]> git.apps.os.sepia.ceph.com Git - ceph.git/commitdiff
crimson/mon: s/AuthResult/auth_result_t/
authorKefu Chai <kchai@redhat.com>
Tue, 22 Sep 2020 06:09:40 +0000 (14:09 +0800)
committerKefu Chai <kchai@redhat.com>
Tue, 22 Sep 2020 09:07:47 +0000 (17:07 +0800)
auth_result_t is merely an enum, so make it like so.

Signed-off-by: Kefu Chai <kchai@redhat.com>
src/crimson/mon/MonClient.cc

index 5c9d4279a04fa50e395be69da6918a8e0c1ce703..2a51ffdb313d7ca043fefcfb92974ccd517a1d82 100644 (file)
@@ -51,19 +51,19 @@ public:
   Connection(const AuthRegistry& auth_registry,
              crimson::net::ConnectionRef conn,
              KeyRing* keyring);
-  enum class AuthResult {
+  enum class auth_result_t {
     success = 0,
     failure,
     canceled
   };
   seastar::future<> handle_auth_reply(Ref<MAuthReply> m);
   // v1
-  seastar::future<AuthResult> authenticate_v1(
+  seastar::future<auth_result_t> authenticate_v1(
     epoch_t epoch,
     const EntityName& name,
     uint32_t want_keys);
   // v2
-  seastar::future<AuthResult> authenticate_v2();
+  seastar::future<auth_result_t> authenticate_v2();
   auth::AuthClient::auth_request_t
   get_auth_request(const EntityName& name,
                    uint32_t want_keys);
@@ -99,8 +99,8 @@ private:
     rotating,
     general,
   };
-  seastar::future<std::optional<AuthResult>> do_auth_single(request_t);
-  seastar::future<AuthResult> do_auth(request_t);
+  seastar::future<std::optional<auth_result_t>> do_auth_single(request_t);
+  seastar::future<auth_result_t> do_auth(request_t);
 
 private:
   bool closed = false;
@@ -110,7 +110,7 @@ private:
   using clock_t = seastar::lowres_system_clock;
   clock_t::time_point auth_start;
   crimson::auth::method_t auth_method = 0;
-  seastar::promise<AuthResult> auth_done;
+  seastar::promise<auth_result_t> auth_done;
   // v1 and v2
   const AuthRegistry& auth_registry;
   crimson::net::ConnectionRef conn;
@@ -141,8 +141,8 @@ seastar::future<> Connection::handle_auth_reply(Ref<MAuthReply> m)
 seastar::future<> Connection::renew_tickets()
 {
   if (auth->need_tickets()) {
-    return do_auth(request_t::general).then([](AuthResult r) {
-      if (r != AuthResult::success)  {
+    return do_auth(request_t::general).then([](auth_result_t r) {
+      if (r != auth_result_t::success)  {
         throw std::system_error(
          make_error_code(
            crimson::net::error::negotiation_failure));
@@ -166,8 +166,8 @@ seastar::future<> Connection::renew_rotating_keyring()
     return seastar::now();
   }
   last_rotating_renew_sent = now;
-  return do_auth(request_t::rotating).then([](AuthResult r) {
-    if (r != AuthResult::success)  {
+  return do_auth(request_t::rotating).then([](auth_result_t r) {
+    if (r != auth_result_t::success)  {
       throw std::system_error(make_error_code(
         crimson::net::error::negotiation_failure));
     }
@@ -226,7 +226,7 @@ Connection::setup_session(epoch_t epoch,
   return conn->send(m);
 }
 
-seastar::future<std::optional<Connection::AuthResult>>
+seastar::future<std::optional<Connection::auth_result_t>>
 Connection::do_auth_single(Connection::request_t what)
 {
   auto m = make_message<MAuth>();
@@ -254,8 +254,8 @@ Connection::do_auth_single(Connection::request_t what)
     if (!m) {
       ceph_assert(closed);
       logger().info("do_auth: connection closed");
-      return seastar::make_ready_future<std::optional<Connection::AuthResult>>(
-       std::make_optional(AuthResult::canceled));
+      return seastar::make_ready_future<std::optional<Connection::auth_result_t>>(
+       std::make_optional(auth_result_t::canceled));
     }
     logger().info(
       "do_auth: mon {} => {} returns {}: {}",
@@ -270,24 +270,24 @@ Connection::do_auth_single(Connection::request_t what)
        ret,
        conn->get_peer_addr());
     }
-    return seastar::make_ready_future<std::optional<Connection::AuthResult>>(
+    return seastar::make_ready_future<std::optional<Connection::auth_result_t>>(
       ret == -EAGAIN
       ? std::nullopt
       : std::make_optional(ret == 0
-        ? AuthResult::success
-        : AuthResult::failure
+        ? auth_result_t::success
+        : auth_result_t::failure
       ));
   });
 }
 
-seastar::future<Connection::AuthResult>
+seastar::future<Connection::auth_result_t>
 Connection::do_auth(Connection::request_t what) {
   return seastar::repeat_until_value([this, what]() {
     return do_auth_single(what);
   });
 }
 
-seastar::future<Connection::AuthResult>
+seastar::future<Connection::auth_result_t>
 Connection::authenticate_v1(epoch_t epoch,
                             const EntityName& name,
                             uint32_t want_keys)
@@ -299,7 +299,7 @@ Connection::authenticate_v1(epoch_t epoch,
   }).then([name, want_keys, this](Ref<MAuthReply> m) {
     if (!m) {
       logger().error("authenticate_v1 canceled on {}", name);
-      return seastar::make_ready_future<AuthResult>(AuthResult::canceled);
+      return seastar::make_ready_future<auth_result_t>(auth_result_t::canceled);
     }
     global_id = m->global_id;
     auth = create_auth(m->protocol, m->global_id, name, want_keys);
@@ -308,7 +308,7 @@ Connection::authenticate_v1(epoch_t epoch,
                                  nullptr, nullptr)) {
     case 0:
       // none
-      return seastar::make_ready_future<AuthResult>(AuthResult::success);
+      return seastar::make_ready_future<auth_result_t>(auth_result_t::success);
     case -EAGAIN:
       // cephx
       return do_auth(request_t::general);
@@ -317,11 +317,11 @@ Connection::authenticate_v1(epoch_t epoch,
     }
   }).handle_exception([](auto ep) {
     logger().error("authenticate_v1 failed with {}", ep);
-    return seastar::make_ready_future<AuthResult>(AuthResult::canceled);
+    return seastar::make_ready_future<auth_result_t>(auth_result_t::canceled);
   });
 }
 
-seastar::future<Connection::AuthResult> Connection::authenticate_v2()
+seastar::future<Connection::auth_result_t> Connection::authenticate_v2()
 {
   auth_start = seastar::lowres_system_clock::now();
   return conn->send(make_message<MMonGetMap>()).then([this] {
@@ -397,7 +397,7 @@ Connection::handle_auth_done(uint64_t new_global_id,
   secret_t connection_secret;
   int r = auth->handle_response(0, p, &session_key, &connection_secret);
   conn->set_last_keepalive_ack(auth_start);
-  auth_done.set_value(AuthResult::success);
+  auth_done.set_value(auth_result_t::success);
   return {session_key, connection_secret, r};
 }
 
@@ -431,7 +431,7 @@ void Connection::close()
 {
   reply.set_value(Ref<MAuthReply>(nullptr));
   reply = {};
-  auth_done.set_value(AuthResult::canceled);
+  auth_done.set_value(auth_result_t::canceled);
   auth_done = {};
   if (conn && !std::exchange(closed, true)) {
     conn->mark_down();
@@ -961,7 +961,7 @@ seastar::future<> Client::reopen_session(int rank)
     }
     logger().info("connecting to mon.{}", rank);
     return seastar::futurize_invoke(
-        [peer, this] () -> seastar::future<Connection::AuthResult> {
+        [peer, this] () -> seastar::future<Connection::auth_result_t> {
       auto conn = msgr.connect(peer, CEPH_ENTITY_TYPE_MON);
       auto& mc = pending_conns.emplace_back(
        std::make_unique<Connection>(auth_registry, conn, &keyring));
@@ -971,11 +971,11 @@ seastar::future<> Client::reopen_session(int rank)
         return mc->authenticate_v1(monmap.get_epoch(), entity_name, want_keys)
           .handle_exception([conn](auto ep) {
             conn->mark_down();
-            return seastar::make_exception_future<Connection::AuthResult>(ep);
+            return seastar::make_exception_future<Connection::auth_result_t>(ep);
           });
       }
     }).then([peer, this](auto result) {
-      if (result != Connection::AuthResult::canceled) {
+      if (result != Connection::auth_result_t::canceled) {
         _finish_auth(peer);
       }
       logger().debug("reopen_session mon connection attempts complete");