progress output.
-:Type: Integer
-:Default: ``1024 * 1024``
-
-
-``rgw admin entry``
-
-:Description: The entry point for an admin request URL.
-:Type: String
-:Default: ``admin``
-
-
-``rgw content length compat``
-
-:Description: Enable compatability handling of FCGI requests with both CONTENT_LENGTH AND HTTP_CONTENT_LENGTH set.
-:Type: Boolean
-:Default: ``false``
-
-
-``rgw bucket quota ttl``
-
-:Description: The amount of time in seconds cached quota information is
- trusted. After this timeout, the quota information will be
- re-fetched from the cluster.
-:Type: Integer
-:Default: ``600``
-
-
-``rgw user quota bucket sync interval``
-
-:Description: The amount of time in seconds bucket quota information is
- accumulated before syncing to the cluster. During this time,
- other RGW instances will not see the changes in bucket quota
- stats from operations on this instance.
-:Type: Integer
-:Default: ``180``
-
-
-``rgw user quota sync interval``
-
-:Description: The amount of time in seconds user quota information is
- accumulated before syncing to the cluster. During this time,
- other RGW instances will not see the changes in user quota stats
- from operations on this instance.
-:Type: Integer
-:Default: ``180``
-
-
-``rgw bucket default quota max objects``
-
-:Description: Default max number of objects per bucket. Set on new users,
- if no other quota is specified. Has no effect on existing users.
- This variable should be set in the client or global sections
- so that it is automatically applied to radosgw-admin commands.
-:Type: Integer
-:Default: ``-1``
-
-
-``rgw bucket default quota max size``
-
-:Description: Default max capacity per bucket, in bytes. Set on new users,
- if no other quota is specified. Has no effect on existing users.
-:Type: Integer
-:Default: ``-1``
-
-
-``rgw user default quota max objects``
-
-:Description: Default max number of objects for a user. This includes all
- objects in all buckets owned by the user. Set on new users,
- if no other quota is specified. Has no effect on existing users.
-:Type: Integer
-:Default: ``-1``
-
-
-``rgw user default quota max size``
-
-:Description: The value for user max size quota in bytes set on new users,
- if no other quota is specified. Has no effect on existing users.
-:Type: Integer
-:Default: ``-1``
-
-
-``rgw verify ssl``
-
-:Description: Verify SSL certificates while making requests.
-:Type: Boolean
-:Default: ``true``
-
-
-Multisite Settings
-==================
-
-.. versionadded:: Jewel
-
-You may include the following settings in your Ceph configuration
-file under each ``[client.radosgw.{instance-name}]`` instance.
-
-
-``rgw zone``
-
-:Description: The name of the zone for the gateway instance. If no zone is
- set, a cluster-wide default can be configured with the command
- ``radosgw-admin zone default``.
-:Type: String
-:Default: None
-
-
-``rgw zonegroup``
-
-:Description: The name of the zonegroup for the gateway instance. If no
- zonegroup is set, a cluster-wide default can be configured with
- the command ``radosgw-admin zonegroup default``.
-:Type: String
-:Default: None
-
-
-``rgw realm``
-
-:Description: The name of the realm for the gateway instance. If no realm is
- set, a cluster-wide default can be configured with the command
- ``radosgw-admin realm default``.
-:Type: String
-:Default: None
-
-
-``rgw run sync thread``
-
-:Description: If there are other zones in the realm to sync from, spawn threads
- to handle the sync of data and metadata.
-:Type: Boolean
-:Default: ``true``
-
-
-``rgw data log window``
-
-:Description: The data log entries window in seconds.
-:Type: Integer
-:Default: ``30``
-
-
-``rgw data log changes size``
-
-:Description: The number of in-memory entries to hold for the data changes log.
-:Type: Integer
-:Default: ``1000``
-
-
-``rgw data log obj prefix``
-
-:Description: The object name prefix for the data log.
-:Type: String
-:Default: ``data_log``
-
-
-``rgw data log num shards``
-
-:Description: The number of shards (objects) on which to keep the
- data changes log.
-
-:Type: Integer
-:Default: ``128``
-
-
-``rgw md log max shards``
-
-:Description: The maximum number of shards for the metadata log.
-:Type: Integer
-:Default: ``64``
-
-.. important:: The values of ``rgw data log num shards`` and
- ``rgw md log max shards`` should not be changed after sync has
- started.
-
-
-Swift Settings
-==============
-
-``rgw enforce swift acls``
-
-:Description: Enforces the Swift Access Control List (ACL) settings.
-:Type: Boolean
-:Default: ``true``
-
-
-``rgw swift token expiration``
-
-:Description: The time in seconds for expiring a Swift token.
-:Type: Integer
-:Default: ``24 * 3600``
-
-
-``rgw swift url``
-
-:Description: The URL for the Ceph Object Gateway Swift API.
-:Type: String
-:Default: None
-
-
-``rgw swift url prefix``
-
-:Description: The URL prefix for the Swift StorageURL that goes in front of
- the "/v1" part. This allows to run several Gateway instances
- on the same host. For compatibility, setting this configuration
- variable to empty causes the default "/swift" to be used.
- Use explicit prefix "/" to start StorageURL at the root.
- WARNING: setting this option to "/" will NOT work if S3 API is
- enabled. From the other side disabling S3 will make impossible
- to deploy RadosGW in the multi-site configuration!
-:Default: ``swift``
-:Example: "/swift-testing"
-
-
-``rgw swift auth url``
-
-:Description: Default URL for verifying v1 auth tokens (if not using internal
- Swift auth).
-
-:Type: String
-:Default: None
-
-
-``rgw swift auth entry``
-
-:Description: The entry point for a Swift auth URL.
-:Type: String
-:Default: ``auth``
-
-
-``rgw swift versioning enabled``
-
-:Description: Enables the Object Versioning of OpenStack Object Storage API.
- This allows clients to put the ``X-Versions-Location`` attribute
- on containers that should be versioned. The attribute specifies
- the name of container storing archived versions. It must be owned
- by the same user that the versioned container due to access
- control verification - ACLs are NOT taken into consideration.
- Those containers cannot be versioned by the S3 object versioning
- mechanism.
-:Type: Boolean
-:Default: ``false``
-
-
-
-Logging Settings
-================
-
-
-``rgw log nonexistent bucket``
-
-:Description: Enables Ceph Object Gateway to log a request for a non-existent
- bucket.
-
-:Type: Boolean
-:Default: ``false``
-
-
-``rgw log object name``
-
-:Description: The logging format for an object name. See manpage
- :manpage:`date` for details about format specifiers.
-
-:Type: Date
-:Default: ``%Y-%m-%d-%H-%i-%n``
-
-
-``rgw log object name utc``
-
-:Description: Whether a logged object name includes a UTC time.
- If ``false``, it uses the local time.
-
-:Type: Boolean
-:Default: ``false``
-
-
-``rgw usage max shards``
-
-:Description: The maximum number of shards for usage logging.
-:Type: Integer
-:Default: ``32``
-
-
-``rgw usage max user shards``
-
-:Description: The maximum number of shards used for a single user's
- usage logging.
-
-:Type: Integer
-:Default: ``1``
-
-
-``rgw enable ops log``
-
-:Description: Enable logging for each successful Ceph Object Gateway operation.
-:Type: Boolean
-:Default: ``false``
-
-
-``rgw enable usage log``
-
-:Description: Enable the usage log.
-:Type: Boolean
-:Default: ``false``
-
-
-``rgw ops log rados``
-
-:Description: Whether the operations log should be written to the
- Ceph Storage Cluster backend.
-
-:Type: Boolean
-:Default: ``true``
-
-
-``rgw ops log socket path``
-
-:Description: The Unix domain socket for writing operations logs.
-:Type: String
-:Default: None
-
-
-``rgw ops log data backlog``
-
-:Description: The maximum data backlog data size for operations logs written
- to a Unix domain socket.
-
-:Type: Integer
-:Default: ``5 << 20``
-
-
-``rgw usage log flush threshold``
-
-:Description: The number of dirty merged entries in the usage log before
- flushing synchronously.
-
-:Type: Integer
-:Default: 1024
-
-
-``rgw usage log tick interval``
-
-:Description: Flush pending usage log data every ``n`` seconds.
-:Type: Integer
-:Default: ``30``
-
-
-``rgw log http headers``
-
-:Description: Comma-delimited list of HTTP headers to include with ops
- log entries. Header names are case insensitive, and use
- the full header name with words separated by underscores.
-
-:Type: String
-:Default: None
-:Example: "http_x_forwarded_for, http_x_special_k"
-
-
-``rgw intent log object name``
-
-:Description: The logging format for the intent log object name. See manpage
- :manpage:`date` for details about format specifiers.
-
-:Type: Date
-:Default: ``%Y-%m-%d-%i-%n``
-
-
-``rgw intent log object name utc``
-
-:Description: Whether the intent log object name includes a UTC time.
- If ``false``, it uses the local time.
-
-:Type: Boolean
-:Default: ``false``
-
-
-
-Keystone Settings
-=================
-
-
-``rgw keystone url``
-
-:Description: The URL for the Keystone server.
-:Type: String
-:Default: None
-
-
-``rgw keystone api version``
-
-:Description: The version (2 or 3) of OpenStack Identity API that should be
- used for communication with the Keystone server.
-:Type: Integer
-:Default: ``2``
-
-
-``rgw keystone admin domain``
-
-:Description: The name of OpenStack domain with admin privilege when using
- OpenStack Identity API v3.
-:Type: String
-:Default: None
-
-
-``rgw keystone admin project``
-
-:Description: The name of OpenStack project with admin privilege when using
- OpenStack Identity API v3. If left unspecified, value of
- ``rgw keystone admin tenant`` will be used instead.
-:Type: String
-:Default: None
-
-
-``rgw keystone admin token``
-
-:Description: The Keystone admin token (shared secret). In Ceph RadosGW
- authentication with the admin token has priority over
- authentication with the admin credentials
- (``rgw keystone admin user``, ``rgw keystone admin password``,
- ``rgw keystone admin tenant``, ``rgw keystone admin project``,
- ``rgw keystone admin domain``). Admin token feature is considered
- as deprecated.
-:Type: String
-:Default: None
-
-
-``rgw keystone admin tenant``
-
-:Description: The name of OpenStack tenant with admin privilege (Service Tenant) when
- using OpenStack Identity API v2
-:Type: String
-:Default: None
-
-
-``rgw keystone admin user``
-
-:Description: The name of OpenStack user with admin privilege for Keystone
- authentication (Service User) when OpenStack Identity API v2
-:Type: String
-:Default: None
-
-
-``rgw keystone admin password``
-
-:Description: The password for OpenStack admin user when using OpenStack
- Identity API v2
-:Type: String
-:Default: None
-
-
-``rgw keystone accepted roles``
-
-:Description: The roles requires to serve requests.
-:Type: String
-:Default: ``Member, admin``
-
-
-``rgw keystone token cache size``
-
-:Description: The maximum number of entries in each Keystone token cache.
-:Type: Integer
-:Default: ``10000``
-
-
-``rgw keystone revocation interval``
-
-:Description: The number of seconds between token revocation checks.
-:Type: Integer
-:Default: ``15 * 60``
-
-
-``rgw keystone verify ssl``
-
-:Description: Verify SSL certificates while making token requests to keystone.
-:Type: Boolean
-:Default: ``true``
-
-Barbican Settings
-=================
-
-``rgw barbican url``
-
-:Description: The URL for the Barbican server.
-:Type: String
-:Default: None
-
-``rgw keystone barbican user``
-
-:Description: The name of the OpenStack user with access to the `Barbican`_
- secrets used for `Encryption`_.
-:Type: String
-:Default: None
-
-``rgw keystone barbican password``
-
-:Description: The password associated with the `Barbican`_ user.
-:Type: String
-:Default: None
-
-``rgw keystone barbican tenant``
-
-:Description: The name of the OpenStack tenant associated with the `Barbican`_
- user when using OpenStack Identity API v2.
-:Type: String
-:Default: None
-
-``rgw keystone barbican project``
-
-:Description: The name of the OpenStack project associated with the `Barbican`_
- user when using OpenStack Identity API v3.
-:Type: String
-:Default: None
-
-``rgw keystone barbican domain``
-
-:Description: The name of the OpenStack domain associated with the `Barbican`_
- user when using OpenStack Identity API v3.
-:Type: String
-:Default: None
-
-
-.. _Architecture: ../../architecture#data-striping
-.. _Pool Configuration: ../../rados/configuration/pool-pg-config-ref/
-.. _Cluster Pools: ../../rados/operations/pools
-.. _Rados cluster handles: ../../rados/api/librados-intro/#step-2-configuring-a-cluster-handle
-.. _Barbican: ../barbican
-.. _Encryption: ../encryption
diff --git a/src/ceph/doc/radosgw/encryption.rst b/src/ceph/doc/radosgw/encryption.rst
deleted file mode 100644
index a7bb7e2..0000000
--- a/src/ceph/doc/radosgw/encryption.rst
+++ /dev/null
@@ -1,56 +0,0 @@
-==========
-Encryption
-==========
-
-.. versionadded:: Luminous
-
-The Ceph Object Gateway supports server-side encryption of uploaded objects,
-with 3 options for the management of encryption keys. Server-side encryption
-means that the data is sent over HTTP in its unencrypted form, and the Ceph
-Object Gateway stores that data in the Ceph Storage Cluster in encrypted form.
-
-Customer-Provided Keys
-======================
-
-In this mode, the client passes an encryption key along with each request to
-read or write encrypted data. It is the client's responsibility to manage those
-keys and remember which key was used to encrypt each object.
-
-This is implemented in S3 according to the `Amazon SSE-C`_ specification.
-
-As all key management is handled by the client, no special configuration is
-needed to support this encryption mode.
-
-Key Management Service
-======================
-
-This mode allows keys to be stored in a secure key management service and
-retrieved on demand by the Ceph Object Gateway to serve requests to encrypt
-or decrypt data.
-
-This is implemented in S3 according to the `Amazon SSE-KMS`_ specification.
-
-In principle, any key management service could be used here, but currently
-only integration with `Barbican`_ is implemented.
-
-See `OpenStack Barbican Integration`_.
-
-Automatic Encryption (for testing only)
-=======================================
-
-A ``rgw crypt default encryption key`` can be set in ceph.conf to force the
-encryption of all objects that do not otherwise specify an encryption mode.
-
-The configuration expects a base64-encoded 256 bit key. For example::
-
- rgw crypt default encryption key = 4YSmvJtBv0aZ7geVgAsdpRnLBEwWSWlMIGnRS8a9TSA=
-
-.. important:: This mode is for diagnostic purposes only! The ceph configuration
- file is not a secure method for storing encryption keys. Keys that are
- accidentally exposed in this way should be considered compromised.
-
-
-.. _Amazon SSE-C: https://docs.aws.amazon.com/AmazonS3/latest/dev/ServerSideEncryptionCustomerKeys.html
-.. _Amazon SSE-KMS: http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html
-.. _Barbican: https://wiki.openstack.org/wiki/Barbican
-.. _OpenStack Barbican Integration: ../barbican
diff --git a/src/ceph/doc/radosgw/index.rst b/src/ceph/doc/radosgw/index.rst
deleted file mode 100644
index 657a6f9..0000000
--- a/src/ceph/doc/radosgw/index.rst
+++ /dev/null
@@ -1,59 +0,0 @@
-=====================
- Ceph Object Gateway
-=====================
-
-:term:`Ceph Object Gateway` is an object storage interface built on top of
-``librados`` to provide applications with a RESTful gateway to
-Ceph Storage Clusters. :term:`Ceph Object Storage` supports two interfaces:
-
-#. **S3-compatible:** Provides object storage functionality with an interface
- that is compatible with a large subset of the Amazon S3 RESTful API.
-
-#. **Swift-compatible:** Provides object storage functionality with an interface
- that is compatible with a large subset of the OpenStack Swift API.
-
-Ceph Object Storage uses the Ceph Object Gateway daemon (``radosgw``), which is
-an HTTP server for interacting with a Ceph Storage Cluster. Since it
-provides interfaces compatible with OpenStack Swift and Amazon S3, the Ceph
-Object Gateway has its own user management. Ceph Object Gateway can store data
-in the same Ceph Storage Cluster used to store data from Ceph Filesystem clients
-or Ceph Block Device clients. The S3 and Swift APIs share a common namespace, so
-you may write data with one API and retrieve it with the other.
-
-.. ditaa:: +------------------------+ +------------------------+
- | S3 compatible API | | Swift compatible API |
- +------------------------+-+------------------------+
- | radosgw |
- +---------------------------------------------------+
- | librados |
- +------------------------+-+------------------------+
- | OSDs | | Monitors |
- +------------------------+ +------------------------+
-
-.. note:: Ceph Object Storage does **NOT** use the Ceph Metadata Server.
-
-
-.. toctree::
- :maxdepth: 1
-
- Manual Install w/Civetweb <../../install/install-ceph-gateway>
- Multisite Configuration <multisite>
- Configuring Pools <pools>
- Config Reference <config-ref>
- Admin Guide <admin>
- S3 API <s3>
- Swift API <swift>
- Admin Ops API <adminops>
- Python binding <api>
- Export over NFS <nfs>
- OpenStack Keystone Integration <keystone>
- OpenStack Barbican Integration <barbican>
- Multi-tenancy <multitenancy>
- Compression <compression>
- LDAP Authentication <ldap-auth>
- Server-Side Encryption <encryption>
- Bucket Policy <bucketpolicy>
- Data Layout in RADOS <layout>
- troubleshooting
- Manpage radosgw <../../man/8/radosgw>
- Manpage radosgw-admin <../../man/8/radosgw-admin>
diff --git a/src/ceph/doc/radosgw/keystone.rst b/src/ceph/doc/radosgw/keystone.rst
deleted file mode 100644
index 398276c..0000000
--- a/src/ceph/doc/radosgw/keystone.rst
+++ /dev/null
@@ -1,145 +0,0 @@
-=====================================
- Integrating with OpenStack Keystone
-=====================================
-
-It is possible to integrate the Ceph Object Gateway with Keystone, the OpenStack
-identity service. This sets up the gateway to accept Keystone as the users
-authority. A user that Keystone authorizes to access the gateway will also be
-automatically created on the Ceph Object Gateway (if didn't exist beforehand). A
-token that Keystone validates will be considered as valid by the gateway.
-
-The following configuration options are available for Keystone integration::
-
- [client.radosgw.gateway]
- rgw keystone api version = {keystone api version}
- rgw keystone url = {keystone server url:keystone server admin port}
- rgw keystone admin token = {keystone admin token}
- rgw keystone accepted roles = {accepted user roles}
- rgw keystone token cache size = {number of tokens to cache}
- rgw keystone revocation interval = {number of seconds before checking revoked tickets}
- rgw keystone implicit tenants = {true for private tenant for each new user}
- rgw s3 auth use keystone = true
- nss db path = {path to nss db}
-
-It is also possible to configure a Keystone service tenant, user & password for
-keystone (for v2.0 version of the OpenStack Identity API), similar to the way
-OpenStack services tend to be configured, this avoids the need for setting the
-shared secret ``rgw keystone admin token`` in the configuration file, which is
-recommended to be disabled in production environments. The service tenant
-credentials should have admin privileges, for more details refer the `Openstack
-keystone documentation`_, which explains the process in detail. The requisite
-configuration options for are::
-
- rgw keystone admin user = {keystone service tenant user name}
- rgw keystone admin password = {keystone service tenant user password}
- rgw keystone admin tenant = {keystone service tenant name}
-
-
-A Ceph Object Gateway user is mapped into a Keystone ``tenant``. A Keystone user
-has different roles assigned to it on possibly more than a single tenant. When
-the Ceph Object Gateway gets the ticket, it looks at the tenant, and the user
-roles that are assigned to that ticket, and accepts/rejects the request
-according to the ``rgw keystone accepted roles`` configurable.
-
-For a v3 version of the OpenStack Identity API you should replace
-``rgw keystone admin tenant`` with::
-
- rgw keystone admin domain = {keystone admin domain name}
- rgw keystone admin project = {keystone admin project name}
-
-
-Prior to Kilo
--------------
-
-Keystone itself needs to be configured to point to the Ceph Object Gateway as an
-object-storage endpoint::
-
- keystone service-create --name swift --type object-store
- keystone endpoint-create --service-id <id> --publicurl http://radosgw.example.com/swift/v1 \
- --internalurl http://radosgw.example.com/swift/v1 --adminurl http://radosgw.example.com/swift/v1
-
-
-As of Kilo
-----------
-
-Keystone itself needs to be configured to point to the Ceph Object Gateway as an
-object-storage endpoint::
-
- openstack service create --name=swift \
- --description="Swift Service" \
- object-store
- +-------------+----------------------------------+
- | Field | Value |
- +-------------+----------------------------------+
- | description | Swift Service |
- | enabled | True |
- | id | 37c4c0e79571404cb4644201a4a6e5ee |
- | name | swift |
- | type | object-store |
- +-------------+----------------------------------+
-
- openstack endpoint create --region RegionOne \
- --publicurl "http://radosgw.example.com:8080/swift/v1" \
- --adminurl "http://radosgw.example.com:8080/swift/v1" \
- --internalurl "http://radosgw.example.com:8080/swift/v1" \
- swift
- +--------------+------------------------------------------+
- | Field | Value |
- +--------------+------------------------------------------+
- | adminurl | http://radosgw.example.com:8080/swift/v1 |
- | id | e4249d2b60e44743a67b5e5b38c18dd3 |
- | internalurl | http://radosgw.example.com:8080/swift/v1 |
- | publicurl | http://radosgw.example.com:8080/swift/v1 |
- | region | RegionOne |
- | service_id | 37c4c0e79571404cb4644201a4a6e5ee |
- | service_name | swift |
- | service_type | object-store |
- +--------------+------------------------------------------+
-
- $ openstack endpoint show object-store
- +--------------+------------------------------------------+
- | Field | Value |
- +--------------+------------------------------------------+
- | adminurl | http://radosgw.example.com:8080/swift/v1 |
- | enabled | True |
- | id | e4249d2b60e44743a67b5e5b38c18dd3 |
- | internalurl | http://radosgw.example.com:8080/swift/v1 |
- | publicurl | http://radosgw.example.com:8080/swift/v1 |
- | region | RegionOne |
- | service_id | 37c4c0e79571404cb4644201a4a6e5ee |
- | service_name | swift |
- | service_type | object-store |
- +--------------+------------------------------------------+
-
-
-The keystone URL is the Keystone admin RESTful API URL. The admin token is the
-token that is configured internally in Keystone for admin requests.
-
-The Ceph Object Gateway will query Keystone periodically for a list of revoked
-tokens. These requests are encoded and signed. Also, Keystone may be configured
-to provide self-signed tokens, which are also encoded and signed. The gateway
-needs to be able to decode and verify these signed messages, and the process
-requires that the gateway be set up appropriately. Currently, the Ceph Object
-Gateway will only be able to perform the procedure if it was compiled with
-``--with-nss``. Configuring the Ceph Object Gateway to work with Keystone also
-requires converting the OpenSSL certificates that Keystone uses for creating the
-requests to the nss db format, for example::
-
- mkdir /var/ceph/nss
-
- openssl x509 -in /etc/keystone/ssl/certs/ca.pem -pubkey | \
- certutil -d /var/ceph/nss -A -n ca -t "TCu,Cu,Tuw"
- openssl x509 -in /etc/keystone/ssl/certs/signing_cert.pem -pubkey | \
- certutil -A -d /var/ceph/nss -n signing_cert -t "P,P,P"
-
-
-
-Openstack keystone may also be terminated with a self signed ssl certificate, in
-order for radosgw to interact with keystone in such a case, you could either
-install keystone's ssl certificate in the node running radosgw. Alternatively
-radosgw could be made to not verify the ssl certificate at all (similar to
-openstack clients with a ``--insecure`` switch) by setting the value of the
-configurable ``rgw keystone verify ssl`` to false.
-
-
-.. _Openstack keystone documentation: http://docs.openstack.org/developer/keystone/configuringservices.html#setting-up-projects-users-and-roles
diff --git a/src/ceph/doc/radosgw/layout.rst b/src/ceph/doc/radosgw/layout.rst
deleted file mode 100644
index 04a525b..0000000
--- a/src/ceph/doc/radosgw/layout.rst
+++ /dev/null
@@ -1,208 +0,0 @@
-===========================
- Rados Gateway Data Layout
-===========================
-
-Although the source code is the ultimate guide, this document helps
-new developers to get up to speed with the implementation details.
-
-Introduction
-------------
-
-Swift offers something called a container, that we use interchangeably with
-the term bucket. One may say that RGW's buckets implement Swift containers.
-
-This document does not consider how RGW operates on these structures,
-e.g. the use of encode() and decode() methods for serialization and so on.
-
-Conceptual View
----------------
-
-Although RADOS only knows about pools and objects with their xattrs and
-omap[1], conceptually RGW organizes its data into three different kinds:
-metadata, bucket index, and data.
-
-Metadata
-^^^^^^^^
-
-We have 3 'sections' of metadata: 'user', 'bucket', and 'bucket.instance'.
-You can use the following commands to introspect metadata entries: ::
-
- $ radosgw-admin metadata list
- $ radosgw-admin metadata list bucket
- $ radosgw-admin metadata list bucket.instance
- $ radosgw-admin metadata list user
-
- $ radosgw-admin metadata get bucket:<bucket>
- $ radosgw-admin metadata get bucket.instance:<bucket>:<bucket_id>
- $ radosgw-admin metadata get user:<user> # get or set
-
-Some variables have been used in above commands, they are:
-
-- user: Holds user information
-- bucket: Holds a mapping between bucket name and bucket instance id
-- bucket.instance: Holds bucket instance information[2]
-
-Every metadata entry is kept on a single rados object.
-See below for implementation defails.
-
-Note that the metadata is not indexed. When listing a metadata section we do a
-rados pgls operation on the containing pool.
-
-Bucket Index
-^^^^^^^^^^^^
-
-It's a different kind of metadata, and kept separately. The bucket index holds
-a key-value map in rados objects. By default it is a single rados object per
-bucket, but it is possible since Hammer to shard that map over multiple rados
-objects. The map itself is kept in omap, associated with each rados object.
-The key of each omap is the name of the objects, and the value holds some basic
-metadata of that object -- metadata that shows up when listing the bucket.
-Also, each omap holds a header, and we keep some bucket accounting metadata
-in that header (number of objects, total size, etc.).
-
-Note that we also hold other information in the bucket index, and it's kept in
-other key namespaces. We can hold the bucket index log there, and for versioned
-objects there is more information that we keep on other keys.
-
-Data
-^^^^
-
-Objects data is kept in one or more rados objects for each rgw object.
-
-Object Lookup Path
-------------------
-
-When accessing objects, ReST APIs come to RGW with three parameters:
-account information (access key in S3 or account name in Swift),
-bucket or container name, and object name (or key). At present, RGW only
-uses account information to find out the user ID and for access control.
-Only the bucket name and object key are used to address the object in a pool.
-
-The user ID in RGW is a string, typically the actual user name from the user
-credentials and not a hashed or mapped identifier.
-
-When accessing a user's data, the user record is loaded from an object
-"<user_id>" in pool "default.rgw.meta" with namespace "users.uid".
-
-Bucket names are represented in the pool "default.rgw.meta" with namespace
-"root". Bucket record is
-loaded in order to obtain so-called marker, which serves as a bucket ID.
-
-The object is located in pool "default.rgw.buckets.data".
-Object name is "<marker>_<key>",
-for example "default.7593.4_image.png", where the marker is "default.7593.4"
-and the key is "image.png". Since these concatenated names are not parsed,
-only passed down to RADOS, the choice of the separator is not important and
-causes no ambiguity. For the same reason, slashes are permitted in object
-names (keys).
-
-It is also possible to create multiple data pools and make it so that
-different users buckets will be created in different rados pools by default,
-thus providing the necessary scaling. The layout and naming of these pools
-is controlled by a 'policy' setting.[3]
-
-An RGW object may consist of several RADOS objects, the first of which
-is the head that contains the metadata, such as manifest, ACLs, content type,
-ETag, and user-defined metadata. The metadata is stored in xattrs.
-The head may also contain up to 512 kilobytes of object data, for efficiency
-and atomicity. The manifest describes how each object is laid out in RADOS
-objects.
-
-Bucket and Object Listing
--------------------------
-
-Buckets that belong to a given user are listed in an omap of an object named
-"<user_id>.buckets" (for example, "foo.buckets") in pool "default.rgw.meta"
-with namespace "users.uid".
-These objects are accessed when listing buckets, when updating bucket
-contents, and updating and retrieving bucket statistics (e.g. for quota).
-
-See the user-visible, encoded class 'cls_user_bucket_entry' and its
-nested class 'cls_user_bucket' for the values of these omap entires.
-
-These listings are kept consistent with buckets in pool ".rgw".
-
-Objects that belong to a given bucket are listed in a bucket index,
-as discussed in sub-section 'Bucket Index' above. The default naming
-for index objects is ".dir.<marker>" in pool "default.rgw.buckets.index".
-
-Footnotes
----------
-
-[1] Omap is a key-value store, associated with an object, in a way similar
-to how Extended Attributes associate with a POSIX file. An object's omap
-is not physically located in the object's storage, but its precise
-implementation is invisible and immaterial to RADOS Gateway.
-In Hammer, one LevelDB is used to store omap in each OSD.
-
-[2] Before the Dumpling release, the 'bucket.instance' metadata did not
-exist and the 'bucket' metadata contained its information. It is possible
-to encounter such buckets in old installations.
-
-[3] The pool names have been changed starting with the Infernalis release.
-If you are looking at an older setup, some details may be different. In
-particular there was a different pool for each of the namespaces that are
-now being used inside the default.root.meta pool.
-
-Appendix: Compendium
---------------------
-
-Known pools:
-
-.rgw.root
- Unspecified region, zone, and global information records, one per object.
-
-<zone>.rgw.control
- notify.<N>
-
-<zone>.rgw.meta
- Multiple namespaces with different kinds of metadata:
-
- namespace: root
- <bucket>
- .bucket.meta.<bucket>:<marker> # see put_bucket_instance_info()
-
- The tenant is used to disambiguate buckets, but not bucket instances.
- Example::
-
- .bucket.meta.prodtx:test%25star:default.84099.6
- .bucket.meta.testcont:default.4126.1
- .bucket.meta.prodtx:testcont:default.84099.4
- prodtx/testcont
- prodtx/test%25star
- testcont
-
- namespace: users.uid
- Contains _both_ per-user information (RGWUserInfo) in "<user>" objects
- and per-user lists of buckets in omaps of "<user>.buckets" objects.
- The "<user>" may contain the tenant if non-empty, for example::
-
- prodtx$prodt
- test2.buckets
- prodtx$prodt.buckets
- test2
-
- namespace: users.email
- Unimportant
-
- namespace: users.keys
- 47UA98JSTJZ9YAN3OS3O
-
- This allows radosgw to look up users by their access keys during authentication.
-
- namespace: users.swift
- test:tester
-
-<zone>.rgw.buckets.index
- Objects are named ".dir.<marker>", each contains a bucket index.
- If the index is sharded, each shard appends the shard index after
- the marker.
-
-<zone>.rgw.buckets.data
- default.7593.4__shadow_.488urDFerTYXavx4yAd-Op8mxehnvTI_1
- <marker>_<key>
-
-An example of a marker would be "default.16004.1" or "default.7593.4".
-The current format is "<zone>.<instance_id>.<bucket_id>". But once
-generated, a marker is not parsed again, so its format may change
-freely in the future.
diff --git a/src/ceph/doc/radosgw/ldap-auth.rst b/src/ceph/doc/radosgw/ldap-auth.rst
deleted file mode 100644
index c67da04..0000000
--- a/src/ceph/doc/radosgw/ldap-auth.rst
+++ /dev/null
@@ -1,138 +0,0 @@
-===================
-LDAP Authentication
-===================
-
-.. versionadded:: Jewel
-
-You can delegate the Ceph Object Gateway authentication to an LDAP server.
-
-How it works
-============
-
-The Ceph Object Gateway extracts the users LDAP credentials from a token. A
-search filter is constructed with the user name. The Ceph Object Gateway uses
-the configured service account to search the directory for a matching entry. If
-an entry is found, the Ceph Object Gateway attempts to bind to the found
-distinguished name with the password from the token. If the credentials are
-valid, the bind will succeed, and the Ceph Object Gateway will grant access.
-
-You can limit the allowed users by setting the base for the search to a
-specific organizational unit or by specifying a custom search filter, for
-example requiring specific group membership, custom object classes, or
-attributes.
-
-Requirements
-============
-
-- **LDAP or Active Directory:** A running LDAP instance accessible by the Ceph
- Object Gateway
-- **Service account:** LDAP credentials to be used by the Ceph Object Gateway
- with search permissions
-- **User account:** At least one user account in the LDAP directory
-- **Do not overlap LDAP and local users:** You should not use the same user
- names for local users and for users being authenticated by using LDAP. The
- Ceph Object Gateway cannot distinguish them and it treats them as the same
- user.
-
-Sanity checks
-=============
-
-Use the ``ldapsearch`` utility to verify the service account or the LDAP connection:
-
-::
-
- # ldapsearch -x -D "uid=ceph,ou=system,dc=example,dc=com" -W \
- -H ldaps://example.com -b "ou=users,dc=example,dc=com" 'uid=*' dn
-
-.. note:: Make sure to use the same LDAP parameters like in the Ceph configuration file to
- eliminate possible problems.
-
-Configuring the Ceph Object Gateway to use LDAP authentication
-==============================================================
-
-The following parameters in the Ceph configuration file are related to the LDAP
-authentication:
-
-- ``rgw_ldap_uri``: Specifies the LDAP server to use. Make sure to use the
- ``ldaps://<fqdn>:<port>`` parameter to not transmit clear text credentials
- over the wire.
-- ``rgw_ldap_binddn``: The Distinguished Name (DN) of the service account used
- by the Ceph Object Gateway
-- ``rgw_ldap_secret``: The password for the service account
-- ``rgw_ldap_searchdn``: Specifies the base in the directory information tree
- for searching users. This might be your users organizational unit or some
- more specific Organizational Unit (OU).
-- ``rgw_ldap_dnattr``: The attribute being used in the constructed search
- filter to match a username. Depending on your Directory Information Tree
- (DIT) this would probably be ``uid`` or ``cn``.
-- ``rgw_search_filter``: If not specified, the Ceph Object Gateway
- automatically constructs the search filter with the ``rgw_ldap_dnattr``
- setting. Use this parameter to narrow the list of allowed users in very
- flexible ways. Consult the *Using a custom search filter to limit user access
- section* for details
-
-Using a custom search filter to limit user access
-=================================================
-
-There are two ways to use the ``rgw_search_filter`` parameter:
-
-Specifying a partial filter to further limit the constructed search filter
---------------------------------------------------------------------------
-
-An example for a partial filter:
-
-::
-
- "objectclass=inetorgperson"
-
-The Ceph Object Gateway will generate the search filter as usual with the
-user name from the token and the value of ``rgw_ldap_dnattr``. The constructed
-filter is then combined with the partial filter from the ``rgw_search_filter``
-attribute. Depending on the user name and the settings the final search filter
-might become:
-
-::
-
- "(&(uid=hari)(objectclass=inetorgperson))"
-
-So user ``hari`` will only be granted access if he is found in the LDAP
-directory, has an object class of ``inetorgperson``, and did specify a valid
-password.
-
-Specifying a complete filter
-----------------------------
-
-A complete filter must contain a ``USERNAME`` token which will be substituted
-with the user name during the authentication attempt. The ``rgw_ldap_dnattr``
-parameter is not used anymore in this case. For example, to limit valid users
-to a specific group, use the following filter:
-
-::
-
- "(&(uid=USERNAME)(memberOf=cn=ceph-users,ou=groups,dc=mycompany,dc=com))"
-
-.. note:: Using the ``memberOf`` attribute in LDAP searches requires server side
- support from you specific LDAP server implementation.
-
-Generating an access token for LDAP authentication
-==================================================
-
-The ``radosgw-token`` utility generates the access token based on the LDAP
-user name and password. It will output a base-64 encoded string which is the
-access token.
-
-::
-
- # export RGW_ACCESS_KEY_ID="<username>"
- # export RGW_SECRET_ACCESS_KEY="<password>"
- # radosgw-token --encode --ttype=ldap
-
-.. note:: For Active Directroy use the ``--ttype=ad`` parameter.
-
-.. important:: The access token is a base-64 encoded JSON struct and contains
- the LDAP credentials as a clear text.
-
-Testing access
-==============
-
-Use your favorite S3 client and specify the token as the access key.
diff --git a/src/ceph/doc/radosgw/multisite.rst b/src/ceph/doc/radosgw/multisite.rst
deleted file mode 100644
index 0c2c442..0000000
--- a/src/ceph/doc/radosgw/multisite.rst
+++ /dev/null
@@ -1,1459 +0,0 @@
-==========
-Multi-Site
-==========
-
-.. versionadded:: Jewel
-
-A single zone configuration typically consists of one zone group containing one
-zone and one or more `ceph-radosgw` instances where you may load-balance gateway
-client requests between the instances. In a single zone configuration, typically
-multiple gateway instances point to a single Ceph storage cluster. However, Kraken
-supports several multi-site configuration options for the Ceph Object Gateway:
-
-- **Multi-zone:** A more advanced configuration consists of one zone group and
- multiple zones, each zone with one or more `ceph-radosgw` instances. Each zone
- is backed by its own Ceph Storage Cluster. Multiple zones in a zone group
- provides disaster recovery for the zone group should one of the zones experience
- a significant failure. In Kraken, each zone is active and may receive write
- operations. In addition to disaster recovery, multiple active zones may also
- serve as a foundation for content delivery networks.
-
-- **Multi-zone-group:** Formerly called 'regions', Ceph Object Gateway can also
- support multiple zone groups, each zone group with one or more zones. Objects
- stored to zones in one zone group within the same realm as another zone
- group will share a global object namespace, ensuring unique object IDs across
- zone groups and zones.
-
-- **Multiple Realms:** In Kraken, the Ceph Object Gateway supports the notion
- of realms, which can be a single zone group or multiple zone groups and
- a globally unique namespace for the realm. Multiple realms provide the ability
- to support numerous configurations and namespaces.
-
-Replicating object data between zones within a zone group looks something
-like this:
-
-.. image:: ../images/zone-sync2.png
- :align: center
-
-For additional details on setting up a cluster, see `Ceph Object Gateway for
-Production <https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/2/html/ceph_object_gateway_for_production/>`__.
-
-Functional Changes from Infernalis
-==================================
-
-In Kraken, you can configure each Ceph Object Gateway to
-work in an active-active zone configuration, allowing for writes to
-non-master zones.
-
-The multi-site configuration is stored within a container called a
-"realm." The realm stores zone groups, zones, and a time "period" with
-multiple epochs for tracking changes to the configuration. In Kraken,
-the ``ceph-radosgw`` daemons handle the synchronization,
-eliminating the need for a separate synchronization agent. Additionally,
-the new approach to synchronization allows the Ceph Object Gateway to
-operate with an "active-active" configuration instead of
-"active-passive".
-
-Requirements and Assumptions
-============================
-
-A multi-site configuration requires at least two Ceph storage clusters,
-preferably given a distinct cluster name. At least two Ceph object
-gateway instances, one for each Ceph storage cluster.
-
-This guide assumes at least two Ceph storage clusters in geographically
-separate locations; however, the configuration can work on the same
-site. This guide also assumes two Ceph object gateway servers named
-``rgw1`` and ``rgw2``.
-
-A multi-site configuration requires a master zone group and a master
-zone. Additionally, each zone group requires a master zone. Zone groups
-may have one or more secondary or non-master zones.
-
-In this guide, the ``rgw1`` host will serve as the master zone of the
-master zone group; and, the ``rgw2`` host will serve as the secondary zone
-of the master zone group.
-
-See `Pools`_ for instructions on creating and tuning pools for Ceph
-Object Storage.
-
-
-Configuring a Master Zone
-=========================
-
-All gateways in a multi-site configuration will retrieve their
-configuration from a ``ceph-radosgw`` daemon on a host within the master
-zone group and master zone. To configure your gateways in a multi-site
-configuration, choose a ``ceph-radosgw`` instance to configure the
-master zone group and master zone.
-
-Create a Realm
---------------
-
-A realm contains the multi-site configuration of zone groups and zones
-and also serves to enforce a globally unique namespace within the realm.
-
-Create a new realm for the multi-site configuration by opening a command
-line interface on a host identified to serve in the master zone group
-and zone. Then, execute the following:
-
-::
-
- # radosgw-admin realm create --rgw-realm={realm-name} [--default]
-
-For example:
-
-::
-
- # radosgw-admin realm create --rgw-realm=movies --default
-
-If the cluster will have a single realm, specify the ``--default`` flag.
-If ``--default`` is specified, ``radosgw-admin`` will use this realm by
-default. If ``--default`` is not specified, adding zone-groups and zones
-requires specifying either the ``--rgw-realm`` flag or the
-``--realm-id`` flag to identify the realm when adding zone groups and
-zones.
-
-After creating the realm, ``radosgw-admin`` will echo back the realm
-configuration. For example:
-
-::
-
- {
- "id": "0956b174-fe14-4f97-8b50-bb7ec5e1cf62",
- "name": "movies",
- "current_period": "1950b710-3e63-4c41-a19e-46a715000980",
- "epoch": 1
- }
-
-.. note:: Ceph generates a unique ID for the realm, which allows the renaming
- of a realm if the need arises.
-
-Create a Master Zone Group
---------------------------
-
-A realm must have at least one zone group, which will serve as the
-master zone group for the realm.
-
-Create a new master zone group for the multi-site configuration by
-opening a command line interface on a host identified to serve in the
-master zone group and zone. Then, execute the following:
-
-::
-
- # radosgw-admin zonegroup create --rgw-zonegroup={name} --endpoints={url} [--rgw-realm={realm-name}|--realm-id={realm-id}] --master --default
-
-For example:
-
-::
-
- # radosgw-admin zonegroup create --rgw-zonegroup=us --endpoints=http://rgw1:80 --rgw-realm=movies --master --default
-
-If the realm will only have a single zone group, specify the
-``--default`` flag. If ``--default`` is specified, ``radosgw-admin``
-will use this zone group by default when adding new zones. If
-``--default`` is not specified, adding zones will require either the
-``--rgw-zonegroup`` flag or the ``--zonegroup-id`` flag to identify the
-zone group when adding or modifying zones.
-
-After creating the master zone group, ``radosgw-admin`` will echo back
-the zone group configuration. For example:
-
-::
-
- {
- "id": "f1a233f5-c354-4107-b36c-df66126475a6",
- "name": "us",
- "api_name": "us",
- "is_master": "true",
- "endpoints": [
- "http:\/\/rgw1:80"
- ],
- "hostnames": [],
- "hostnames_s3webzone": [],
- "master_zone": "",
- "zones": [],
- "placement_targets": [],
- "default_placement": "",
- "realm_id": "0956b174-fe14-4f97-8b50-bb7ec5e1cf62"
- }
-
-Create a Master Zone
---------------------
-
-.. important:: Zones must be created on a Ceph Object Gateway node that will be
- within the zone.
-
-Create a new master zone for the multi-site configuration by opening a
-command line interface on a host identified to serve in the master zone
-group and zone. Then, execute the following:
-
-::
-
- # radosgw-admin zone create --rgw-zonegroup={zone-group-name} \
- --rgw-zone={zone-name} \
- --master --default \
- --endpoints={http://fqdn}[,{http://fqdn}]
-
-
-For example:
-
-::
-
- # radosgw-admin zone create --rgw-zonegroup=us --rgw-zone=us-east \
- --master --default \
- --endpoints={http://fqdn}[,{http://fqdn}]
-
-
-.. note:: The ``--access-key`` and ``--secret`` aren’t specified. These
- settings will be added to the zone once the user is created in the
- next section.
-
-.. important:: The following steps assume a multi-site configuration using newly
- installed systems that aren’t storing data yet. DO NOT DELETE the
- ``default`` zone and its pools if you are already using it to store
- data, or the data will be deleted and unrecoverable.
-
-Delete Default Zone Group and Zone
-----------------------------------
-
-Delete the ``default`` zone if it exists. Make sure to remove it from
-the default zone group first.
-
-::
-
- # radosgw-admin zonegroup remove --rgw-zonegroup=default --rgw-zone=default
- # radosgw-admin period update --commit
- # radosgw-admin zone delete --rgw-zone=default
- # radosgw-admin period update --commit
- # radosgw-admin zonegroup delete --rgw-zonegroup=default
- # radosgw-admin period update --commit
-
-Finally, delete the ``default`` pools in your Ceph storage cluster if
-they exist.
-
-.. important:: The following step assumes a multi-site configuration using newly
- installed systems that aren’t currently storing data. DO NOT DELETE
- the ``default`` zone group if you are already using it to store
- data.
-
-::
-
- # rados rmpool default.rgw.control default.rgw.control --yes-i-really-really-mean-it
- # rados rmpool default.rgw.data.root default.rgw.data.root --yes-i-really-really-mean-it
- # rados rmpool default.rgw.gc default.rgw.gc --yes-i-really-really-mean-it
- # rados rmpool default.rgw.log default.rgw.log --yes-i-really-really-mean-it
- # rados rmpool default.rgw.users.uid default.rgw.users.uid --yes-i-really-really-mean-it
-
-Create a System User
---------------------
-
-The ``ceph-radosgw`` daemons must authenticate before pulling realm and
-period information. In the master zone, create a system user to
-facilitate authentication between daemons.
-
-::
-
- # radosgw-admin user create --uid="{user-name}" --display-name="{Display Name}" --system
-
-For example:
-
-::
-
- # radosgw-admin user create --uid="synchronization-user" --display-name="Synchronization User" --system
-
-Make a note of the ``access_key`` and ``secret_key``, as the secondary
-zones will require them to authenticate with the master zone.
-
-Finally, add the system user to the master zone.
-
-::
-
- # radosgw-admin zone modify --rgw-zone=us-east --access-key={access-key} --secret={secret}
- # radosgw-admin period update --commit
-
-Update the Period
------------------
-
-After updating the master zone configuration, update the period.
-
-::
-
- # radosgw-admin period update --commit
-
-.. note:: Updating the period changes the epoch, and ensures that other zones
- will receive the updated configuration.
-
-Update the Ceph Configuration File
-----------------------------------
-
-Update the Ceph configuration file on master zone hosts by adding the
-``rgw_zone`` configuration option and the name of the master zone to the
-instance entry.
-
-::
-
- [client.rgw.{instance-name}]
- ...
- rgw_zone={zone-name}
-
-For example:
-
-::
-
- [client.rgw.rgw1]
- host = rgw1
- rgw frontends = "civetweb port=80"
- rgw_zone=us-east
-
-Start the Gateway
------------------
-
-On the object gateway host, start and enable the Ceph Object Gateway
-service:
-
-::
-
- # systemctl start ceph-radosgw@rgw.`hostname -s`
- # systemctl enable ceph-radosgw@rgw.`hostname -s`
-
-Configure Secondary Zones
-=========================
-
-Zones within a zone group replicate all data to ensure that each zone
-has the same data. When creating the secondary zone, execute all of the
-following operations on a host identified to serve the secondary zone.
-
-.. note:: To add a third zone, follow the same procedures as for adding the
- secondary zone. Use different zone name.
-
-.. important:: You must execute metadata operations, such as user creation, on a
- host within the master zone. The master zone and the secondary zone
- can receive bucket operations, but the secondary zone redirects
- bucket operations to the master zone. If the master zone is down,
- bucket operations will fail.
-
-Pull the Realm
---------------
-
-Using the URL path, access key and secret of the master zone in the
-master zone group, pull the realm to the host. To pull a non-default
-realm, specify the realm using the ``--rgw-realm`` or ``--realm-id``
-configuration options.
-
-::
-
- # radosgw-admin realm pull --url={url-to-master-zone-gateway} --access-key={access-key} --secret={secret}
-
-If this realm is the default realm or the only realm, make the realm the
-default realm.
-
-::
-
- # radosgw-admin realm default --rgw-realm={realm-name}
-
-Pull the Period
----------------
-
-Using the URL path, access key and secret of the master zone in the
-master zone group, pull the period to the host. To pull a period from a
-non-default realm, specify the realm using the ``--rgw-realm`` or
-``--realm-id`` configuration options.
-
-::
-
- # radosgw-admin period pull --url={url-to-master-zone-gateway} --access-key={access-key} --secret={secret}
-
-
-.. note:: Pulling the period retrieves the latest version of the zone group
- and zone configurations for the realm.
-
-Create a Secondary Zone
------------------------
-
-.. important:: Zones must be created on a Ceph Object Gateway node that will be
- within the zone.
-
-Create a secondary zone for the multi-site configuration by opening a
-command line interface on a host identified to serve the secondary zone.
-Specify the zone group ID, the new zone name and an endpoint for the
-zone. **DO NOT** use the ``--master`` or ``--default`` flags. In Kraken,
-all zones run in an active-active configuration by
-default; that is, a gateway client may write data to any zone and the
-zone will replicate the data to all other zones within the zone group.
-If the secondary zone should not accept write operations, specify the
-``--read-only`` flag to create an active-passive configuration between
-the master zone and the secondary zone. Additionally, provide the
-``access_key`` and ``secret_key`` of the generated system user stored in
-the master zone of the master zone group. Execute the following:
-
-::
-
- # radosgw-admin zone create --rgw-zonegroup={zone-group-name}\
- --rgw-zone={zone-name} --endpoints={url} \
- --access-key={system-key} --secret={secret}\
- --endpoints=http://{fqdn}:80 \
- [--read-only]
-
-For example:
-
-::
-
- # radosgw-admin zone create --rgw-zonegroup=us --rgw-zone=us-west \
- --access-key={system-key} --secret={secret} \
- --endpoints=http://rgw2:80
-
-.. important:: The following steps assume a multi-site configuration using newly
- installed systems that aren’t storing data. **DO NOT DELETE** the
- ``default`` zone and its pools if you are already using it to store
- data, or the data will be lost and unrecoverable.
-
-Delete the default zone if needed.
-
-::
-
- # radosgw-admin zone delete --rgw-zone=default
-
-Finally, delete the default pools in your Ceph storage cluster if
-needed.
-
-::
-
- # rados rmpool default.rgw.control default.rgw.control --yes-i-really-really-mean-it
- # rados rmpool default.rgw.data.root default.rgw.data.root --yes-i-really-really-mean-it
- # rados rmpool default.rgw.gc default.rgw.gc --yes-i-really-really-mean-it
- # rados rmpool default.rgw.log default.rgw.log --yes-i-really-really-mean-it
- # rados rmpool default.rgw.users.uid default.rgw.users.uid --yes-i-really-really-mean-it
-
-Update the Ceph Configuration File
-----------------------------------
-
-Update the Ceph configuration file on the secondary zone hosts by adding
-the ``rgw_zone`` configuration option and the name of the secondary zone
-to the instance entry.
-
-::
-
- [client.rgw.{instance-name}]
- ...
- rgw_zone={zone-name}
-
-For example:
-
-::
-
- [client.rgw.rgw2]
- host = rgw2
- rgw frontends = "civetweb port=80"
- rgw_zone=us-west
-
-Update the Period
------------------
-
-After updating the master zone configuration, update the period.
-
-::
-
- # radosgw-admin period update --commit
-
-.. note:: Updating the period changes the epoch, and ensures that other zones
- will receive the updated configuration.
-
-Start the Gateway
------------------
-
-On the object gateway host, start and enable the Ceph Object Gateway
-service:
-
-::
-
- # systemctl start ceph-radosgw@rgw.`hostname -s`
- # systemctl enable ceph-radosgw@rgw.`hostname -s`
-
-Check Synchronization Status
-----------------------------
-
-Once the secondary zone is up and running, check the synchronization
-status. Synchronization copies users and buckets created in the master
-zone to the secondary zone.
-
-::
-
- # radosgw-admin sync status
-
-The output will provide the status of synchronization operations. For
-example:
-
-::
-
- realm f3239bc5-e1a8-4206-a81d-e1576480804d (earth)
- zonegroup c50dbb7e-d9ce-47cc-a8bb-97d9b399d388 (us)
- zone 4c453b70-4a16-4ce8-8185-1893b05d346e (us-west)
- metadata sync syncing
- full sync: 0/64 shards
- metadata is caught up with master
- incremental sync: 64/64 shards
- data sync source: 1ee9da3e-114d-4ae3-a8a4-056e8a17f532 (us-east)
- syncing
- full sync: 0/128 shards
- incremental sync: 128/128 shards
- data is caught up with source
-
-.. note:: Secondary zones accept bucket operations; however, secondary zones
- redirect bucket operations to the master zone and then synchronize
- with the master zone to receive the result of the bucket operations.
- If the master zone is down, bucket operations executed on the
- secondary zone will fail, but object operations should succeed.
-
-
-Maintenance
-===========
-
-Checking the Sync Status
-------------------------
-
-Information about the replication status of a zone can be queried with::
-
- $ radosgw-admin sync status
- realm b3bc1c37-9c44-4b89-a03b-04c269bea5da (earth)
- zonegroup f54f9b22-b4b6-4a0e-9211-fa6ac1693f49 (us)
- zone adce11c9-b8ed-4a90-8bc5-3fc029ff0816 (us-2)
- metadata sync syncing
- full sync: 0/64 shards
- incremental sync: 64/64 shards
- metadata is behind on 1 shards
- oldest incremental change not applied: 2017-03-22 10:20:00.0.881361s
- data sync source: 341c2d81-4574-4d08-ab0f-5a2a7b168028 (us-1)
- syncing
- full sync: 0/128 shards
- incremental sync: 128/128 shards
- data is caught up with source
- source: 3b5d1a3f-3f27-4e4a-8f34-6072d4bb1275 (us-3)
- syncing
- full sync: 0/128 shards
- incremental sync: 128/128 shards
- data is caught up with source
-
-Changing the Metadata Master Zone
----------------------------------
-
-.. important:: Care must be taken when changing which zone is the metadata
- master. If a zone has not finished syncing metadata from the current master
- zone, it will be unable to serve any remaining entries when promoted to
- master and those changes will be lost. For this reason, waiting for a
- zone's ``radosgw-admin sync status`` to catch up on metadata sync before
- promoting it to master is recommended.
-
- Similarly, if changes to metadata are being processed by the current master
- zone while another zone is being promoted to master, those changes are
- likely to be lost. To avoid this, shutting down any ``radosgw`` instances
- on the previous master zone is recommended. After promoting another zone,
- its new period can be fetched with ``radosgw-admin period pull`` and the
- gateway(s) can be restarted.
-
-To promote a zone (for example, zone ``us-2`` in zonegroup ``us``) to metadata
-master, run the following commands on that zone::
-
- $ radosgw-admin zone modify --rgw-zone=us-2 --master
- $ radosgw-admin zonegroup modify --rgw-zonegroup=us --master
- $ radosgw-admin period update --commit
-
-This will generate a new period, and the radosgw instance(s) in zone ``us-2``
-will send this period to other zones.
-
-Failover and Disaster Recovery
-==============================
-
-If the master zone should fail, failover to the secondary zone for
-disaster recovery.
-
-1. Make the secondary zone the master and default zone. For example:
-
- ::
-
- # radosgw-admin zone modify --rgw-zone={zone-name} --master --default
-
- By default, Ceph Object Gateway will run in an active-active
- configuration. If the cluster was configured to run in an
- active-passive configuration, the secondary zone is a read-only zone.
- Remove the ``--read-only`` status to allow the zone to receive write
- operations. For example:
-
- ::
-
- # radosgw-admin zone modify --rgw-zone={zone-name} --master --default \
- --read-only=False
-
-2. Update the period to make the changes take effect.
-
- ::
-
- # radosgw-admin period update --commit
-
-3. Finally, restart the Ceph Object Gateway.
-
- ::
-
- # systemctl restart ceph-radosgw@rgw.`hostname -s`
-
-If the former master zone recovers, revert the operation.
-
-1. From the recovered zone, pull the period from the current master
- zone.
-
- ::
-
- # radosgw-admin period pull --url={url-to-master-zone-gateway} \
- --access-key={access-key} --secret={secret}
-
-2. Make the recovered zone the master and default zone.
-
- ::
-
- # radosgw-admin zone modify --rgw-zone={zone-name} --master --default
-
-3. Update the period to make the changes take effect.
-
- ::
-
- # radosgw-admin period update --commit
-
-4. Then, restart the Ceph Object Gateway in the recovered zone.
-
- ::
-
- # systemctl restart ceph-radosgw@rgw.`hostname -s`
-
-5. If the secondary zone needs to be a read-only configuration, update
- the secondary zone.
-
- ::
-
- # radosgw-admin zone modify --rgw-zone={zone-name} --read-only
-
-6. Update the period to make the changes take effect.
-
- ::
-
- # radosgw-admin period update --commit
-
-7. Finally, restart the Ceph Object Gateway in the secondary zone.
-
- ::
-
- # systemctl restart ceph-radosgw@rgw.`hostname -s`
-
-Migrating a Single Site System to Multi-Site
-============================================
-
-To migrate from a single site system with a ``default`` zone group and
-zone to a multi site system, use the following steps:
-
-1. Create a realm. Replace ``<name>`` with the realm name.
-
- ::
-
- # radosgw-admin realm create --rgw-realm=<name> --default
-
-2. Rename the default zone and zonegroup. Replace ``<name>`` with the
- zonegroup or zone name.
-
- ::
-
- # radosgw-admin zonegroup rename --rgw-zonegroup default --zonegroup-new-name=<name>
- # radosgw-admin zone rename --rgw-zone default --zone-new-name us-east-1 --rgw-zonegroup=<name>
-
-3. Configure the master zonegroup. Replace ``<name>`` with the realm or
- zonegroup name. Replace ``<fqdn>`` with the fully qualified domain
- name(s) in the zonegroup.
-
- ::
-
- # radosgw-admin zonegroup modify --rgw-realm=<name> --rgw-zonegroup=<name> --endpoints http://<fqdn>:80 --master --default
-
-4. Configure the master zone. Replace ``<name>`` with the realm,
- zonegroup or zone name. Replace ``<fqdn>`` with the fully qualified
- domain name(s) in the zonegroup.
-
- ::
-
- # radosgw-admin zone modify --rgw-realm=<name> --rgw-zonegroup=<name> \
- --rgw-zone=<name> --endpoints http://<fqdn>:80 \
- --access-key=<access-key> --secret=<secret-key> \
- --master --default
-
-5. Create a system user. Replace ``<user-id>`` with the username.
- Replace ``<display-name>`` with a display name. It may contain
- spaces.
-
- ::
-
- # radosgw-admin user create --uid=<user-id> --display-name="<display-name>"\
- --access-key=<access-key> --secret=<secret-key> --system
-
-6. Commit the updated configuration.
-
- ::
-
- # radosgw-admin period update --commit
-
-7. Finally, restart the Ceph Object Gateway.
-
- ::
-
- # systemctl restart ceph-radosgw@rgw.`hostname -s`
-
-After completing this procedure, proceed to `Configure a Secondary
-Zone <#configure-secondary-zones>`__ to create a secondary zone
-in the master zone group.
-
-
-Multi-Site Configuration Reference
-==================================
-
-The following sections provide additional details and command-line
-usage for realms, periods, zone groups and zones.
-
-Realms
-------
-
-A realm represents a globally unique namespace consisting of one or more
-zonegroups containing one or more zones, and zones containing buckets,
-which in turn contain objects. A realm enables the Ceph Object Gateway
-to support multiple namespaces and their configuration on the same
-hardware.
-
-A realm contains the notion of periods. Each period represents the state
-of the zone group and zone configuration in time. Each time you make a
-change to a zonegroup or zone, update the period and commit it.
-
-By default, the Ceph Object Gateway does not create a realm
-for backward compatibility with Infernalis and earlier releases.
-However, as a best practice, we recommend creating realms for new
-clusters.
-
-Create a Realm
-~~~~~~~~~~~~~~
-
-To create a realm, execute ``realm create`` and specify the realm name.
-If the realm is the default, specify ``--default``.
-
-::
-
- # radosgw-admin realm create --rgw-realm={realm-name} [--default]
-
-For example:
-
-::
-
- # radosgw-admin realm create --rgw-realm=movies --default
-
-By specifying ``--default``, the realm will be called implicitly with
-each ``radosgw-admin`` call unless ``--rgw-realm`` and the realm name
-are explicitly provided.
-
-Make a Realm the Default
-~~~~~~~~~~~~~~~~~~~~~~~~
-
-One realm in the list of realms should be the default realm. There may
-be only one default realm. If there is only one realm and it wasn’t
-specified as the default realm when it was created, make it the default
-realm. Alternatively, to change which realm is the default, execute:
-
-::
-
- # radosgw-admin realm default --rgw-realm=movies
-
-.. note:: When the realm is default, the command line assumes
- ``--rgw-realm=<realm-name>`` as an argument.
-
-Delete a Realm
-~~~~~~~~~~~~~~
-
-To delete a realm, execute ``realm delete`` and specify the realm name.
-
-::
-
- # radosgw-admin realm delete --rgw-realm={realm-name}
-
-For example:
-
-::
-
- # radosgw-admin realm delete --rgw-realm=movies
-
-Get a Realm
-~~~~~~~~~~~
-
-To get a realm, execute ``realm get`` and specify the realm name.
-
-::
-
- #radosgw-admin realm get --rgw-realm=<name>
-
-For example:
-
-::
-
- # radosgw-admin realm get --rgw-realm=movies [> filename.json]
-
-The CLI will echo a JSON object with the realm properties.
-
-::
-
- {
- "id": "0a68d52e-a19c-4e8e-b012-a8f831cb3ebc",
- "name": "movies",
- "current_period": "b0c5bbef-4337-4edd-8184-5aeab2ec413b",
- "epoch": 1
- }
-
-Use ``>`` and an output file name to output the JSON object to a file.
-
-Set a Realm
-~~~~~~~~~~~
-
-To set a realm, execute ``realm set``, specify the realm name, and
-``--infile=`` with an input file name.
-
-::
-
- #radosgw-admin realm set --rgw-realm=<name> --infile=<infilename>
-
-For example:
-
-::
-
- # radosgw-admin realm set --rgw-realm=movies --infile=filename.json
-
-List Realms
-~~~~~~~~~~~
-
-To list realms, execute ``realm list``.
-
-::
-
- # radosgw-admin realm list
-
-List Realm Periods
-~~~~~~~~~~~~~~~~~~
-
-To list realm periods, execute ``realm list-periods``.
-
-::
-
- # radosgw-admin realm list-periods
-
-Pull a Realm
-~~~~~~~~~~~~
-
-To pull a realm from the node containing the master zone group and
-master zone to a node containing a secondary zone group or zone, execute
-``realm pull`` on the node that will receive the realm configuration.
-
-::
-
- # radosgw-admin realm pull --url={url-to-master-zone-gateway} --access-key={access-key} --secret={secret}
-
-Rename a Realm
-~~~~~~~~~~~~~~
-
-A realm is not part of the period. Consequently, renaming the realm is
-only applied locally, and will not get pulled with ``realm pull``. When
-renaming a realm with multiple zones, run the command on each zone. To
-rename a realm, execute the following:
-
-::
-
- # radosgw-admin realm rename --rgw-realm=<current-name> --realm-new-name=<new-realm-name>
-
-.. note:: DO NOT use ``realm set`` to change the ``name`` parameter. That
- changes the internal name only. Specifying ``--rgw-realm`` would
- still use the old realm name.
-
-Zone Groups
------------
-
-The Ceph Object Gateway supports multi-site deployments and a global
-namespace by using the notion of zone groups. Formerly called a region
-in Infernalis, a zone group defines the geographic location of one or more Ceph
-Object Gateway instances within one or more zones.
-
-Configuring zone groups differs from typical configuration procedures,
-because not all of the settings end up in a Ceph configuration file. You
-can list zone groups, get a zone group configuration, and set a zone
-group configuration.
-
-Create a Zone Group
-~~~~~~~~~~~~~~~~~~~
-
-Creating a zone group consists of specifying the zone group name.
-Creating a zone assumes it will live in the default realm unless
-``--rgw-realm=<realm-name>`` is specified. If the zonegroup is the
-default zonegroup, specify the ``--default`` flag. If the zonegroup is
-the master zonegroup, specify the ``--master`` flag. For example:
-
-::
-
- # radosgw-admin zonegroup create --rgw-zonegroup=<name> [--rgw-realm=<name>][--master] [--default]
-
-
-.. note:: Use ``zonegroup modify --rgw-zonegroup=<zonegroup-name>`` to modify
- an existing zone group’s settings.
-
-Make a Zone Group the Default
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-One zonegroup in the list of zonegroups should be the default zonegroup.
-There may be only one default zonegroup. If there is only one zonegroup
-and it wasn’t specified as the default zonegroup when it was created,
-make it the default zonegroup. Alternatively, to change which zonegroup
-is the default, execute:
-
-::
-
- # radosgw-admin zonegroup default --rgw-zonegroup=comedy
-
-.. note:: When the zonegroup is default, the command line assumes
- ``--rgw-zonegroup=<zonegroup-name>`` as an argument.
-
-Then, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-Add a Zone to a Zone Group
-~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-To add a zone to a zonegroup, execute the following:
-
-::
-
- # radosgw-admin zonegroup add --rgw-zonegroup=<name> --rgw-zone=<name>
-
-Then, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-Remove a Zone from a Zone Group
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-To remove a zone from a zonegroup, execute the following:
-
-::
-
- # radosgw-admin zonegroup remove --rgw-zonegroup=<name> --rgw-zone=<name>
-
-Then, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-Rename a Zone Group
-~~~~~~~~~~~~~~~~~~~
-
-To rename a zonegroup, execute the following:
-
-::
-
- # radosgw-admin zonegroup rename --rgw-zonegroup=<name> --zonegroup-new-name=<name>
-
-Then, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-Delete a Zone Group
-~~~~~~~~~~~~~~~~~~~
-
-To delete a zonegroup, execute the following:
-
-::
-
- # radosgw-admin zonegroup delete --rgw-zonegroup=<name>
-
-Then, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-List Zone Groups
-~~~~~~~~~~~~~~~~
-
-A Ceph cluster contains a list of zone groups. To list the zone groups,
-execute:
-
-::
-
- # radosgw-admin zonegroup list
-
-The ``radosgw-admin`` returns a JSON formatted list of zone groups.
-
-::
-
- {
- "default_info": "90b28698-e7c3-462c-a42d-4aa780d24eda",
- "zonegroups": [
- "us"
- ]
- }
-
-Get a Zone Group Map
-~~~~~~~~~~~~~~~~~~~~
-
-To list the details of each zone group, execute:
-
-::
-
- # radosgw-admin zonegroup-map get
-
-.. note:: If you receive a ``failed to read zonegroup map`` error, run
- ``radosgw-admin zonegroup-map update`` as ``root`` first.
-
-Get a Zone Group
-~~~~~~~~~~~~~~~~
-
-To view the configuration of a zone group, execute:
-
-::
-
- radosgw-admin zonegroup get [--rgw-zonegroup=<zonegroup>]
-
-The zone group configuration looks like this:
-
-::
-
- {
- "id": "90b28698-e7c3-462c-a42d-4aa780d24eda",
- "name": "us",
- "api_name": "us",
- "is_master": "true",
- "endpoints": [
- "http:\/\/rgw1:80"
- ],
- "hostnames": [],
- "hostnames_s3website": [],
- "master_zone": "9248cab2-afe7-43d8-a661-a40bf316665e",
- "zones": [
- {
- "id": "9248cab2-afe7-43d8-a661-a40bf316665e",
- "name": "us-east",
- "endpoints": [
- "http:\/\/rgw1"
- ],
- "log_meta": "true",
- "log_data": "true",
- "bucket_index_max_shards": 0,
- "read_only": "false"
- },
- {
- "id": "d1024e59-7d28-49d1-8222-af101965a939",
- "name": "us-west",
- "endpoints": [
- "http:\/\/rgw2:80"
- ],
- "log_meta": "false",
- "log_data": "true",
- "bucket_index_max_shards": 0,
- "read_only": "false"
- }
- ],
- "placement_targets": [
- {
- "name": "default-placement",
- "tags": []
- }
- ],
- "default_placement": "default-placement",
- "realm_id": "ae031368-8715-4e27-9a99-0c9468852cfe"
- }
-
-Set a Zone Group
-~~~~~~~~~~~~~~~~
-
-Defining a zone group consists of creating a JSON object, specifying at
-least the required settings:
-
-1. ``name``: The name of the zone group. Required.
-
-2. ``api_name``: The API name for the zone group. Optional.
-
-3. ``is_master``: Determines if the zone group is the master zone group.
- Required. **note:** You can only have one master zone group.
-
-4. ``endpoints``: A list of all the endpoints in the zone group. For
- example, you may use multiple domain names to refer to the same zone
- group. Remember to escape the forward slashes (``\/``). You may also
- specify a port (``fqdn:port``) for each endpoint. Optional.
-
-5. ``hostnames``: A list of all the hostnames in the zone group. For
- example, you may use multiple domain names to refer to the same zone
- group. Optional. The ``rgw dns name`` setting will automatically be
- included in this list. You should restart the gateway daemon(s) after
- changing this setting.
-
-6. ``master_zone``: The master zone for the zone group. Optional. Uses
- the default zone if not specified. **note:** You can only have one
- master zone per zone group.
-
-7. ``zones``: A list of all zones within the zone group. Each zone has a
- name (required), a list of endpoints (optional), and whether or not
- the gateway will log metadata and data operations (false by default).
-
-8. ``placement_targets``: A list of placement targets (optional). Each
- placement target contains a name (required) for the placement target
- and a list of tags (optional) so that only users with the tag can use
- the placement target (i.e., the user’s ``placement_tags`` field in
- the user info).
-
-9. ``default_placement``: The default placement target for the object
- index and object data. Set to ``default-placement`` by default. You
- may also set a per-user default placement in the user info for each
- user.
-
-To set a zone group, create a JSON object consisting of the required
-fields, save the object to a file (e.g., ``zonegroup.json``); then,
-execute the following command:
-
-::
-
- # radosgw-admin zonegroup set --infile zonegroup.json
-
-Where ``zonegroup.json`` is the JSON file you created.
-
-.. important:: The ``default`` zone group ``is_master`` setting is ``true`` by
- default. If you create a new zone group and want to make it the
- master zone group, you must either set the ``default`` zone group
- ``is_master`` setting to ``false``, or delete the ``default`` zone
- group.
-
-Finally, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-Set a Zone Group Map
-~~~~~~~~~~~~~~~~~~~~
-
-Setting a zone group map consists of creating a JSON object consisting
-of one or more zone groups, and setting the ``master_zonegroup`` for the
-cluster. Each zone group in the zone group map consists of a key/value
-pair, where the ``key`` setting is equivalent to the ``name`` setting
-for an individual zone group configuration, and the ``val`` is a JSON
-object consisting of an individual zone group configuration.
-
-You may only have one zone group with ``is_master`` equal to ``true``,
-and it must be specified as the ``master_zonegroup`` at the end of the
-zone group map. The following JSON object is an example of a default
-zone group map.
-
-::
-
- {
- "zonegroups": [
- {
- "key": "90b28698-e7c3-462c-a42d-4aa780d24eda",
- "val": {
- "id": "90b28698-e7c3-462c-a42d-4aa780d24eda",
- "name": "us",
- "api_name": "us",
- "is_master": "true",
- "endpoints": [
- "http:\/\/rgw1:80"
- ],
- "hostnames": [],
- "hostnames_s3website": [],
- "master_zone": "9248cab2-afe7-43d8-a661-a40bf316665e",
- "zones": [
- {
- "id": "9248cab2-afe7-43d8-a661-a40bf316665e",
- "name": "us-east",
- "endpoints": [
- "http:\/\/rgw1"
- ],
- "log_meta": "true",
- "log_data": "true",
- "bucket_index_max_shards": 0,
- "read_only": "false"
- },
- {
- "id": "d1024e59-7d28-49d1-8222-af101965a939",
- "name": "us-west",
- "endpoints": [
- "http:\/\/rgw2:80"
- ],
- "log_meta": "false",
- "log_data": "true",
- "bucket_index_max_shards": 0,
- "read_only": "false"
- }
- ],
- "placement_targets": [
- {
- "name": "default-placement",
- "tags": []
- }
- ],
- "default_placement": "default-placement",
- "realm_id": "ae031368-8715-4e27-9a99-0c9468852cfe"
- }
- }
- ],
- "master_zonegroup": "90b28698-e7c3-462c-a42d-4aa780d24eda",
- "bucket_quota": {
- "enabled": false,
- "max_size_kb": -1,
- "max_objects": -1
- },
- "user_quota": {
- "enabled": false,
- "max_size_kb": -1,
- "max_objects": -1
- }
- }
-
-To set a zone group map, execute the following:
-
-::
-
- # radosgw-admin zonegroup-map set --infile zonegroupmap.json
-
-Where ``zonegroupmap.json`` is the JSON file you created. Ensure that
-you have zones created for the ones specified in the zone group map.
-Finally, update the period.
-
-::
-
- # radosgw-admin period update --commit
-
-Zones
------
-
-Ceph Object Gateway supports the notion of zones. A zone defines a
-logical group consisting of one or more Ceph Object Gateway instances.
-
-Configuring zones differs from typical configuration procedures, because
-not all of the settings end up in a Ceph configuration file. You can
-list zones, get a zone configuration and set a zone configuration.
-
-Create a Zone
-~~~~~~~~~~~~~
-
-To create a zone, specify a zone name. If it is a master zone, specify
-the ``--master`` option. Only one zone in a zone group may be a master
-zone. To add the zone to a zonegroup, specify the ``--rgw-zonegroup``
-option with the zonegroup name.
-
-::
-
- # radosgw-admin zone create --rgw-zone=<name> \
- [--zonegroup=<zonegroup-name]\
- [--endpoints=<endpoint>[,<endpoint>] \
- [--master] [--default] \
- --access-key $SYSTEM_ACCESS_KEY --secret $SYSTEM_SECRET_KEY
-
-Then, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-Delete a Zone
-~~~~~~~~~~~~~
-
-To delete zone, first remove it from the zonegroup.
-
-::
-
- # radosgw-admin zonegroup remove --zonegroup=<name>\
- --zone=<name>
-
-Then, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-Next, delete the zone. Execute the following:
-
-::
-
- # radosgw-admin zone delete --rgw-zone<name>
-
-Finally, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-.. important:: Do not delete a zone without removing it from a zone group first.
- Otherwise, updating the period will fail.
-
-If the pools for the deleted zone will not be used anywhere else,
-consider deleting the pools. Replace ``<del-zone>`` in the example below
-with the deleted zone’s name.
-
-.. important:: Only delete the pools with prepended zone names. Deleting the root
- pool, such as, ``.rgw.root`` will remove all of the system’s
- configuration.
-
-.. important:: Once the pools are deleted, all of the data within them are deleted
- in an unrecoverable manner. Only delete the pools if the pool
- contents are no longer needed.
-
-::
-
- # rados rmpool <del-zone>.rgw.control <del-zone>.rgw.control --yes-i-really-really-mean-it
- # rados rmpool <del-zone>.rgw.data.root <del-zone>.rgw.data.root --yes-i-really-really-mean-it
- # rados rmpool <del-zone>.rgw.gc <del-zone>.rgw.gc --yes-i-really-really-mean-it
- # rados rmpool <del-zone>.rgw.log <del-zone>.rgw.log --yes-i-really-really-mean-it
- # rados rmpool <del-zone>.rgw.users.uid <del-zone>.rgw.users.uid --yes-i-really-really-mean-it
-
-Modify a Zone
-~~~~~~~~~~~~~
-
-To modify a zone, specify the zone name and the parameters you wish to
-modify.
-
-::
-
- # radosgw-admin zone modify [options]
-
-Where ``[options]``:
-
-- ``--access-key=<key>``
-- ``--secret/--secret-key=<key>``
-- ``--master``
-- ``--default``
-- ``--endpoints=<list>``
-
-Then, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-List Zones
-~~~~~~~~~~
-
-As ``root``, to list the zones in a cluster, execute:
-
-::
-
- # radosgw-admin zone list
-
-Get a Zone
-~~~~~~~~~~
-
-As ``root``, to get the configuration of a zone, execute:
-
-::
-
- # radosgw-admin zone get [--rgw-zone=<zone>]
-
-The ``default`` zone looks like this:
-
-::
-
- { "domain_root": ".rgw",
- "control_pool": ".rgw.control",
- "gc_pool": ".rgw.gc",
- "log_pool": ".log",
- "intent_log_pool": ".intent-log",
- "usage_log_pool": ".usage",
- "user_keys_pool": ".users",
- "user_email_pool": ".users.email",
- "user_swift_pool": ".users.swift",
- "user_uid_pool": ".users.uid",
- "system_key": { "access_key": "", "secret_key": ""},
- "placement_pools": [
- { "key": "default-placement",
- "val": { "index_pool": ".rgw.buckets.index",
- "data_pool": ".rgw.buckets"}
- }
- ]
- }
-
-Set a Zone
-~~~~~~~~~~
-
-Configuring a zone involves specifying a series of Ceph Object Gateway
-pools. For consistency, we recommend using a pool prefix that is the
-same as the zone name. See
-`Pools <http://docs.ceph.com/docs/master/rados/operations/pools/#pools>`__
-for details of configuring pools.
-
-To set a zone, create a JSON object consisting of the pools, save the
-object to a file (e.g., ``zone.json``); then, execute the following
-command, replacing ``{zone-name}`` with the name of the zone:
-
-::
-
- # radosgw-admin zone set --rgw-zone={zone-name} --infile zone.json
-
-Where ``zone.json`` is the JSON file you created.
-
-Then, as ``root``, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-Rename a Zone
-~~~~~~~~~~~~~
-
-To rename a zone, specify the zone name and the new zone name.
-
-::
-
- # radosgw-admin zone rename --rgw-zone=<name> --zone-new-name=<name>
-
-Then, update the period:
-
-::
-
- # radosgw-admin period update --commit
-
-Zone Group and Zone Settings
-----------------------------
-
-When configuring a default zone group and zone, the pool name includes
-the zone name. For example:
-
-- ``default.rgw.control``
-
-To change the defaults, include the following settings in your Ceph
-configuration file under each ``[client.radosgw.{instance-name}]``
-instance.
-
-+-------------------------------------+-----------------------------------+---------+-----------------------+
-| Name | Description | Type | Default |
-+=====================================+===================================+=========+=======================+
-| ``rgw_zone`` | The name of the zone for the | String | None |
-| | gateway instance. | | |
-+-------------------------------------+-----------------------------------+---------+-----------------------+
-| ``rgw_zonegroup`` | The name of the zone group for | String | None |
-| | the gateway instance. | | |
-+-------------------------------------+-----------------------------------+---------+-----------------------+
-| ``rgw_zonegroup_root_pool`` | The root pool for the zone group. | String | ``.rgw.root`` |
-+-------------------------------------+-----------------------------------+---------+-----------------------+
-| ``rgw_zone_root_pool`` | The root pool for the zone. | String | ``.rgw.root`` |
-+-------------------------------------+-----------------------------------+---------+-----------------------+
-| ``rgw_default_zone_group_info_oid`` | The OID for storing the default | String | ``default.zonegroup`` |
-| | zone group. We do not recommend | | |
-| | changing this setting. | | |
-+-------------------------------------+-----------------------------------+---------+-----------------------+
-| ``rgw_num_zone_opstate_shards`` | The maximum number of shards for | Integer | ``128`` |
-| | keeping inter-zone group | | |
-| | synchronization progress. | | |
-+-------------------------------------+-----------------------------------+---------+-----------------------+
-
-
-.. _`Pools`: ../pools
diff --git a/src/ceph/doc/radosgw/multitenancy.rst b/src/ceph/doc/radosgw/multitenancy.rst
deleted file mode 100644
index 95f22d7..0000000
--- a/src/ceph/doc/radosgw/multitenancy.rst
+++ /dev/null
@@ -1,107 +0,0 @@
-=================
-RGW Multi-tenancy
-=================
-
-.. versionadded:: Jewel
-
-The multi-tenancy feature allows to use buckets and users of the same
-name simultaneously by segregating them under so-called ``tenants``.
-This may be useful, for instance, to permit users of Swift API to
-create buckets with easily conflicting names such as "test" or "trove".
-
-From the Jewel release onward, each user and bucket lies under a tenant.
-For compatibility, a "legacy" tenant with an empty name is provided.
-Whenever a bucket is referred without an explicit tenant, an implicit
-tenant is used, taken from the user performing the operation. Since
-the pre-existing users are under the legacy tenant, they continue
-to create and access buckets as before. The layout of objects in RADOS
-is extended in a compatible way, ensuring a smooth upgrade to Jewel.
-
-Administering Users With Explicit Tenants
-=========================================
-
-Tenants as such do not have any operations on them. They appear and
-and disappear as needed, when users are administered. In order to create,
-modify, and remove users with explicit tenants, either an additional
-option --tenant is supplied, or a syntax "<tenant>$<user>" is used
-in the parameters of the radosgw-admin command.
-
-Examples
---------
-
-Create a user testx$tester to be accessed with S3::
-
- # radosgw-admin --tenant testx --uid tester --display-name "Test User" --access_key TESTER --secret test123 user create
-
-Create a user testx$tester to be accessed with Swift::
-
- # radosgw-admin --tenant testx --uid tester --display-name "Test User" --subuser tester:test --key-type swift --access full user create
- # radosgw-admin --subuser 'testx$tester:test' --key-type swift --secret test123
-
-.. note:: The subuser with explicit tenant has to be quoted in the shell.
-
- Tenant names may contain only alphanumeric characters and underscores.
-
-Accessing Buckets with Explicit Tenants
-=======================================
-
-When a client application accesses buckets, it always operates with
-credentials of a particular user. As mentioned above, every user belongs
-to a tenant. Therefore, every operation has an implicit tenant in its
-context, to be used if no tenant is specified explicitly. Thus a complete
-compatibility is maintained with previous releases, as long as the
-referred buckets and referring user belong to the same tenant.
-In other words, anything unusual occurs when accessing another tenant's
-buckets *only*.
-
-Extensions employed to specify an explicit tenant differ according
-to the protocol and authentication system used.
-
-S3
---
-
-In case of S3, a colon character is used to separate tenant and bucket.
-Thus a sample URL would be::
-
- https://ep.host.dom/tenant:bucket
-
-Here's a simple Python sample:
-
-.. code-block:: python
- :linenos:
-
- from boto.s3.connection import S3Connection, OrdinaryCallingFormat
- c = S3Connection(
- aws_access_key_id="TESTER",
- aws_secret_access_key="test123",
- host="ep.host.dom",
- calling_format = OrdinaryCallingFormat())
- bucket = c.get_bucket("test5b:testbucket")
-
-Note that it's not possible to supply an explicit tenant using
-a hostname. Hostnames cannot contain colons, or any other separators
-that are not already valid in bucket names. Using a period creates an
-ambiguous syntax. Therefore, the bucket-in-URL-path format has to be
-used.
-
-Swift with built-in authenticator
----------------------------------
-
-TBD -- not in test_multen.py yet
-
-Swift with Keystone
--------------------
-
-TBD -- don't forget to explain the function of
- rgw keystone implicit tenants = true
- in commit e9259486decab52a362443d3fd3dec33b0ec654f
-
-Notes and known issues
-----------------------
-
-Just to be clear, it is not possible to create buckets in other
-tenants at present. The owner of newly created bucket is extracted
-from authentication information.
-
-This document needs examples of administration of Keystone users.
-The keystone.rst may need to be updated.
diff --git a/src/ceph/doc/radosgw/nfs.rst b/src/ceph/doc/radosgw/nfs.rst
deleted file mode 100644
index 55b88af..0000000
--- a/src/ceph/doc/radosgw/nfs.rst
+++ /dev/null
@@ -1,366 +0,0 @@
-===
-NFS
-===
-
-.. versionadded:: Jewel
-
-Ceph Object Gateway namespaces can now be exported over file-based
-access protocols such as NFSv3 and NFSv4, alongside traditional HTTP access
-protocols (S3 and Swift).
-
-In particular, the Ceph Object Gateway can now be configured to
-provide file-based access when embedded in the NFS-Ganesha NFS server.
-
-librgw
-======
-
-The librgw.so shared library (Unix) provides a loadable interface to
-Ceph Object Gateway services, and instantiates a full Ceph Object Gateway
-instance on initialization.
-
-In turn, librgw.so exports rgw_file, a stateful API for file-oriented
-access to RGW buckets and objects. The API is general, but its design
-is strongly influenced by the File System Abstraction Layer (FSAL) API
-of NFS-Ganesha, for which it has been primarily designed.
-
-A set of Python bindings is also provided.
-
-Namespace Conventions
-=====================
-
-The implementation conforms to Amazon Web Services (AWS) hierarchical
-namespace conventions which map UNIX-style path names onto S3 buckets
-and objects.
-
-The top level of the attached namespace consists of S3 buckets,
-represented as NFS directories. Files and directories subordinate to
-buckets are each represented as objects, following S3 prefix and
-delimiter conventions, with '/' being the only supported path
-delimiter [#]_.
-
-For example, if an NFS client has mounted an RGW namespace at "/nfs",
-then a file "/nfs/mybucket/www/index.html" in the NFS namespace
-corresponds to an RGW object "www/index.html" in a bucket/container
-"mybucket."
-
-Although it is generally invisible to clients, the NFS namespace is
-assembled through concatenation of the corresponding paths implied by
-the objects in the namespace. Leaf objects, whether files or
-directories, will always be materialized in an RGW object of the
-corresponding key name, "<name>" if a file, "<name>/" if a directory.
-Non-leaf directories (e.g., "www" above) might only be implied by
-their appearance in the names of one or more leaf objects. Directories
-created within NFS or directly operated on by an NFS client (e.g., via
-an attribute-setting operation such as chown or chmod) always have a
-leaf object representation used to store materialized attributes such
-as Unix ownership and permissions.
-
-Supported Operations
-====================
-
-The RGW NFS interface supports most operations on files and
-directories, with the following restrictions:
-
-- Links, including symlinks, are not supported
-- NFS ACLs are not supported
-
- + Unix user and group ownership and permissions *are* supported
-
-- Directories may not be moved/renamed
-
- + files may be moved between directories
-
-- Only full, sequential *write* i/o is supported
-
- + i.e., write operations are constrained to be **uploads**
- + many typical i/o operations such as editing files in place will necessarily fail as they perform non-sequential stores
- + some file utilities *apparently* writing sequentially (e.g., some versions of GNU tar) may fail due to infrequent non-sequential stores
- + When mounting via NFS, sequential application i/o can generally be constrained to be written sequentially to the NFS server via a synchronous mount option (e.g. -osync in Linux)
- + NFS clients which cannot mount synchronously (e.g., MS Windows) will not be able to upload files
-
-Security
-========
-
-The RGW NFS interface provides a hybrid security model with the
-following characteristics:
-
-- NFS protocol security is provided by the NFS-Ganesha server, as negotiated by the NFS server and clients
-
- + e.g., clients can by trusted (AUTH_SYS), or required to present Kerberos user credentials (RPCSEC_GSS)
- + RPCSEC_GSS wire security can be integrity only (krb5i) or integrity and privacy (encryption, krb5p)
- + various NFS-specific security and permission rules are available
-
- * e.g., root-squashing
-
-- a set of RGW/S3 security credentials (unknown to NFS) is associated with each RGW NFS mount (i.e., NFS-Ganesha EXPORT)
-
- + all RGW object operations performed via the NFS server will be performed by the RGW user associated with the credentials stored in the export being accessed (currently only RGW and RGW LDAP credentials are supported)
-
- * additional RGW authentication types such as Keystone are not currently supported
-
-Configuring an NFS-Ganesha Instance
-===================================
-
-Each NFS RGW instance is an NFS-Ganesha server instance *embeddding*
-a full Ceph RGW instance.
-
-Therefore, the RGW NFS configuration includes Ceph and Ceph Object
-Gateway-specific configuration in a local ceph.conf, as well as
-NFS-Ganesha-specific configuration in the NFS-Ganesha config file,
-ganesha.conf.
-
-ceph.conf
----------
-
-Required ceph.conf configuration for RGW NFS includes:
-
-* valid [client.radosgw.{instance-name}] section
-* valid values for minimal instance configuration, in particular, an installed and correct ``keyring``
-
-Other config variables are optional, front-end-specific and front-end
-selection variables (e.g., ``rgw data`` and ``rgw frontends``) are
-optional and in some cases ignored.
-
-A small number of config variables (e.g., ``rgw_namespace_expire_secs``)
-are unique to RGW NFS.
-
-ganesha.conf
-------------
-
-A strictly minimal ganesha.conf for use with RGW NFS includes one
-EXPORT block with embedded FSAL block of type RGW::
-
- EXPORT
- {
- Export_ID={numeric-id};
- Path = "/";
- Pseudo = "/";
- Access_Type = RW;
- SecType = "sys";
- NFS_Protocols = 4;
- Transport_Protocols = TCP;
-
- # optional, permit unsquashed access by client "root" user
- #Squash = No_Root_Squash;
-
- FSAL {
- Name = RGW;
- User_Id = {s3-user-id};
- Access_Key_Id ="{s3-access-key}";
- Secret_Access_Key = "{s3-secret}";
- }
- }
-
-``Export_ID`` must have an integer value, e.g., "77"
-
-``Path`` (for RGW) should be "/"
-
-``Pseudo`` defines an NFSv4 pseudo root name (NFSv4 only)
-
-``SecType = sys;`` allows clients to attach without Kerberos
-authentication
-
-``Squash = No_Root_Squash;`` enables the client root user to override
-permissions (Unix convention). When root-squashing is enabled,
-operations attempted by the root user are performed as if by the local
-"nobody" (and "nogroup") user on the NFS-Ganesha server
-
-The RGW FSAL additionally supports RGW-specific configuration
-variables in the RGW config section::
-
- RGW {
- cluster = "{cluster name, default 'ceph'}";
- name = "client.rgw.{instance-name}";
- ceph_conf = "/opt/ceph-rgw/etc/ceph/ceph.conf";
- init_args = "-d --debug-rgw=16";
- }
-
-``cluster`` sets a Ceph cluster name (must match the cluster being exported)
-
-``name`` sets an RGW instance name (must match the cluster being exported)
-
-``ceph_conf`` gives a path to a non-default ceph.conf file to use
-
-
-Other useful NFS-Ganesha configuration:
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-Any EXPORT block which should support NFSv3 should include version 3
-in the NFS_Protocols setting. Additionally, NFSv3 is the last major
-version to support the UDP transport. To enable UDP, include it in the
-Transport_Protocols setting. For example::
-
- EXPORT {
- ...
- NFS_Protocols = 3,4;
- Transport_Protocols = UDP,TCP;
- ...
- }
-
-One important family of options pertains to interaction with the Linux
-idmapping service, which is used to normalize user and group names
-across systems. Details of idmapper integration are not provided here.
-
-With Linux NFS clients, NFS-Ganesha can be configured
-to accept client-supplied numeric user and group identifiers with
-NFSv4, which by default stringifies these--this may be useful in small
-setups and for experimentation::
-
- NFSV4 {
- Allow_Numeric_Owners = true;
- Only_Numeric_Owners = true;
- }
-
-Troubleshooting
-~~~~~~~~~~~~~~~
-
-NFS-Ganesha configuration problems are usually debugged by running the
-server with debugging options, controlled by the LOG config section.
-
-NFS-Ganesha log messages are grouped into various components, logging
-can be enabled separately for each component. Valid values for
-component logging include::
-
- *FATAL* critical errors only
- *WARN* unusual condition
- *DEBUG* mildly verbose trace output
- *FULL_DEBUG* verbose trace output
-
-Example::
-
- LOG {
-
- Components {
- MEMLEAKS = FATAL;
- FSAL = FATAL;
- NFSPROTO = FATAL;
- NFS_V4 = FATAL;
- EXPORT = FATAL;
- FILEHANDLE = FATAL;
- DISPATCH = FATAL;
- CACHE_INODE = FATAL;
- CACHE_INODE_LRU = FATAL;
- HASHTABLE = FATAL;
- HASHTABLE_CACHE = FATAL;
- DUPREQ = FATAL;
- INIT = DEBUG;
- MAIN = DEBUG;
- IDMAPPER = FATAL;
- NFS_READDIR = FATAL;
- NFS_V4_LOCK = FATAL;
- CONFIG = FATAL;
- CLIENTID = FATAL;
- SESSIONS = FATAL;
- PNFS = FATAL;
- RW_LOCK = FATAL;
- NLM = FATAL;
- RPC = FATAL;
- NFS_CB = FATAL;
- THREAD = FATAL;
- NFS_V4_ACL = FATAL;
- STATE = FATAL;
- FSAL_UP = FATAL;
- DBUS = FATAL;
- }
- # optional: redirect log output
- # Facility {
- # name = FILE;
- # destination = "/tmp/ganesha-rgw.log";
- # enable = active;
- }
- }
-
-Running Multiple NFS Gateways
-=============================
-
-Each NFS-Ganesha instance acts as a full gateway endpoint, with the
-limitation that currently an NFS-Ganesha instance cannot be configured
-to export HTTP services. As with ordinary gateway instances, any
-number of NFS-Ganesha instances can be started, exporting the same or
-different resources from the cluster. This enables the clustering of
-NFS-Ganesha instances. However, this does not imply high availability.
-
-When regular gateway instances and NFS-Ganesha instances overlap the
-same data resources, they will be accessible from both the standard S3
-API and through the NFS-Ganesha instance as exported. You can
-co-locate the NFS-Ganesha instance with a Ceph Object Gateway instance
-on the same host.
-
-RGW vs RGW NFS
-==============
-
-Exporting an NFS namespace and other RGW namespaces (e.g., S3 or Swift
-via the Civetweb HTTP front-end) from the same program instance is
-currently not supported.
-
-When adding objects and buckets outside of NFS, those objects will
-appear in the NFS namespace in the time set by
-``rgw_nfs_namespace_expire_secs``, which defaults to 300 seconds (5 minutes).
-Override the default value for ``rgw_nfs_namespace_expire_secs`` in the
-Ceph configuration file to change the refresh rate.
-
-If exporting Swift containers that do not conform to valid S3 bucket
-naming requirements, set ``rgw_relaxed_s3_bucket_names`` to true in the
-[client.radosgw] section of the Ceph configuration file. For example,
-if a Swift container name contains underscores, it is not a valid S3
-bucket name and will be rejected unless ``rgw_relaxed_s3_bucket_names``
-is set to true.
-
-Configuring NFSv4 clients
-=========================
-
-To access the namespace, mount the configured NFS-Ganesha export(s)
-into desired locations in the local POSIX namespace. As noted, this
-implementation has a few unique restrictions:
-
-- NFS 4.1 and higher protocol flavors are preferred
-
- + NFSv4 OPEN and CLOSE operations are used to track upload transactions
-
-- To upload data successfully, clients must preserve write ordering
-
- + on Linux and many Unix NFS clients, use the -osync mount option
-
-Conventions for mounting NFS resources are platform-specific. The
-following conventions work on Linux and some Unix platforms:
-
-From the command line::
-
- mount -t nfs -o nfsvers=4,noauto,soft,proto=tcp <ganesha-host-name>:/ <mount-point>
-
-In /etc/fstab::
-
-<ganesha-host-name>:/ <mount-point> nfs noauto,soft,nfsvers=4.1,sync,proto=tcp 0 0
-
-Specify the NFS-Ganesha host name and the path to the mount point on
-the client.
-
-Configuring NFSv3 Clients
-=========================
-
-Linux clients can be configured to mount with NFSv3 by supplying
-``nfsvers=3`` and ``noacl`` as mount options. To use UDP as the
-transport, add ``proto=udp`` to the mount options. However, TCP is the
-preferred transport::
-
- <ganesha-host-name>:/ <mount-point> nfs noauto,noacl,soft,nfsvers=3,sync,proto=tcp 0 0
-
-Configure the NFS Ganesha EXPORT block Protocols setting with version
-3 and the Transports setting with UDP if the mount will use version 3 with UDP.
-
-NFSv3 Semantics
----------------
-
-Since NFSv3 does not communicate client OPEN and CLOSE operations to
-file servers, RGW NFS cannot use these operations to mark the
-beginning and ending of file upload transactions. Instead, RGW NFS
-starts a new upload when the first write is sent to a file at offset
-0, and finalizes the upload when no new writes to the file have been
-seen for a period of time, by default, 10 seconds. To change this
-timeout, set an alternate value for ``rgw_nfs_write_completion_interval_s``
-in the RGW section(s) of the Ceph configuration file.
-
-References
-==========
-
-.. [#] http://docs.aws.amazon.com/AmazonS3/latest/dev/ListingKeysHierarchy.html
diff --git a/src/ceph/doc/radosgw/pools.rst b/src/ceph/doc/radosgw/pools.rst
deleted file mode 100644
index 2d88a3c..0000000
--- a/src/ceph/doc/radosgw/pools.rst
+++ /dev/null
@@ -1,55 +0,0 @@
-=====
-Pools
-=====
-
-The Ceph Object Gateway uses several pools for its various storage needs,
-which are listed in the Zone object (see ``radosgw-admin zone get``). A
-single zone named ``default`` is created automatically with pool names
-starting with ``default.rgw.``, but a `Multisite Configuration`_ will have
-multiple zones.
-
-Tuning
-======
-
-When ``radosgw`` first tries to operate on a zone pool that does not
-exist, it will create that pool with the default values from
-``osd pool default pg num`` and ``osd pool default pgp num``. These defaults
-are sufficient for some pools, but others (especially those listed in
-``placement_pools`` for the bucket index and data) will require additional
-tuning. We recommend using the `Ceph Placement Group’s per Pool
-Calculator <http://ceph.com/pgcalc/>`__ to calculate a suitable number of
-placement groups for these pools. See
-`Pools <http://docs.ceph.com/docs/master/rados/operations/pools/#pools>`__
-for details on pool creation.
-
-Pool Namespaces
-===============
-
-.. versionadded:: Luminous
-
-Pool names particular to a zone follow the naming convention
-``{zone-name}.pool-name``. For example, a zone named ``us-east`` will
-have the following pools:
-
-- ``.rgw.root``
-
-- ``us-east.rgw.control``
-
-- ``us-east.rgw.meta``
-
-- ``us-east.rgw.log``
-
-- ``us-east.rgw.buckets.index``
-
-- ``us-east.rgw.buckets.data``
-
-The zone definitions list several more pools than that, but many of those
-are consolidated through the use of rados namespaces. For example, all of
-the following pool entries use namespaces of the ``us-east.rgw.meta`` pool::
-
- "user_keys_pool": "us-east.rgw.meta:users.keys",
- "user_email_pool": "us-east.rgw.meta:users.email",
- "user_swift_pool": "us-east.rgw.meta:users.swift",
- "user_uid_pool": "us-east.rgw.meta:users.uid",
-
-.. _`Multisite Configuration`: ../multisite
diff --git a/src/ceph/doc/radosgw/s3.rst b/src/ceph/doc/radosgw/s3.rst
deleted file mode 100644
index 56c837a..0000000
--- a/src/ceph/doc/radosgw/s3.rst
+++ /dev/null
@@ -1,95 +0,0 @@
-============================
- Ceph Object Gateway S3 API
-============================
-
-Ceph supports a RESTful API that is compatible with the basic data access model of the `Amazon S3 API`_.
-
-API
----
-
-.. toctree::
- :maxdepth: 1
-
- Common <s3/commons>
- Authentication <s3/authentication>
- Service Ops <s3/serviceops>
- Bucket Ops <s3/bucketops>
- Object Ops <s3/objectops>
- C++ <s3/cpp>
- C# <s3/csharp>
- Java <s3/java>
- Perl <s3/perl>
- PHP <s3/php>
- Python <s3/python>
- Ruby <s3/ruby>
-
-
-Features Support
-----------------
-
-The following table describes the support status for current Amazon S3 functional features:
-
-+---------------------------------+-----------------+----------------------------------------+
-| Feature | Status | Remarks |
-+=================================+=================+========================================+
-| **List Buckets** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Delete Bucket** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Create Bucket** | Supported | Different set of canned ACLs |
-+---------------------------------+-----------------+----------------------------------------+
-| **Bucket Lifecycle** | Supported | Removing expired files is supported |
-+---------------------------------+-----------------+----------------------------------------+
-| **Policy (Buckets, Objects)** | Not Supported | ACLs are supported |
-+---------------------------------+-----------------+----------------------------------------+
-| **Bucket Website** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Bucket ACLs (Get, Put)** | Supported | Different set of canned ACLs |
-+---------------------------------+-----------------+----------------------------------------+
-| **Bucket Location** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Bucket Notification** | Not Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Bucket Object Versions** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Get Bucket Info (HEAD)** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Bucket Request Payment** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Put Object** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Delete Object** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Get Object** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Object ACLs (Get, Put)** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Get Object Info (HEAD)** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **POST Object** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Copy Object** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Multipart Uploads** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-
-Unsupported Header Fields
--------------------------
-
-The following common request header fields are not supported:
-
-+----------------------------+------------+
-| Name | Type |
-+============================+============+
-| **x-amz-security-token** | Request |
-+----------------------------+------------+
-| **Server** | Response |
-+----------------------------+------------+
-| **x-amz-delete-marker** | Response |
-+----------------------------+------------+
-| **x-amz-id-2** | Response |
-+----------------------------+------------+
-| **x-amz-version-id** | Response |
-+----------------------------+------------+
-
-.. _Amazon S3 API: http://docs.aws.amazon.com/AmazonS3/latest/API/APIRest.html
diff --git a/src/ceph/doc/radosgw/s3/authentication.rst b/src/ceph/doc/radosgw/s3/authentication.rst
deleted file mode 100644
index b187538..0000000
--- a/src/ceph/doc/radosgw/s3/authentication.rst
+++ /dev/null
@@ -1,75 +0,0 @@
-=========================
- Authentication and ACLs
-=========================
-
-Requests to the RADOS Gateway (RGW) can be either authenticated or
-unauthenticated. RGW assumes unauthenticated requests are sent by an anonymous
-user. RGW supports canned ACLs.
-
-Authentication
---------------
-Authenticating a request requires including an access key and a Hash-based
-Message Authentication Code (HMAC) in the request before it is sent to the
-RGW server. RGW uses an S3-compatible authentication approach.
-
-::
-
- HTTP/1.1
- PUT /buckets/bucket/object.mpeg
- Host: cname.domain.com
- Date: Mon, 2 Jan 2012 00:01:01 +0000
- Content-Encoding: mpeg
- Content-Length: 9999999
-
- Authorization: AWS {access-key}:{hash-of-header-and-secret}
-
-In the foregoing example, replace ``{access-key}`` with the value for your access
-key ID followed by a colon (``:``). Replace ``{hash-of-header-and-secret}`` with
-a hash of the header string and the secret corresponding to the access key ID.
-
-To generate the hash of the header string and secret, you must:
-
-#. Get the value of the header string.
-#. Normalize the request header string into canonical form.
-#. Generate an HMAC using a SHA-1 hashing algorithm.
- See `RFC 2104`_ and `HMAC`_ for details.
-#. Encode the ``hmac`` result as base-64.
-
-To normalize the header into canonical form:
-
-#. Get all fields beginning with ``x-amz-``.
-#. Ensure that the fields are all lowercase.
-#. Sort the fields lexicographically.
-#. Combine multiple instances of the same field name into a
- single field and separate the field values with a comma.
-#. Replace white space and line breaks in field values with a single space.
-#. Remove white space before and after colons.
-#. Append a new line after each field.
-#. Merge the fields back into the header.
-
-Replace the ``{hash-of-header-and-secret}`` with the base-64 encoded HMAC string.
-
-Access Control Lists (ACLs)
----------------------------
-
-RGW supports S3-compatible ACL functionality. An ACL is a list of access grants
-that specify which operations a user can perform on a bucket or on an object.
-Each grant has a different meaning when applied to a bucket versus applied to
-an object:
-
-+------------------+--------------------------------------------------------+----------------------------------------------+
-| Permission | Bucket | Object |
-+==================+========================================================+==============================================+
-| ``READ`` | Grantee can list the objects in the bucket. | Grantee can read the object. |
-+------------------+--------------------------------------------------------+----------------------------------------------+
-| ``WRITE`` | Grantee can write or delete objects in the bucket. | N/A |
-+------------------+--------------------------------------------------------+----------------------------------------------+
-| ``READ_ACP`` | Grantee can read bucket ACL. | Grantee can read the object ACL. |
-+------------------+--------------------------------------------------------+----------------------------------------------+
-| ``WRITE_ACP`` | Grantee can write bucket ACL. | Grantee can write to the object ACL. |
-+------------------+--------------------------------------------------------+----------------------------------------------+
-| ``FULL_CONTROL`` | Grantee has full permissions for object in the bucket. | Grantee can read or write to the object ACL. |
-+------------------+--------------------------------------------------------+----------------------------------------------+
-
-.. _RFC 2104: http://www.ietf.org/rfc/rfc2104.txt
-.. _HMAC: http://en.wikipedia.org/wiki/HMAC
diff --git a/src/ceph/doc/radosgw/s3/bucketops.rst b/src/ceph/doc/radosgw/s3/bucketops.rst
deleted file mode 100644
index c7cd5b4..0000000
--- a/src/ceph/doc/radosgw/s3/bucketops.rst
+++ /dev/null
@@ -1,377 +0,0 @@
-===================
- Bucket Operations
-===================
-
-PUT Bucket
-----------
-Creates a new bucket. To create a bucket, you must have a user ID and a valid AWS Access Key ID to authenticate requests. You may not
-create buckets as an anonymous user.
-
-.. note:: We do not support request entities for ``PUT /{bucket}`` in this release.
-
-Constraints
-~~~~~~~~~~~
-In general, bucket names should follow domain name constraints.
-
-- Bucket names must be unique.
-- Bucket names must begin and end with a lowercase letter.
-- Bucket names may contain a dash (-).
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{bucket} HTTP/1.1
- Host: cname.domain.com
- x-amz-acl: public-read-write
-
- Authorization: AWS {access-key}:{hash-of-header-and-secret}
-
-Parameters
-~~~~~~~~~~
-
-+---------------+----------------------+-----------------------------------------------------------------------------+------------+
-| Name | Description | Valid Values | Required |
-+===============+======================+=============================================================================+============+
-| ``x-amz-acl`` | Canned ACLs. | ``private``, ``public-read``, ``public-read-write``, ``authenticated-read`` | No |
-+---------------+----------------------+-----------------------------------------------------------------------------+------------+
-
-
-
-HTTP Response
-~~~~~~~~~~~~~
-
-If the bucket name is unique, within constraints and unused, the operation will succeed.
-If a bucket with the same name already exists and the user is the bucket owner, the operation will succeed.
-If the bucket name is already in use, the operation will fail.
-
-+---------------+-----------------------+----------------------------------------------------------+
-| HTTP Status | Status Code | Description |
-+===============+=======================+==========================================================+
-| ``409`` | BucketAlreadyExists | Bucket already exists under different user's ownership. |
-+---------------+-----------------------+----------------------------------------------------------+
-
-DELETE Bucket
--------------
-
-Deletes a bucket. You can reuse bucket names following a successful bucket removal.
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{bucket} HTTP/1.1
- Host: cname.domain.com
-
- Authorization: AWS {access-key}:{hash-of-header-and-secret}
-
-HTTP Response
-~~~~~~~~~~~~~
-
-+---------------+---------------+------------------+
-| HTTP Status | Status Code | Description |
-+===============+===============+==================+
-| ``204`` | No Content | Bucket removed. |
-+---------------+---------------+------------------+
-
-GET Bucket
-----------
-Returns a list of bucket objects.
-
-Syntax
-~~~~~~
-
-::
-
- GET /{bucket}?max-keys=25 HTTP/1.1
- Host: cname.domain.com
-
-Parameters
-~~~~~~~~~~
-
-+-----------------+-----------+-----------------------------------------------------------------------+
-| Name | Type | Description |
-+=================+===========+=======================================================================+
-| ``prefix`` | String | Only returns objects that contain the specified prefix. |
-+-----------------+-----------+-----------------------------------------------------------------------+
-| ``delimiter`` | String | The delimiter between the prefix and the rest of the object name. |
-+-----------------+-----------+-----------------------------------------------------------------------+
-| ``marker`` | String | A beginning index for the list of objects returned. |
-+-----------------+-----------+-----------------------------------------------------------------------+
-| ``max-keys`` | Integer | The maximum number of keys to return. Default is 1000. |
-+-----------------+-----------+-----------------------------------------------------------------------+
-
-
-HTTP Response
-~~~~~~~~~~~~~
-
-+---------------+---------------+--------------------+
-| HTTP Status | Status Code | Description |
-+===============+===============+====================+
-| ``200`` | OK | Buckets retrieved |
-+---------------+---------------+--------------------+
-
-Bucket Response Entities
-~~~~~~~~~~~~~~~~~~~~~~~~
-``GET /{bucket}`` returns a container for buckets with the following fields.
-
-+------------------------+-----------+----------------------------------------------------------------------------------+
-| Name | Type | Description |
-+========================+===========+==================================================================================+
-| ``ListBucketResult`` | Entity | The container for the list of objects. |
-+------------------------+-----------+----------------------------------------------------------------------------------+
-| ``Name`` | String | The name of the bucket whose contents will be returned. |
-+------------------------+-----------+----------------------------------------------------------------------------------+
-| ``Prefix`` | String | A prefix for the object keys. |
-+------------------------+-----------+----------------------------------------------------------------------------------+
-| ``Marker`` | String | A beginning index for the list of objects returned. |
-+------------------------+-----------+----------------------------------------------------------------------------------+
-| ``MaxKeys`` | Integer | The maximum number of keys returned. |
-+------------------------+-----------+----------------------------------------------------------------------------------+
-| ``Delimiter`` | String | If set, objects with the same prefix will appear in the ``CommonPrefixes`` list. |
-+------------------------+-----------+----------------------------------------------------------------------------------+
-| ``IsTruncated`` | Boolean | If ``true``, only a subset of the bucket's contents were returned. |
-+------------------------+-----------+----------------------------------------------------------------------------------+
-| ``CommonPrefixes`` | Container | If multiple objects contain the same prefix, they will appear in this list. |
-+------------------------+-----------+----------------------------------------------------------------------------------+
-
-Object Response Entities
-~~~~~~~~~~~~~~~~~~~~~~~~
-The ``ListBucketResult`` contains objects, where each object is within a ``Contents`` container.
-
-+------------------------+-----------+------------------------------------------+
-| Name | Type | Description |
-+========================+===========+==========================================+
-| ``Contents`` | Object | A container for the object. |
-+------------------------+-----------+------------------------------------------+
-| ``Key`` | String | The object's key. |
-+------------------------+-----------+------------------------------------------+
-| ``LastModified`` | Date | The object's last-modified date/time. |
-+------------------------+-----------+------------------------------------------+
-| ``ETag`` | String | An MD-5 hash of the object. (entity tag) |
-+------------------------+-----------+------------------------------------------+
-| ``Size`` | Integer | The object's size. |
-+------------------------+-----------+------------------------------------------+
-| ``StorageClass`` | String | Should always return ``STANDARD``. |
-+------------------------+-----------+------------------------------------------+
-
-Get Bucket Location
--------------------
-Retrieves the bucket's region. The user needs to be the bucket owner
-to call this. A bucket can be constrained to a region by providing
-``LocationConstraint`` during a PUT request.
-
-Syntax
-~~~~~~
-Add the ``location`` subresource to bucket resource as shown below
-
-::
-
- GET /{bucket}?location HTTP/1.1
- Host: cname.domain.com
-
- Authorization: AWS {access-key}:{hash-of-header-and-secret}
-
-Response Entities
-~~~~~~~~~~~~~~~~~~~~~~~~
-
-+------------------------+-----------+------------------------------------------+
-| Name | Type | Description |
-+========================+===========+==========================================+
-| ``LocationConstraint`` | String | The region where bucket resides, empty |
-| | | string for defult region |
-+------------------------+-----------+------------------------------------------+
-
-
-
-Get Bucket ACL
---------------
-Retrieves the bucket access control list. The user needs to be the bucket
-owner or to have been granted ``READ_ACP`` permission on the bucket.
-
-Syntax
-~~~~~~
-Add the ``acl`` subresource to the bucket request as shown below.
-
-::
-
- GET /{bucket}?acl HTTP/1.1
- Host: cname.domain.com
-
- Authorization: AWS {access-key}:{hash-of-header-and-secret}
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| Name | Type | Description |
-+===========================+=============+==============================================================================================+
-| ``AccessControlPolicy`` | Container | A container for the response. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``AccessControlList`` | Container | A container for the ACL information. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Owner`` | Container | A container for the bucket owner's ``ID`` and ``DisplayName``. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``ID`` | String | The bucket owner's ID. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``DisplayName`` | String | The bucket owner's display name. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Grant`` | Container | A container for ``Grantee`` and ``Permission``. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Grantee`` | Container | A container for the ``DisplayName`` and ``ID`` of the user receiving a grant of permission. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Permission`` | String | The permission given to the ``Grantee`` bucket. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-
-PUT Bucket ACL
---------------
-Sets an access control to an existing bucket. The user needs to be the bucket
-owner or to have been granted ``WRITE_ACP`` permission on the bucket.
-
-Syntax
-~~~~~~
-Add the ``acl`` subresource to the bucket request as shown below.
-
-::
-
- PUT /{bucket}?acl HTTP/1.1
-
-Request Entities
-~~~~~~~~~~~~~~~~
-
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| Name | Type | Description |
-+===========================+=============+==============================================================================================+
-| ``AccessControlPolicy`` | Container | A container for the request. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``AccessControlList`` | Container | A container for the ACL information. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Owner`` | Container | A container for the bucket owner's ``ID`` and ``DisplayName``. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``ID`` | String | The bucket owner's ID. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``DisplayName`` | String | The bucket owner's display name. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Grant`` | Container | A container for ``Grantee`` and ``Permission``. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Grantee`` | Container | A container for the ``DisplayName`` and ``ID`` of the user receiving a grant of permission. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Permission`` | String | The permission given to the ``Grantee`` bucket. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-
-List Bucket Multipart Uploads
------------------------------
-
-``GET /?uploads`` returns a list of the current in-progress multipart uploads--i.e., the application initiates a multipart upload, but
-the service hasn't completed all the uploads yet.
-
-Syntax
-~~~~~~
-
-::
-
- GET /{bucket}?uploads HTTP/1.1
-
-Parameters
-~~~~~~~~~~
-
-You may specify parameters for ``GET /{bucket}?uploads``, but none of them are required.
-
-+------------------------+-----------+--------------------------------------------------------------------------------------+
-| Name | Type | Description |
-+========================+===========+======================================================================================+
-| ``prefix`` | String | Returns in-progress uploads whose keys contains the specified prefix. |
-+------------------------+-----------+--------------------------------------------------------------------------------------+
-| ``delimiter`` | String | The delimiter between the prefix and the rest of the object name. |
-+------------------------+-----------+--------------------------------------------------------------------------------------+
-| ``key-marker`` | String | The beginning marker for the list of uploads. |
-+------------------------+-----------+--------------------------------------------------------------------------------------+
-| ``max-keys`` | Integer | The maximum number of in-progress uploads. The default is 1000. |
-+------------------------+-----------+--------------------------------------------------------------------------------------+
-| ``max-uploads`` | Integer | The maximum number of multipart uploads. The range from 1-1000. The default is 1000. |
-+------------------------+-----------+--------------------------------------------------------------------------------------+
-| ``upload-id-marker`` | String | Ignored if ``key-marker`` is not specified. Specifies the ``ID`` of first |
-| | | upload to list in lexicographical order at or following the ``ID``. |
-+------------------------+-----------+--------------------------------------------------------------------------------------+
-
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| Name | Type | Description |
-+=========================================+=============+==========================================================================================================+
-| ``ListMultipartUploadsResult`` | Container | A container for the results. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``ListMultipartUploadsResult.Prefix`` | String | The prefix specified by the ``prefix`` request parameter (if any). |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Bucket`` | String | The bucket that will receive the bucket contents. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``KeyMarker`` | String | The key marker specified by the ``key-marker`` request parameter (if any). |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``UploadIdMarker`` | String | The marker specified by the ``upload-id-marker`` request parameter (if any). |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``NextKeyMarker`` | String | The key marker to use in a subsequent request if ``IsTruncated`` is ``true``. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``NextUploadIdMarker`` | String | The upload ID marker to use in a subsequent request if ``IsTruncated`` is ``true``. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``MaxUploads`` | Integer | The max uploads specified by the ``max-uploads`` request parameter. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Delimiter`` | String | If set, objects with the same prefix will appear in the ``CommonPrefixes`` list. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``IsTruncated`` | Boolean | If ``true``, only a subset of the bucket's upload contents were returned. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Upload`` | Container | A container for ``Key``, ``UploadId``, ``InitiatorOwner``, ``StorageClass``, and ``Initiated`` elements. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Key`` | String | The key of the object once the multipart upload is complete. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``UploadId`` | String | The ``ID`` that identifies the multipart upload. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Initiator`` | Container | Contains the ``ID`` and ``DisplayName`` of the user who initiated the upload. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``DisplayName`` | String | The initiator's display name. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``ID`` | String | The initiator's ID. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Owner`` | Container | A container for the ``ID`` and ``DisplayName`` of the user who owns the uploaded object. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``StorageClass`` | String | The method used to store the resulting object. ``STANDARD`` or ``REDUCED_REDUNDANCY`` |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Initiated`` | Date | The date and time the user initiated the upload. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``CommonPrefixes`` | Container | If multiple objects contain the same prefix, they will appear in this list. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``CommonPrefixes.Prefix`` | String | The substring of the key after the prefix as defined by the ``prefix`` request parameter. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-
-ENABLE/SUSPEND BUCKET VERSIONING
---------------------------------
-
-``PUT /?versioning`` This subresource set the versioning state of an existing bucket. To set the versioning state, you must be the bucket owner.
-
-You can set the versioning state with one of the following values:
-
-- Enabled : Enables versioning for the objects in the bucket, All objects added to the bucket receive a unique version ID.
-- Suspended : Disables versioning for the objects in the bucket, All objects added to the bucket receive the version ID null.
-
-If the versioning state has never been set on a bucket, it has no versioning state; a GET versioning request does not return a versioning state value.
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{bucket}?versioning HTTP/1.1
-
-REQUEST ENTITIES
-~~~~~~~~~~~~~~~~
-
-+-----------------------------+-----------+---------------------------------------------------------------------------+
-| Name | Type | Description |
-+=============================+===========+===========================================================================+
-| ``VersioningConfiguration`` | Container | A container for the request. |
-+-----------------------------+-----------+---------------------------------------------------------------------------+
-| ``Status`` | String | Sets the versioning state of the bucket. Valid Values: Suspended/Enabled |
-+-----------------------------+-----------+---------------------------------------------------------------------------+
diff --git a/src/ceph/doc/radosgw/s3/commons.rst b/src/ceph/doc/radosgw/s3/commons.rst
deleted file mode 100644
index ca848bc..0000000
--- a/src/ceph/doc/radosgw/s3/commons.rst
+++ /dev/null
@@ -1,111 +0,0 @@
-=================
- Common Entities
-=================
-
-.. toctree::
- :maxdepth: -1
-
-Bucket and Host Name
---------------------
-There are two different modes of accessing the buckets. The first (preferred) method
-identifies the bucket as the top-level directory in the URI. ::
-
- GET /mybucket HTTP/1.1
- Host: cname.domain.com
-
-The second method identifies the bucket via a virtual bucket host name. For example::
-
- GET / HTTP/1.1
- Host: mybucket.cname.domain.com
-
-To configure virtual hosted buckets, you can either set ``rgw_dns_name = cname.domain.com`` in ceph.conf, or add ``cname.domain.com`` to the list of ``hostnames`` in your zonegroup configuration. See `Ceph Object Gateway - Multisite Configuration`_ for more on zonegroups.
-
-.. tip:: We prefer the first method, because the second method requires expensive domain certification and DNS wild cards.
-
-Common Request Headers
-----------------------
-
-+--------------------+------------------------------------------+
-| Request Header | Description |
-+====================+==========================================+
-| ``CONTENT_LENGTH`` | Length of the request body. |
-+--------------------+------------------------------------------+
-| ``DATE`` | Request time and date (in UTC). |
-+--------------------+------------------------------------------+
-| ``HOST`` | The name of the host server. |
-+--------------------+------------------------------------------+
-| ``AUTHORIZATION`` | Authorization token. |
-+--------------------+------------------------------------------+
-
-Common Response Status
-----------------------
-
-+---------------+-----------------------------------+
-| HTTP Status | Response Code |
-+===============+===================================+
-| ``100`` | Continue |
-+---------------+-----------------------------------+
-| ``200`` | Success |
-+---------------+-----------------------------------+
-| ``201`` | Created |
-+---------------+-----------------------------------+
-| ``202`` | Accepted |
-+---------------+-----------------------------------+
-| ``204`` | NoContent |
-+---------------+-----------------------------------+
-| ``206`` | Partial content |
-+---------------+-----------------------------------+
-| ``304`` | NotModified |
-+---------------+-----------------------------------+
-| ``400`` | InvalidArgument |
-+---------------+-----------------------------------+
-| ``400`` | InvalidDigest |
-+---------------+-----------------------------------+
-| ``400`` | BadDigest |
-+---------------+-----------------------------------+
-| ``400`` | InvalidBucketName |
-+---------------+-----------------------------------+
-| ``400`` | InvalidObjectName |
-+---------------+-----------------------------------+
-| ``400`` | UnresolvableGrantByEmailAddress |
-+---------------+-----------------------------------+
-| ``400`` | InvalidPart |
-+---------------+-----------------------------------+
-| ``400`` | InvalidPartOrder |
-+---------------+-----------------------------------+
-| ``400`` | RequestTimeout |
-+---------------+-----------------------------------+
-| ``400`` | EntityTooLarge |
-+---------------+-----------------------------------+
-| ``403`` | AccessDenied |
-+---------------+-----------------------------------+
-| ``403`` | UserSuspended |
-+---------------+-----------------------------------+
-| ``403`` | RequestTimeTooSkewed |
-+---------------+-----------------------------------+
-| ``404`` | NoSuchKey |
-+---------------+-----------------------------------+
-| ``404`` | NoSuchBucket |
-+---------------+-----------------------------------+
-| ``404`` | NoSuchUpload |
-+---------------+-----------------------------------+
-| ``405`` | MethodNotAllowed |
-+---------------+-----------------------------------+
-| ``408`` | RequestTimeout |
-+---------------+-----------------------------------+
-| ``409`` | BucketAlreadyExists |
-+---------------+-----------------------------------+
-| ``409`` | BucketNotEmpty |
-+---------------+-----------------------------------+
-| ``411`` | MissingContentLength |
-+---------------+-----------------------------------+
-| ``412`` | PreconditionFailed |
-+---------------+-----------------------------------+
-| ``416`` | InvalidRange |
-+---------------+-----------------------------------+
-| ``422`` | UnprocessableEntity |
-+---------------+-----------------------------------+
-| ``500`` | InternalError |
-+---------------+-----------------------------------+
-
-.. _`Ceph Object Gateway - Multisite Configuration`: ../../multisite
diff --git a/src/ceph/doc/radosgw/s3/cpp.rst b/src/ceph/doc/radosgw/s3/cpp.rst
deleted file mode 100644
index 3451aeb..0000000
--- a/src/ceph/doc/radosgw/s3/cpp.rst
+++ /dev/null
@@ -1,331 +0,0 @@
-.. _cpp:
-
-C++ S3 Examples
-===============
-
-Setup
------
-
-The following contains includes and globals that will be used in later examples:
-
-.. code-block:: cpp
-
- #include "libs3.h"
- #include <stdlib.h>
- #include <iostream>
- #include <fstream>
-
- const char access_key[] = "ACCESS_KEY";
- const char secret_key[] = "SECRET_KEY";
- const char host[] = "HOST";
- const char sample_bucket[] = "sample_bucket";
- const char sample_key[] = "hello.txt";
- const char sample_file[] = "resource/hello.txt";
-
- S3BucketContext bucketContext =
- {
- host,
- sample_bucket,
- S3ProtocolHTTP,
- S3UriStylePath,
- access_key,
- secret_key
- };
-
- S3Status responsePropertiesCallback(
- const S3ResponseProperties *properties,
- void *callbackData)
- {
- return S3StatusOK;
- }
-
- static void responseCompleteCallback(
- S3Status status,
- const S3ErrorDetails *error,
- void *callbackData)
- {
- return;
- }
-
- S3ResponseHandler responseHandler =
- {
- &responsePropertiesCallback,
- &responseCompleteCallback
- };
-
-
-Creating (and Closing) a Connection
------------------------------------
-
-This creates a connection so that you can interact with the server.
-
-.. code-block:: cpp
-
- S3_initialize("s3", S3_INIT_ALL, host);
- // Do stuff...
- S3_deinitialize();
-
-
-Listing Owned Buckets
----------------------
-
-This gets a list of Buckets that you own.
-This also prints out the bucket name, owner ID, and display name
-for each bucket.
-
-.. code-block:: cpp
-
- static S3Status listServiceCallback(
- const char *ownerId,
- const char *ownerDisplayName,
- const char *bucketName,
- int64_t creationDate, void *callbackData)
- {
- bool *header_printed = (bool*) callbackData;
- if (!*header_printed) {
- *header_printed = true;
- printf("%-22s", " Bucket");
- printf(" %-20s %-12s", " Owner ID", "Display Name");
- printf("\n");
- printf("----------------------");
- printf(" --------------------" " ------------");
- printf("\n");
- }
-
- printf("%-22s", bucketName);
- printf(" %-20s %-12s", ownerId ? ownerId : "", ownerDisplayName ? ownerDisplayName : "");
- printf("\n");
-
- return S3StatusOK;
- }
-
- S3ListServiceHandler listServiceHandler =
- {
- responseHandler,
- &listServiceCallback
- };
- bool header_printed = false;
- S3_list_service(S3ProtocolHTTP, access_key, secret_key, host, 0, NULL, &listServiceHandler, &header_printed);
-
-
-Creating a Bucket
------------------
-
-This creates a new bucket.
-
-.. code-block:: cpp
-
- S3_create_bucket(S3ProtocolHTTP, access_key, secret_key, NULL, host, sample_bucket, S3CannedAclPrivate, NULL, NULL, &responseHandler, NULL);
-
-
-Listing a Bucket's Content
---------------------------
-
-This gets a list of objects in the bucket.
-This also prints out each object's name, the file size, and
-last modified date.
-
-.. code-block:: cpp
-
- static S3Status listBucketCallback(
- int isTruncated,
- const char *nextMarker,
- int contentsCount,
- const S3ListBucketContent *contents,
- int commonPrefixesCount,
- const char **commonPrefixes,
- void *callbackData)
- {
- printf("%-22s", " Object Name");
- printf(" %-5s %-20s", "Size", " Last Modified");
- printf("\n");
- printf("----------------------");
- printf(" -----" " --------------------");
- printf("\n");
-
- for (int i = 0; i < contentsCount; i++) {
- char timebuf[256];
- char sizebuf[16];
- const S3ListBucketContent *content = &(contents[i]);
- time_t t = (time_t) content->lastModified;
-
- strftime(timebuf, sizeof(timebuf), "%Y-%m-%dT%H:%M:%SZ", gmtime(&t));
- sprintf(sizebuf, "%5llu", (unsigned long long) content->size);
- printf("%-22s %s %s\n", content->key, sizebuf, timebuf);
- }
-
- return S3StatusOK;
- }
-
- S3ListBucketHandler listBucketHandler =
- {
- responseHandler,
- &listBucketCallback
- };
- S3_list_bucket(&bucketContext, NULL, NULL, NULL, 0, NULL, &listBucketHandler, NULL);
-
-The output will look something like this::
-
- myphoto1.jpg 251262 2011-08-08T21:35:48.000Z
- myphoto2.jpg 262518 2011-08-08T21:38:01.000Z
-
-
-Deleting a Bucket
------------------
-
-.. note::
-
- The Bucket must be empty! Otherwise it won't work!
-
-.. code-block:: cpp
-
- S3_delete_bucket(S3ProtocolHTTP, S3UriStylePath, access_key, secret_key, host, sample_bucket, NULL, &responseHandler, NULL);
-
-
-Creating an Object (from a file)
---------------------------------
-
-This creates a file ``hello.txt``.
-
-.. code-block:: cpp
-
- #include <sys/stat.h>
- typedef struct put_object_callback_data
- {
- FILE *infile;
- uint64_t contentLength;
- } put_object_callback_data;
-
-
- static int putObjectDataCallback(int bufferSize, char *buffer, void *callbackData)
- {
- put_object_callback_data *data = (put_object_callback_data *) callbackData;
-
- int ret = 0;
-
- if (data->contentLength) {
- int toRead = ((data->contentLength > (unsigned) bufferSize) ? (unsigned) bufferSize : data->contentLength);
- ret = fread(buffer, 1, toRead, data->infile);
- }
- data->contentLength -= ret;
- return ret;
- }
-
- put_object_callback_data data;
- struct stat statbuf;
- if (stat(sample_file, &statbuf) == -1) {
- fprintf(stderr, "\nERROR: Failed to stat file %s: ", sample_file);
- perror(0);
- exit(-1);
- }
-
- int contentLength = statbuf.st_size;
- data.contentLength = contentLength;
-
- if (!(data.infile = fopen(sample_file, "r"))) {
- fprintf(stderr, "\nERROR: Failed to open input file %s: ", sample_file);
- perror(0);
- exit(-1);
- }
-
- S3PutObjectHandler putObjectHandler =
- {
- responseHandler,
- &putObjectDataCallback
- };
-
- S3_put_object(&bucketContext, sample_key, contentLength, NULL, NULL, &putObjectHandler, &data);
-
-
-Download an Object (to a file)
-------------------------------
-
-This downloads a file and prints the contents.
-
-.. code-block:: cpp
-
- static S3Status getObjectDataCallback(int bufferSize, const char *buffer, void *callbackData)
- {
- FILE *outfile = (FILE *) callbackData;
- size_t wrote = fwrite(buffer, 1, bufferSize, outfile);
- return ((wrote < (size_t) bufferSize) ? S3StatusAbortedByCallback : S3StatusOK);
- }
-
- S3GetObjectHandler getObjectHandler =
- {
- responseHandler,
- &getObjectDataCallback
- };
- FILE *outfile = stdout;
- S3_get_object(&bucketContext, sample_key, NULL, 0, 0, NULL, &getObjectHandler, outfile);
-
-
-Delete an Object
-----------------
-
-This deletes an object.
-
-.. code-block:: cpp
-
- S3ResponseHandler deleteResponseHandler =
- {
- 0,
- &responseCompleteCallback
- };
- S3_delete_object(&bucketContext, sample_key, 0, &deleteResponseHandler, 0);
-
-
-Change an Object's ACL
-----------------------
-
-This changes an object's ACL to grant full control to another user.
-
-
-.. code-block:: cpp
-
- #include <string.h>
- char ownerId[] = "owner";
- char ownerDisplayName[] = "owner";
- char granteeId[] = "grantee";
- char granteeDisplayName[] = "grantee";
-
- S3AclGrant grants[] = {
- {
- S3GranteeTypeCanonicalUser,
- {{}},
- S3PermissionFullControl
- },
- {
- S3GranteeTypeCanonicalUser,
- {{}},
- S3PermissionReadACP
- },
- {
- S3GranteeTypeAllUsers,
- {{}},
- S3PermissionRead
- }
- };
-
- strncpy(grants[0].grantee.canonicalUser.id, ownerId, S3_MAX_GRANTEE_USER_ID_SIZE);
- strncpy(grants[0].grantee.canonicalUser.displayName, ownerDisplayName, S3_MAX_GRANTEE_DISPLAY_NAME_SIZE);
-
- strncpy(grants[1].grantee.canonicalUser.id, granteeId, S3_MAX_GRANTEE_USER_ID_SIZE);
- strncpy(grants[1].grantee.canonicalUser.displayName, granteeDisplayName, S3_MAX_GRANTEE_DISPLAY_NAME_SIZE);
-
- S3_set_acl(&bucketContext, sample_key, ownerId, ownerDisplayName, 3, grants, 0, &responseHandler, 0);
-
-
-Generate Object Download URL (signed)
--------------------------------------
-
-This generates a signed download URL that will be valid for 5 minutes.
-
-.. code-block:: cpp
-
- #include <time.h>
- char buffer[S3_MAX_AUTHENTICATED_QUERY_STRING_SIZE];
- int64_t expires = time(NULL) + 60 * 5; // Current time + 5 minutes
-
- S3_generate_authenticated_query_string(buffer, &bucketContext, sample_key, expires, NULL);
-
diff --git a/src/ceph/doc/radosgw/s3/csharp.rst b/src/ceph/doc/radosgw/s3/csharp.rst
deleted file mode 100644
index af1c6e4..0000000
--- a/src/ceph/doc/radosgw/s3/csharp.rst
+++ /dev/null
@@ -1,199 +0,0 @@
-.. _csharp:
-
-C# S3 Examples
-==============
-
-Creating a Connection
----------------------
-
-This creates a connection so that you can interact with the server.
-
-.. code-block:: csharp
-
- using System;
- using Amazon;
- using Amazon.S3;
- using Amazon.S3.Model;
-
- string accessKey = "put your access key here!";
- string secretKey = "put your secret key here!";
-
- AmazonS3Config config = new AmazonS3Config();
- config.ServiceURL = "objects.dreamhost.com";
-
- AmazonS3Client s3Client = new AmazonS3Client(
- accessKey,
- secretKey,
- config
- );
-
-
-Listing Owned Buckets
----------------------
-
-This gets a list of Buckets that you own.
-This also prints out the bucket name and creation date of each bucket.
-
-.. code-block:: csharp
-
- ListBucketsResponse response = client.ListBuckets();
- foreach (S3Bucket b in response.Buckets)
- {
- Console.WriteLine("{0}\t{1}", b.BucketName, b.CreationDate);
- }
-
-The output will look something like this::
-
- mahbuckat1 2011-04-21T18:05:39.000Z
- mahbuckat2 2011-04-21T18:05:48.000Z
- mahbuckat3 2011-04-21T18:07:18.000Z
-
-
-Creating a Bucket
------------------
-This creates a new bucket called ``my-new-bucket``
-
-.. code-block:: csharp
-
- PutBucketRequest request = new PutBucketRequest();
- request.BucketName = "my-new-bucket";
- client.PutBucket(request);
-
-Listing a Bucket's Content
---------------------------
-
-This gets a list of objects in the bucket.
-This also prints out each object's name, the file size, and last
-modified date.
-
-.. code-block:: csharp
-
- ListObjectsRequest request = new ListObjectsRequest();
- request.BucketName = "my-new-bucket";
- ListObjectsResponse response = client.ListObjects(request);
- foreach (S3Object o in response.S3Objects)
- {
- Console.WriteLine("{0}\t{1}\t{2}", o.Key, o.Size, o.LastModified);
- }
-
-The output will look something like this::
-
- myphoto1.jpg 251262 2011-08-08T21:35:48.000Z
- myphoto2.jpg 262518 2011-08-08T21:38:01.000Z
-
-
-Deleting a Bucket
------------------
-
-.. note::
-
- The Bucket must be empty! Otherwise it won't work!
-
-.. code-block:: csharp
-
- DeleteBucketRequest request = new DeleteBucketRequest();
- request.BucketName = "my-new-bucket";
- client.DeleteBucket(request);
-
-
-Forced Delete for Non-empty Buckets
------------------------------------
-
-.. attention::
-
- not available
-
-
-Creating an Object
-------------------
-
-This creates a file ``hello.txt`` with the string ``"Hello World!"``
-
-.. code-block:: csharp
-
- PutObjectRequest request = new PutObjectRequest();
- request.BucketName = "my-new-bucket";
- request.Key = "hello.txt";
- request.ContentType = "text/plain";
- request.ContentBody = "Hello World!";
- client.PutObject(request);
-
-
-Change an Object's ACL
-----------------------
-
-This makes the object ``hello.txt`` to be publicly readable, and
-``secret_plans.txt`` to be private.
-
-.. code-block:: csharp
-
- PutACLRequest request = new PutACLRequest();
- request.BucketName = "my-new-bucket";
- request.Key = "hello.txt";
- request.CannedACL = S3CannedACL.PublicRead;
- client.PutACL(request);
-
- PutACLRequest request2 = new PutACLRequest();
- request2.BucketName = "my-new-bucket";
- request2.Key = "secret_plans.txt";
- request2.CannedACL = S3CannedACL.Private;
- client.PutACL(request2);
-
-
-Download an Object (to a file)
-------------------------------
-
-This downloads the object ``perl_poetry.pdf`` and saves it in
-``C:\Users\larry\Documents``
-
-.. code-block:: csharp
-
- GetObjectRequest request = new GetObjectRequest();
- request.BucketName = "my-new-bucket";
- request.Key = "perl_poetry.pdf";
- GetObjectResponse response = client.GetObject(request);
- response.WriteResponseStreamToFile("C:\\Users\\larry\\Documents\\perl_poetry.pdf");
-
-
-Delete an Object
-----------------
-
-This deletes the object ``goodbye.txt``
-
-.. code-block:: csharp
-
- DeleteObjectRequest request = new DeleteObjectRequest();
- request.BucketName = "my-new-bucket";
- request.Key = "goodbye.txt";
- client.DeleteObject(request);
-
-
-Generate Object Download URLs (signed and unsigned)
----------------------------------------------------
-
-This generates an unsigned download URL for ``hello.txt``. This works
-because we made ``hello.txt`` public by setting the ACL above.
-This then generates a signed download URL for ``secret_plans.txt`` that
-will work for 1 hour. Signed download URLs will work for the time
-period even if the object is private (when the time period is up, the
-URL will stop working).
-
-.. note::
-
- The C# S3 Library does not have a method for generating unsigned
- URLs, so the following example only shows generating signed URLs.
-
-.. code-block:: csharp
-
- GetPreSignedUrlRequest request = new GetPreSignedUrlRequest();
- request.BucketName = "my-bucket-name";
- request.Key = "secret_plans.txt";
- request.Expires = DateTime.Now.AddHours(1);
- request.Protocol = Protocol.HTTP;
- string url = client.GetPreSignedURL(request);
- Console.WriteLine(url);
-
-The output of this will look something like::
-
- http://objects.dreamhost.com/my-bucket-name/secret_plans.txt?Signature=XXXXXXXXXXXXXXXXXXXXXXXXXXX&Expires=1316027075&AWSAccessKeyId=XXXXXXXXXXXXXXXXXXX
-
diff --git a/src/ceph/doc/radosgw/s3/java.rst b/src/ceph/doc/radosgw/s3/java.rst
deleted file mode 100644
index 057c09c..0000000
--- a/src/ceph/doc/radosgw/s3/java.rst
+++ /dev/null
@@ -1,212 +0,0 @@
-.. _java:
-
-Java S3 Examples
-================
-
-Setup
------
-
-The following examples may require some or all of the following java
-classes to be imported:
-
-.. code-block:: java
-
- import java.io.ByteArrayInputStream;
- import java.io.File;
- import java.util.List;
- import com.amazonaws.auth.AWSCredentials;
- import com.amazonaws.auth.BasicAWSCredentials;
- import com.amazonaws.util.StringUtils;
- import com.amazonaws.services.s3.AmazonS3;
- import com.amazonaws.services.s3.AmazonS3Client;
- import com.amazonaws.services.s3.model.Bucket;
- import com.amazonaws.services.s3.model.CannedAccessControlList;
- import com.amazonaws.services.s3.model.GeneratePresignedUrlRequest;
- import com.amazonaws.services.s3.model.GetObjectRequest;
- import com.amazonaws.services.s3.model.ObjectListing;
- import com.amazonaws.services.s3.model.ObjectMetadata;
- import com.amazonaws.services.s3.model.S3ObjectSummary;
-
-
-If you are just testing the Ceph Object Storage services, consider
-using HTTP protocol instead of HTTPS protocol.
-
-First, import the ``ClientConfiguration`` and ``Protocol`` classes.
-
-.. code-block:: java
-
- import com.amazonaws.ClientConfiguration;
- import com.amazonaws.Protocol;
-
-
-Then, define the client configuration, and add the client configuration
-as an argument for the S3 client.
-
-.. code-block:: java
-
- AWSCredentials credentials = new BasicAWSCredentials(accessKey, secretKey);
-
- ClientConfiguration clientConfig = new ClientConfiguration();
- clientConfig.setProtocol(Protocol.HTTP);
-
- AmazonS3 conn = new AmazonS3Client(credentials, clientConfig);
- conn.setEndpoint("endpoint.com");
-
-
-Creating a Connection
----------------------
-
-This creates a connection so that you can interact with the server.
-
-.. code-block:: java
-
- String accessKey = "insert your access key here!";
- String secretKey = "insert your secret key here!";
-
- AWSCredentials credentials = new BasicAWSCredentials(accessKey, secretKey);
- AmazonS3 conn = new AmazonS3Client(credentials);
- conn.setEndpoint("objects.dreamhost.com");
-
-
-Listing Owned Buckets
----------------------
-
-This gets a list of Buckets that you own.
-This also prints out the bucket name and creation date of each bucket.
-
-.. code-block:: java
-
- List<Bucket> buckets = conn.listBuckets();
- for (Bucket bucket : buckets) {
- System.out.println(bucket.getName() + "\t" +
- StringUtils.fromDate(bucket.getCreationDate()));
- }
-
-The output will look something like this::
-
- mahbuckat1 2011-04-21T18:05:39.000Z
- mahbuckat2 2011-04-21T18:05:48.000Z
- mahbuckat3 2011-04-21T18:07:18.000Z
-
-
-Creating a Bucket
------------------
-
-This creates a new bucket called ``my-new-bucket``
-
-.. code-block:: java
-
- Bucket bucket = conn.createBucket("my-new-bucket");
-
-
-Listing a Bucket's Content
---------------------------
-This gets a list of objects in the bucket.
-This also prints out each object's name, the file size, and last
-modified date.
-
-.. code-block:: java
-
- ObjectListing objects = conn.listObjects(bucket.getName());
- do {
- for (S3ObjectSummary objectSummary : objects.getObjectSummaries()) {
- System.out.println(objectSummary.getKey() + "\t" +
- objectSummary.getSize() + "\t" +
- StringUtils.fromDate(objectSummary.getLastModified()));
- }
- objects = conn.listNextBatchOfObjects(objects);
- } while (objects.isTruncated());
-
-The output will look something like this::
-
- myphoto1.jpg 251262 2011-08-08T21:35:48.000Z
- myphoto2.jpg 262518 2011-08-08T21:38:01.000Z
-
-
-Deleting a Bucket
------------------
-
-.. note::
- The Bucket must be empty! Otherwise it won't work!
-
-.. code-block:: java
-
- conn.deleteBucket(bucket.getName());
-
-
-Forced Delete for Non-empty Buckets
------------------------------------
-.. attention::
- not available
-
-
-Creating an Object
-------------------
-
-This creates a file ``hello.txt`` with the string ``"Hello World!"``
-
-.. code-block:: java
-
- ByteArrayInputStream input = new ByteArrayInputStream("Hello World!".getBytes());
- conn.putObject(bucket.getName(), "hello.txt", input, new ObjectMetadata());
-
-
-Change an Object's ACL
-----------------------
-
-This makes the object ``hello.txt`` to be publicly readable, and
-``secret_plans.txt`` to be private.
-
-.. code-block:: java
-
- conn.setObjectAcl(bucket.getName(), "hello.txt", CannedAccessControlList.PublicRead);
- conn.setObjectAcl(bucket.getName(), "secret_plans.txt", CannedAccessControlList.Private);
-
-
-Download an Object (to a file)
-------------------------------
-
-This downloads the object ``perl_poetry.pdf`` and saves it in
-``/home/larry/documents``
-
-.. code-block:: java
-
- conn.getObject(
- new GetObjectRequest(bucket.getName(), "perl_poetry.pdf"),
- new File("/home/larry/documents/perl_poetry.pdf")
- );
-
-
-Delete an Object
-----------------
-
-This deletes the object ``goodbye.txt``
-
-.. code-block:: java
-
- conn.deleteObject(bucket.getName(), "goodbye.txt");
-
-
-Generate Object Download URLs (signed and unsigned)
----------------------------------------------------
-
-This generates an unsigned download URL for ``hello.txt``. This works
-because we made ``hello.txt`` public by setting the ACL above.
-This then generates a signed download URL for ``secret_plans.txt`` that
-will work for 1 hour. Signed download URLs will work for the time
-period even if the object is private (when the time period is up, the
-URL will stop working).
-
-.. note::
- The java library does not have a method for generating unsigned
- URLs, so the example below just generates a signed URL.
-
-.. code-block:: java
-
- GeneratePresignedUrlRequest request = new GeneratePresignedUrlRequest(bucket.getName(), "secret_plans.txt");
- System.out.println(conn.generatePresignedUrl(request));
-
-The output will look something like this::
-
- https://my-bucket-name.objects.dreamhost.com/secret_plans.txt?Signature=XXXXXXXXXXXXXXXXXXXXXXXXXXX&Expires=1316027075&AWSAccessKeyId=XXXXXXXXXXXXXXXXXXX
-
diff --git a/src/ceph/doc/radosgw/s3/objectops.rst b/src/ceph/doc/radosgw/s3/objectops.rst
deleted file mode 100644
index b8a2475..0000000
--- a/src/ceph/doc/radosgw/s3/objectops.rst
+++ /dev/null
@@ -1,403 +0,0 @@
-Object Operations
-=================
-
-Put Object
-----------
-Adds an object to a bucket. You must have write permissions on the bucket to perform this operation.
-
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{bucket}/{object} HTTP/1.1
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-+----------------------+--------------------------------------------+-------------------------------------------------------------------------------+------------+
-| Name | Description | Valid Values | Required |
-+======================+============================================+===============================================================================+============+
-| **content-md5** | A base64 encoded MD-5 hash of the message. | A string. No defaults or constraints. | No |
-+----------------------+--------------------------------------------+-------------------------------------------------------------------------------+------------+
-| **content-type** | A standard MIME type. | Any MIME type. Default: ``binary/octet-stream`` | No |
-+----------------------+--------------------------------------------+-------------------------------------------------------------------------------+------------+
-| **x-amz-meta-<...>** | User metadata. Stored with the object. | A string up to 8kb. No defaults. | No |
-+----------------------+--------------------------------------------+-------------------------------------------------------------------------------+------------+
-| **x-amz-acl** | A canned ACL. | ``private``, ``public-read``, ``public-read-write``, ``authenticated-read`` | No |
-+----------------------+--------------------------------------------+-------------------------------------------------------------------------------+------------+
-
-
-Copy Object
------------
-To copy an object, use ``PUT`` and specify a destination bucket and the object name.
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{dest-bucket}/{dest-object} HTTP/1.1
- x-amz-copy-source: {source-bucket}/{source-object}
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-+--------------------------------------+-------------------------------------------------+------------------------+------------+
-| Name | Description | Valid Values | Required |
-+======================================+=================================================+========================+============+
-| **x-amz-copy-source** | The source bucket name + object name. | {bucket}/{obj} | Yes |
-+--------------------------------------+-------------------------------------------------+------------------------+------------+
-| **x-amz-acl** | A canned ACL. | ``private``, | No |
-| | | ``public-read``, | |
-| | | ``public-read-write``, | |
-| | | ``authenticated-read`` | |
-+--------------------------------------+-------------------------------------------------+------------------------+------------+
-| **x-amz-copy-if-modified-since** | Copies only if modified since the timestamp. | Timestamp | No |
-+--------------------------------------+-------------------------------------------------+------------------------+------------+
-| **x-amz-copy-if-unmodified-since** | Copies only if unmodified since the timestamp. | Timestamp | No |
-+--------------------------------------+-------------------------------------------------+------------------------+------------+
-| **x-amz-copy-if-match** | Copies only if object ETag matches ETag. | Entity Tag | No |
-+--------------------------------------+-------------------------------------------------+------------------------+------------+
-| **x-amz-copy-if-none-match** | Copies only if object ETag doesn't match. | Entity Tag | No |
-+--------------------------------------+-------------------------------------------------+------------------------+------------+
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-+------------------------+-------------+-----------------------------------------------+
-| Name | Type | Description |
-+========================+=============+===============================================+
-| **CopyObjectResult** | Container | A container for the response elements. |
-+------------------------+-------------+-----------------------------------------------+
-| **LastModified** | Date | The last modified date of the source object. |
-+------------------------+-------------+-----------------------------------------------+
-| **Etag** | String | The ETag of the new object. |
-+------------------------+-------------+-----------------------------------------------+
-
-Remove Object
--------------
-
-Removes an object. Requires WRITE permission set on the containing bucket.
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{bucket}/{object} HTTP/1.1
-
-
-
-Get Object
-----------
-Retrieves an object from a bucket within RADOS.
-
-Syntax
-~~~~~~
-
-::
-
- GET /{bucket}/{object} HTTP/1.1
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-| Name | Description | Valid Values | Required |
-+===========================+================================================+================================+============+
-| **range** | The range of the object to retrieve. | Range: bytes=beginbyte-endbyte | No |
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-| **if-modified-since** | Gets only if modified since the timestamp. | Timestamp | No |
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-| **if-unmodified-since** | Gets only if not modified since the timestamp. | Timestamp | No |
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-| **if-match** | Gets only if object ETag matches ETag. | Entity Tag | No |
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-| **if-none-match** | Gets only if object ETag matches ETag. | Entity Tag | No |
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-
-Response Headers
-~~~~~~~~~~~~~~~~
-
-+-------------------+--------------------------------------------------------------------------------------------+
-| Name | Description |
-+===================+============================================================================================+
-| **Content-Range** | Data range, will only be returned if the range header field was specified in the request |
-+-------------------+--------------------------------------------------------------------------------------------+
-
-Get Object Info
----------------
-
-Returns information about object. This request will return the same
-header information as with the Get Object request, but will include
-the metadata only, not the object data payload.
-
-Syntax
-~~~~~~
-
-::
-
- HEAD /{bucket}/{object} HTTP/1.1
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-| Name | Description | Valid Values | Required |
-+===========================+================================================+================================+============+
-| **range** | The range of the object to retrieve. | Range: bytes=beginbyte-endbyte | No |
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-| **if-modified-since** | Gets only if modified since the timestamp. | Timestamp | No |
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-| **if-unmodified-since** | Gets only if not modified since the timestamp. | Timestamp | No |
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-| **if-match** | Gets only if object ETag matches ETag. | Entity Tag | No |
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-| **if-none-match** | Gets only if object ETag matches ETag. | Entity Tag | No |
-+---------------------------+------------------------------------------------+--------------------------------+------------+
-
-Get Object ACL
---------------
-
-Syntax
-~~~~~~
-
-::
-
- GET /{bucket}/{object}?acl HTTP/1.1
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| Name | Type | Description |
-+===========================+=============+==============================================================================================+
-| ``AccessControlPolicy`` | Container | A container for the response. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``AccessControlList`` | Container | A container for the ACL information. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Owner`` | Container | A container for the object owner's ``ID`` and ``DisplayName``. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``ID`` | String | The object owner's ID. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``DisplayName`` | String | The object owner's display name. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Grant`` | Container | A container for ``Grantee`` and ``Permission``. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Grantee`` | Container | A container for the ``DisplayName`` and ``ID`` of the user receiving a grant of permission. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Permission`` | String | The permission given to the ``Grantee`` object. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-
-
-
-Set Object ACL
---------------
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{bucket}/{object}?acl
-
-Request Entities
-~~~~~~~~~~~~~~~~
-
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| Name | Type | Description |
-+===========================+=============+==============================================================================================+
-| ``AccessControlPolicy`` | Container | A container for the response. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``AccessControlList`` | Container | A container for the ACL information. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Owner`` | Container | A container for the object owner's ``ID`` and ``DisplayName``. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``ID`` | String | The object owner's ID. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``DisplayName`` | String | The object owner's display name. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Grant`` | Container | A container for ``Grantee`` and ``Permission``. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Grantee`` | Container | A container for the ``DisplayName`` and ``ID`` of the user receiving a grant of permission. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-| ``Permission`` | String | The permission given to the ``Grantee`` object. |
-+---------------------------+-------------+----------------------------------------------------------------------------------------------+
-
-
-
-Initiate Multi-part Upload
---------------------------
-
-Initiate a multi-part upload process.
-
-Syntax
-~~~~~~
-
-::
-
- POST /{bucket}/{object}?uploads
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-+----------------------+--------------------------------------------+-------------------------------------------------------------------------------+------------+
-| Name | Description | Valid Values | Required |
-+======================+============================================+===============================================================================+============+
-| **content-md5** | A base64 encoded MD-5 hash of the message. | A string. No defaults or constraints. | No |
-+----------------------+--------------------------------------------+-------------------------------------------------------------------------------+------------+
-| **content-type** | A standard MIME type. | Any MIME type. Default: ``binary/octet-stream`` | No |
-+----------------------+--------------------------------------------+-------------------------------------------------------------------------------+------------+
-| **x-amz-meta-<...>** | User metadata. Stored with the object. | A string up to 8kb. No defaults. | No |
-+----------------------+--------------------------------------------+-------------------------------------------------------------------------------+------------+
-| **x-amz-acl** | A canned ACL. | ``private``, ``public-read``, ``public-read-write``, ``authenticated-read`` | No |
-+----------------------+--------------------------------------------+-------------------------------------------------------------------------------+------------+
-
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| Name | Type | Description |
-+=========================================+=============+==========================================================================================================+
-| ``InitiatedMultipartUploadsResult`` | Container | A container for the results. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Bucket`` | String | The bucket that will receive the object contents. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Key`` | String | The key specified by the ``key`` request parameter (if any). |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``UploadId`` | String | The ID specified by the ``upload-id`` request parameter identifying the multipart upload (if any). |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-
-
-Multipart Upload Part
----------------------
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{bucket}/{object}?partNumber=&uploadId= HTTP/1.1
-
-HTTP Response
-~~~~~~~~~~~~~
-
-The following HTTP response may be returned:
-
-+---------------+----------------+--------------------------------------------------------------------------+
-| HTTP Status | Status Code | Description |
-+===============+================+==========================================================================+
-| **404** | NoSuchUpload | Specified upload-id does not match any initiated upload on this object |
-+---------------+----------------+--------------------------------------------------------------------------+
-
-List Multipart Upload Parts
----------------------------
-
-Syntax
-~~~~~~
-
-::
-
- GET /{bucket}/{object}?uploadId=123 HTTP/1.1
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| Name | Type | Description |
-+=========================================+=============+==========================================================================================================+
-| ``ListPartsResult`` | Container | A container for the results. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Bucket`` | String | The bucket that will receive the object contents. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Key`` | String | The key specified by the ``key`` request parameter (if any). |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``UploadId`` | String | The ID specified by the ``upload-id`` request parameter identifying the multipart upload (if any). |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Initiator`` | Container | Contains the ``ID`` and ``DisplayName`` of the user who initiated the upload. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``ID`` | String | The initiator's ID. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``DisplayName`` | String | The initiator's display name. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Owner`` | Container | A container for the ``ID`` and ``DisplayName`` of the user who owns the uploaded object. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``StorageClass`` | String | The method used to store the resulting object. ``STANDARD`` or ``REDUCED_REDUNDANCY`` |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``PartNumberMarker`` | String | The part marker to use in a subsequent request if ``IsTruncated`` is ``true``. Precedes the list. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``NextPartNumberMarker`` | String | The next part marker to use in a subsequent request if ``IsTruncated`` is ``true``. The end of the list. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``MaxParts`` | Integer | The max parts allowed in the response as specified by the ``max-parts`` request parameter. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``IsTruncated`` | Boolean | If ``true``, only a subset of the object's upload contents were returned. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Part`` | Container | A container for ``LastModified``, ``PartNumber``, ``ETag`` and ``Size`` elements. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``LastModified`` | Date | Date and time at which the part was uploaded. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``PartNumber`` | Integer | The identification number of the part. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``ETag`` | String | The part's entity tag. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-| ``Size`` | Integer | The size of the uploaded part. |
-+-----------------------------------------+-------------+----------------------------------------------------------------------------------------------------------+
-
-
-
-Complete Multipart Upload
--------------------------
-Assembles uploaded parts and creates a new object, thereby completing a multipart upload.
-
-Syntax
-~~~~~~
-
-::
-
- POST /{bucket}/{object}?uploadId= HTTP/1.1
-
-Request Entities
-~~~~~~~~~~~~~~~~
-
-+----------------------------------+-------------+-----------------------------------------------------+----------+
-| Name | Type | Description | Required |
-+==================================+=============+=====================================================+==========+
-| ``CompleteMultipartUpload`` | Container | A container consisting of one or more parts. | Yes |
-+----------------------------------+-------------+-----------------------------------------------------+----------+
-| ``Part`` | Container | A container for the ``PartNumber`` and ``ETag``. | Yes |
-+----------------------------------+-------------+-----------------------------------------------------+----------+
-| ``PartNumber`` | Integer | The identifier of the part. | Yes |
-+----------------------------------+-------------+-----------------------------------------------------+----------+
-| ``ETag`` | String | The part's entity tag. | Yes |
-+----------------------------------+-------------+-----------------------------------------------------+----------+
-
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-+-------------------------------------+-------------+-------------------------------------------------------+
-| Name | Type | Description |
-+=====================================+=============+=======================================================+
-| **CompleteMultipartUploadResult** | Container | A container for the response. |
-+-------------------------------------+-------------+-------------------------------------------------------+
-| **Location** | URI | The resource identifier (path) of the new object. |
-+-------------------------------------+-------------+-------------------------------------------------------+
-| **Bucket** | String | The name of the bucket that contains the new object. |
-+-------------------------------------+-------------+-------------------------------------------------------+
-| **Key** | String | The object's key. |
-+-------------------------------------+-------------+-------------------------------------------------------+
-| **ETag** | String | The entity tag of the new object. |
-+-------------------------------------+-------------+-------------------------------------------------------+
-
-Abort Multipart Upload
-----------------------
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{bucket}/{object}?uploadId= HTTP/1.1
diff --git a/src/ceph/doc/radosgw/s3/perl.rst b/src/ceph/doc/radosgw/s3/perl.rst
deleted file mode 100644
index f12e5c6..0000000
--- a/src/ceph/doc/radosgw/s3/perl.rst
+++ /dev/null
@@ -1,192 +0,0 @@
-.. _perl:
-
-Perl S3 Examples
-================
-
-Creating a Connection
----------------------
-
-This creates a connection so that you can interact with the server.
-
-.. code-block:: perl
-
- use Amazon::S3;
- my $access_key = 'put your access key here!';
- my $secret_key = 'put your secret key here!';
-
- my $conn = Amazon::S3->new({
- aws_access_key_id => $access_key,
- aws_secret_access_key => $secret_key,
- host => 'objects.dreamhost.com',
- secure => 1,
- retry => 1,
- });
-
-
-Listing Owned Buckets
----------------------
-
-This gets a list of `Amazon::S3::Bucket`_ objects that you own.
-We'll also print out the bucket name and creation date of each bucket.
-
-.. code-block:: perl
-
- my @buckets = @{$conn->buckets->{buckets} || []};
- foreach my $bucket (@buckets) {
- print $bucket->bucket . "\t" . $bucket->creation_date . "\n";
- }
-
-The output will look something like this::
-
- mahbuckat1 2011-04-21T18:05:39.000Z
- mahbuckat2 2011-04-21T18:05:48.000Z
- mahbuckat3 2011-04-21T18:07:18.000Z
-
-
-Creating a Bucket
------------------
-
-This creates a new bucket called ``my-new-bucket``
-
-.. code-block:: perl
-
- my $bucket = $conn->add_bucket({ bucket => 'my-new-bucket' });
-
-
-Listing a Bucket's Content
---------------------------
-
-This gets a list of hashes with info about each object in the bucket.
-We'll also print out each object's name, the file size, and last
-modified date.
-
-.. code-block:: perl
-
- my @keys = @{$bucket->list_all->{keys} || []};
- foreach my $key (@keys) {
- print "$key->{key}\t$key->{size}\t$key->{last_modified}\n";
- }
-
-The output will look something like this::
-
- myphoto1.jpg 251262 2011-08-08T21:35:48.000Z
- myphoto2.jpg 262518 2011-08-08T21:38:01.000Z
-
-
-Deleting a Bucket
------------------
-
-.. note::
- The Bucket must be empty! Otherwise it won't work!
-
-.. code-block:: perl
-
- $conn->delete_bucket($bucket);
-
-
-Forced Delete for Non-empty Buckets
------------------------------------
-
-.. attention::
-
- not available in the `Amazon::S3`_ perl module
-
-
-Creating an Object
-------------------
-
-This creates a file ``hello.txt`` with the string ``"Hello World!"``
-
-.. code-block:: perl
-
- $bucket->add_key(
- 'hello.txt', 'Hello World!',
- { content_type => 'text/plain' },
- );
-
-
-Change an Object's ACL
-----------------------
-
-This makes the object ``hello.txt`` to be publicly readable and
-``secret_plans.txt`` to be private.
-
-.. code-block:: perl
-
- $bucket->set_acl({
- key => 'hello.txt',
- acl_short => 'public-read',
- });
- $bucket->set_acl({
- key => 'secret_plans.txt',
- acl_short => 'private',
- });
-
-
-Download an Object (to a file)
-------------------------------
-
-This downloads the object ``perl_poetry.pdf`` and saves it in
-``/home/larry/documents/``
-
-.. code-block:: perl
-
- $bucket->get_key_filename('perl_poetry.pdf', undef,
- '/home/larry/documents/perl_poetry.pdf');
-
-
-Delete an Object
-----------------
-
-This deletes the object ``goodbye.txt``
-
-.. code-block:: perl
-
- $bucket->delete_key('goodbye.txt');
-
-Generate Object Download URLs (signed and unsigned)
----------------------------------------------------
-This generates an unsigned download URL for ``hello.txt``. This works
-because we made ``hello.txt`` public by setting the ACL above.
-Then this generates a signed download URL for ``secret_plans.txt`` that
-will work for 1 hour. Signed download URLs will work for the time
-period even if the object is private (when the time period is up, the
-URL will stop working).
-
-.. note::
- The `Amazon::S3`_ module does not have a way to generate download
- URLs, so we are going to be using another module instead. Unfortunately,
- most modules for generating these URLs assume that you are using Amazon,
- so we have had to go with using a more obscure module, `Muck::FS::S3`_. This
- should be the same as Amazon's sample S3 perl module, but this sample
- module is not in CPAN. So, you can either use CPAN to install
- `Muck::FS::S3`_, or install Amazon's sample S3 module manually. If you go
- the manual route, you can remove ``Muck::FS::`` from the example below.
-
-.. code-block:: perl
-
- use Muck::FS::S3::QueryStringAuthGenerator;
- my $generator = Muck::FS::S3::QueryStringAuthGenerator->new(
- $access_key,
- $secret_key,
- 0, # 0 means use 'http'. set this to 1 for 'https'
- 'objects.dreamhost.com',
- );
-
- my $hello_url = $generator->make_bare_url($bucket->bucket, 'hello.txt');
- print $hello_url . "\n";
-
- $generator->expires_in(3600); # 1 hour = 3600 seconds
- my $plans_url = $generator->get($bucket->bucket, 'secret_plans.txt');
- print $plans_url . "\n";
-
-The output will look something like this::
-
- http://objects.dreamhost.com:80/my-bucket-name/hello.txt
- http://objects.dreamhost.com:80/my-bucket-name/secret_plans.txt?Signature=XXXXXXXXXXXXXXXXXXXXXXXXXXX&Expires=1316027075&AWSAccessKeyId=XXXXXXXXXXXXXXXXXXX
-
-
-.. _`Amazon::S3`: http://search.cpan.org/~tima/Amazon-S3-0.441/lib/Amazon/S3.pm
-.. _`Amazon::S3::Bucket`: http://search.cpan.org/~tima/Amazon-S3-0.441/lib/Amazon/S3/Bucket.pm
-.. _`Muck::FS::S3`: http://search.cpan.org/~mike/Muck-0.02/
-
diff --git a/src/ceph/doc/radosgw/s3/php.rst b/src/ceph/doc/radosgw/s3/php.rst
deleted file mode 100644
index 40542e0..0000000
--- a/src/ceph/doc/radosgw/s3/php.rst
+++ /dev/null
@@ -1,208 +0,0 @@
-.. _php:
-
-PHP S3 Examples
-===============
-
-Creating a Connection
----------------------
-
-This creates a connection so that you can interact with the server.
-
-.. code-block:: php
-
- <?php
- define('AWS_KEY', 'place access key here');
- define('AWS_SECRET_KEY', 'place secret key here');
- define('AWS_CANONICAL_ID', 'your DHO Username');
- define('AWS_CANONICAL_NAME', 'Also your DHO Username!');
- $HOST = 'objects.dreamhost.com';
-
- // require the amazon sdk for php library
- require_once 'AWSSDKforPHP/sdk.class.php';
-
- // Instantiate the S3 class and point it at the desired host
- $Connection = new AmazonS3(array(
- 'key' => AWS_KEY,
- 'secret' => AWS_SECRET_KEY,
- 'canonical_id' => AWS_CANONICAL_ID,
- 'canonical_name' => AWS_CANONICAL_NAME,
- ));
- $Connection->set_hostname($HOST);
- $Connection->allow_hostname_override(false);
-
- // Set the S3 class to use objects.dreamhost.com/bucket
- // instead of bucket.objects.dreamhost.com
- $Connection->enable_path_style();
-
-
-Listing Owned Buckets
----------------------
-This gets a list of CFSimpleXML objects representing buckets that you
-own. This also prints out the bucket name and creation date of each
-bucket.
-
-.. code-block:: php
-
- <?php
- $ListResponse = $Connection->list_buckets();
- $Buckets = $ListResponse->body->Buckets->Bucket;
- foreach ($Buckets as $Bucket) {
- echo $Bucket->Name . "\t" . $Bucket->CreationDate . "\n";
- }
-
-The output will look something like this::
-
- mahbuckat1 2011-04-21T18:05:39.000Z
- mahbuckat2 2011-04-21T18:05:48.000Z
- mahbuckat3 2011-04-21T18:07:18.000Z
-
-
-Creating a Bucket
------------------
-
-This creates a new bucket called ``my-new-bucket`` and returns a
-``CFResponse`` object.
-
-.. note::
-
- This command requires a region as the second argument,
- so we use ``AmazonS3::REGION_US_E1``, because this constant is ``''``
-
-.. code-block:: php
-
- <?php
- $Connection->create_bucket('my-new-bucket', AmazonS3::REGION_US_E1);
-
-
-List a Bucket's Content
------------------------
-
-This gets an array of ``CFSimpleXML`` objects representing the objects
-in the bucket. This then prints out each object's name, the file size,
-and last modified date.
-
-.. code-block:: php
-
- <?php
- $ObjectsListResponse = $Connection->list_objects($bucketname);
- $Objects = $ObjectsListResponse->body->Contents;
- foreach ($Objects as $Object) {
- echo $Object->Key . "\t" . $Object->Size . "\t" . $Object->LastModified . "\n";
- }
-
-.. note::
-
- If there are more than 1000 objects in this bucket,
- you need to check $ObjectListResponse->body->isTruncated
- and run again with the name of the last key listed.
- Keep doing this until isTruncated is not true.
-
-The output will look something like this if the bucket has some files::
-
- myphoto1.jpg 251262 2011-08-08T21:35:48.000Z
- myphoto2.jpg 262518 2011-08-08T21:38:01.000Z
-
-
-Deleting a Bucket
------------------
-
-This deletes the bucket called ``my-old-bucket`` and returns a
-``CFResponse`` object
-
-.. note::
-
- The Bucket must be empty! Otherwise it won't work!
-
-.. code-block:: php
-
- <?php
- $Connection->delete_bucket('my-old-bucket');
-
-
-Forced Delte for Non-empty Buckets
-----------------------------------
-
-This will delete the bucket even if it is not empty.
-
-.. code-block:: php
-
- <?php
- $Connection->delete_bucket('my-old-bucket', 1);
-
-
-Creating an Object
-------------------
-
-This creates an object ``hello.txt`` with the string ``"Hello World!"``
-
-.. code-block:: php
-
- <?php
- $Connection->create_object('my-bucket-name', 'hello.txt', array(
- 'body' => "Hello World!",
- ));
-
-
-Change an Object's ACL
-----------------------
-
-This makes the object ``hello.txt`` to be publicly readable and
-``secret_plans.txt`` to be private.
-
-.. code-block:: php
-
- <?php
- $Connection->set_object_acl('my-bucket-name', 'hello.txt', AmazonS3::ACL_PUBLIC);
- $Connection->set_object_acl('my-bucket-name', 'secret_plans.txt', AmazonS3::ACL_PRIVATE);
-
-
-Delete an Object
-----------------
-
-This deletes the object ``goodbye.txt``
-
-.. code-block:: php
-
- <?php
- $Connection->delete_object('my-bucket-name', 'goodbye.txt');
-
-
-Download an Object (to a file)
-------------------------------
-
-This downloads the object ``poetry.pdf`` and saves it in
-``/home/larry/documents/``
-
-.. code-block:: php
-
- <?php
- $FileHandle = fopen('/home/larry/documents/poetry.pdf', 'w+');
- $Connection->get_object('my-bucket-name', 'poetry.pdf', array(
- 'fileDownload' => $FileHandle,
- ));
-
-
-Generate Object Download URLs (signed and unsigned)
----------------------------------------------------
-
-This generates an unsigned download URL for ``hello.txt``.
-This works because we made ``hello.txt`` public by setting
-the ACL above. This then generates a signed download URL
-for ``secret_plans.txt`` that will work for 1 hour.
-Signed download URLs will work for the time period even
-if the object is private (when the time period is up,
-the URL will stop working).
-
-.. code-block:: php
-
- <?php
- my $plans_url = $Connection->get_object_url('my-bucket-name', 'hello.txt');
- echo $plans_url . "\n";
- my $secret_url = $Connection->get_object_url('my-bucket-name', 'secret_plans.txt', '1 hour');
- echo $secret_url . "\n";
-
-The output of this will look something like::
-
- http://objects.dreamhost.com/my-bucket-name/hello.txt
- http://objects.dreamhost.com/my-bucket-name/secret_plans.txt?Signature=XXXXXXXXXXXXXXXXXXXXXXXXXXX&Expires=1316027075&AWSAccessKeyId=XXXXXXXXXXXXXXXXXXX
-
diff --git a/src/ceph/doc/radosgw/s3/python.rst b/src/ceph/doc/radosgw/s3/python.rst
deleted file mode 100644
index a2c6a59..0000000
--- a/src/ceph/doc/radosgw/s3/python.rst
+++ /dev/null
@@ -1,171 +0,0 @@
-.. _python:
-
-Python S3 Examples
-==================
-
-Creating a Connection
----------------------
-
-This creates a connection so that you can interact with the server.
-
-.. code-block:: python
-
- import boto
- import boto.s3.connection
- access_key = 'put your access key here!'
- secret_key = 'put your secret key here!'
-
- conn = boto.connect_s3(
- aws_access_key_id = access_key,
- aws_secret_access_key = secret_key,
- host = 'objects.dreamhost.com',
- #is_secure=False, # uncomment if you are not using ssl
- calling_format = boto.s3.connection.OrdinaryCallingFormat(),
- )
-
-
-Listing Owned Buckets
----------------------
-
-This gets a list of Buckets that you own.
-This also prints out the bucket name and creation date of each bucket.
-
-.. code-block:: python
-
- for bucket in conn.get_all_buckets():
- print "{name}\t{created}".format(
- name = bucket.name,
- created = bucket.creation_date,
- )
-
-The output will look something like this::
-
- mahbuckat1 2011-04-21T18:05:39.000Z
- mahbuckat2 2011-04-21T18:05:48.000Z
- mahbuckat3 2011-04-21T18:07:18.000Z
-
-
-Creating a Bucket
------------------
-
-This creates a new bucket called ``my-new-bucket``
-
-.. code-block:: python
-
- bucket = conn.create_bucket('my-new-bucket')
-
-
-Listing a Bucket's Content
---------------------------
-
-This gets a list of objects in the bucket.
-This also prints out each object's name, the file size, and last
-modified date.
-
-.. code-block:: python
-
- for key in bucket.list():
- print "{name}\t{size}\t{modified}".format(
- name = key.name,
- size = key.size,
- modified = key.last_modified,
- )
-
-The output will look something like this::
-
- myphoto1.jpg 251262 2011-08-08T21:35:48.000Z
- myphoto2.jpg 262518 2011-08-08T21:38:01.000Z
-
-
-Deleting a Bucket
------------------
-
-.. note::
-
- The Bucket must be empty! Otherwise it won't work!
-
-.. code-block:: python
-
- conn.delete_bucket(bucket.name)
-
-
-Forced Delete for Non-empty Buckets
------------------------------------
-
-.. attention::
-
- not available in python
-
-
-Creating an Object
-------------------
-
-This creates a file ``hello.txt`` with the string ``"Hello World!"``
-
-.. code-block:: python
-
- key = bucket.new_key('hello.txt')
- key.set_contents_from_string('Hello World!')
-
-
-Change an Object's ACL
-----------------------
-
-This makes the object ``hello.txt`` to be publicly readable, and
-``secret_plans.txt`` to be private.
-
-.. code-block:: python
-
- hello_key = bucket.get_key('hello.txt')
- hello_key.set_canned_acl('public-read')
- plans_key = bucket.get_key('secret_plans.txt')
- plans_key.set_canned_acl('private')
-
-
-Download an Object (to a file)
-------------------------------
-
-This downloads the object ``perl_poetry.pdf`` and saves it in
-``/home/larry/documents/``
-
-.. code-block:: python
-
- key = bucket.get_key('perl_poetry.pdf')
- key.get_contents_to_filename('/home/larry/documents/perl_poetry.pdf')
-
-
-Delete an Object
-----------------
-
-This deletes the object ``goodbye.txt``
-
-.. code-block:: python
-
- bucket.delete_key('goodbye.txt')
-
-
-Generate Object Download URLs (signed and unsigned)
----------------------------------------------------
-
-This generates an unsigned download URL for ``hello.txt``. This works
-because we made ``hello.txt`` public by setting the ACL above.
-This then generates a signed download URL for ``secret_plans.txt`` that
-will work for 1 hour. Signed download URLs will work for the time
-period even if the object is private (when the time period is up, the
-URL will stop working).
-
-.. code-block:: python
-
- hello_key = bucket.get_key('hello.txt')
- hello_url = hello_key.generate_url(0, query_auth=False, force_http=True)
- print hello_url
-
- plans_key = bucket.get_key('secret_plans.txt')
- plans_url = plans_key.generate_url(3600, query_auth=True, force_http=True)
- print plans_url
-
-The output of this will look something like::
-
- http://objects.dreamhost.com/my-bucket-name/hello.txt
- http://objects.dreamhost.com/my-bucket-name/secret_plans.txt?Signature=XXXXXXXXXXXXXXXXXXXXXXXXXXX&Expires=1316027075&AWSAccessKeyId=XXXXXXXXXXXXXXXXXXX
-
diff --git a/src/ceph/doc/radosgw/s3/ruby.rst b/src/ceph/doc/radosgw/s3/ruby.rst
deleted file mode 100644
index 435b3c6..0000000
--- a/src/ceph/doc/radosgw/s3/ruby.rst
+++ /dev/null
@@ -1,364 +0,0 @@
-.. _ruby:
-
-Ruby `AWS::SDK`_ Examples (aws-sdk gem ~>2)
-===========================================
-
-Settings
----------------------
-
-You can setup the connection on global way:
-
-.. code-block:: ruby
-
- Aws.config.update(
- endpoint: 'https://objects.dreamhost.com.',
- access_key_id: 'my-access-key',
- secret_access_key: 'my-secret-key',
- force_path_style: true,
- region: 'us-east-1'
- )
-
-
-and instantiate a client object:
-
-.. code-block:: ruby
-
- s3_client = Aws::S3::Client.new
-
-Listing Owned Buckets
----------------------
-
-This gets a list of buckets that you own.
-This also prints out the bucket name and creation date of each bucket.
-
-.. code-block:: ruby
-
- s3_client.list_buckets.buckets.each do |bucket|
- puts "#{bucket.name}\t#{bucket.creation_date}"
- end
-
-The output will look something like this::
-
- mahbuckat1 2011-04-21T18:05:39.000Z
- mahbuckat2 2011-04-21T18:05:48.000Z
- mahbuckat3 2011-04-21T18:07:18.000Z
-
-
-Creating a Bucket
------------------
-
-This creates a new bucket called ``my-new-bucket``
-
-.. code-block:: ruby
-
- s3_client.create_bucket(bucket: 'my-new-bucket')
-
-If you want a private bucket:
-
-`acl` option accepts: # private, public-read, public-read-write, authenticated-read
-
-.. code-block:: ruby
-
- s3_client.create_bucket(bucket: 'my-new-bucket', acl: 'private')
-
-
-Listing a Bucket's Content
---------------------------
-
-This gets a list of hashes with the contents of each object
-This also prints out each object's name, the file size, and last
-modified date.
-
-.. code-block:: ruby
-
- s3_client.get_objects(bucket: 'my-new-bucket').contents.each do |object|
- puts "#{object.key}\t#{object.size}\t#{object.last-modified}"
- end
-
-The output will look something like this if the bucket has some files::
-
- myphoto1.jpg 251262 2011-08-08T21:35:48.000Z
- myphoto2.jpg 262518 2011-08-08T21:38:01.000Z
-
-
-Deleting a Bucket
------------------
-.. note::
- The Bucket must be empty! Otherwise it won't work!
-
-.. code-block:: ruby
-
- s3_client.delete_bucket(bucket: 'my-new-bucket')
-
-
-Forced Delete for Non-empty Buckets
------------------------------------
-First, you need to clear the bucket:
-
-.. code-block:: ruby
-
- Aws::S3::Bucket.new('my-new-bucket', client: s3_client).clear!
-
-after, you can destroy the bucket
-
-.. code-block:: ruby
-
- s3_client.delete_bucket(bucket: 'my-new-bucket')
-
-
-Creating an Object
-------------------
-
-This creates a file ``hello.txt`` with the string ``"Hello World!"``
-
-.. code-block:: ruby
-
- s3_client.put_object(
- key: 'hello.txt',
- body: 'Hello World!',
- bucket: 'my-new-bucket',
- content_type: 'text/plain'
- )
-
-
-Change an Object's ACL
-----------------------
-
-This makes the object ``hello.txt`` to be publicly readable, and ``secret_plans.txt``
-to be private.
-
-.. code-block:: ruby
-
- s3_client.put_object_acl(bucket: 'my-new-bucket', key: 'hello.txt', acl: 'public-read')
-
- s3_client.put_object_acl(bucket: 'my-new-bucket', key: 'private.txt', acl: 'private')
-
-
-Download an Object (to a file)
-------------------------------
-
-This downloads the object ``poetry.pdf`` and saves it in
-``/home/larry/documents/``
-
-.. code-block:: ruby
-
- s3_client.get_object(bucket: 'my-new-bucket', key: 'poetry.pdf', response_target: '/home/larry/documents/poetry.pdf')
-
-
-Delete an Object
-----------------
-
-This deletes the object ``goodbye.txt``
-
-.. code-block:: ruby
-
- s3_client.delete_object(key: 'goodbye.txt', bucket: 'my-new-bucket')
-
-
-Generate Object Download URLs (signed and unsigned)
----------------------------------------------------
-
-This generates an unsigned download URL for ``hello.txt``. This works
-because we made ``hello.txt`` public by setting the ACL above.
-This then generates a signed download URL for ``secret_plans.txt`` that
-will work for 1 hour. Signed download URLs will work for the time
-period even if the object is private (when the time period is up, the
-URL will stop working).
-
-.. code-block:: ruby
-
- puts Aws::S3::Object.new(
- key: 'hello.txt',
- bucket_name: 'my-new-bucket',
- client: s3_client
- ).public_url
-
- puts Aws::S3::Object.new(
- key: 'secret_plans.txt',
- bucket_name: 'hermes_ceph_gem',
- client: s3_client
- ).presigned_url(:get, expires_in: 60 * 60)
-
-The output of this will look something like::
-
- http://objects.dreamhost.com/my-bucket-name/hello.txt
- http://objects.dreamhost.com/my-bucket-name/secret_plans.txt?Signature=XXXXXXXXXXXXXXXXXXXXXXXXXXX&Expires=1316027075&AWSAccessKeyId=XXXXXXXXXXXXXXXXXXX
-
-.. _`AWS::SDK`: http://docs.aws.amazon.com/sdkforruby/api/Aws/S3/Client.html
-
-
-
-Ruby `AWS::S3`_ Examples (aws-s3 gem)
-=====================================
-
-Creating a Connection
----------------------
-
-This creates a connection so that you can interact with the server.
-
-.. code-block:: ruby
-
- AWS::S3::Base.establish_connection!(
- :server => 'objects.dreamhost.com',
- :use_ssl => true,
- :access_key_id => 'my-access-key',
- :secret_access_key => 'my-secret-key'
- )
-
-
-Listing Owned Buckets
----------------------
-
-This gets a list of `AWS::S3::Bucket`_ objects that you own.
-This also prints out the bucket name and creation date of each bucket.
-
-.. code-block:: ruby
-
- AWS::S3::Service.buckets.each do |bucket|
- puts "#{bucket.name}\t#{bucket.creation_date}"
- end
-
-The output will look something like this::
-
- mahbuckat1 2011-04-21T18:05:39.000Z
- mahbuckat2 2011-04-21T18:05:48.000Z
- mahbuckat3 2011-04-21T18:07:18.000Z
-
-
-Creating a Bucket
------------------
-
-This creates a new bucket called ``my-new-bucket``
-
-.. code-block:: ruby
-
- AWS::S3::Bucket.create('my-new-bucket')
-
-
-Listing a Bucket's Content
---------------------------
-
-This gets a list of hashes with the contents of each object
-This also prints out each object's name, the file size, and last
-modified date.
-
-.. code-block:: ruby
-
- new_bucket = AWS::S3::Bucket.find('my-new-bucket')
- new_bucket.each do |object|
- puts "#{object.key}\t#{object.about['content-length']}\t#{object.about['last-modified']}"
- end
-
-The output will look something like this if the bucket has some files::
-
- myphoto1.jpg 251262 2011-08-08T21:35:48.000Z
- myphoto2.jpg 262518 2011-08-08T21:38:01.000Z
-
-
-Deleting a Bucket
------------------
-.. note::
- The Bucket must be empty! Otherwise it won't work!
-
-.. code-block:: ruby
-
- AWS::S3::Bucket.delete('my-new-bucket')
-
-
-Forced Delete for Non-empty Buckets
------------------------------------
-
-.. code-block:: ruby
-
- AWS::S3::Bucket.delete('my-new-bucket', :force => true)
-
-
-Creating an Object
-------------------
-
-This creates a file ``hello.txt`` with the string ``"Hello World!"``
-
-.. code-block:: ruby
-
- AWS::S3::S3Object.store(
- 'hello.txt',
- 'Hello World!',
- 'my-new-bucket',
- :content_type => 'text/plain'
- )
-
-
-Change an Object's ACL
-----------------------
-
-This makes the object ``hello.txt`` to be publicly readable, and ``secret_plans.txt``
-to be private.
-
-.. code-block:: ruby
-
- policy = AWS::S3::S3Object.acl('hello.txt', 'my-new-bucket')
- policy.grants = [ AWS::S3::ACL::Grant.grant(:public_read) ]
- AWS::S3::S3Object.acl('hello.txt', 'my-new-bucket', policy)
-
- policy = AWS::S3::S3Object.acl('secret_plans.txt', 'my-new-bucket')
- policy.grants = []
- AWS::S3::S3Object.acl('secret_plans.txt', 'my-new-bucket', policy)
-
-
-Download an Object (to a file)
-------------------------------
-
-This downloads the object ``poetry.pdf`` and saves it in
-``/home/larry/documents/``
-
-.. code-block:: ruby
-
- open('/home/larry/documents/poetry.pdf', 'w') do |file|
- AWS::S3::S3Object.stream('poetry.pdf', 'my-new-bucket') do |chunk|
- file.write(chunk)
- end
- end
-
-
-Delete an Object
-----------------
-
-This deletes the object ``goodbye.txt``
-
-.. code-block:: ruby
-
- AWS::S3::S3Object.delete('goodbye.txt', 'my-new-bucket')
-
-
-Generate Object Download URLs (signed and unsigned)
----------------------------------------------------
-
-This generates an unsigned download URL for ``hello.txt``. This works
-because we made ``hello.txt`` public by setting the ACL above.
-This then generates a signed download URL for ``secret_plans.txt`` that
-will work for 1 hour. Signed download URLs will work for the time
-period even if the object is private (when the time period is up, the
-URL will stop working).
-
-.. code-block:: ruby
-
- puts AWS::S3::S3Object.url_for(
- 'hello.txt',
- 'my-new-bucket',
- :authenticated => false
- )
-
- puts AWS::S3::S3Object.url_for(
- 'secret_plans.txt',
- 'my-new-bucket',
- :expires_in => 60 * 60
- )
-
-The output of this will look something like::
-
- http://objects.dreamhost.com/my-bucket-name/hello.txt
- http://objects.dreamhost.com/my-bucket-name/secret_plans.txt?Signature=XXXXXXXXXXXXXXXXXXXXXXXXXXX&Expires=1316027075&AWSAccessKeyId=XXXXXXXXXXXXXXXXXXX
-
-.. _`AWS::S3`: http://amazon.rubyforge.org/
-.. _`AWS::S3::Bucket`: http://amazon.rubyforge.org/doc/
-
diff --git a/src/ceph/doc/radosgw/s3/serviceops.rst b/src/ceph/doc/radosgw/s3/serviceops.rst
deleted file mode 100644
index c55ce98..0000000
--- a/src/ceph/doc/radosgw/s3/serviceops.rst
+++ /dev/null
@@ -1,39 +0,0 @@
-Service Operations
-==================
-
-List Buckets
-------------
-``GET /`` returns a list of buckets created by the user making the request. ``GET /`` only
-returns buckets created by an authenticated user. You cannot make an anonymous request.
-
-Syntax
-~~~~~~
-::
-
- GET / HTTP/1.1
- Host: cname.domain.com
-
- Authorization: AWS {access-key}:{hash-of-header-and-secret}
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-+----------------------------+-------------+-----------------------------------------------------------------+
-| Name | Type | Description |
-+============================+=============+=================================================================+
-| ``Buckets`` | Container | Container for list of buckets. |
-+----------------------------+-------------+-----------------------------------------------------------------+
-| ``Bucket`` | Container | Container for bucket information. |
-+----------------------------+-------------+-----------------------------------------------------------------+
-| ``Name`` | String | Bucket name. |
-+----------------------------+-------------+-----------------------------------------------------------------+
-| ``CreationDate`` | Date | UTC time when the bucket was created. |
-+----------------------------+-------------+-----------------------------------------------------------------+
-| ``ListAllMyBucketsResult`` | Container | A container for the result. |
-+----------------------------+-------------+-----------------------------------------------------------------+
-| ``Owner`` | Container | A container for the bucket owner's ``ID`` and ``DisplayName``. |
-+----------------------------+-------------+-----------------------------------------------------------------+
-| ``ID`` | String | The bucket owner's ID. |
-+----------------------------+-------------+-----------------------------------------------------------------+
-| ``DisplayName`` | String | The bucket owner's display name. |
-+----------------------------+-------------+-----------------------------------------------------------------+
diff --git a/src/ceph/doc/radosgw/swift.rst b/src/ceph/doc/radosgw/swift.rst
deleted file mode 100644
index 42f21ff..0000000
--- a/src/ceph/doc/radosgw/swift.rst
+++ /dev/null
@@ -1,75 +0,0 @@
-===============================
- Ceph Object Gateway Swift API
-===============================
-
-Ceph supports a RESTful API that is compatible with the basic data access model of the `Swift API`_.
-
-API
----
-
-.. toctree::
- :maxdepth: 1
-
- Authentication <swift/auth>
- Service Ops <swift/serviceops>
- Container Ops <swift/containerops>
- Object Ops <swift/objectops>
- Temp URL Ops <swift/tempurl>
- Tutorial <swift/tutorial>
- Java <swift/java>
- Python <swift/python>
- Ruby <swift/ruby>
-
-
-Features Support
-----------------
-
-The following table describes the support status for current Swift functional features:
-
-+---------------------------------+-----------------+----------------------------------------+
-| Feature | Status | Remarks |
-+=================================+=================+========================================+
-| **Authentication** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Get Account Metadata** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Swift ACLs** | Supported | Supports a subset of Swift ACLs |
-+---------------------------------+-----------------+----------------------------------------+
-| **List Containers** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Delete Container** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Create Container** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Get Container Metadata** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Update Container Metadata** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Delete Container Metadata** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **List Objects** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Static Website** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Create Object** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Create Large Object** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Delete Object** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Get Object** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Copy Object** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Get Object Metadata** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Update Object Metadata** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Expiring Objects** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **Object Versioning** | Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-| **CORS** | Not Supported | |
-+---------------------------------+-----------------+----------------------------------------+
-
-.. _Swift API: http://developer.openstack.org/api-ref-objectstorage-v1.html
diff --git a/src/ceph/doc/radosgw/swift/auth.rst b/src/ceph/doc/radosgw/swift/auth.rst
deleted file mode 100644
index 2629050..0000000
--- a/src/ceph/doc/radosgw/swift/auth.rst
+++ /dev/null
@@ -1,77 +0,0 @@
-================
- Authentication
-================
-
-Swift API requests that require authentication must contain an
-``X-Storage-Token`` authentication token in the request header.
-The token may be retrieved from RADOS Gateway, or from another authenticator.
-To obtain a token from RADOS Gateway, you must create a user. For example::
-
- sudo radosgw-admin user create --subuser="{username}:{subusername}" --uid="{username}"
- --display-name="{Display Name}" --key-type=swift --secret="{password}" --access=full
-
-For details on RADOS Gateway administration, see `radosgw-admin`_.
-
-.. _radosgw-admin: ../../../man/8/radosgw-admin/
-
-Auth Get
---------
-
-To authenticate a user, make a request containing an ``X-Auth-User`` and a
-``X-Auth-Key`` in the header.
-
-Syntax
-~~~~~~
-
-::
-
- GET /auth HTTP/1.1
- Host: swift.radosgwhost.com
- X-Auth-User: johndoe
- X-Auth-Key: R7UUOLFDI2ZI9PRCQ53K
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-``X-Auth-User``
-
-:Description: The key RADOS GW username to authenticate.
-:Type: String
-:Required: Yes
-
-``X-Auth-Key``
-
-:Description: The key associated to a RADOS GW username.
-:Type: String
-:Required: Yes
-
-
-Response Headers
-~~~~~~~~~~~~~~~~
-
-The response from the server should include an ``X-Auth-Token`` value. The
-response may also contain a ``X-Storage-Url`` that provides the
-``{api version}/{account}`` prefix that is specified in other requests
-throughout the API documentation.
-
-
-``X-Storage-Token``
-
-:Description: The authorization token for the ``X-Auth-User`` specified in the request.
-:Type: String
-
-
-``X-Storage-Url``
-
-:Description: The URL and ``{api version}/{account}`` path for the user.
-:Type: String
-
-A typical response looks like this::
-
- HTTP/1.1 204 No Content
- Date: Mon, 16 Jul 2012 11:05:33 GMT
- Server: swift
- X-Storage-Url: https://swift.radosgwhost.com/v1/ACCT-12345
- X-Auth-Token: UOlCCC8TahFKlWuv9DB09TWHF0nDjpPElha0kAa
- Content-Length: 0
- Content-Type: text/plain; charset=UTF-8
diff --git a/src/ceph/doc/radosgw/swift/containerops.rst b/src/ceph/doc/radosgw/swift/containerops.rst
deleted file mode 100644
index 463d91c..0000000
--- a/src/ceph/doc/radosgw/swift/containerops.rst
+++ /dev/null
@@ -1,279 +0,0 @@
-======================
- Container Operations
-======================
-
-A container is a mechanism for storing data objects. An account may
-have many containers, but container names must be unique. This API enables a
-client to create a container, set access controls and metadata,
-retrieve a container's contents, and delete a container. Since this API
-makes requests related to information in a particular user's account, all
-requests in this API must be authenticated unless a container's access control
-is deliberately made publicly accessible (i.e., allows anonymous requests).
-
-.. note:: The Amazon S3 API uses the term 'bucket' to describe a data container.
- When you hear someone refer to a 'bucket' within the Swift API, the term
- 'bucket' may be construed as the equivalent of the term 'container.'
-
-One facet of object storage is that it does not support hierarchical paths
-or directories. Instead, it supports one level consisting of one or more
-containers, where each container may have objects. The RADOS Gateway's
-Swift-compatible API supports the notion of 'pseudo-hierarchical containers,'
-which is a means of using object naming to emulate a container (or directory)
-hierarchy without actually implementing one in the storage system. You may
-name objects with pseudo-hierarchical names
-(e.g., photos/buildings/empire-state.jpg), but container names cannot
-contain a forward slash (``/``) character.
-
-
-Create a Container
-==================
-
-To create a new container, make a ``PUT`` request with the API version, account,
-and the name of the new container. The container name must be unique, must not
-contain a forward-slash (/) character, and should be less than 256 bytes. You
-may include access control headers and metadata headers in the request. The
-operation is idempotent; that is, if you make a request to create a container
-that already exists, it will return with a HTTP 202 return code, but will not
-create another container.
-
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{api version}/{account}/{container} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
- X-Container-Read: {comma-separated-uids}
- X-Container-Write: {comma-separated-uids}
- X-Container-Meta-{key}: {value}
-
-
-Headers
-~~~~~~~
-
-``X-Container-Read``
-
-:Description: The user IDs with read permissions for the container.
-:Type: Comma-separated string values of user IDs.
-:Required: No
-
-``X-Container-Write``
-
-:Description: The user IDs with write permissions for the container.
-:Type: Comma-separated string values of user IDs.
-:Required: No
-
-``X-Container-Meta-{key}``
-
-:Description: A user-defined meta data key that takes an arbitrary string value.
-:Type: String
-:Required: No
-
-
-HTTP Response
-~~~~~~~~~~~~~
-
-If a container with the same name already exists, and the user is the
-container owner then the operation will succeed. Otherwise the operation
-will fail.
-
-``409``
-
-:Description: The container already exists under a different user's ownership.
-:Status Code: ``BucketAlreadyExists``
-
-
-
-
-List a Container's Objects
-==========================
-
-To list the objects within a container, make a ``GET`` request with the with the
-API version, account, and the name of the container. You can specify query
-parameters to filter the full list, or leave out the parameters to return a list
-of the first 10,000 object names stored in the container.
-
-
-Syntax
-~~~~~~
-
-::
-
- GET /{api version}/{container} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
-
-
-Parameters
-~~~~~~~~~~
-
-``format``
-
-:Description: Defines the format of the result.
-:Type: String
-:Valid Values: ``json`` | ``xml``
-:Required: No
-
-``prefix``
-
-:Description: Limits the result set to objects beginning with the specified prefix.
-:Type: String
-:Required: No
-
-``marker``
-
-:Description: Returns a list of results greater than the marker value.
-:Type: String
-:Required: No
-
-``limit``
-
-:Description: Limits the number of results to the specified value.
-:Type: Integer
-:Valid Range: 0 - 10,000
-:Required: No
-
-``delimiter``
-
-:Description: The delimiter between the prefix and the rest of the object name.
-:Type: String
-:Required: No
-
-``path``
-
-:Description: The pseudo-hierarchical path of the objects.
-:Type: String
-:Required: No
-
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-``container``
-
-:Description: The container.
-:Type: Container
-
-``object``
-
-:Description: An object within the container.
-:Type: Container
-
-``name``
-
-:Description: The name of an object within the container.
-:Type: String
-
-``hash``
-
-:Description: A hash code of the object's contents.
-:Type: String
-
-``last_modified``
-
-:Description: The last time the object's contents were modified.
-:Type: Date
-
-``content_type``
-
-:Description: The type of content within the object.
-:Type: String
-
-
-
-Update a Container's ACLs
-=========================
-
-When a user creates a container, the user has read and write access to the
-container by default. To allow other users to read a container's contents or
-write to a container, you must specifically enable the user.
-You may also specify ``*`` in the ``X-Container-Read`` or ``X-Container-Write``
-settings, which effectively enables all users to either read from or write
-to the container. Setting ``*`` makes the container public. That is it
-enables anonymous users to either read from or write to the container.
-
-
-Syntax
-~~~~~~
-
-::
-
- POST /{api version}/{account}/{container} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
- X-Container-Read: *
- X-Container-Write: {uid1}, {uid2}, {uid3}
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-``X-Container-Read``
-
-:Description: The user IDs with read permissions for the container.
-:Type: Comma-separated string values of user IDs.
-:Required: No
-
-``X-Container-Write``
-
-:Description: The user IDs with write permissions for the container.
-:Type: Comma-separated string values of user IDs.
-:Required: No
-
-
-Add/Update Container Metadata
-=============================
-
-To add metadata to a container, make a ``POST`` request with the API version,
-account, and container name. You must have write permissions on the
-container to add or update metadata.
-
-Syntax
-~~~~~~
-
-::
-
- POST /{api version}/{account}/{container} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
- X-Container-Meta-Color: red
- X-Container-Meta-Taste: salty
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-``X-Container-Meta-{key}``
-
-:Description: A user-defined meta data key that takes an arbitrary string value.
-:Type: String
-:Required: No
-
-
-
-Delete a Container
-==================
-
-To delete a container, make a ``DELETE`` request with the API version, account,
-and the name of the container. The container must be empty. If you'd like to check
-if the container is empty, execute a ``HEAD`` request against the container. Once
-you have successfully removed the container, you will be able to reuse the container name.
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{api version}/{account}/{container} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
-
-
-HTTP Response
-~~~~~~~~~~~~~
-
-``204``
-
-:Description: The container was removed.
-:Status Code: ``NoContent``
-
diff --git a/src/ceph/doc/radosgw/swift/java.rst b/src/ceph/doc/radosgw/swift/java.rst
deleted file mode 100644
index 8977a3b..0000000
--- a/src/ceph/doc/radosgw/swift/java.rst
+++ /dev/null
@@ -1,175 +0,0 @@
-.. _java_swift:
-
-=====================
- Java Swift Examples
-=====================
-
-Setup
-=====
-
-The following examples may require some or all of the following Java
-classes to be imported:
-
-.. code-block:: java
-
- import org.javaswift.joss.client.factory.AccountConfig;
- import org.javaswift.joss.client.factory.AccountFactory;
- import org.javaswift.joss.client.factory.AuthenticationMethod;
- import org.javaswift.joss.model.Account;
- import org.javaswift.joss.model.Container;
- import org.javaswift.joss.model.StoredObject;
- import java.io.File;
- import java.io.IOException;
- import java.util.*;
-
-
-Create a Connection
-===================
-
-This creates a connection so that you can interact with the server:
-
-.. code-block:: java
-
- String username = "USERNAME";
- String password = "PASSWORD";
- String authUrl = "https://radosgw.endpoint/auth/1.0";
-
- AccountConfig config = new AccountConfig();
- config.setUsername(username);
- config.setPassword(password);
- config.setAuthUrl(authUrl);
- config.setAuthenticationMethod(AuthenticationMethod.BASIC);
- Account account = new AccountFactory(config).createAccount();
-
-
-Create a Container
-==================
-
-This creates a new container called ``my-new-container``:
-
-.. code-block:: java
-
- Container container = account.getContainer("my-new-container");
- container.create();
-
-
-Create an Object
-================
-
-This creates an object ``foo.txt`` from the file named ``foo.txt`` in
-the container ``my-new-container``:
-
-.. code-block:: java
-
- Container container = account.getContainer("my-new-container");
- StoredObject object = container.getObject("foo.txt");
- object.uploadObject(new File("foo.txt"));
-
-
-Add/Update Object Metadata
-==========================
-
-This adds the metadata key-value pair ``key``:``value`` to the object named
-``foo.txt`` in the container ``my-new-container``:
-
-.. code-block:: java
-
- Container container = account.getContainer("my-new-container");
- StoredObject object = container.getObject("foo.txt");
- Map<String, Object> metadata = new TreeMap<String, Object>();
- metadata.put("key", "value");
- object.setMetadata(metadata);
-
-
-List Owned Containers
-=====================
-
-This gets a list of Containers that you own.
-This also prints out the container name.
-
-.. code-block:: java
-
- Collection<Container> containers = account.list();
- for (Container currentContainer : containers) {
- System.out.println(currentContainer.getName());
- }
-
-The output will look something like this::
-
- mahbuckat1
- mahbuckat2
- mahbuckat3
-
-
-List a Container's Content
-==========================
-
-This gets a list of objects in the container ``my-new-container``; and, it also
-prints out each object's name, the file size, and last modified date:
-
-.. code-block:: java
-
- Container container = account.getContainer("my-new-container");
- Collection<StoredObject> objects = container.list();
- for (StoredObject currentObject : objects) {
- System.out.println(currentObject.getName());
- }
-
-The output will look something like this::
-
- myphoto1.jpg
- myphoto2.jpg
-
-
-Retrieve an Object's Metadata
-=============================
-
-This retrieves metadata and gets the MIME type for an object named ``foo.txt``
-in a container named ``my-new-container``:
-
-.. code-block:: java
-
- Container container = account.getContainer("my-new-container");
- StoredObject object = container.getObject("foo.txt");
- Map<String, Object> returnedMetadata = object.getMetadata();
- for (String name : returnedMetadata.keySet()) {
- System.out.println("META / "+name+": "+returnedMetadata.get(name));
- }
-
-
-Retrieve an Object
-==================
-
-This downloads the object ``foo.txt`` in the container ``my-new-container``
-and saves it in ``./outfile.txt``:
-
-.. code-block:: java
-
- Container container = account.getContainer("my-new-container");
- StoredObject object = container.getObject("foo.txt");
- object.downloadObject(new File("outfile.txt"));
-
-
-Delete an Object
-================
-
-This deletes the object ``goodbye.txt`` in the container "my-new-container":
-
-.. code-block:: java
-
- Container container = account.getContainer("my-new-container");
- StoredObject object = container.getObject("foo.txt");
- object.delete();
-
-
-Delete a Container
-==================
-
-This deletes a container named "my-new-container":
-
-.. code-block:: java
-
- Container container = account.getContainer("my-new-container");
- container.delete();
-
-.. note:: The container must be empty! Otherwise it won't work!
diff --git a/src/ceph/doc/radosgw/swift/objectops.rst b/src/ceph/doc/radosgw/swift/objectops.rst
deleted file mode 100644
index fc8d219..0000000
--- a/src/ceph/doc/radosgw/swift/objectops.rst
+++ /dev/null
@@ -1,271 +0,0 @@
-===================
- Object Operations
-===================
-
-An object is a container for storing data and metadata. A container may
-have many objects, but the object names must be unique. This API enables a
-client to create an object, set access controls and metadata, retrieve an
-object's data and metadata, and delete an object. Since this API makes requests
-related to information in a particular user's account, all requests in this API
-must be authenticated unless the container or object's access control is
-deliberately made publicly accessible (i.e., allows anonymous requests).
-
-
-Create/Update an Object
-=======================
-
-To create a new object, make a ``PUT`` request with the API version, account,
-container name and the name of the new object. You must have write permission
-on the container to create or update an object. The object name must be
-unique within the container. The ``PUT`` request is not idempotent, so if you
-do not use a unique name, the request will update the object. However, you may
-use pseudo-hierarchical syntax in your object name to distinguish it from
-another object of the same name if it is under a different pseudo-hierarchical
-directory. You may include access control headers and metadata headers in the
-request.
-
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{api version}/{account}/{container}/{object} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
-
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-``ETag``
-
-:Description: An MD5 hash of the object's contents. Recommended.
-:Type: String
-:Required: No
-
-
-``Content-Type``
-
-:Description: The type of content the object contains.
-:Type: String
-:Required: No
-
-
-``Transfer-Encoding``
-
-:Description: Indicates whether the object is part of a larger aggregate object.
-:Type: String
-:Valid Values: ``chunked``
-:Required: No
-
-
-Copy an Object
-==============
-
-Copying an object allows you to make a server-side copy of an object, so that
-you don't have to download it and upload it under another container/name.
-To copy the contents of one object to another object, you may make either a
-``PUT`` request or a ``COPY`` request with the API version, account, and the
-container name. For a ``PUT`` request, use the destination container and object
-name in the request, and the source container and object in the request header.
-For a ``Copy`` request, use the source container and object in the request, and
-the destination container and object in the request header. You must have write
-permission on the container to copy an object. The destination object name must be
-unique within the container. The request is not idempotent, so if you do not use
-a unique name, the request will update the destination object. However, you may
-use pseudo-hierarchical syntax in your object name to distinguish the destination
-object from the source object of the same name if it is under a different
-pseudo-hierarchical directory. You may include access control headers and metadata
-headers in the request.
-
-Syntax
-~~~~~~
-
-::
-
- PUT /{api version}/{account}/{dest-container}/{dest-object} HTTP/1.1
- X-Copy-From: {source-container}/{source-object}
- Host: {fqdn}
- X-Auth-Token: {auth-token}
-
-
-or alternatively:
-
-::
-
- COPY /{api version}/{account}/{source-container}/{source-object} HTTP/1.1
- Destination: {dest-container}/{dest-object}
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-``X-Copy-From``
-
-:Description: Used with a ``PUT`` request to define the source container/object path.
-:Type: String
-:Required: Yes, if using ``PUT``
-
-
-``Destination``
-
-:Description: Used with a ``COPY`` request to define the destination container/object path.
-:Type: String
-:Required: Yes, if using ``COPY``
-
-
-``If-Modified-Since``
-
-:Description: Only copies if modified since the date/time of the source object's ``last_modified`` attribute.
-:Type: Date
-:Required: No
-
-
-``If-Unmodified-Since``
-
-:Description: Only copies if not modified since the date/time of the source object's ``last_modified`` attribute.
-:Type: Date
-:Required: No
-
-``Copy-If-Match``
-
-:Description: Copies only if the ETag in the request matches the source object's ETag.
-:Type: ETag.
-:Required: No
-
-
-``Copy-If-None-Match``
-
-:Description: Copies only if the ETag in the request does not match the source object's ETag.
-:Type: ETag.
-:Required: No
-
-
-Delete an Object
-================
-
-To delete an object, make a ``DELETE`` request with the API version, account,
-container and object name. You must have write permissions on the container to delete
-an object within it. Once you have successfully deleted the object, you will be able to
-reuse the object name.
-
-Syntax
-~~~~~~
-
-::
-
- DELETE /{api version}/{account}/{container}/{object} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
-
-
-Get an Object
-=============
-
-To retrieve an object, make a ``GET`` request with the API version, account,
-container and object name. You must have read permissions on the container to
-retrieve an object within it.
-
-Syntax
-~~~~~~
-
-::
-
- GET /{api version}/{account}/{container}/{object} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
-
-
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-``range``
-
-:Description: To retrieve a subset of an object's contents, you may specify a byte range.
-:Type: Date
-:Required: No
-
-
-``If-Modified-Since``
-
-:Description: Only copies if modified since the date/time of the source object's ``last_modified`` attribute.
-:Type: Date
-:Required: No
-
-
-``If-Unmodified-Since``
-
-:Description: Only copies if not modified since the date/time of the source object's ``last_modified`` attribute.
-:Type: Date
-:Required: No
-
-``Copy-If-Match``
-
-:Description: Copies only if the ETag in the request matches the source object's ETag.
-:Type: ETag.
-:Required: No
-
-
-``Copy-If-None-Match``
-
-:Description: Copies only if the ETag in the request does not match the source object's ETag.
-:Type: ETag.
-:Required: No
-
-
-
-Response Headers
-~~~~~~~~~~~~~~~~
-
-``Content-Range``
-
-:Description: The range of the subset of object contents. Returned only if the range header field was specified in the request
-
-
-Get Object Metadata
-===================
-
-To retrieve an object's metadata, make a ``HEAD`` request with the API version,
-account, container and object name. You must have read permissions on the
-container to retrieve metadata from an object within the container. This request
-returns the same header information as the request for the object itself, but
-it does not return the object's data.
-
-Syntax
-~~~~~~
-
-::
-
- HEAD /{api version}/{account}/{container}/{object} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
-
-
-
-Add/Update Object Metadata
-==========================
-
-To add metadata to an object, make a ``POST`` request with the API version,
-account, container and object name. You must have write permissions on the
-parent container to add or update metadata.
-
-
-Syntax
-~~~~~~
-
-::
-
- POST /{api version}/{account}/{container}/{object} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-``X-Object-Meta-{key}``
-
-:Description: A user-defined meta data key that takes an arbitrary string value.
-:Type: String
-:Required: No
-
diff --git a/src/ceph/doc/radosgw/swift/python.rst b/src/ceph/doc/radosgw/swift/python.rst
deleted file mode 100644
index 28d92d7..0000000
--- a/src/ceph/doc/radosgw/swift/python.rst
+++ /dev/null
@@ -1,114 +0,0 @@
-.. _python_swift:
-
-=====================
-Python Swift Examples
-=====================
-
-Create a Connection
-===================
-
-This creates a connection so that you can interact with the server:
-
-.. code-block:: python
-
- import swiftclient
- user = 'account_name:username'
- key = 'your_api_key'
-
- conn = swiftclient.Connection(
- user=user,
- key=key,
- authurl='https://objects.dreamhost.com/auth',
- )
-
-
-Create a Container
-==================
-
-This creates a new container called ``my-new-container``:
-
-.. code-block:: python
-
- container_name = 'my-new-container'
- conn.put_container(container_name)
-
-
-Create an Object
-================
-
-This creates a file ``hello.txt`` from the file named ``my_hello.txt``:
-
-.. code-block:: python
-
- with open('hello.txt', 'r') as hello_file:
- conn.put_object(container_name, 'hello.txt',
- contents= hello_file.read(),
- content_type='text/plain')
-
-
-List Owned Containers
-=====================
-
-This gets a list of containers that you own, and prints out the container name:
-
-.. code-block:: python
-
- for container in conn.get_account()[1]:
- print container['name']
-
-The output will look something like this::
-
- mahbuckat1
- mahbuckat2
- mahbuckat3
-
-List a Container's Content
-==========================
-
-This gets a list of objects in the container, and prints out each
-object's name, the file size, and last modified date:
-
-.. code-block:: python
-
- for data in conn.get_container(container_name)[1]:
- print '{0}\t{1}\t{2}'.format(data['name'], data['bytes'], data['last_modified'])
-
-The output will look something like this::
-
- myphoto1.jpg 251262 2011-08-08T21:35:48.000Z
- myphoto2.jpg 262518 2011-08-08T21:38:01.000Z
-
-
-Retrieve an Object
-==================
-
-This downloads the object ``hello.txt`` and saves it in
-``./my_hello.txt``:
-
-.. code-block:: python
-
- obj_tuple = conn.get_object(container_name, 'hello.txt')
- with open('my_hello.txt', 'w') as my_hello:
- my_hello.write(obj_tuple[1])
-
-
-Delete an Object
-================
-
-This deletes the object ``hello.txt``:
-
-.. code-block:: python
-
- conn.delete_object(container_name, 'hello.txt')
-
-Delete a Container
-==================
-
-.. note::
-
- The container must be empty! Otherwise the request won't work!
-
-.. code-block:: python
-
- conn.delete_container(container_name)
-
diff --git a/src/ceph/doc/radosgw/swift/ruby.rst b/src/ceph/doc/radosgw/swift/ruby.rst
deleted file mode 100644
index a20b66d..0000000
--- a/src/ceph/doc/radosgw/swift/ruby.rst
+++ /dev/null
@@ -1,119 +0,0 @@
-.. _ruby_swift:
-
-=====================
- Ruby Swift Examples
-=====================
-
-Create a Connection
-===================
-
-This creates a connection so that you can interact with the server:
-
-.. code-block:: ruby
-
- require 'cloudfiles'
- username = 'account_name:user_name'
- api_key = 'your_secret_key'
-
- conn = CloudFiles::Connection.new(
- :username => username,
- :api_key => api_key,
- :auth_url => 'http://objects.dreamhost.com/auth'
- )
-
-
-Create a Container
-==================
-
-This creates a new container called ``my-new-container``
-
-.. code-block:: ruby
-
- container = conn.create_container('my-new-container')
-
-
-Create an Object
-================
-
-This creates a file ``hello.txt`` from the file named ``my_hello.txt``
-
-.. code-block:: ruby
-
- obj = container.create_object('hello.txt')
- obj.load_from_filename('./my_hello.txt')
- obj.content_type = 'text/plain'
-
-
-
-List Owned Containers
-=====================
-
-This gets a list of Containers that you own, and also prints out
-the container name:
-
-.. code-block:: ruby
-
- conn.containers.each do |container|
- puts container
- end
-
-The output will look something like this::
-
- mahbuckat1
- mahbuckat2
- mahbuckat3
-
-
-List a Container's Contents
-===========================
-
-This gets a list of objects in the container, and prints out each
-object's name, the file size, and last modified date:
-
-.. code-block:: ruby
-
- require 'date' # not necessary in the next version
-
- container.objects_detail.each do |name, data|
- puts "#{name}\t#{data[:bytes]}\t#{data[:last_modified]}"
- end
-
-The output will look something like this::
-
- myphoto1.jpg 251262 2011-08-08T21:35:48.000Z
- myphoto2.jpg 262518 2011-08-08T21:38:01.000Z
-
-
-
-Retrieve an Object
-==================
-
-This downloads the object ``hello.txt`` and saves it in
-``./my_hello.txt``:
-
-.. code-block:: ruby
-
- obj = container.object('hello.txt')
- obj.save_to_filename('./my_hello.txt')
-
-
-Delete an Object
-================
-
-This deletes the object ``goodbye.txt``:
-
-.. code-block:: ruby
-
- container.delete_object('goodbye.txt')
-
-
-Delete a Container
-==================
-
-.. note::
-
- The container must be empty! Otherwise the request won't work!
-
-.. code-block:: ruby
-
- container.delete_container('my-new-container')
diff --git a/src/ceph/doc/radosgw/swift/serviceops.rst b/src/ceph/doc/radosgw/swift/serviceops.rst
deleted file mode 100644
index a00f3d8..0000000
--- a/src/ceph/doc/radosgw/swift/serviceops.rst
+++ /dev/null
@@ -1,76 +0,0 @@
-====================
- Service Operations
-====================
-
-To retrieve data about our Swift-compatible service, you may execute ``GET``
-requests using the ``X-Storage-Url`` value retrieved during authentication.
-
-List Containers
-===============
-
-A ``GET`` request that specifies the API version and the account will return
-a list of containers for a particular user account. Since the request returns
-a particular user's containers, the request requires an authentication token.
-The request cannot be made anonymously.
-
-Syntax
-~~~~~~
-
-::
-
- GET /{api version}/{account} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
-
-
-
-Request Parameters
-~~~~~~~~~~~~~~~~~~
-
-``limit``
-
-:Description: Limits the number of results to the specified value.
-:Type: Integer
-:Required: No
-
-``format``
-
-:Description: Defines the format of the result.
-:Type: String
-:Valid Values: ``json`` | ``xml``
-:Required: No
-
-
-``marker``
-
-:Description: Returns a list of results greater than the marker value.
-:Type: String
-:Required: No
-
-
-
-Response Entities
-~~~~~~~~~~~~~~~~~
-
-The response contains a list of containers, or returns with an HTTP
-204 response code
-
-``account``
-
-:Description: A list for account information.
-:Type: Container
-
-``container``
-
-:Description: The list of containers.
-:Type: Container
-
-``name``
-
-:Description: The name of a container.
-:Type: String
-
-``bytes``
-
-:Description: The size of the container.
-:Type: Integer \ No newline at end of file
diff --git a/src/ceph/doc/radosgw/swift/tempurl.rst b/src/ceph/doc/radosgw/swift/tempurl.rst
deleted file mode 100644
index 517e5c3..0000000
--- a/src/ceph/doc/radosgw/swift/tempurl.rst
+++ /dev/null
@@ -1,84 +0,0 @@
-====================
- Temp URL Operations
-====================
-
-To allow temporary access (for eg for `GET` requests) to objects
-without the need to share credentials, temp url functionality is
-supported by swift endpoint of radosgw. For this functionality,
-initially the value of `X-Account-Meta-Temp-URL-Key` and optionally
-`X-Account-Meta-Temp-URL-Key-2` should be set. The Temp URL
-functionality relies on a HMAC-SHA1 signature against these secret
-keys.
-
-POST Temp-URL Keys
-==================
-
-A ``POST`` request to the swift account with the required Key will set
-the secret temp url key for the account against which temporary url
-access can be provided to accounts. Up to two keys are supported, and
-signatures are checked against both the keys, if present, so that keys
-can be rotated without invalidating the temporary urls.
-
-Syntax
-~~~~~~
-
-::
-
- POST /{api version}/{account} HTTP/1.1
- Host: {fqdn}
- X-Auth-Token: {auth-token}
-
-Request Headers
-~~~~~~~~~~~~~~~
-
-``X-Account-Meta-Temp-URL-Key``
-
-:Description: A user-defined key that takes an arbitrary string value.
-:Type: String
-:Required: Yes
-
-``X-Account-Meta-Temp-URL-Key-2``
-
-:Description: A user-defined key that takes an arbitrary string value.
-:Type: String
-:Required: No
-
-
-GET Temp-URL Objects
-====================
-
-Temporary URL uses a cryptographic HMAC-SHA1 signature, which includes
-the following elements:
-
-#. The value of the Request method, "GET" for instance
-#. The expiry time, in format of seconds since the epoch, ie Unix time
-#. The request path starting from "v1" onwards
-
-The above items are normalized with newlines appended between them,
-and a HMAC is generated using the SHA-1 hashing algorithm against one
-of the Temp URL Keys posted earlier.
-
-A sample python script to demonstrate the above is given below:
-
-
-.. code-block:: python
-
- import hmac
- from hashlib import sha1
- from time import time
-
- method = 'GET'
- host = 'https://objectstore.example.com/swift'
- duration_in_seconds = 300 # Duration for which the url is valid
- expires = int(time() + duration_in_seconds)
- path = '/v1/your-bucket/your-object'
- key = 'secret'
- hmac_body = '%s\n%s\n%s' % (method, expires, path)
- sig = hmac.new(key, hmac_body, sha1).hexdigest()
- rest_uri = "{host}{path}?temp_url_sig={sig}&temp_url_expires={expires}".format(
- host=host, path=path, sig=sig, expires=expires)
- print rest_uri
-
- # Example Output
- # https://objectstore.example.com/swift/v1/your-bucket/your-object?temp_url_sig=ff4657876227fc6025f04fcf1e82818266d022c6&temp_url_expires=1423200992
-
diff --git a/src/ceph/doc/radosgw/swift/tutorial.rst b/src/ceph/doc/radosgw/swift/tutorial.rst
deleted file mode 100644
index 8287d19..0000000
--- a/src/ceph/doc/radosgw/swift/tutorial.rst
+++ /dev/null
@@ -1,60 +0,0 @@
-==========
- Tutorial
-==========
-
-The Swift-compatible API tutorials follow a simple container-based object
-lifecycle. The first step requires you to setup a connection between your
-client and the RADOS Gateway server. Then, you may follow a natural
-container and object lifecycle, including adding and retrieving object
-metadata. See example code for the following languages:
-
-- `Java`_
-- `Python`_
-- `Ruby`_
-
-
-.. ditaa:: +----------------------------+ +-----------------------------+
- | | | |
- | Create a Connection |------->| Create a Container |
- | | | |
- +----------------------------+ +-----------------------------+
- |
- +--------------------------------------+
- |
- v
- +----------------------------+ +-----------------------------+
- | | | |
- | Create an Object |------->| Add/Update Object Metadata |
- | | | |
- +----------------------------+ +-----------------------------+
- |
- +--------------------------------------+
- |
- v
- +----------------------------+ +-----------------------------+
- | | | |
- | List Owned Containers |------->| List a Container's Contents |
- | | | |
- +----------------------------+ +-----------------------------+
- |
- +--------------------------------------+
- |
- v
- +----------------------------+ +-----------------------------+
- | | | |
- | Get an Object's Metadata |------->| Retrieve an Object |
- | | | |
- +----------------------------+ +-----------------------------+
- |
- +--------------------------------------+
- |
- v
- +----------------------------+ +-----------------------------+
- | | | |
- | Delete an Object |------->| Delete a Container |
- | | | |
- +----------------------------+ +-----------------------------+
-
-.. _Java: ../java
-.. _Python: ../python
-.. _Ruby: ../ruby
diff --git a/src/ceph/doc/radosgw/troubleshooting.rst b/src/ceph/doc/radosgw/troubleshooting.rst
deleted file mode 100644
index 3e4a057..0000000
--- a/src/ceph/doc/radosgw/troubleshooting.rst
+++ /dev/null
@@ -1,179 +0,0 @@
-=================
- Troubleshooting
-=================
-
-
-The Gateway Won't Start
-=======================
-
-If you cannot start the gateway (i.e., there is no existing ``pid``),
-check to see if there is an existing ``.asok`` file from another
-user. If an ``.asok`` file from another user exists and there is no
-running ``pid``, remove the ``.asok`` file and try to start the
-process again.
-
-This may occur when you start the process as a ``root`` user and
-the startup script is trying to start the process as a
-``www-data`` or ``apache`` user and an existing ``.asok`` is
-preventing the script from starting the daemon.
-
-The radosgw init script (/etc/init.d/radosgw) also has a verbose argument that
-can provide some insight as to what could be the issue:
-
- /etc/init.d/radosgw start -v
-
-or
-
- /etc/init.d radosgw start --verbose
-
-HTTP Request Errors
-===================
-
-Examining the access and error logs for the web server itself is
-probably the first step in identifying what is going on. If there is
-a 500 error, that usually indicates a problem communicating with the
-``radosgw`` daemon. Ensure the daemon is running, its socket path is
-configured, and that the web server is looking for it in the proper
-location.
-
-
-Crashed ``radosgw`` process
-===========================
-
-If the ``radosgw`` process dies, you will normally see a 500 error
-from the web server (apache, nginx, etc.). In that situation, simply
-restarting radosgw will restore service.
-
-To diagnose the cause of the crash, check the log in ``/var/log/ceph``
-and/or the core file (if one was generated).
-
-
-Blocked ``radosgw`` Requests
-============================
-
-If some (or all) radosgw requests appear to be blocked, you can get
-some insight into the internal state of the ``radosgw`` daemon via
-its admin socket. By default, there will be a socket configured to
-reside in ``/var/run/ceph``, and the daemon can be queried with::
-
- ceph daemon /var/run/ceph/client.rgw help
-
- help list available commands
- objecter_requests show in-progress osd requests
- perfcounters_dump dump perfcounters value
- perfcounters_schema dump perfcounters schema
- version get protocol version
-
-Of particular interest::
-
- ceph daemon /var/run/ceph/client.rgw objecter_requests
- ...
-
-will dump information about current in-progress requests with the
-RADOS cluster. This allows one to identify if any requests are blocked
-by a non-responsive OSD. For example, one might see::
-
- { "ops": [
- { "tid": 1858,
- "pg": "2.d2041a48",
- "osd": 1,
- "last_sent": "2012-03-08 14:56:37.949872",
- "attempts": 1,
- "object_id": "fatty_25647_object1857",
- "object_locator": "@2",
- "snapid": "head",
- "snap_context": "0=[]",
- "mtime": "2012-03-08 14:56:37.949813",
- "osd_ops": [
- "write 0~4096"]},
- { "tid": 1873,
- "pg": "2.695e9f8e",
- "osd": 1,
- "last_sent": "2012-03-08 14:56:37.970615",
- "attempts": 1,
- "object_id": "fatty_25647_object1872",
- "object_locator": "@2",
- "snapid": "head",
- "snap_context": "0=[]",
- "mtime": "2012-03-08 14:56:37.970555",
- "osd_ops": [
- "write 0~4096"]}],
- "linger_ops": [],
- "pool_ops": [],
- "pool_stat_ops": [],
- "statfs_ops": []}
-
-In this dump, two requests are in progress. The ``last_sent`` field is
-the time the RADOS request was sent. If this is a while ago, it suggests
-that the OSD is not responding. For example, for request 1858, you could
-check the OSD status with::
-
- ceph pg map 2.d2041a48
-
- osdmap e9 pg 2.d2041a48 (2.0) -> up [1,0] acting [1,0]
-
-This tells us to look at ``osd.1``, the primary copy for this PG::
-
- ceph daemon osd.1 ops
- { "num_ops": 651,
- "ops": [
- { "description": "osd_op(client.4124.0:1858 fatty_25647_object1857 [write 0~4096] 2.d2041a48)",
- "received_at": "1331247573.344650",
- "age": "25.606449",
- "flag_point": "waiting for sub ops",
- "client_info": { "client": "client.4124",
- "tid": 1858}},
- ...
-
-The ``flag_point`` field indicates that the OSD is currently waiting
-for replicas to respond, in this case ``osd.0``.
-
-
-Java S3 API Troubleshooting
-===========================
-
-
-Peer Not Authenticated
-----------------------
-
-You may receive an error that looks like this::
-
- [java] INFO: Unable to execute HTTP request: peer not authenticated
-
-The Java SDK for S3 requires a valid certificate from a recognized certificate
-authority, because it uses HTTPS by default. If you are just testing the Ceph
-Object Storage services, you can resolve this problem in a few ways:
-
-#. Prepend the IP address or hostname with ``http://``. For example, change this::
-
- conn.setEndpoint("myserver");
-
- To::
-
- conn.setEndpoint("http://myserver")
-
-#. After setting your credentials, add a client configuration and set the
- protocol to ``Protocol.HTTP``. ::
-
- AWSCredentials credentials = new BasicAWSCredentials(accessKey, secretKey);
-
- ClientConfiguration clientConfig = new ClientConfiguration();
- clientConfig.setProtocol(Protocol.HTTP);
-
- AmazonS3 conn = new AmazonS3Client(credentials, clientConfig);
-
-
-
-405 MethodNotAllowed
---------------------
-
-If you receive an 405 error, check to see if you have the S3 subdomain set up correctly.
-You will need to have a wild card setting in your DNS record for subdomain functionality
-to work properly.
-
-Also, check to ensure that the default site is disabled. ::
-
- [java] Exception in thread "main" Status Code: 405, AWS Service: Amazon S3, AWS Request ID: null, AWS Error Code: MethodNotAllowed, AWS Error Message: null, S3 Extended Request ID: null
-
-
-