@@ -17,7 +17,6 @@ import (
17
17
"github.com/lightninglabs/taproot-assets/address"
18
18
"github.com/lightninglabs/taproot-assets/fn"
19
19
"github.com/lightninglabs/taproot-assets/monitoring"
20
- "github.com/lightninglabs/taproot-assets/perms"
21
20
"github.com/lightninglabs/taproot-assets/rfqmsg"
22
21
"github.com/lightninglabs/taproot-assets/rpcperms"
23
22
"github.com/lightninglabs/taproot-assets/tapchannel"
@@ -133,7 +132,7 @@ func (s *Server) initialize(interceptorChain *rpcperms.InterceptorChain) error {
133
132
Checkers : []macaroons.Checker {
134
133
macaroons .IPLockChecker ,
135
134
},
136
- RequiredPerms : perms .RequiredPermissions ,
135
+ RequiredPerms : taprpc .RequiredPermissions ,
137
136
},
138
137
)
139
138
if err != nil {
@@ -158,7 +157,7 @@ func (s *Server) initialize(interceptorChain *rpcperms.InterceptorChain) error {
158
157
159
158
// Register all our known permission with the macaroon
160
159
// service.
161
- for method , ops := range perms .RequiredPermissions {
160
+ for method , ops := range taprpc .RequiredPermissions {
162
161
err := interceptorChain .AddPermission (
163
162
method , ops ,
164
163
)
@@ -311,7 +310,7 @@ func (s *Server) RunUntilShutdown(mainErrChan <-chan error) error {
311
310
serverOpts := s .cfg .GrpcServerOpts
312
311
313
312
// Get RPC endpoints which don't require macaroons.
314
- macaroonWhitelist := perms .MacaroonWhitelist (
313
+ macaroonWhitelist := taprpc .MacaroonWhitelist (
315
314
s .cfg .UniversePublicAccess .IsReadAccessGranted (),
316
315
s .cfg .UniversePublicAccess .IsWriteAccessGranted (),
317
316
s .cfg .RPCConfig .AllowPublicUniProofCourier ,
0 commit comments