]> git.apps.os.sepia.ceph.com Git - ceph.git/commitdiff
msg/async: drop verify_authorizer wrapper
authorSage Weil <sage@redhat.com>
Thu, 20 Sep 2018 21:19:15 +0000 (16:19 -0500)
committerSage Weil <sage@redhat.com>
Mon, 15 Oct 2018 20:01:40 +0000 (15:01 -0500)
Signed-off-by: Sage Weil <sage@redhat.com>
src/msg/async/AsyncMessenger.h
src/msg/async/Protocol.cc

index bc6b5cc56a244a3b9503ac265015e2b4b981c9bc..3f2333b9500393608c6202f18ad93c09ed97d60e 100644 (file)
@@ -378,15 +378,6 @@ public:
     return stack;
   }
 
-  /**
-   * This wraps ms_deliver_verify_authorizer; we use it for AsyncConnection.
-   */
-  bool verify_authorizer(Connection *con, int peer_type, int protocol, bufferlist& auth, bufferlist& auth_reply,
-                         bool& isvalid, CryptoKey& session_key,
-                        std::unique_ptr<AuthAuthorizerChallenge> *challenge) {
-    return ms_deliver_verify_authorizer(con, peer_type, protocol, auth,
-                                        auth_reply, isvalid, session_key, challenge);
-  }
   /**
    * Increment the global sequence for this AsyncMessenger and return it.
    * This is for the connect protocol, although it doesn't hurt if somebody
index 0dcb147b1adf5d82042b5f32e5a369505218e807..f3c3d4bae8eb32dd25e33c3639996ada9b6daad5 100644 (file)
@@ -1907,7 +1907,7 @@ CtPtr ProtocolV1::handle_connect_message_2() {
   bool authorizer_valid;
   bool need_challenge = HAVE_FEATURE(connect_msg.features, CEPHX_V2);
   bool had_challenge = (bool)authorizer_challenge;
-  if (!messenger->verify_authorizer(
+  if (!messenger->ms_deliver_verify_authorizer(
           connection, connection->peer_type, connect_msg.authorizer_protocol,
           authorizer_buf, authorizer_reply, authorizer_valid, session_key,
           need_challenge ? &authorizer_challenge : nullptr) ||