mirror of
https://github.com/neondatabase/neon.git
synced 2026-05-20 14:40:37 +00:00
fixup: make it build
This commit is contained in:
@@ -3,7 +3,7 @@ use camino::Utf8Path;
|
||||
use jsonwebtoken::EncodingKey;
|
||||
use std::fs;
|
||||
use utils::{
|
||||
auth::{encode_hadron_token_with_encoding_key, Claims, Scope},
|
||||
auth::{Claims, Scope, encode_hadron_token_with_encoding_key},
|
||||
id::TenantId,
|
||||
};
|
||||
use uuid::Uuid;
|
||||
|
||||
@@ -40,6 +40,7 @@ use tokio_util::sync::CancellationToken;
|
||||
use tracing::warn;
|
||||
use utils::auth::{Scope, SwappableJwtAuth};
|
||||
use utils::id::{NodeId, TenantId, TimelineId};
|
||||
use uuid::Uuid;
|
||||
|
||||
use crate::http;
|
||||
use crate::metrics::{
|
||||
@@ -1805,6 +1806,7 @@ fn check_permissions(request: &Request<Body>, required_scope: Scope) -> Result<(
|
||||
/// Access by Admin-scope tokens is also permitted.
|
||||
/// TODO(william.huang): Merge with the previous function by refactoring `Scope` to make it carry the dependent arguments.
|
||||
/// E.g., `Scope::TenantEndpoint(EndpointId)`, `Scope::Tenant(TenantId)`, etc.
|
||||
#[allow(unused)]
|
||||
fn check_endpoint_permission(request: &Request<Body>, endpoint_id: Uuid) -> Result<(), ApiError> {
|
||||
check_permission_with(
|
||||
request,
|
||||
|
||||
@@ -515,17 +515,12 @@ async fn async_main() -> anyhow::Result<()> {
|
||||
|
||||
let persistence = Arc::new(Persistence::new(secrets.database_url).await);
|
||||
|
||||
let service = Service::spawn(
|
||||
config,
|
||||
persistence.clone(),
|
||||
secrets.token_generator,
|
||||
)
|
||||
.await?;
|
||||
let service = Service::spawn(config, persistence.clone(), secrets.token_generator).await?;
|
||||
|
||||
let jwt_auth = secrets
|
||||
.public_key
|
||||
.map(|jwt_auth| Arc::new(SwappableJwtAuth::new(jwt_auth)));
|
||||
let router = make_router(service.clone(), auth, build_info)
|
||||
let router = make_router(service.clone(), jwt_auth, build_info)
|
||||
.build()
|
||||
.map_err(|err| anyhow!(err))?;
|
||||
let http_service =
|
||||
|
||||
@@ -4,6 +4,7 @@ pub(crate) mod safekeeper_reconciler;
|
||||
mod safekeeper_service;
|
||||
mod tenant_shard_iterator;
|
||||
|
||||
use crate::hadron_token::HadronTokenGenerator;
|
||||
use std::borrow::Cow;
|
||||
use std::cmp::Ordering;
|
||||
use std::collections::{BTreeMap, HashMap, HashSet};
|
||||
@@ -14,7 +15,6 @@ use std::path::PathBuf;
|
||||
use std::str::FromStr;
|
||||
use std::sync::{Arc, OnceLock};
|
||||
use std::time::{Duration, Instant, SystemTime};
|
||||
use crate::hadron_token::HadronTokenGenerator;
|
||||
|
||||
use anyhow::Context;
|
||||
use control_plane::storage_controller::{
|
||||
@@ -518,6 +518,7 @@ pub struct Service {
|
||||
persistence: Arc<Persistence>,
|
||||
|
||||
// HadronTokenGenerator to generate (sign) JWTs during compute deployment and compute-spec generation.
|
||||
#[allow(unused)]
|
||||
token_generator: Option<HadronTokenGenerator>,
|
||||
|
||||
compute_hook: Arc<ComputeHook>,
|
||||
@@ -1661,7 +1662,11 @@ impl Service {
|
||||
}
|
||||
}
|
||||
|
||||
pub async fn spawn(config: Config, persistence: Arc<Persistence>, token_generator: Option<HadronTokenGenerator>) -> anyhow::Result<Arc<Self>> {
|
||||
pub async fn spawn(
|
||||
config: Config,
|
||||
persistence: Arc<Persistence>,
|
||||
token_generator: Option<HadronTokenGenerator>,
|
||||
) -> anyhow::Result<Arc<Self>> {
|
||||
let (result_tx, result_rx) = tokio::sync::mpsc::unbounded_channel();
|
||||
let (abort_tx, abort_rx) = tokio::sync::mpsc::unbounded_channel();
|
||||
|
||||
|
||||
Reference in New Issue
Block a user