diff options
author | antirez <antirez@gmail.com> | 2019-01-18 13:39:28 +0100 |
---|---|---|
committer | antirez <antirez@gmail.com> | 2019-01-21 17:14:20 +0100 |
commit | 52f9a32d125ee686a9dd045d8b61fe484111d1c2 (patch) | |
tree | b90b51a2aa09a290afe86d7ce981517820bc14f8 | |
parent | e79a7c3bfc4eb15e1691deba2ba46408916f4dca (diff) | |
download | redis-52f9a32d125ee686a9dd045d8b61fe484111d1c2.tar.gz |
ACL: GetUserCommandBit() is a much better name for the function.
-rw-r--r-- | src/acl.c | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -325,7 +325,7 @@ int ACLGetCommandBitCoordinates(unsigned long id, uint64_t *word, uint64_t *bit) * * If the bit overflows the user internal represetation, zero is returned * in order to disallow the execution of the command in such edge case. */ -int ACLCheckCommandID(user *u, unsigned long id) { +int ACLGetUserCommandBit(user *u, unsigned long id) { uint64_t word, bit; if (ACLGetCommandBitCoordinates(id,&word,&bit) == C_ERR) return 0; return u->allowed_commands[word] & bit; @@ -353,7 +353,7 @@ int ACLCheckCommandPerm(client *c) { { /* If the bit is not set we have to check further, in case the * command is allowed just with that specific subcommand. */ - if (ACLCheckCommandID(u,id) == 0) { + if (ACLGetUserCommandBit(u,id) == 0) { /* Check if the subcommand matches. */ if (u->allowed_subcommands == NULL || c->argc < 2) return ACL_DENIED_CMD; |