1db6d316c2
Signed-off-by: Pavel Karpy <carpawell@nspcc.ru> Signed-off-by: Pavel Karpy <carpawell@nspcc.ru>
105 lines
2.7 KiB
Go
105 lines
2.7 KiB
Go
package container
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/nspcc-dev/neofs-node/pkg/morph/client"
|
|
)
|
|
|
|
// EACLArgs groups the arguments
|
|
// of get eACL test invoke call.
|
|
type EACLArgs struct {
|
|
cid []byte // container identifier
|
|
}
|
|
|
|
// EACLValues groups the stack parameters
|
|
// returned by get eACL test invoke.
|
|
type EACLValues struct {
|
|
eacl []byte // extended ACL table
|
|
|
|
signature []byte // RFC-6979 signature of extended ACL table
|
|
|
|
publicKey []byte // public key of the extended ACL table signer
|
|
|
|
token []byte // token of the session within which the eACL table was set
|
|
}
|
|
|
|
// SetCID sets the container identifier
|
|
// in a binary format.
|
|
func (g *EACLArgs) SetCID(v []byte) {
|
|
g.cid = v
|
|
}
|
|
|
|
// EACL returns the eACL table
|
|
// in a binary format.
|
|
func (g *EACLValues) EACL() []byte {
|
|
return g.eacl
|
|
}
|
|
|
|
// Signature returns RFC-6979 signature of extended ACL table.
|
|
func (g *EACLValues) Signature() []byte {
|
|
return g.signature
|
|
}
|
|
|
|
// PublicKey of the signature.
|
|
func (g *EACLValues) PublicKey() []byte {
|
|
return g.publicKey
|
|
}
|
|
|
|
// SessionToken returns token of the session within which
|
|
// the eACl table was set in a NeoFS API binary format.
|
|
func (g *EACLValues) SessionToken() []byte {
|
|
return g.token
|
|
}
|
|
|
|
// EACL performs the test invoke of get eACL
|
|
// method of NeoFS Container contract.
|
|
func (c *Client) EACL(args EACLArgs) (*EACLValues, error) {
|
|
invokePrm := client.TestInvokePrm{}
|
|
|
|
invokePrm.SetMethod(c.eaclMethod)
|
|
invokePrm.SetArgs(args.cid)
|
|
|
|
prms, err := c.client.TestInvoke(invokePrm)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not perform test invocation (%s): %w", c.eaclMethod, err)
|
|
} else if ln := len(prms); ln != 1 {
|
|
return nil, fmt.Errorf("unexpected stack item count (%s): %d", c.eaclMethod, ln)
|
|
}
|
|
|
|
arr, err := client.ArrayFromStackItem(prms[0])
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not get item array of eACL (%s): %w", c.eaclMethod, err)
|
|
}
|
|
|
|
if len(arr) != 4 {
|
|
return nil, fmt.Errorf("unexpected eacl stack item count (%s): %d", c.eaclMethod, len(arr))
|
|
}
|
|
|
|
eacl, err := client.BytesFromStackItem(arr[0])
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not get byte array of eACL (%s): %w", c.eaclMethod, err)
|
|
}
|
|
|
|
sig, err := client.BytesFromStackItem(arr[1])
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not get byte array of eACL signature (%s): %w", c.eaclMethod, err)
|
|
}
|
|
|
|
pub, err := client.BytesFromStackItem(arr[2])
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not get byte array of eACL public key (%s): %w", c.eaclMethod, err)
|
|
}
|
|
|
|
tok, err := client.BytesFromStackItem(arr[3])
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not get byte array of eACL session token (%s): %w", c.eaclMethod, err)
|
|
}
|
|
|
|
return &EACLValues{
|
|
eacl: eacl,
|
|
signature: sig,
|
|
publicKey: pub,
|
|
token: tok,
|
|
}, nil
|
|
}
|