2023-03-28 18:39:22 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
2021-11-16 18:04:01 +00:00
|
|
|
//go:build !consulent
|
2019-12-10 02:26:41 +00:00
|
|
|
// +build !consulent
|
|
|
|
|
|
|
|
package config
|
|
|
|
|
2020-04-28 13:45:33 +00:00
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
)
|
|
|
|
|
2020-11-20 22:43:32 +00:00
|
|
|
// validateEnterpriseConfig is a function to validate the enterprise specific
|
|
|
|
// configuration items after Parsing but before merging into the overall
|
|
|
|
// configuration. The original intent is to use it to ensure that we warn
|
|
|
|
// for enterprise configurations used in OSS.
|
|
|
|
func validateEnterpriseConfigKeys(config *Config) []error {
|
|
|
|
var result []error
|
|
|
|
add := func(k string) {
|
|
|
|
result = append(result, enterpriseConfigKeyError{key: k})
|
2020-04-28 13:45:33 +00:00
|
|
|
}
|
2020-11-20 22:43:32 +00:00
|
|
|
|
|
|
|
if config.ReadReplica != nil {
|
|
|
|
add(`read_replica (or the deprecated non_voting_server)`)
|
|
|
|
}
|
|
|
|
if stringVal(config.SegmentName) != "" {
|
|
|
|
add("segment")
|
|
|
|
}
|
|
|
|
if len(config.Segments) > 0 {
|
|
|
|
add("segments")
|
|
|
|
}
|
2021-07-08 15:03:38 +00:00
|
|
|
if stringVal(config.Partition) != "" {
|
|
|
|
add("partition")
|
|
|
|
}
|
2020-11-20 22:43:32 +00:00
|
|
|
if stringVal(config.Autopilot.RedundancyZoneTag) != "" {
|
|
|
|
add("autopilot.redundancy_zone_tag")
|
|
|
|
}
|
|
|
|
if stringVal(config.Autopilot.UpgradeVersionTag) != "" {
|
|
|
|
add("autopilot.upgrade_version_tag")
|
|
|
|
}
|
|
|
|
if config.Autopilot.DisableUpgradeMigration != nil {
|
|
|
|
add("autopilot.disable_upgrade_migration")
|
|
|
|
}
|
|
|
|
if config.DNS.PreferNamespace != nil {
|
|
|
|
add("dns_config.prefer_namespace")
|
|
|
|
config.DNS.PreferNamespace = nil
|
|
|
|
}
|
|
|
|
if config.ACL.MSPDisableBootstrap != nil {
|
|
|
|
add("acl.msp_disable_bootstrap")
|
|
|
|
config.ACL.MSPDisableBootstrap = nil
|
|
|
|
}
|
|
|
|
if len(config.ACL.Tokens.ManagedServiceProvider) > 0 {
|
|
|
|
add("acl.tokens.managed_service_provider")
|
|
|
|
config.ACL.Tokens.ManagedServiceProvider = nil
|
|
|
|
}
|
2021-05-06 21:09:18 +00:00
|
|
|
if boolVal(config.Audit.Enabled) || len(config.Audit.Sinks) > 0 {
|
2020-11-20 22:43:32 +00:00
|
|
|
add("audit")
|
|
|
|
}
|
2021-05-10 14:10:39 +00:00
|
|
|
if config.LicensePath != nil {
|
|
|
|
add("license_path")
|
|
|
|
config.LicensePath = nil
|
|
|
|
}
|
2020-11-20 22:43:32 +00:00
|
|
|
|
|
|
|
return result
|
|
|
|
}
|
2020-04-28 13:45:33 +00:00
|
|
|
|
|
|
|
type enterpriseConfigKeyError struct {
|
|
|
|
key string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e enterpriseConfigKeyError) Error() string {
|
|
|
|
return fmt.Sprintf("%q is a Consul Enterprise configuration and will have no effect", e.key)
|
|
|
|
}
|
|
|
|
|
2020-12-21 18:55:53 +00:00
|
|
|
func (*builder) BuildEnterpriseRuntimeConfig(_ *RuntimeConfig, _ *Config) error {
|
2020-08-27 17:15:10 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-12-21 18:55:53 +00:00
|
|
|
func (*builder) validateEnterpriseConfig(_ RuntimeConfig) error {
|
2020-08-27 17:15:10 +00:00
|
|
|
return nil
|
2019-12-10 02:26:41 +00:00
|
|
|
}
|