From 4ef369732ad5cfb40f5b7486914acb44b738f3f8 Mon Sep 17 00:00:00 2001
From: Leonard Lyubich <leonard@nspcc.ru>
Date: Tue, 25 May 2021 19:33:00 +0300
Subject: [PATCH] [#525] ir/container: Write session token on eACL table
 approval

Approved eACL table should be stored in sidechain along with related session
token.

Forward session token from `SetEACL` event to `Wrapper.PutEACL` method.

Signed-off-by: Leonard Lyubich <leonard@nspcc.ru>
---
 pkg/innerring/processors/container/process_eacl.go | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/pkg/innerring/processors/container/process_eacl.go b/pkg/innerring/processors/container/process_eacl.go
index b56f08caa..7894d1540 100644
--- a/pkg/innerring/processors/container/process_eacl.go
+++ b/pkg/innerring/processors/container/process_eacl.go
@@ -69,7 +69,7 @@ func (cp *Processor) checkEACLOwnership(binTable []byte, key *keys.PublicKey) er
 }
 
 func (cp *Processor) approveSetEACL(e container.SetEACL) {
-	err := cp.cnrClient.PutEACL(e.Table(), e.PublicKey(), e.Signature(), nil)
+	err := cp.cnrClient.PutEACL(e.Table(), e.PublicKey(), e.Signature(), e.SessionToken())
 	if err != nil {
 		cp.log.Error("could not approve set EACL",
 			zap.String("error", err.Error()),