]> git-server-git.apps.pok.os.sepia.ceph.com Git - ceph.git/commitdiff
auth: remove auid args from handle_request and verify_authorizer
authorSage Weil <sage@redhat.com>
Sun, 12 Aug 2018 20:00:44 +0000 (15:00 -0500)
committerSage Weil <sage@redhat.com>
Fri, 31 Aug 2018 20:54:58 +0000 (15:54 -0500)
Signed-off-by: Sage Weil <sage@redhat.com>
16 files changed:
src/auth/AuthAuthorizeHandler.h
src/auth/AuthServiceHandler.h
src/auth/cephx/CephxAuthorizeHandler.cc
src/auth/cephx/CephxAuthorizeHandler.h
src/auth/cephx/CephxServiceHandler.cc
src/auth/cephx/CephxServiceHandler.h
src/auth/none/AuthNoneAuthorizeHandler.cc
src/auth/none/AuthNoneAuthorizeHandler.h
src/auth/none/AuthNoneServiceHandler.h
src/auth/unknown/AuthUnknownAuthorizeHandler.cc
src/auth/unknown/AuthUnknownAuthorizeHandler.h
src/auth/unknown/AuthUnknownServiceHandler.h
src/mds/MDSDaemon.cc
src/mgr/DaemonServer.cc
src/mon/AuthMonitor.cc
src/osd/OSD.cc

index 7473267dc4d46e5f5342146be6cc2860e2af9a74..d2de7e1964e3381a64f7db294ebfd7b54e4aea2c 100644 (file)
@@ -34,7 +34,6 @@ struct AuthAuthorizeHandler {
                                 bufferlist& authorizer_data, bufferlist& authorizer_reply,
                                  EntityName& entity_name, uint64_t& global_id,
                                 AuthCapsInfo& caps_info, CryptoKey& session_key,
-                                uint64_t *auid,
                                 std::unique_ptr<AuthAuthorizerChallenge> *challenge) = 0;
   virtual int authorizer_session_crypto() = 0;
 };
index 51551f4cf8da1eb23fa5ef1ba8f4e4dc2b453ca0..2230c75c71ffc86965b4a829da3fad1532019588 100644 (file)
@@ -36,7 +36,7 @@ public:
   virtual ~AuthServiceHandler() { }
 
   virtual int start_session(EntityName& name, bufferlist::const_iterator& indata, bufferlist& result, AuthCapsInfo& caps) = 0;
-  virtual int handle_request(bufferlist::const_iterator& indata, bufferlist& result, uint64_t& global_id, AuthCapsInfo& caps, uint64_t *auid = NULL) = 0;
+  virtual int handle_request(bufferlist::const_iterator& indata, bufferlist& result, uint64_t& global_id, AuthCapsInfo& caps) = 0;
 
   EntityName& get_entity_name() { return entity_name; }
 };
index e589ff4ee7e991a98a2b2516423f74b0a5346178..8e1c778dceea829fe8b189874334e96192ce2250 100644 (file)
@@ -10,7 +10,7 @@ bool CephxAuthorizeHandler::verify_authorizer(
   CephContext *cct, KeyStore *keys,
   bufferlist& authorizer_data, bufferlist& authorizer_reply,
   EntityName& entity_name, uint64_t& global_id, AuthCapsInfo& caps_info,
-  CryptoKey& session_key, uint64_t *auid,
+  CryptoKey& session_key,
   std::unique_ptr<AuthAuthorizerChallenge> *challenge)
 {
   auto iter = authorizer_data.cbegin();
@@ -30,7 +30,6 @@ bool CephxAuthorizeHandler::verify_authorizer(
     entity_name = auth_ticket_info.ticket.name;
     global_id = auth_ticket_info.ticket.global_id;
     session_key = auth_ticket_info.session_key;
-    if (auid) *auid = auth_ticket_info.ticket.auid;
   }
 
   return isvalid;
index 8fa40aa71275312d88077203ff7a1d405eccc485..ab11d2c37cb1fc424c120d3168ff4ebc0886613c 100644 (file)
@@ -23,7 +23,7 @@ struct CephxAuthorizeHandler : public AuthAuthorizeHandler {
   bool verify_authorizer(CephContext *cct, KeyStore *keys,
                         bufferlist& authorizer_data, bufferlist& authorizer_reply,
                          EntityName& entity_name, uint64_t& global_id,
-                        AuthCapsInfo& caps_info, CryptoKey& session_key, uint64_t *auid,
+                        AuthCapsInfo& caps_info, CryptoKey& session_key,
                         std::unique_ptr<AuthAuthorizerChallenge> *challenge) override;
   int authorizer_session_crypto() override;
 };
index ea2d852cae1b90b85d469fda7ab1d7f7de980215..07593c4686499c3c02a65dbb1df394539f144495 100644 (file)
@@ -42,7 +42,7 @@ int CephxServiceHandler::start_session(EntityName& name, bufferlist::const_itera
   return CEPH_AUTH_CEPHX;
 }
 
-int CephxServiceHandler::handle_request(bufferlist::const_iterator& indata, bufferlist& result_bl, uint64_t& global_id, AuthCapsInfo& caps, uint64_t *auid)
+int CephxServiceHandler::handle_request(bufferlist::const_iterator& indata, bufferlist& result_bl, uint64_t& global_id, AuthCapsInfo& caps)
 {
   int ret = 0;
 
@@ -113,8 +113,6 @@ int CephxServiceHandler::handle_request(bufferlist::const_iterator& indata, buff
       info.ticket.auid = eauth.auid;
       info.validity += cct->_conf->auth_mon_ticket_ttl;
 
-      if (auid) *auid = eauth.auid;
-
       key_server->generate_secret(session_key);
 
       info.session_key = session_key;
index b51ee5f137386236d857d85b461d083de86d1df9..e961e38814ea771e2b03c88ee8cd743a6b69c1bf 100644 (file)
@@ -30,7 +30,7 @@ public:
   ~CephxServiceHandler() override {}
   
   int start_session(EntityName& name, bufferlist::const_iterator& indata, bufferlist& result_bl, AuthCapsInfo& caps) override;
-  int handle_request(bufferlist::const_iterator& indata, bufferlist& result_bl, uint64_t& global_id, AuthCapsInfo& caps, uint64_t *auid = NULL) override;
+  int handle_request(bufferlist::const_iterator& indata, bufferlist& result_bl, uint64_t& global_id, AuthCapsInfo& caps) override;
   void build_cephx_response_header(int request_type, int status, bufferlist& bl);
 };
 
index d7e42c1b9ac76a2ab8147c44ef009ab5a9a19271..723b463fe9260317f81d0ccd4cdff69c466891d3 100644 (file)
@@ -22,7 +22,6 @@ bool AuthNoneAuthorizeHandler::verify_authorizer(
   bufferlist& authorizer_data, bufferlist& authorizer_reply,
   EntityName& entity_name, uint64_t& global_id, AuthCapsInfo& caps_info,
   CryptoKey& session_key,
-  uint64_t *auid,
   std::unique_ptr<AuthAuthorizerChallenge> *challenge)
 {
   auto iter = authorizer_data.cbegin();
index 0ce542bf678e2b061ea5fcb756f1df8de1a9701e..7dcd029b8e39648652a0e9003eab2ad1e3b9333a 100644 (file)
@@ -23,7 +23,7 @@ struct AuthNoneAuthorizeHandler : public AuthAuthorizeHandler {
   bool verify_authorizer(CephContext *cct, KeyStore *keys,
                         bufferlist& authorizer_data, bufferlist& authorizer_reply,
                          EntityName& entity_name, uint64_t& global_id,
-                        AuthCapsInfo& caps_info, CryptoKey& session_key, uint64_t *auid,
+                        AuthCapsInfo& caps_info, CryptoKey& session_key,
                         std::unique_ptr<AuthAuthorizerChallenge> *challenge) override;
   int authorizer_session_crypto() override;
 };
index f784d641b1267571b2a1eb59eec26565cc1d7ae9..449143894924e732746d3de324efb0d6b3b4dc1f 100644 (file)
@@ -31,7 +31,7 @@ public:
     caps.allow_all = true;
     return CEPH_AUTH_NONE;
   }
-  int handle_request(bufferlist::const_iterator& indata, bufferlist& result_bl, uint64_t& global_id, AuthCapsInfo& caps, uint64_t *auid = NULL) override {
+  int handle_request(bufferlist::const_iterator& indata, bufferlist& result_bl, uint64_t& global_id, AuthCapsInfo& caps) override {
     return 0;
   }
   void build_cephx_response_header(int request_type, int status, bufferlist& bl) { }
index 90e00ef579a584201554e82f2061740cfd6b3aec..1f59401fe41cdbb82e937b188ff9a8c932c217f2 100644 (file)
@@ -19,7 +19,6 @@ bool AuthUnknownAuthorizeHandler::verify_authorizer(
   bufferlist& authorizer_data, bufferlist& authorizer_reply,
   EntityName& entity_name, uint64_t& global_id, AuthCapsInfo& caps_info,
   CryptoKey& session_key,
-  uint64_t *auid,
   std::unique_ptr<AuthAuthorizerChallenge> *challenge)
 {
   // For unknown authorizers, there's nothing to verify.  They're "OK" by definition.  PLR
index e052af5def7dff1a62710a8e3a4b9283f37483a8..fdbcd1c3d95b85c93bace7b8365638db70363a8b 100644 (file)
@@ -23,7 +23,7 @@ struct AuthUnknownAuthorizeHandler : public AuthAuthorizeHandler {
   bool verify_authorizer(CephContext *cct, KeyStore *keys,
                         bufferlist& authorizer_data, bufferlist& authorizer_reply,
                          EntityName& entity_name, uint64_t& global_id,
-                        AuthCapsInfo& caps_info, CryptoKey& session_key, uint64_t *auid,
+                        AuthCapsInfo& caps_info, CryptoKey& session_key,
                         std::unique_ptr<AuthAuthorizerChallenge> *challenge) override;
   int authorizer_session_crypto() override;
 };
index 5c1e511e58378aacbd6a2c4315416f38f3be1d70..f89174d9aa13ffcebcb62ec82b84e154dbd1f470 100644 (file)
@@ -29,7 +29,7 @@ public:
   int start_session(EntityName& name, bufferlist::iterator& indata, bufferlist& result_bl, AuthCapsInfo& caps) {
     return CEPH_AUTH_UNKNOWN;
   }
-  int handle_request(bufferlist::iterator& indata, bufferlist& result_bl, uint64_t& global_id, AuthCapsInfo& caps, uint64_t *auid = NULL) {
+  int handle_request(bufferlist::iterator& indata, bufferlist& result_bl, uint64_t& global_id, AuthCapsInfo& caps) {
     ceph_abort();  // shouldn't get called
     return 0;
   }
index bc247f02105bc1252997f803384358c2c437ddf8..16d6821f13499fd4561c7dac163bb2d061df4119 100644 (file)
@@ -1308,7 +1308,7 @@ bool MDSDaemon::ms_verify_authorizer(Connection *con, int peer_type,
     is_valid = authorize_handler->verify_authorizer(
       cct, keys,
       authorizer_data, authorizer_reply, name, global_id, caps_info,
-      session_key, nullptr, challenge);
+      session_key, challenge);
   } else {
     dout(10) << __func__ << " no rotating_keys (yet), denied" << dendl;
     is_valid = false;
index 0a802227ce0450cf9ddca154b86a81f6bd9a434f..ce30ac879e1bbcc6cf3f18f4a37b69badec54d45 100644 (file)
@@ -195,7 +195,6 @@ bool DaemonServer::ms_verify_authorizer(
       authorizer_reply, s->entity_name,
       s->global_id, caps_info,
       session_key,
-      nullptr,
       challenge);
   } else {
     dout(10) << __func__ << " no rotating_keys (yet), denied" << dendl;
index 7611152095cebc032bc26430b4a7a94654656660..33c3f2bc2d971980b989514a5c456dba1ca95641 100644 (file)
@@ -647,7 +647,7 @@ bool AuthMonitor::prep_auth(MonOpRequestRef op, bool paxos_writable)
       }
     } else {
       // request
-      ret = s->auth_handler->handle_request(indata, response_bl, s->global_id, caps_info, &auid);
+      ret = s->auth_handler->handle_request(indata, response_bl, s->global_id, caps_info);
     }
     if (ret == -EIO) {
       wait_for_active(op, new C_RetryMessage(this,op));
index 02e50f00141b9a11dc46211ee64d70c60c7b3bd2..1e08ad43eecd5b34aa496d24d6a6075852990a5c 100644 (file)
@@ -6634,7 +6634,7 @@ bool OSD::ms_verify_authorizer(
     isvalid = authorize_handler->verify_authorizer(
       cct, keys,
       authorizer_data, authorizer_reply, name, global_id, caps_info, session_key,
-      &auid, challenge);
+      challenge);
   } else {
     dout(10) << __func__ << " no rotating_keys (yet), denied" << dendl;
     isvalid = false;