Loading blockconnection.go +1 −1 Original line number Diff line number Diff line Loading @@ -376,7 +376,7 @@ func (conn *BlockConnection) SetErasePin(currentPin []byte, newPin []byte) (Stat return callback.Status(), err } // SetACL sets Permission for particular user Identify. // SetACL sets Permission for particular user Identity. // On success, Status.Code = OK. func (conn *BlockConnection) SetACL(acls []ACL) (Status, error) { callback := &GenericCallback{} Loading kinetic.go +1 −1 Original line number Diff line number Diff line Loading @@ -698,7 +698,7 @@ type ACLScope struct { // ACL structure for SetACL call. Defines permission for identity. type ACL struct { Identify int64 Identity int64 Key []byte Algo ACLAlgorithm Scopes []ACLScope Loading kinetic_test.go +1 −1 Original line number Diff line number Diff line Loading @@ -281,7 +281,7 @@ func ExampleBlockConnection_SetACL() { } acls := []ACL{ ACL{ Identify: 100, Identity: 100, Key: []byte("asdfasdf"), Algo: ACLAlgorithmHMACSHA1, Scopes: scope, Loading nonblockconnection.go +2 −2 Original line number Diff line number Diff line Loading @@ -410,7 +410,7 @@ func (conn *NonBlockConnection) SetErasePin(currentPin []byte, newPin []byte, h return conn.service.submit(msg, cmd, nil, h) } // SetACL sets Permission for particular user Identify. // SetACL sets Permission for particular user Identity. func (conn *NonBlockConnection) SetACL(acls []ACL, h *ResponseHandler) error { msg := newMessage(kproto.Message_HMACAUTH) cmd := newCommand(kproto.Command_SECURITY) Loading @@ -433,7 +433,7 @@ func (conn *NonBlockConnection) SetACL(acls []ACL, h *ResponseHandler) error { cmdAlgo := convertACLAlgorithmToProto(acl.Algo) cmdPriority := convertPriorityToProto(acl.MaxPriority) cmdACL[ka] = &kproto.Command_Security_ACL{ Identity: &acl.Identify, Identity: &acl.Identity, Key: acl.Key, HmacAlgorithm: &cmdAlgo, Scope: cmdScope, Loading Loading
blockconnection.go +1 −1 Original line number Diff line number Diff line Loading @@ -376,7 +376,7 @@ func (conn *BlockConnection) SetErasePin(currentPin []byte, newPin []byte) (Stat return callback.Status(), err } // SetACL sets Permission for particular user Identify. // SetACL sets Permission for particular user Identity. // On success, Status.Code = OK. func (conn *BlockConnection) SetACL(acls []ACL) (Status, error) { callback := &GenericCallback{} Loading
kinetic.go +1 −1 Original line number Diff line number Diff line Loading @@ -698,7 +698,7 @@ type ACLScope struct { // ACL structure for SetACL call. Defines permission for identity. type ACL struct { Identify int64 Identity int64 Key []byte Algo ACLAlgorithm Scopes []ACLScope Loading
kinetic_test.go +1 −1 Original line number Diff line number Diff line Loading @@ -281,7 +281,7 @@ func ExampleBlockConnection_SetACL() { } acls := []ACL{ ACL{ Identify: 100, Identity: 100, Key: []byte("asdfasdf"), Algo: ACLAlgorithmHMACSHA1, Scopes: scope, Loading
nonblockconnection.go +2 −2 Original line number Diff line number Diff line Loading @@ -410,7 +410,7 @@ func (conn *NonBlockConnection) SetErasePin(currentPin []byte, newPin []byte, h return conn.service.submit(msg, cmd, nil, h) } // SetACL sets Permission for particular user Identify. // SetACL sets Permission for particular user Identity. func (conn *NonBlockConnection) SetACL(acls []ACL, h *ResponseHandler) error { msg := newMessage(kproto.Message_HMACAUTH) cmd := newCommand(kproto.Command_SECURITY) Loading @@ -433,7 +433,7 @@ func (conn *NonBlockConnection) SetACL(acls []ACL, h *ResponseHandler) error { cmdAlgo := convertACLAlgorithmToProto(acl.Algo) cmdPriority := convertPriorityToProto(acl.MaxPriority) cmdACL[ka] = &kproto.Command_Security_ACL{ Identity: &acl.Identify, Identity: &acl.Identity, Key: acl.Key, HmacAlgorithm: &cmdAlgo, Scope: cmdScope, Loading