Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

acl: do not check EACL for system role #3015

Merged
merged 1 commit into from
Nov 14, 2024

Conversation

roman-khimov
Copy link
Member

EACL can not have any rules for system role since 0.38.0 (ab909a3), so performing these checks is not very helpful. Of course one can still ban the node by key, but that would make a lot of regular operations fail and broken container is not very helpful.

This fixes #2972 as much as possible (containers can be cached for a longer period of time).

EACL can not have any rules for system role since 0.38.0 (ab909a3),
so performing these checks is not very helpful. Of course one can still ban
the node by key, but that would make a lot of regular operations fail and
broken container is not very helpful.

This fixes #2972 as much as possible (containers can be cached for a longer
period of time).

Signed-off-by: Roman Khimov <[email protected]>
Copy link

codecov bot commented Nov 13, 2024

Codecov Report

Attention: Patch coverage is 0% with 13 lines in your changes missing coverage. Please review.

Project coverage is 22.83%. Comparing base (b7714ae) to head (08aefce).
Report is 8 commits behind head on master.

Files with missing lines Patch % Lines
pkg/services/object/acl/acl.go 0.00% 13 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##           master    #3015      +/-   ##
==========================================
- Coverage   22.84%   22.83%   -0.01%     
==========================================
  Files         790      790              
  Lines       58344    58347       +3     
==========================================
- Hits        13328    13325       -3     
- Misses      44136    44141       +5     
- Partials      880      881       +1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

}

if eaclRole == eaclSDK.RoleSystem {
return nil // Controlled by BasicACL, EACL can not contain any rules for system role since 0.38.0.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

no need to make a separate condition for this, we already have the case

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

also did not get it but maybe @roman-khimov has some thoughts on it

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That switch is so nice in its request role->acl role mapping that I didn't wont to interrupt the flow there. Can be changed at any time.

@roman-khimov roman-khimov merged commit 45802c6 into master Nov 14, 2024
20 of 22 checks passed
@roman-khimov roman-khimov deleted the dont-check-eacl-for-system branch November 14, 2024 16:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

HEAD operation leads to RPC requests
3 participants