uint32_t rgw_perms_from_aclspec_default_strategy(
const rgw_user& uid,
- const RGWIdentityApplier::aclspec_t& aclspec)
+ const rgw::auth::Identity::aclspec_t& aclspec)
{
dout(5) << "Searching permissions for uid=" << uid << dendl;
}
};
- using aclspec_t = RGWIdentityApplier::aclspec_t;
+ using aclspec_t = rgw::auth::Identity::aclspec_t;
typedef std::function<uint32_t(const aclspec_t&)> acl_strategy_t;
protected:
}
};
- using aclspec_t = RGWIdentityApplier::aclspec_t;
+ using aclspec_t = rgw::auth::Identity::aclspec_t;
typedef std::function<uint32_t(const aclspec_t&)> acl_strategy_t;
protected:
* the authentication process, they must have it loaded. Leveraging this is
* a way to avoid unnecessary calls to underlying RADOS store. */
class LocalApplier : public IdentityApplier {
- using aclspec_t = RGWIdentityApplier::aclspec_t;
+ using aclspec_t = rgw::auth::Identity::aclspec_t;
protected:
const RGWUserInfo user_info;
} /* namespace auth */
} /* namespace rgw */
+
+uint32_t rgw_perms_from_aclspec_default_strategy(
+ const rgw_user& uid,
+ const rgw::auth::Identity::aclspec_t& aclspec);
+
#endif /* CEPH_RGW_AUTH_H */
};
/* Lambda will obtain a copy of (not a reference to!) allowed_items. */
- return [allowed_items](const RGWIdentityApplier::aclspec_t& aclspec) {
+ return [allowed_items](const rgw::auth::Identity::aclspec_t& aclspec) {
uint32_t perm = 0;
for (const auto& allowed_item : allowed_items) {