[Pkg-ganeti-devel] [ganeti] 142/165: Use ssconf port map when handling SSH keys

Apollon Oikonomopoulos apoikos at moszumanska.debian.org
Tue Aug 11 13:53:22 UTC 2015


This is an automated email from the git hooks/post-receive script.

apoikos pushed a commit to branch master
in repository ganeti.

commit 3eca0766dff02cc4622357b0afae28f860347583
Author: Helga Velroyen <helgav at google.com>
Date:   Fri Jul 17 09:53:19 2015 +0200

    Use ssconf port map when handling SSH keys
    
    Recently, the SSH port information was added to ssconf
    file. This patch makes use of it when adding, removing,
    or renewing SSH keys. The main benefit of it is to reduce
    the signature of the backend functions and thus the RPC
    load.
    
    Signed-off-by: Helga Velroyen <helgav at google.com>
    Reviewed-by: Klaus Aehlig <aehlig at google.com>
---
 lib/backend.py                     | 23 ++++++++-----------
 lib/cmdlib/cluster.py              |  3 +--
 lib/cmdlib/node.py                 | 14 ++++--------
 lib/rpc_defs.py                    |  3 ---
 lib/server/noded.py                | 13 +++++------
 lib/ssh.py                         | 22 ------------------
 test/py/ganeti.backend_unittest.py | 46 ++++++++++++++------------------------
 7 files changed, 37 insertions(+), 87 deletions(-)

diff --git a/lib/backend.py b/lib/backend.py
index 7c82d8d..5454aba 100644
--- a/lib/backend.py
+++ b/lib/backend.py
@@ -1415,7 +1415,6 @@ def _InitSshUpdateData(data, noded_cert_file, ssconf_store):
 
 def AddNodeSshKey(node_uuid, node_name,
                   potential_master_candidates,
-                  ssh_port_map,
                   to_authorized_keys=False,
                   to_public_keys=False,
                   get_public_keys=False,
@@ -1436,8 +1435,6 @@ def AddNodeSshKey(node_uuid, node_name,
   @param node_uuid: the UUID of the node whose key is added
   @type node_name: str
   @param node_name: the name of the node whose key is added
-  @type ssh_port_map: dict from str to int
-  @param ssh_port_map: a mapping from node names to SSH port numbers
   @type potential_master_candidates: list of str
   @param potential_master_candidates: list of node names of potential master
     candidates; this should match the list of uuids in the public key file
@@ -1487,6 +1484,8 @@ def AddNodeSshKey(node_uuid, node_name,
   _InitSshUpdateData(base_data, noded_cert_file, ssconf_store)
   cluster_name = base_data[constants.SSHS_CLUSTER_NAME]
 
+  ssh_port_map = ssconf_store.GetSshPortMap()
+
   # Update the target node itself
   logging.debug("Updating SSH key files of target node '%s'.", node_name)
   if get_public_keys:
@@ -1566,7 +1565,6 @@ def AddNodeSshKey(node_uuid, node_name,
 def RemoveNodeSshKey(node_uuid, node_name,
                      master_candidate_uuids,
                      potential_master_candidates,
-                     ssh_port_map,
                      master_uuid=None,
                      keys_to_remove=None,
                      from_authorized_keys=False,
@@ -1593,8 +1591,6 @@ def RemoveNodeSshKey(node_uuid, node_name,
   @type potential_master_candidates: list of str
   @param potential_master_candidates: list of names of potential master
     candidates
-  @type ssh_port_map: dict of str to int
-  @param ssh_port_map: mapping of node names to their SSH port
   @type keys_to_remove: dict of str to list of str
   @param keys_to_remove: a dictionary mapping node UUIDS to lists of SSH keys
     to be removed. This list is supposed to be used only if the keys are not
@@ -1627,6 +1623,7 @@ def RemoveNodeSshKey(node_uuid, node_name,
     ssconf_store = ssconf.SimpleStore()
 
   master_node = ssconf_store.GetMasterNode()
+  ssh_port_map = ssconf_store.GetSshPortMap()
 
   if from_authorized_keys or from_public_keys:
     if keys_to_remove:
@@ -1881,8 +1878,7 @@ def _ReplaceMasterKeyOnMaster(root_keyfiles):
     raise errors.SshUpdateError("Could not move at least one master SSH key.")
 
 
-def RenewSshKeys(node_uuids, node_names, ssh_port_map,
-                 master_candidate_uuids,
+def RenewSshKeys(node_uuids, node_names, master_candidate_uuids,
                  potential_master_candidates,
                  pub_key_file=pathutils.SSH_PUB_KEYS,
                  ssconf_store=None,
@@ -1895,8 +1891,6 @@ def RenewSshKeys(node_uuids, node_names, ssh_port_map,
   @type node_names: list of str
   @param node_names: list of node names whose keys should be removed. This list
     should match the C{node_uuids} parameter
-  @type ssh_port_map: dict of str to int
-  @param ssh_port_map: map of node UUID to ssh port number
   @type master_candidate_uuids: list of str
   @param master_candidate_uuids: list of UUIDs of master candidates or
     master node
@@ -1930,6 +1924,7 @@ def RenewSshKeys(node_uuids, node_names, ssh_port_map,
 
   master_node_name = ssconf_store.GetMasterNode()
   master_node_uuid = _GetMasterNodeUUID(node_uuid_name_map, master_node_name)
+  ssh_port_map = ssconf_store.GetSshPortMap()
   # List of all node errors that happened, but which did not abort the
   # procedure as a whole. It is important that this is a list to have a
   # somewhat chronological history of events.
@@ -1964,7 +1959,7 @@ def RenewSshKeys(node_uuids, node_names, ssh_port_map,
         logging.debug("Removing SSH key of node '%s'.", node_name)
         node_errors = RemoveNodeSshKey(
            node_uuid, node_name, master_candidate_uuids,
-           potential_master_candidates, ssh_port_map,
+           potential_master_candidates,
            master_uuid=master_node_uuid, from_authorized_keys=master_candidate,
            from_public_keys=False, clear_authorized_keys=False,
            clear_public_keys=False)
@@ -1999,7 +1994,7 @@ def RenewSshKeys(node_uuids, node_names, ssh_port_map,
     logging.debug("Add ssh key of node '%s'.", node_name)
     node_errors = AddNodeSshKey(
         node_uuid, node_name, potential_master_candidates,
-        ssh_port_map, to_authorized_keys=master_candidate,
+        to_authorized_keys=master_candidate,
         to_public_keys=potential_master_candidate,
         get_public_keys=True,
         pub_key_file=pub_key_file, ssconf_store=ssconf_store,
@@ -2033,7 +2028,7 @@ def RenewSshKeys(node_uuids, node_names, ssh_port_map,
   logging.debug("Add new master key to all nodes.")
   node_errors = AddNodeSshKey(
       master_node_uuid, master_node_name, potential_master_candidates,
-      ssh_port_map, to_authorized_keys=True, to_public_keys=True,
+      to_authorized_keys=True, to_public_keys=True,
       get_public_keys=False, pub_key_file=pub_key_file,
       ssconf_store=ssconf_store, noded_cert_file=noded_cert_file,
       run_cmd_fn=run_cmd_fn)
@@ -2053,7 +2048,7 @@ def RenewSshKeys(node_uuids, node_names, ssh_port_map,
   logging.debug("Remove the old master key from all nodes.")
   node_errors = RemoveNodeSshKey(
       master_node_uuid, master_node_name, master_candidate_uuids,
-      potential_master_candidates, ssh_port_map,
+      potential_master_candidates,
       keys_to_remove=old_master_keys_by_uuid, from_authorized_keys=True,
       from_public_keys=False, clear_authorized_keys=False,
       clear_public_keys=False)
diff --git a/lib/cmdlib/cluster.py b/lib/cmdlib/cluster.py
index 01acb75..dd758ec 100644
--- a/lib/cmdlib/cluster.py
+++ b/lib/cmdlib/cluster.py
@@ -175,13 +175,12 @@ class LUClusterRenewCrypto(NoHooksLU):
                         in nodes.items() if not node_info.offline]
     node_names = [name for (_, name) in nodes_uuid_names]
     node_uuids = [uuid for (uuid, _) in nodes_uuid_names]
-    port_map = ssh.GetSshPortMap(node_names, self.cfg)
     potential_master_candidates = self.cfg.GetPotentialMasterCandidates()
     master_candidate_uuids = self.cfg.GetMasterCandidateUuids()
 
     result = self.rpc.call_node_ssh_keys_renew(
       [master_uuid],
-      node_uuids, node_names, port_map,
+      node_uuids, node_names,
       master_candidate_uuids,
       potential_master_candidates)
 
diff --git a/lib/cmdlib/node.py b/lib/cmdlib/node.py
index b6d67bc..9c2ba21 100644
--- a/lib/cmdlib/node.py
+++ b/lib/cmdlib/node.py
@@ -55,8 +55,6 @@ from ganeti.cmdlib.common import CheckParamsNotGlobal, \
   AddNodeCertToCandidateCerts, RemoveNodeCertFromCandidateCerts, \
   EnsureKvmdOnNodes, WarnAboutFailedSshUpdates
 
-from ganeti.ssh import GetSshPortMap
-
 
 def _DecideSelfPromotion(lu, exceptions=None):
   """Decide whether I should promote myself as a master candidate.
@@ -349,7 +347,6 @@ class LUNodeAdd(LogicalUnit):
     """
     potential_master_candidates = self.cfg.GetPotentialMasterCandidates()
     master_node = self.cfg.GetMasterNode()
-    port_map = GetSshPortMap(potential_master_candidates, self.cfg)
 
     if readd:
       # clear previous keys
@@ -359,7 +356,6 @@ class LUNodeAdd(LogicalUnit):
         new_node_uuid, new_node_name,
         master_candidate_uuids,
         potential_master_candidates,
-        port_map,
         True, # from authorized keys
         True, # from public keys
         False, # clear authorized keys
@@ -371,7 +367,7 @@ class LUNodeAdd(LogicalUnit):
 
     result = rpcrunner.call_node_ssh_key_add(
       [master_node], new_node_uuid, new_node_name,
-      potential_master_candidates, port_map,
+      potential_master_candidates,
       is_master_candidate, is_potential_master_candidate,
       is_potential_master_candidate)
 
@@ -872,14 +868,13 @@ class LUNodeSetParams(LogicalUnit):
 
       if self.cfg.GetClusterInfo().modify_ssh_setup:
         potential_master_candidates = self.cfg.GetPotentialMasterCandidates()
-        ssh_port_map = GetSshPortMap(potential_master_candidates, self.cfg)
         master_node = self.cfg.GetMasterNode()
         if self.old_role == self._ROLE_CANDIDATE:
           master_candidate_uuids = self.cfg.GetMasterCandidateUuids()
           ssh_result = self.rpc.call_node_ssh_key_remove(
             [master_node],
             node.uuid, node.name,
-            master_candidate_uuids, potential_master_candidates, ssh_port_map,
+            master_candidate_uuids, potential_master_candidates,
             True, # remove node's key from all nodes' authorized_keys file
             False, # currently, all nodes are potential master candidates
             False, # do not clear node's 'authorized_keys'
@@ -892,7 +887,7 @@ class LUNodeSetParams(LogicalUnit):
         if self.new_role == self._ROLE_CANDIDATE:
           ssh_result = self.rpc.call_node_ssh_key_add(
             [master_node], node.uuid, node.name,
-            potential_master_candidates, ssh_port_map,
+            potential_master_candidates,
             True, # add node's key to all node's 'authorized_keys'
             True, # all nodes are potential master candidates
             False) # do not update the node's public keys
@@ -1582,13 +1577,12 @@ class LUNodeRemove(LogicalUnit):
       potential_master_candidates = self.cfg.GetPotentialMasterCandidates()
       potential_master_candidate = \
         self.op.node_name in potential_master_candidates
-      ssh_port_map = GetSshPortMap(potential_master_candidates, self.cfg)
       master_candidate_uuids = self.cfg.GetMasterCandidateUuids()
       master_node = self.cfg.GetMasterNode()
       result = self.rpc.call_node_ssh_key_remove(
         [master_node],
         self.node.uuid, self.op.node_name,
-        master_candidate_uuids, potential_master_candidates, ssh_port_map,
+        master_candidate_uuids, potential_master_candidates,
         self.node.master_candidate, # from_authorized_keys
         potential_master_candidate, # from_public_keys
         True, # clear node's 'authorized_keys'
diff --git a/lib/rpc_defs.py b/lib/rpc_defs.py
index 9ea9e08..40feb0c 100644
--- a/lib/rpc_defs.py
+++ b/lib/rpc_defs.py
@@ -537,7 +537,6 @@ _NODE_CALLS = [
     ("node_uuid", None, "UUID of the node whose key is distributed"),
     ("node_name", None, "Name of the node whose key is distributed"),
     ("potential_master_candidates", None, "Potential master candidates"),
-    ("ssh_port_map", None, "Map of nodes' SSH ports to be used for transfers"),
     ("to_authorized_keys", None, "Whether the node's key should be added"
      " to all nodes' 'authorized_keys' file"),
     ("to_public_keys", None, "Whether the node's key should be added"
@@ -550,7 +549,6 @@ _NODE_CALLS = [
     ("node_name", None, "Name of the node whose key is removed"),
     ("master_candidate_uuids", None, "List of UUIDs of master candidates."),
     ("potential_master_candidates", None, "Potential master candidates"),
-    ("ssh_port_map", None, "Map of nodes' SSH ports to be used for transfers"),
     ("from_authorized_keys", None,
      "If the key should be removed from the 'authorized_keys' file."),
     ("from_public_keys", None,
@@ -563,7 +561,6 @@ _NODE_CALLS = [
   ("node_ssh_keys_renew", MULTI, None, constants.RPC_TMO_SLOW, [
     ("node_uuids", None, "UUIDs of the nodes whose key is renewed"),
     ("node_names", None, "Names of the nodes whose key is renewed"),
-    ("ssh_port_map", None, "Map of nodes' SSH ports to be used for transfers"),
     ("master_candidate_uuids", None, "List of UUIDs of master candidates."),
     ("potential_master_candidates", None, "Potential master candidates")],
     None, None, "Renew all SSH key pairs of all nodes nodes."),
diff --git a/lib/server/noded.py b/lib/server/noded.py
index 80bcaf6..27f5128 100644
--- a/lib/server/noded.py
+++ b/lib/server/noded.py
@@ -923,10 +923,10 @@ class NodeRequestHandler(http.server.HttpServerHandler):
     """Distributes a new node's SSH key if authorized.
 
     """
-    (node_uuid, node_name, potential_master_candidates, ssh_port_map,
+    (node_uuid, node_name, potential_master_candidates,
      to_authorized_keys, to_public_keys, get_public_keys) = params
     return backend.AddNodeSshKey(node_uuid, node_name,
-                                 potential_master_candidates, ssh_port_map,
+                                 potential_master_candidates,
                                  to_authorized_keys=to_authorized_keys,
                                  to_public_keys=to_public_keys,
                                  get_public_keys=get_public_keys)
@@ -936,9 +936,9 @@ class NodeRequestHandler(http.server.HttpServerHandler):
     """Generates a new root SSH key pair on the node.
 
     """
-    (node_uuids, node_names, ssh_port_map,
-     master_candidate_uuids, potential_master_candidates) = params
-    return backend.RenewSshKeys(node_uuids, node_names, ssh_port_map,
+    (node_uuids, node_names, master_candidate_uuids,
+     potential_master_candidates) = params
+    return backend.RenewSshKeys(node_uuids, node_names,
                                 master_candidate_uuids,
                                 potential_master_candidates)
 
@@ -948,13 +948,12 @@ class NodeRequestHandler(http.server.HttpServerHandler):
 
     """
     (node_uuid, node_name,
-     master_candidate_uuids, potential_master_candidates, ssh_port_map,
+     master_candidate_uuids, potential_master_candidates,
      from_authorized_keys, from_public_keys, clear_authorized_keys,
      clear_public_keys) = params
     return backend.RemoveNodeSshKey(node_uuid, node_name,
                                     master_candidate_uuids,
                                     potential_master_candidates,
-                                    ssh_port_map,
                                     from_authorized_keys=from_authorized_keys,
                                     from_public_keys=from_public_keys,
                                     clear_authorized_keys=clear_authorized_keys,
diff --git a/lib/ssh.py b/lib/ssh.py
index e260450..7d34f29 100644
--- a/lib/ssh.py
+++ b/lib/ssh.py
@@ -1067,28 +1067,6 @@ def RunSshCmdWithStdin(cluster_name, node, basecmd, port, data,
                              (result.cmd, result.fail_reason))
 
 
-def GetSshPortMap(nodes, cfg):
-  """Retrieves SSH ports of given nodes from the config.
-
-  @param nodes: the names of nodes
-  @type nodes: a list of strings
-  @param cfg: a configuration object
-  @type cfg: L{ConfigWriter}
-  @return: a map from node names to ssh ports
-  @rtype: a dict from str to int
-
-  """
-  node_port_map = {}
-  node_groups = dict(map(lambda n: (n.name, n.group),
-                         cfg.GetAllNodesInfo().values()))
-  group_port_map = cfg.GetGroupSshPorts()
-  for node in nodes:
-    group_uuid = node_groups.get(node)
-    ssh_port = group_port_map.get(group_uuid)
-    node_port_map[node] = ssh_port
-  return node_port_map
-
-
 def ReadRemoteSshPubKeys(pub_key_file, node, cluster_name, port, ask_key,
                          strict_host_check):
   """Fetches the public DSA SSH key from a node via SSH.
diff --git a/test/py/ganeti.backend_unittest.py b/test/py/ganeti.backend_unittest.py
index f0e0d10..c75d5b2 100755
--- a/test/py/ganeti.backend_unittest.py
+++ b/test/py/ganeti.backend_unittest.py
@@ -45,7 +45,6 @@ from ganeti import errors
 from ganeti import hypervisor
 from ganeti import netutils
 from ganeti import objects
-from ganeti import pathutils
 from ganeti import serializer
 from ganeti import ssh
 from ganeti import utils
@@ -948,6 +947,7 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     self._ssconf_mock.GetMasterNode = mock.Mock()
     self._ssconf_mock.GetClusterName = mock.Mock()
     self._ssconf_mock.GetOnlineNodeList = mock.Mock()
+    self._ssconf_mock.GetSshPortMap = mock.Mock()
 
     self._run_cmd_mock = mock.Mock()
     self._run_cmd_mock.side_effect = self._ssh_file_manager.RunCommand
@@ -1008,7 +1008,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     self._all_nodes = []
     self._potential_master_candidates = []
     self._master_candidate_uuids = []
-    self._ssh_port_map = {}
 
     self._ssconf_mock.reset_mock()
     self._ssconf_mock.GetNodeList.reset_mock()
@@ -1019,7 +1018,8 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     self._ssh_file_manager.InitAllNodes(15, 10, 5)
     self._master_node = self._ssh_file_manager.GetMasterNodeName()
-    self._ssh_port_map = self._ssh_file_manager.GetSshPortMap(self._SSH_PORT)
+    self._ssconf_mock.GetSshPortMap.return_value = \
+        self._ssh_file_manager.GetSshPortMap(self._SSH_PORT)
     self._potential_master_candidates = \
         self._ssh_file_manager.GetAllPotentialMasterCandidateNodeNames()
     self._master_candidate_uuids = \
@@ -1049,12 +1049,13 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     ssh.AddPublicKey(test_node_uuid, "some_old_key",
                      key_file=self._pub_key_file)
 
-    backend._GenerateNodeSshKey(test_node_uuid, test_node_name,
-                                self._ssh_port_map,
-                                pub_key_file=self._pub_key_file,
-                                ssconf_store=self._ssconf_mock,
-                                noded_cert_file=self.noded_cert_file,
-                                run_cmd_fn=self._run_cmd_mock)
+    backend._GenerateNodeSshKey(
+        test_node_uuid, test_node_name,
+        self._ssh_file_manager.GetSshPortMap(self._SSH_PORT),
+        pub_key_file=self._pub_key_file,
+        ssconf_store=self._ssconf_mock,
+        noded_cert_file=self.noded_cert_file,
+        run_cmd_fn=self._run_cmd_mock)
 
     calls_per_node = self._GetCallsPerNode()
     for node, calls in calls_per_node.items():
@@ -1069,7 +1070,8 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
       ssh.AddPublicKey(name, key, key_file=self._pub_key_file)
       self._potential_master_candidates.append(name)
 
-    self._ssh_port_map[name] = self._SSH_PORT
+    self._ssconf_mock.GetSshPortMap.return_value = \
+        self._ssh_file_manager.GetSshPortMap(self._SSH_PORT)
 
   def _GetNewMasterCandidate(self):
     """Returns the properties of a new master candidate node."""
@@ -1086,7 +1088,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     backend.AddNodeSshKey(new_node_uuid, new_node_name,
                           self._potential_master_candidates,
-                          self._ssh_port_map,
                           to_authorized_keys=is_master_candidate,
                           to_public_keys=is_potential_master_candidate,
                           get_public_keys=is_potential_master_candidate,
@@ -1114,7 +1115,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     backend.AddNodeSshKey(new_node_uuid, new_node_name,
                           self._potential_master_candidates,
-                          self._ssh_port_map,
                           to_authorized_keys=is_master_candidate,
                           to_public_keys=is_potential_master_candidate,
                           get_public_keys=is_potential_master_candidate,
@@ -1142,7 +1142,7 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     self.assertRaises(
         AssertionError, backend.AddNodeSshKey, new_node_uuid, new_node_name,
-        self._potential_master_candidates, self._ssh_port_map,
+        self._potential_master_candidates,
         to_authorized_keys=is_master_candidate,
         to_public_keys=is_potential_master_candidate,
         get_public_keys=is_potential_master_candidate,
@@ -1165,7 +1165,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     backend.AddNodeSshKey(node_info.uuid, node_name,
                           self._potential_master_candidates,
-                          self._ssh_port_map,
                           to_authorized_keys=True,
                           to_public_keys=False,
                           get_public_keys=False,
@@ -1186,7 +1185,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     backend.RemoveNodeSshKey(node_uuid, node_name,
                              self._master_candidate_uuids,
                              self._potential_master_candidates,
-                             self._ssh_port_map,
                              from_authorized_keys=True,
                              from_public_keys=True,
                              clear_authorized_keys=True,
@@ -1210,7 +1208,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     backend.RemoveNodeSshKey(node_info.uuid, node_name,
                              self._master_candidate_uuids,
                              self._potential_master_candidates,
-                             self._ssh_port_map,
                              from_authorized_keys=False,
                              from_public_keys=True,
                              clear_authorized_keys=True,
@@ -1234,7 +1231,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     backend.RemoveNodeSshKey(node_info.uuid, node_name,
                              self._master_candidate_uuids,
                              self._potential_master_candidates,
-                             self._ssh_port_map,
                              from_authorized_keys=False,
                              from_public_keys=False,
                              clear_authorized_keys=True,
@@ -1261,7 +1257,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     backend.RemoveNodeSshKey(node_info.uuid, node_name,
                              self._master_candidate_uuids,
                              self._potential_master_candidates,
-                             self._ssh_port_map,
                              from_authorized_keys=True,
                              from_public_keys=False,
                              clear_authorized_keys=False,
@@ -1285,7 +1280,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     backend.RemoveNodeSshKey(node_info.uuid, node_name,
                              self._master_candidate_uuids,
                              self._potential_master_candidates,
-                             self._ssh_port_map,
                              from_authorized_keys=False,
                              from_public_keys=True,
                              clear_authorized_keys=False,
@@ -1317,7 +1311,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     backend.AddNodeSshKey(new_node_uuid, new_node_name,
                           self._potential_master_candidates,
-                          self._ssh_port_map,
                           to_authorized_keys=is_master_candidate,
                           to_public_keys=is_potential_master_candidate,
                           get_public_keys=is_potential_master_candidate,
@@ -1343,7 +1336,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     backend.RemoveNodeSshKey(node_info.uuid, node_name,
                              self._master_candidate_uuids,
                              self._potential_master_candidates,
-                             self._ssh_port_map,
                              from_authorized_keys=True,
                              from_public_keys=True,
                              clear_authorized_keys=True,
@@ -1378,7 +1370,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     backend.AddNodeSshKey(new_node_uuid, new_node_name,
                           self._potential_master_candidates,
-                          self._ssh_port_map,
                           to_authorized_keys=is_master_candidate,
                           to_public_keys=is_potential_master_candidate,
                           get_public_keys=is_potential_master_candidate,
@@ -1412,7 +1403,7 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     self.assertRaises(
         errors.SshUpdateError, backend.AddNodeSshKey, new_node_uuid,
-        new_node_name, self._potential_master_candidates, self._ssh_port_map,
+        new_node_name, self._potential_master_candidates,
         to_authorized_keys=is_master_candidate,
         to_public_keys=is_potential_master_candidate,
         get_public_keys=is_potential_master_candidate,
@@ -1453,7 +1444,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     backend.AddNodeSshKey(new_node_uuid, new_node_name,
                           self._potential_master_candidates,
-                          self._ssh_port_map,
                           to_authorized_keys=is_master_candidate,
                           to_public_keys=is_potential_master_candidate,
                           get_public_keys=is_potential_master_candidate,
@@ -1487,7 +1477,7 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     node_errors = backend.AddNodeSshKey(
         new_node_uuid, new_node_name, self._potential_master_candidates,
-        self._ssh_port_map, to_authorized_keys=is_master_candidate,
+        to_authorized_keys=is_master_candidate,
         to_public_keys=is_potential_master_candidate,
         get_public_keys=is_potential_master_candidate,
         pub_key_file=self._pub_key_file,
@@ -1523,7 +1513,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     backend.RemoveNodeSshKey(node_info.uuid, node_name,
                              self._master_candidate_uuids,
                              self._potential_master_candidates,
-                             self._ssh_port_map,
                              from_authorized_keys=True,
                              from_public_keys=True,
                              clear_authorized_keys=True,
@@ -1556,7 +1545,7 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     error_msgs = backend.RemoveNodeSshKey(
         node_info.uuid, node_name, self._master_candidate_uuids,
-        self._potential_master_candidates, self._ssh_port_map,
+        self._potential_master_candidates,
         from_authorized_keys=True, from_public_keys=True,
         clear_authorized_keys=True, clear_public_keys=True,
         pub_key_file=self._pub_key_file, ssconf_store=self._ssconf_mock,
@@ -1583,7 +1572,6 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
     backend.RemoveNodeSshKey(node_info.uuid, node_name,
                              self._master_candidate_uuids,
                              self._potential_master_candidates,
-                             self._ssh_port_map,
                              from_authorized_keys=True,
                              from_public_keys=True,
                              clear_authorized_keys=True,
@@ -1613,7 +1601,7 @@ class TestAddRemoveGenerateNodeSshKey(testutils.GanetiTestCase):
 
     error_msgs = backend.RemoveNodeSshKey(
         node_info.uuid, node_name, self._master_candidate_uuids,
-        self._potential_master_candidates, self._ssh_port_map,
+        self._potential_master_candidates,
         from_authorized_keys=True, from_public_keys=True,
         clear_authorized_keys=True, clear_public_keys=True,
         pub_key_file=self._pub_key_file, ssconf_store=self._ssconf_mock,

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-ganeti/ganeti.git



More information about the Pkg-ganeti-devel mailing list