From 47cd10a4d744188fa2cfaeffa508392f8ee3d456 Mon Sep 17 00:00:00 2001 From: Evgenii Stratonikov Date: Fri, 11 Feb 2022 13:55:30 +0300 Subject: [PATCH] [#767] services/object: replace duplicate link in TODO Signed-off-by: Evgenii Stratonikov --- pkg/services/object/acl/acl.go | 4 ++-- pkg/services/object/acl/classifier.go | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/pkg/services/object/acl/acl.go b/pkg/services/object/acl/acl.go index 81e6f1726..de6ee4ccd 100644 --- a/pkg/services/object/acl/acl.go +++ b/pkg/services/object/acl/acl.go @@ -749,7 +749,7 @@ func isValidBearer(reqInfo requestInfo, st netmap.State) bool { // 3. Then check if container owner signed this token. tokenIssuerKey := unmarshalPublicKey(token.GetSignature().GetKey()) if !isOwnerFromKey(reqInfo.cnrOwner, tokenIssuerKey) { - // TODO: #1156 in this case we can issue all owner keys from neofs.id and check once again + // TODO: #767 in this case we can issue all owner keys from neofs.id and check once again return false } @@ -758,7 +758,7 @@ func isValidBearer(reqInfo requestInfo, st netmap.State) bool { if tokenOwnerField != nil { // see bearer token owner field description requestSenderKey := unmarshalPublicKey(reqInfo.senderKey) if !isOwnerFromKey(tokenOwnerField, requestSenderKey) { - // TODO: #1156 in this case we can issue all owner keys from neofs.id and check once again + // TODO: #767 in this case we can issue all owner keys from neofs.id and check once again return false } } diff --git a/pkg/services/object/acl/classifier.go b/pkg/services/object/acl/classifier.go index 775b037d6..db25f215e 100644 --- a/pkg/services/object/acl/classifier.go +++ b/pkg/services/object/acl/classifier.go @@ -63,7 +63,7 @@ func (c SenderClassifier) Classify( ownerKeyInBytes := ownerKey.Bytes() - // TODO: #1156 get owner from neofs.id if present + // TODO: #767 get owner from neofs.id if present // if request owner is the same as container owner, return RoleUser if ownerID.Equal(cnr.OwnerID()) { @@ -203,7 +203,7 @@ func ownerFromToken(token *session.SessionToken) (*owner.ID, *keys.PublicKey, er tokenOwner := owner.NewIDFromV2(token.GetBody().GetOwnerID()) if !isOwnerFromKey(tokenOwner, tokenIssuerKey) { - // TODO: #1156 in this case we can issue all owner keys from neofs.id and check once again + // TODO: #767 in this case we can issue all owner keys from neofs.id and check once again return nil, nil, fmt.Errorf("%w: invalid session token owner", ErrMalformedRequest) }