forked from TrueCloudLab/frostfs-node
[#106] Process bearer token in ACL service
If bearer token is presented in the request then check if it is a valid one and then use it to process extended ACL checks. Signed-off-by: Alex Vanin <alexey@nspcc.ru>
This commit is contained in:
parent
094248690b
commit
89cd2ad463
4 changed files with 107 additions and 8 deletions
|
@ -10,6 +10,7 @@ import (
|
|||
"github.com/nspcc-dev/neofs-api-go/pkg/netmap"
|
||||
"github.com/nspcc-dev/neofs-api-go/pkg/owner"
|
||||
"github.com/nspcc-dev/neofs-api-go/util/signature"
|
||||
bearer "github.com/nspcc-dev/neofs-api-go/v2/acl"
|
||||
"github.com/nspcc-dev/neofs-api-go/v2/session"
|
||||
v2signature "github.com/nspcc-dev/neofs-api-go/v2/signature"
|
||||
crypto "github.com/nspcc-dev/neofs-crypto"
|
||||
|
@ -25,6 +26,7 @@ type (
|
|||
metaWithToken struct {
|
||||
vheader *session.RequestVerificationHeader
|
||||
token *session.SessionToken
|
||||
bearer *bearer.BearerToken
|
||||
}
|
||||
|
||||
SenderClassifier struct {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue