]> git.ipfire.org Git - thirdparty/libvirt.git/commitdiff
qemu: domain: Remove qemuDomainSupportsEncryptedSecret
authorPeter Krempa <pkrempa@redhat.com>
Tue, 21 Sep 2021 15:58:30 +0000 (17:58 +0200)
committerPeter Krempa <pkrempa@redhat.com>
Wed, 22 Sep 2021 12:53:55 +0000 (14:53 +0200)
The answer is now always 'true', so we can remove the function and
simplify the logic in places where it's called.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Ján Tomko <jtomko@redhat.com>
src/qemu/qemu_domain.c
src/qemu/qemu_domain.h

index 1340ed0d298d7bed434e680617651edfd12a806d..903e86f8dc73584b3170fe6c87e92ed1b6b51569 100644 (file)
@@ -1154,12 +1154,6 @@ qemuDomainSecretAESSetup(qemuDomainObjPrivate *priv,
     g_autofree uint8_t *ciphertext = NULL;
     size_t ciphertextlen = 0;
 
-    if (!qemuDomainSupportsEncryptedSecret(priv)) {
-        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
-                       _("encrypted secrets are not supported"));
-        return NULL;
-    }
-
     secinfo = g_new0(qemuDomainSecretInfo, 1);
 
     secinfo->type = VIR_DOMAIN_SECRET_INFO_TYPE_AES;
@@ -1235,20 +1229,6 @@ qemuDomainSecretAESSetupFromSecret(qemuDomainObjPrivate *priv,
 }
 
 
-/**
- * qemuDomainSupportsEncryptedSecret:
- * @priv: qemu domain private data
- *
- * Returns true if libvirt can use encrypted 'secret' objects with VM which
- * @priv belongs to.
- */
-bool
-qemuDomainSupportsEncryptedSecret(qemuDomainObjPrivate *priv)
-{
-    return !!priv->masterKey;
-}
-
-
 /* qemuDomainSecretInfoNewPlain:
  * @usageType: Secret usage type
  * @username: username
@@ -1404,8 +1384,7 @@ qemuDomainSecretStorageSourcePrepare(qemuDomainObjPrivate *priv,
         if (src->protocol == VIR_STORAGE_NET_PROTOCOL_RBD)
             usageType = VIR_SECRET_USAGE_TYPE_CEPH;
 
-        if (!qemuDomainSupportsEncryptedSecret(priv) ||
-            (src->protocol == VIR_STORAGE_NET_PROTOCOL_ISCSI && !iscsiHasPS)) {
+        if (src->protocol == VIR_STORAGE_NET_PROTOCOL_ISCSI && !iscsiHasPS) {
             srcPriv->secinfo = qemuDomainSecretInfoNewPlain(usageType,
                                                             src->auth->username,
                                                             &src->auth->seclookupdef);
@@ -10888,7 +10867,7 @@ qemuDomainPrepareHostdev(virDomainHostdevDef *hostdev,
                 virSecretUsageType usageType = VIR_SECRET_USAGE_TYPE_ISCSI;
                 qemuDomainStorageSourcePrivate *srcPriv = qemuDomainStorageSourcePrivateFetch(src);
 
-                if (!qemuDomainSupportsEncryptedSecret(priv) || !iscsiHasPS) {
+                if (!iscsiHasPS) {
                     srcPriv->secinfo = qemuDomainSecretInfoNewPlain(usageType,
                                                                     src->auth->username,
                                                                     &src->auth->seclookupdef);
index ae9d76ec4a3aea9a4d264359698f8b7e6bfd4dd3..08f33f0f9e49f1b2795d40a2642e73197d3b9f47 100644 (file)
@@ -853,8 +853,6 @@ int qemuDomainMasterKeyCreate(virDomainObj *vm);
 
 void qemuDomainMasterKeyRemove(qemuDomainObjPrivate *priv);
 
-bool qemuDomainSupportsEncryptedSecret(qemuDomainObjPrivate *priv);
-
 void qemuDomainSecretInfoFree(qemuDomainSecretInfo *secinfo)
     ATTRIBUTE_NONNULL(1);