502 lines
16 KiB
Go
502 lines
16 KiB
Go
|
// +build !consulent
|
||
|
|
||
|
package state
|
||
|
|
||
|
import (
|
||
|
"fmt"
|
||
|
|
||
|
"github.com/hashicorp/consul/agent/structs"
|
||
|
memdb "github.com/hashicorp/go-memdb"
|
||
|
)
|
||
|
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
///// ACL Table Schemas /////
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
|
||
|
func tokensTableSchema() *memdb.TableSchema {
|
||
|
return &memdb.TableSchema{
|
||
|
Name: "acl-tokens",
|
||
|
Indexes: map[string]*memdb.IndexSchema{
|
||
|
"accessor": &memdb.IndexSchema{
|
||
|
Name: "accessor",
|
||
|
// DEPRECATED (ACL-Legacy-Compat) - we should not AllowMissing here once legacy compat is removed
|
||
|
AllowMissing: true,
|
||
|
Unique: true,
|
||
|
Indexer: &memdb.UUIDFieldIndex{
|
||
|
Field: "AccessorID",
|
||
|
},
|
||
|
},
|
||
|
"id": &memdb.IndexSchema{
|
||
|
Name: "id",
|
||
|
AllowMissing: false,
|
||
|
Unique: true,
|
||
|
Indexer: &memdb.StringFieldIndex{
|
||
|
Field: "SecretID",
|
||
|
Lowercase: false,
|
||
|
},
|
||
|
},
|
||
|
"policies": &memdb.IndexSchema{
|
||
|
Name: "policies",
|
||
|
// Need to allow missing for the anonymous token
|
||
|
AllowMissing: true,
|
||
|
Unique: false,
|
||
|
Indexer: &TokenPoliciesIndex{},
|
||
|
},
|
||
|
"roles": &memdb.IndexSchema{
|
||
|
Name: "roles",
|
||
|
AllowMissing: true,
|
||
|
Unique: false,
|
||
|
Indexer: &TokenRolesIndex{},
|
||
|
},
|
||
|
"authmethod": &memdb.IndexSchema{
|
||
|
Name: "authmethod",
|
||
|
AllowMissing: true,
|
||
|
Unique: false,
|
||
|
Indexer: &memdb.StringFieldIndex{
|
||
|
Field: "AuthMethod",
|
||
|
Lowercase: false,
|
||
|
},
|
||
|
},
|
||
|
"local": &memdb.IndexSchema{
|
||
|
Name: "local",
|
||
|
AllowMissing: false,
|
||
|
Unique: false,
|
||
|
Indexer: &memdb.ConditionalIndex{
|
||
|
Conditional: func(obj interface{}) (bool, error) {
|
||
|
if token, ok := obj.(*structs.ACLToken); ok {
|
||
|
return token.Local, nil
|
||
|
}
|
||
|
return false, nil
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
"expires-global": {
|
||
|
Name: "expires-global",
|
||
|
AllowMissing: true,
|
||
|
Unique: false,
|
||
|
Indexer: &TokenExpirationIndex{LocalFilter: false},
|
||
|
},
|
||
|
"expires-local": {
|
||
|
Name: "expires-local",
|
||
|
AllowMissing: true,
|
||
|
Unique: false,
|
||
|
Indexer: &TokenExpirationIndex{LocalFilter: true},
|
||
|
},
|
||
|
|
||
|
//DEPRECATED (ACL-Legacy-Compat) - This index is only needed while we support upgrading v1 to v2 acls
|
||
|
// This table indexes all the ACL tokens that do not have an AccessorID
|
||
|
"needs-upgrade": &memdb.IndexSchema{
|
||
|
Name: "needs-upgrade",
|
||
|
AllowMissing: false,
|
||
|
Unique: false,
|
||
|
Indexer: &memdb.ConditionalIndex{
|
||
|
Conditional: func(obj interface{}) (bool, error) {
|
||
|
if token, ok := obj.(*structs.ACLToken); ok {
|
||
|
return token.AccessorID == "", nil
|
||
|
}
|
||
|
return false, nil
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func policiesTableSchema() *memdb.TableSchema {
|
||
|
return &memdb.TableSchema{
|
||
|
Name: "acl-policies",
|
||
|
Indexes: map[string]*memdb.IndexSchema{
|
||
|
"id": &memdb.IndexSchema{
|
||
|
Name: "id",
|
||
|
AllowMissing: false,
|
||
|
Unique: true,
|
||
|
Indexer: &memdb.UUIDFieldIndex{
|
||
|
Field: "ID",
|
||
|
},
|
||
|
},
|
||
|
"name": &memdb.IndexSchema{
|
||
|
Name: "name",
|
||
|
AllowMissing: false,
|
||
|
Unique: true,
|
||
|
Indexer: &memdb.StringFieldIndex{
|
||
|
Field: "Name",
|
||
|
// TODO (ACL-V2) - should we coerce to lowercase?
|
||
|
Lowercase: true,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func rolesTableSchema() *memdb.TableSchema {
|
||
|
return &memdb.TableSchema{
|
||
|
Name: "acl-roles",
|
||
|
Indexes: map[string]*memdb.IndexSchema{
|
||
|
"id": &memdb.IndexSchema{
|
||
|
Name: "id",
|
||
|
AllowMissing: false,
|
||
|
Unique: true,
|
||
|
Indexer: &memdb.UUIDFieldIndex{
|
||
|
Field: "ID",
|
||
|
},
|
||
|
},
|
||
|
"name": &memdb.IndexSchema{
|
||
|
Name: "name",
|
||
|
AllowMissing: false,
|
||
|
Unique: true,
|
||
|
Indexer: &memdb.StringFieldIndex{
|
||
|
Field: "Name",
|
||
|
Lowercase: true,
|
||
|
},
|
||
|
},
|
||
|
"policies": &memdb.IndexSchema{
|
||
|
Name: "policies",
|
||
|
// Need to allow missing for the anonymous token
|
||
|
AllowMissing: true,
|
||
|
Unique: false,
|
||
|
Indexer: &RolePoliciesIndex{},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func bindingRulesTableSchema() *memdb.TableSchema {
|
||
|
return &memdb.TableSchema{
|
||
|
Name: "acl-binding-rules",
|
||
|
Indexes: map[string]*memdb.IndexSchema{
|
||
|
"id": &memdb.IndexSchema{
|
||
|
Name: "id",
|
||
|
AllowMissing: false,
|
||
|
Unique: true,
|
||
|
Indexer: &memdb.UUIDFieldIndex{
|
||
|
Field: "ID",
|
||
|
},
|
||
|
},
|
||
|
"authmethod": &memdb.IndexSchema{
|
||
|
Name: "authmethod",
|
||
|
AllowMissing: false,
|
||
|
Unique: false,
|
||
|
Indexer: &memdb.StringFieldIndex{
|
||
|
Field: "AuthMethod",
|
||
|
Lowercase: true,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func authMethodsTableSchema() *memdb.TableSchema {
|
||
|
return &memdb.TableSchema{
|
||
|
Name: "acl-auth-methods",
|
||
|
Indexes: map[string]*memdb.IndexSchema{
|
||
|
"id": &memdb.IndexSchema{
|
||
|
Name: "id",
|
||
|
AllowMissing: false,
|
||
|
Unique: true,
|
||
|
Indexer: &memdb.StringFieldIndex{
|
||
|
Field: "Name",
|
||
|
Lowercase: true,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
}
|
||
|
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
///// ACL Policy Functions /////
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
|
||
|
func (s *Store) aclPolicyInsert(tx *memdb.Txn, policy *structs.ACLPolicy, updateIndexes bool) error {
|
||
|
if err := tx.Insert("acl-policies", policy); err != nil {
|
||
|
return fmt.Errorf("failed inserting acl policy: %v", err)
|
||
|
}
|
||
|
|
||
|
if updateIndexes {
|
||
|
if err := tx.Insert("index", &IndexEntry{"acl-policies", policy.ModifyIndex}); err != nil {
|
||
|
return fmt.Errorf("failed updating acl policies index: %v", err)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclPolicyGetByID(tx *memdb.Txn, id string, _ *structs.EnterpriseMeta) (<-chan struct{}, interface{}, error) {
|
||
|
return tx.FirstWatch("acl-policies", "id", id)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclPolicyGetByName(tx *memdb.Txn, name string, _ *structs.EnterpriseMeta) (<-chan struct{}, interface{}, error) {
|
||
|
return tx.FirstWatch("acl-policies", "name", name)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclPolicyList(tx *memdb.Txn, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-policies", "id")
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclPolicyDeleteWithPolicy(tx *memdb.Txn, policy *structs.ACLPolicy, idx uint64) error {
|
||
|
// remove the policy
|
||
|
if err := tx.Delete("acl-policies", policy); err != nil {
|
||
|
return fmt.Errorf("failed deleting acl policy: %v", err)
|
||
|
}
|
||
|
|
||
|
// update the overall acl-policies index
|
||
|
if err := tx.Insert("index", &IndexEntry{"acl-policies", idx}); err != nil {
|
||
|
return fmt.Errorf("failed updating acl policies index: %v", err)
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclPolicyMaxIndex(tx *memdb.Txn, _ *structs.ACLPolicy, _ *structs.EnterpriseMeta) uint64 {
|
||
|
return maxIndexTxn(tx, "acl-policies")
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclPolicyUpsertValidateEnterprise(*memdb.Txn, *structs.ACLPolicy, *structs.ACLPolicy) error {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) ACLPolicyUpsertValidateEnterprise(*structs.ACLPolicy, *structs.ACLPolicy) error {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
///// ACL Token Functions /////
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
|
||
|
func (s *Store) aclTokenInsert(tx *memdb.Txn, token *structs.ACLToken, updateIndexes bool) error {
|
||
|
// insert the token into memdb
|
||
|
if err := tx.Insert("acl-tokens", token); err != nil {
|
||
|
return fmt.Errorf("failed inserting acl token: %v", err)
|
||
|
}
|
||
|
|
||
|
if updateIndexes {
|
||
|
// update the overall acl-tokens index
|
||
|
if err := tx.Insert("index", &IndexEntry{"acl-tokens", token.ModifyIndex}); err != nil {
|
||
|
return fmt.Errorf("failed updating acl tokens index: %v", err)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclTokenGetFromIndex(tx *memdb.Txn, id string, index string, entMeta *structs.EnterpriseMeta) (<-chan struct{}, interface{}, error) {
|
||
|
return tx.FirstWatch("acl-tokens", index, id)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclTokenListAll(tx *memdb.Txn, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-tokens", "id")
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclTokenListLocal(tx *memdb.Txn, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-tokens", "local", true)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclTokenListGlobal(tx *memdb.Txn, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-tokens", "local", false)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclTokenListByPolicy(tx *memdb.Txn, policy string, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-tokens", "policies", policy)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclTokenListByRole(tx *memdb.Txn, role string, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-tokens", "roles", role)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclTokenListByAuthMethod(tx *memdb.Txn, authMethod string, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-tokens", "authmethod", authMethod)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclTokenDeleteWithToken(tx *memdb.Txn, token *structs.ACLToken, idx uint64) error {
|
||
|
// remove the token
|
||
|
if err := tx.Delete("acl-tokens", token); err != nil {
|
||
|
return fmt.Errorf("failed deleting acl token: %v", err)
|
||
|
}
|
||
|
|
||
|
// update the overall acl-tokens index
|
||
|
if err := tx.Insert("index", &IndexEntry{"acl-tokens", idx}); err != nil {
|
||
|
return fmt.Errorf("failed updating acl tokens index: %v", err)
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclTokenMaxIndex(tx *memdb.Txn, _ *structs.ACLToken, entMeta *structs.EnterpriseMeta) uint64 {
|
||
|
return maxIndexTxn(tx, "acl-tokens")
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclTokenUpsertValidateEnterprise(tx *memdb.Txn, token *structs.ACLToken, existing *structs.ACLToken) error {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) ACLTokenUpsertValidateEnterprise(token *structs.ACLToken, existing *structs.ACLToken) error {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
///// ACL Role Functions /////
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
|
||
|
func (s *Store) aclRoleInsert(tx *memdb.Txn, role *structs.ACLRole, updateIndexes bool) error {
|
||
|
// insert the role into memdb
|
||
|
if err := tx.Insert("acl-roles", role); err != nil {
|
||
|
return fmt.Errorf("failed inserting acl role: %v", err)
|
||
|
}
|
||
|
|
||
|
if updateIndexes {
|
||
|
// update the overall acl-roles index
|
||
|
if err := tx.Insert("index", &IndexEntry{"acl-roles", role.ModifyIndex}); err != nil {
|
||
|
return fmt.Errorf("failed updating acl roles index: %v", err)
|
||
|
}
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclRoleGetByID(tx *memdb.Txn, id string, _ *structs.EnterpriseMeta) (<-chan struct{}, interface{}, error) {
|
||
|
return tx.FirstWatch("acl-roles", "id", id)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclRoleGetByName(tx *memdb.Txn, name string, _ *structs.EnterpriseMeta) (<-chan struct{}, interface{}, error) {
|
||
|
return tx.FirstWatch("acl-roles", "name", name)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclRoleList(tx *memdb.Txn, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-roles", "id")
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclRoleListByPolicy(tx *memdb.Txn, policy string, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-roles", "policies", policy)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclRoleDeleteWithRole(tx *memdb.Txn, role *structs.ACLRole, idx uint64) error {
|
||
|
// remove the role
|
||
|
if err := tx.Delete("acl-roles", role); err != nil {
|
||
|
return fmt.Errorf("failed deleting acl role: %v", err)
|
||
|
}
|
||
|
|
||
|
// update the overall acl-roles index
|
||
|
if err := tx.Insert("index", &IndexEntry{"acl-roles", idx}); err != nil {
|
||
|
return fmt.Errorf("failed updating acl policies index: %v", err)
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclRoleMaxIndex(tx *memdb.Txn, _ *structs.ACLRole, _ *structs.EnterpriseMeta) uint64 {
|
||
|
return maxIndexTxn(tx, "acl-roles")
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclRoleUpsertValidateEnterprise(tx *memdb.Txn, role *structs.ACLRole, existing *structs.ACLRole) error {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) ACLRoleUpsertValidateEnterprise(role *structs.ACLRole, existing *structs.ACLRole) error {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
///// ACL Binding Rule Functions /////
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
|
||
|
func (s *Store) aclBindingRuleInsert(tx *memdb.Txn, rule *structs.ACLBindingRule, updateIndexes bool) error {
|
||
|
// insert the role into memdb
|
||
|
if err := tx.Insert("acl-binding-rules", rule); err != nil {
|
||
|
return fmt.Errorf("failed inserting acl role: %v", err)
|
||
|
}
|
||
|
|
||
|
if updateIndexes {
|
||
|
// update the overall acl-binding-rules index
|
||
|
if err := tx.Insert("index", &IndexEntry{"acl-binding-rules", rule.ModifyIndex}); err != nil {
|
||
|
return fmt.Errorf("failed updating acl binding-rules index: %v", err)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclBindingRuleGetByID(tx *memdb.Txn, id string, _ *structs.EnterpriseMeta) (<-chan struct{}, interface{}, error) {
|
||
|
return tx.FirstWatch("acl-binding-rules", "id", id)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclBindingRuleList(tx *memdb.Txn, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-binding-rules", "id")
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclBindingRuleListByAuthMethod(tx *memdb.Txn, method string, _ *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-binding-rules", "authmethod", method)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclBindingRuleDeleteWithRule(tx *memdb.Txn, rule *structs.ACLBindingRule, idx uint64) error {
|
||
|
// remove the rule
|
||
|
if err := tx.Delete("acl-binding-rules", rule); err != nil {
|
||
|
return fmt.Errorf("failed deleting acl binding rule: %v", err)
|
||
|
}
|
||
|
|
||
|
// update the overall acl-binding-rules index
|
||
|
if err := tx.Insert("index", &IndexEntry{"acl-binding-rules", idx}); err != nil {
|
||
|
return fmt.Errorf("failed updating acl binding rules index: %v", err)
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclBindingRuleMaxIndex(tx *memdb.Txn, _ *structs.ACLBindingRule, entMeta *structs.EnterpriseMeta) uint64 {
|
||
|
return maxIndexTxn(tx, "acl-binding-rules")
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclBindingRuleUpsertValidateEnterprise(tx *memdb.Txn, rule *structs.ACLBindingRule, existing *structs.ACLBindingRule) error {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) ACLBindingRuleUpsertValidateEnterprise(rule *structs.ACLBindingRule, existing *structs.ACLBindingRule) error {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
///// ACL Auth Method Functions /////
|
||
|
///////////////////////////////////////////////////////////////////////////////
|
||
|
|
||
|
func (s *Store) aclAuthMethodInsert(tx *memdb.Txn, method *structs.ACLAuthMethod, updateIndexes bool) error {
|
||
|
// insert the role into memdb
|
||
|
if err := tx.Insert("acl-auth-methods", method); err != nil {
|
||
|
return fmt.Errorf("failed inserting acl role: %v", err)
|
||
|
}
|
||
|
|
||
|
if updateIndexes {
|
||
|
// update the overall acl-auth-methods index
|
||
|
if err := tx.Insert("index", &IndexEntry{"acl-auth-methods", method.ModifyIndex}); err != nil {
|
||
|
return fmt.Errorf("failed updating acl auth methods index: %v", err)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclAuthMethodGetByName(tx *memdb.Txn, method string, _ *structs.EnterpriseMeta) (<-chan struct{}, interface{}, error) {
|
||
|
return tx.FirstWatch("acl-auth-methods", "id", method)
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclAuthMethodList(tx *memdb.Txn, entMeta *structs.EnterpriseMeta) (memdb.ResultIterator, error) {
|
||
|
return tx.Get("acl-auth-methods", "id")
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclAuthMethodDeleteWithMethod(tx *memdb.Txn, method *structs.ACLAuthMethod, idx uint64) error {
|
||
|
// remove the method
|
||
|
if err := tx.Delete("acl-auth-methods", method); err != nil {
|
||
|
return fmt.Errorf("failed deleting acl auth method: %v", err)
|
||
|
}
|
||
|
|
||
|
// update the overall acl-auth-methods index
|
||
|
if err := tx.Insert("index", &IndexEntry{"acl-auth-methods", idx}); err != nil {
|
||
|
return fmt.Errorf("failed updating acl auth methods index: %v", err)
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclAuthMethodMaxIndex(tx *memdb.Txn, _ *structs.ACLAuthMethod, entMeta *structs.EnterpriseMeta) uint64 {
|
||
|
return maxIndexTxn(tx, "acl-auth-methods")
|
||
|
}
|
||
|
|
||
|
func (s *Store) aclAuthMethodUpsertValidateEnterprise(tx *memdb.Txn, method *structs.ACLAuthMethod, existing *structs.ACLAuthMethod) error {
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func (s *Store) ACLAuthMethodUpsertValidateEnterprise(method *structs.ACLAuthMethod, existing *structs.ACLAuthMethod) error {
|
||
|
return nil
|
||
|
}
|