@@ -330,7 +330,7 @@ def deleteSandboxes(self, SBIdList):
330330 return result
331331 return S_OK ()
332332
333- def getSandboxId (self , SEName , SEPFN , requesterName , requesterGroup , field = "SBId" , requesterDN = None ):
333+ def getSandboxId (self , SEName , SEPFN , requesterName , requesterGroup , field = "SBId" ):
334334 """
335335 Get the sandboxId if it exists
336336
@@ -350,7 +350,7 @@ def getSandboxId(self, SEName, SEPFN, requesterName, requesterGroup, field="SBId
350350 "s.OwnerId=o.OwnerId" ,
351351 ]
352352 sqlCmd = f"SELECT s.{ field } FROM `sb_SandBoxes` s, `sb_Owners` o WHERE"
353- requesterProps = Registry .getPropertiesForEntity (requesterGroup , name = requesterName , dn = requesterDN )
353+ requesterProps = Registry .getPropertiesForEntity (requesterGroup , name = requesterName )
354354 if Properties .JOB_ADMINISTRATOR in requesterProps or Properties .JOB_MONITOR in requesterProps :
355355 # Do nothing, just ensure it doesn't fit in the other cases
356356 pass
@@ -370,24 +370,3 @@ def getSandboxId(self, SEName, SEPFN, requesterName, requesterGroup, field="SBId
370370 if not data :
371371 return S_ERROR ("No sandbox matches the requirements" )
372372 return S_OK (data [0 ][0 ])
373-
374- def getSandboxOwner (self , SEName , SEPFN , requesterDN , requesterGroup ):
375- """get the sandbox owner, if such sandbox exists
376-
377- :param SEName: name of the StorageElement
378- :param SEPFN: PFN of the Sandbox
379- :param requesterDN: host DN used as credentials
380- :param requesterGroup: group used to use as credentials (should be 'hosts')
381-
382- :returns: S_OK with tuple (owner, ownerGroup, VO)
383- """
384- if not (res := self .getSandboxId (SEName , SEPFN , None , requesterGroup , "OwnerId" , requesterDN = requesterDN ))[
385- "OK"
386- ]:
387- return res
388-
389- if not (
390- res := self ._query (f"SELECT `Owner`, `OwnerGroup`, `VO` FROM `sb_Owners` WHERE `OwnerId` = { res ['Value' ]} " )
391- )["OK" ]:
392- return res
393- return S_OK (res ["Value" ][0 ])
0 commit comments