diff --git a/internal/endpoints/tokeninfo/history.go b/internal/endpoints/tokeninfo/history.go index 6b8167a1..e267664d 100644 --- a/internal/endpoints/tokeninfo/history.go +++ b/internal/endpoints/tokeninfo/history.go @@ -49,7 +49,7 @@ func doTokenInfoHistory(req pkg.TokenInfoRequest, mt *mytoken.Mytoken, clientMet func handleTokenInfoHistory(req pkg.TokenInfoRequest, mt *mytoken.Mytoken, clientMetadata *api.ClientMetaData) model.Response { // If we call this function it means the token is valid. - usedRestriction, errRes := auth.CheckCapabilityAndRestriction(nil, mt, clientMetadata.IP, api.CapabilityTokeninfoHistory) + usedRestriction, errRes := auth.CheckCapabilityAndRestriction(nil, mt, clientMetadata.IP, nil, nil, api.CapabilityTokeninfoHistory) if errRes != nil { return *errRes } diff --git a/internal/endpoints/tokeninfo/list.go b/internal/endpoints/tokeninfo/list.go index a0d61666..e40139e2 100644 --- a/internal/endpoints/tokeninfo/list.go +++ b/internal/endpoints/tokeninfo/list.go @@ -50,7 +50,7 @@ func doTokenInfoList(req pkg.TokenInfoRequest, mt *mytoken.Mytoken, clientMetada func handleTokenInfoList(req pkg.TokenInfoRequest, mt *mytoken.Mytoken, clientMetadata *api.ClientMetaData) model.Response { // If we call this function it means the token is valid. - usedRestriction, errRes := auth.CheckCapabilityAndRestriction(nil, mt, clientMetadata.IP, api.CapabilityListMT) + usedRestriction, errRes := auth.CheckCapabilityAndRestriction(nil, mt, clientMetadata.IP, nil, nil, api.CapabilityListMT) if errRes != nil { return *errRes } diff --git a/internal/endpoints/tokeninfo/tree.go b/internal/endpoints/tokeninfo/tree.go index f0270e2e..8cf819cf 100644 --- a/internal/endpoints/tokeninfo/tree.go +++ b/internal/endpoints/tokeninfo/tree.go @@ -49,7 +49,7 @@ func doTokenInfoTree(req pkg.TokenInfoRequest, mt *mytoken.Mytoken, clientMetada func handleTokenInfoTree(req pkg.TokenInfoRequest, mt *mytoken.Mytoken, clientMetadata *api.ClientMetaData) model.Response { // If we call this function it means the token is valid. - usedRestriction, errRes := auth.CheckCapabilityAndRestriction(nil, mt, clientMetadata.IP, api.CapabilityTokeninfoTree) + usedRestriction, errRes := auth.CheckCapabilityAndRestriction(nil, mt, clientMetadata.IP, nil, nil, api.CapabilityTokeninfoTree) if errRes != nil { return *errRes }