Update scope usage and add Changes for lightweight accounts

This commit is contained in:
Ishank Arora
2021-07-13 13:02:29 +02:00
parent 7b1130f34b
commit 29c5cb627a
6 changed files with 11 additions and 8 deletions
+1 -1
View File
@@ -302,7 +302,7 @@ func AuthenticateCS3(ctx context.Context, su config.ServiceUser, tm token.Manage
UidNumber: su.UID,
GidNumber: su.GID,
}
s, err := scope.GetOwnerScope()
s, err := scope.AddOwnerScope(nil)
if err != nil {
return
}
+1 -1
View File
@@ -654,7 +654,7 @@ func mintToken(ctx context.Context, su *User, roleIds []string) (token string, e
UidNumber: int64(su.UIDNumber),
GidNumber: int64(su.GIDNumber),
}
s, _ := scope.GetOwnerScope()
s, _ := scope.AddOwnerScope(nil)
return tokenManager.MintToken(ctx, u, s)
}
+1 -1
View File
@@ -490,7 +490,7 @@ func (o Ocs) mintTokenForUser(ctx context.Context, account *accounts.Account) (s
UidNumber: account.UidNumber,
GidNumber: account.GidNumber,
}
s, err := scope.GetOwnerScope()
s, err := scope.AddOwnerScope(nil)
if err != nil {
return "", err
}
+1 -1
View File
@@ -92,7 +92,7 @@ func (m accountResolver) ServeHTTP(w http.ResponseWriter, req *http.Request) {
m.logger.Debug().Interface("claims", claims).Interface("user", u).Msgf("associated claims with uuid")
}
s, err := scope.GetOwnerScope()
s, err := scope.AddOwnerScope(nil)
if err != nil {
m.logger.Error().Err(err).Msgf("could not get owner scope")
return
+6 -3
View File
@@ -53,9 +53,12 @@ func (c *cs3backend) GetUserByClaims(ctx context.Context, claim, value string, w
return user, nil
}
roleIDs, err := loadRolesIDs(ctx, user.Id.OpaqueId, c.settingsRoleService)
if err != nil {
c.logger.Error().Err(err).Msg("Could not load roles")
var roleIDs []string
if user.Id.Type != cs3.UserType_USER_TYPE_LIGHTWEIGHT {
roleIDs, err = loadRolesIDs(ctx, user.Id.OpaqueId, c.settingsRoleService)
if err != nil {
c.logger.Error().Err(err).Msgf("Could not load roles")
}
}
if len(roleIDs) == 0 {
+1 -1
View File
@@ -9,7 +9,7 @@ import (
)
var (
regexForAccountUUID = regexp.MustCompile(`^[A-Za-z0-9\-_.+@]+$`)
regexForAccountUUID = regexp.MustCompile(`^[A-Za-z0-9\-_.+@:]+$`)
requireAccountID = []validation.Rule{
// use rule for validation error message consistency (".. must not be blank" on empty strings)
validation.Required,