forked from TrueCloudLab/frostfs-node
[#1483] morph: Remove container.GetEACL()
Signed-off-by: Evgenii Stratonikov <e.stratonikov@yadro.com>
This commit is contained in:
parent
a692298533
commit
3324c26fd8
2 changed files with 0 additions and 96 deletions
|
@ -27,7 +27,6 @@ const (
|
||||||
getMethod = "get"
|
getMethod = "get"
|
||||||
listMethod = "list"
|
listMethod = "list"
|
||||||
containersOfMethod = "containersOf"
|
containersOfMethod = "containersOf"
|
||||||
eaclMethod = "eACL"
|
|
||||||
deletionInfoMethod = "deletionInfo"
|
deletionInfoMethod = "deletionInfo"
|
||||||
|
|
||||||
// putNamedMethod is method name for container put with an alias. It is exported to provide custom fee.
|
// putNamedMethod is method name for container put with an alias. It is exported to provide custom fee.
|
||||||
|
|
|
@ -1,95 +0,0 @@
|
||||||
package container
|
|
||||||
|
|
||||||
import (
|
|
||||||
"crypto/sha256"
|
|
||||||
"fmt"
|
|
||||||
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-node/pkg/core/container"
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-node/pkg/morph/client"
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/api/refs"
|
|
||||||
apistatus "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/client/status"
|
|
||||||
cid "git.frostfs.info/TrueCloudLab/frostfs-sdk-go/container/id"
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/eacl"
|
|
||||||
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/session"
|
|
||||||
)
|
|
||||||
|
|
||||||
// GetEACL reads the extended ACL table from FrostFS system
|
|
||||||
// through Container contract call.
|
|
||||||
//
|
|
||||||
// Returns apistatus.EACLNotFound if eACL table is missing in the contract.
|
|
||||||
func (c *Client) GetEACL(cnr cid.ID) (*container.EACL, error) {
|
|
||||||
binCnr := make([]byte, sha256.Size)
|
|
||||||
cnr.Encode(binCnr)
|
|
||||||
|
|
||||||
prm := client.TestInvokePrm{}
|
|
||||||
prm.SetMethod(eaclMethod)
|
|
||||||
prm.SetArgs(binCnr)
|
|
||||||
|
|
||||||
prms, err := c.client.TestInvoke(prm)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("could not perform test invocation (%s): %w", eaclMethod, err)
|
|
||||||
} else if ln := len(prms); ln != 1 {
|
|
||||||
return nil, fmt.Errorf("unexpected stack item count (%s): %d", eaclMethod, ln)
|
|
||||||
}
|
|
||||||
|
|
||||||
arr, err := client.ArrayFromStackItem(prms[0])
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("could not get item array of eACL (%s): %w", eaclMethod, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(arr) != 4 {
|
|
||||||
return nil, fmt.Errorf("unexpected eacl stack item count (%s): %d", eaclMethod, len(arr))
|
|
||||||
}
|
|
||||||
|
|
||||||
rawEACL, err := client.BytesFromStackItem(arr[0])
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("could not get byte array of eACL (%s): %w", eaclMethod, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
sig, err := client.BytesFromStackItem(arr[1])
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("could not get byte array of eACL signature (%s): %w", eaclMethod, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Client may not return errors if the table is missing, so check this case additionally.
|
|
||||||
// The absence of a signature in the response can be taken as an eACL absence criterion,
|
|
||||||
// since unsigned table cannot be approved in the storage by design.
|
|
||||||
if len(sig) == 0 {
|
|
||||||
return nil, new(apistatus.EACLNotFound)
|
|
||||||
}
|
|
||||||
|
|
||||||
pub, err := client.BytesFromStackItem(arr[2])
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("could not get byte array of eACL public key (%s): %w", eaclMethod, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
binToken, err := client.BytesFromStackItem(arr[3])
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("could not get byte array of eACL session token (%s): %w", eaclMethod, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
var res container.EACL
|
|
||||||
|
|
||||||
res.Value = eacl.NewTable()
|
|
||||||
if err = res.Value.Unmarshal(rawEACL); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(binToken) > 0 {
|
|
||||||
res.Session = new(session.Container)
|
|
||||||
|
|
||||||
err = res.Session.Unmarshal(binToken)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("could not unmarshal session token: %w", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// TODO(@cthulhu-rider): #468 implement and use another approach to avoid conversion
|
|
||||||
var sigV2 refs.Signature
|
|
||||||
sigV2.SetKey(pub)
|
|
||||||
sigV2.SetSign(sig)
|
|
||||||
sigV2.SetScheme(refs.ECDSA_RFC6979_SHA256)
|
|
||||||
|
|
||||||
err = res.Signature.ReadFromV2(sigV2)
|
|
||||||
return &res, err
|
|
||||||
}
|
|
Loading…
Reference in a new issue