[#1090] tree: Make workaround for APE checks
All checks were successful
DCO action / DCO (pull_request) Successful in 30m22s
Vulncheck / Vulncheck (pull_request) Successful in 30m38s
Build / Build Components (1.21) (pull_request) Successful in 32m33s
Tests and linters / Lint (pull_request) Successful in 32m33s
Build / Build Components (1.22) (pull_request) Successful in 32m47s
Tests and linters / Staticcheck (pull_request) Successful in 32m29s
Tests and linters / gopls check (pull_request) Successful in 35m4s
Tests and linters / Tests (1.21) (pull_request) Successful in 35m54s
Tests and linters / Tests with -race (pull_request) Successful in 35m52s
Tests and linters / Tests (1.22) (pull_request) Successful in 36m47s

* Make `verifyClient` method perform APE check if a container
  was created with zero-filled basic ACL.
* Object verbs are used in APE, until tree verbs are introduced.

Signed-off-by: Airat Arifullin <a.arifullin@yadro.com>
This commit is contained in:
Airat Arifullin 2024-04-11 18:10:33 +03:00
parent 16481968c0
commit 04aa7874b2
4 changed files with 89 additions and 6 deletions

View file

@ -63,7 +63,9 @@ func initTreeService(c *cfg) {
tree.WithReplicationChannelCapacity(treeConfig.ReplicationChannelCapacity()),
tree.WithReplicationWorkerCount(treeConfig.ReplicationWorkerCount()),
tree.WithAuthorizedKeys(treeConfig.AuthorizedKeys()),
tree.WithMetrics(c.metricsCollector.TreeService()))
tree.WithMetrics(c.metricsCollector.TreeService()),
tree.WithAPERouter(c.cfgObject.cfgAccessPolicyEngine.accessPolicyEngine),
)
c.cfgGRPC.performAndSave(func(_ string, _ net.Listener, s *grpc.Server) {
tree.RegisterTreeServiceServer(s, c.treeService)