From 4ef369732ad5cfb40f5b7486914acb44b738f3f8 Mon Sep 17 00:00:00 2001 From: Leonard Lyubich Date: Tue, 25 May 2021 19:33:00 +0300 Subject: [PATCH] [#525] ir/container: Write session token on eACL table approval Approved eACL table should be stored in sidechain along with related session token. Forward session token from `SetEACL` event to `Wrapper.PutEACL` method. Signed-off-by: Leonard Lyubich --- pkg/innerring/processors/container/process_eacl.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkg/innerring/processors/container/process_eacl.go b/pkg/innerring/processors/container/process_eacl.go index b56f08caa..7894d1540 100644 --- a/pkg/innerring/processors/container/process_eacl.go +++ b/pkg/innerring/processors/container/process_eacl.go @@ -69,7 +69,7 @@ func (cp *Processor) checkEACLOwnership(binTable []byte, key *keys.PublicKey) er } func (cp *Processor) approveSetEACL(e container.SetEACL) { - err := cp.cnrClient.PutEACL(e.Table(), e.PublicKey(), e.Signature(), nil) + err := cp.cnrClient.PutEACL(e.Table(), e.PublicKey(), e.Signature(), e.SessionToken()) if err != nil { cp.log.Error("could not approve set EACL", zap.String("error", err.Error()),