Signed-off-by: oppiliappan me@oppi.li
+9
-1
spindle/ingester.go
+9
-1
spindle/ingester.go
·········
·········+if err := s.e.AddRepo(record.Owner, rbac.ThisServer, filepath.Join(record.Owner, record.Name)); err != nil {
+89
spindle/xrpc/add_secret.go
+89
spindle/xrpc/add_secret.go
···
···+resp, err := atproto.RepoGetRecord(r.Context(), &xrpcc, "", tangled.RepoNSID, repoAt.Authority().String(), repoAt.RecordKey().String())+if ok, err := x.Enforcer.IsSettingsAllowed(actorDid.String(), rbac.ThisServer, didPath); !ok || err != nil {
+91
spindle/xrpc/list_secrets.go
+91
spindle/xrpc/list_secrets.go
···
···+resp, err := atproto.RepoGetRecord(r.Context(), &xrpcc, "", tangled.RepoNSID, repoAt.Authority().String(), repoAt.RecordKey().String())+if ok, err := x.Enforcer.IsSettingsAllowed(actorDid.String(), rbac.ThisServer, didPath); !ok || err != nil {
+82
spindle/xrpc/remove_secret.go
+82
spindle/xrpc/remove_secret.go
···
···+resp, err := atproto.RepoGetRecord(r.Context(), &xrpcc, "", tangled.RepoNSID, repoAt.Authority().String(), repoAt.RecordKey().String())+if ok, err := x.Enforcer.IsSettingsAllowed(actorDid.String(), rbac.ThisServer, didPath); !ok || err != nil {
+147
spindle/xrpc/xrpc.go
+147
spindle/xrpc/xrpc.go
···
···+WithError(fmt.Errorf("DID does not have sufficent access permissions for this operation: %s", d)),