2018-10-19 16:04:07 +00:00
|
|
|
package consul
|
|
|
|
|
|
|
|
import (
|
|
|
|
"github.com/hashicorp/consul/acl"
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
|
|
)
|
|
|
|
|
|
|
|
var clientACLCacheConfig *structs.ACLCachesConfig = &structs.ACLCachesConfig{
|
|
|
|
// The ACL cache configuration on client agents is more conservative than
|
|
|
|
// on the servers. It is assumed that individual client agents will have
|
|
|
|
// fewer distinct identities accessing the client than a server would
|
|
|
|
// and thus can put smaller limits on the amount of ACL caching done.
|
|
|
|
//
|
|
|
|
// Identities - number of identities/acl tokens that can be cached
|
|
|
|
Identities: 1024,
|
|
|
|
// Policies - number of unparsed ACL policies that can be cached
|
|
|
|
Policies: 128,
|
|
|
|
// ParsedPolicies - number of parsed ACL policies that can be cached
|
|
|
|
ParsedPolicies: 128,
|
|
|
|
// Authorizers - number of compiled multi-policy effective policies that can be cached
|
|
|
|
Authorizers: 256,
|
2019-04-15 20:43:19 +00:00
|
|
|
// Roles - number of ACL roles that can be cached
|
|
|
|
Roles: 128,
|
2018-10-19 16:04:07 +00:00
|
|
|
}
|
|
|
|
|
2021-10-04 22:54:49 +00:00
|
|
|
func (c *Client) ACLDatacenter() string {
|
2021-10-25 20:09:52 +00:00
|
|
|
// For resolution running on clients, servers within the current datacenter
|
2021-10-04 22:54:49 +00:00
|
|
|
// must be queried first to pick up local tokens.
|
2018-10-19 16:04:07 +00:00
|
|
|
return c.config.Datacenter
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Client) ResolveIdentityFromToken(token string) (bool, structs.ACLIdentity, error) {
|
|
|
|
// clients do no local identity resolution at the moment
|
|
|
|
return false, nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Client) ResolvePolicyFromID(policyID string) (bool, *structs.ACLPolicy, error) {
|
|
|
|
// clients do no local policy resolution at the moment
|
|
|
|
return false, nil, nil
|
|
|
|
}
|
|
|
|
|
2019-04-15 20:43:19 +00:00
|
|
|
func (c *Client) ResolveRoleFromID(roleID string) (bool, *structs.ACLRole, error) {
|
|
|
|
// clients do no local role resolution at the moment
|
|
|
|
return false, nil, nil
|
|
|
|
}
|
|
|
|
|
2020-05-13 17:00:08 +00:00
|
|
|
func (c *Client) ResolveTokenToIdentity(token string) (structs.ACLIdentity, error) {
|
|
|
|
// not using ResolveTokenToIdentityAndAuthorizer because in this case we don't
|
|
|
|
// need to resolve the roles, policies and namespace but just want the identity
|
|
|
|
// information such as accessor id.
|
|
|
|
return c.acls.ResolveTokenToIdentity(token)
|
|
|
|
}
|
|
|
|
|
2021-07-30 22:05:33 +00:00
|
|
|
// TODO: Server has an identical implementation, remove duplication
|
2019-12-18 18:46:53 +00:00
|
|
|
func (c *Client) ResolveTokenAndDefaultMeta(token string, entMeta *structs.EnterpriseMeta, authzContext *acl.AuthorizerContext) (acl.Authorizer, error) {
|
|
|
|
identity, authz, err := c.acls.ResolveTokenToIdentityAndAuthorizer(token)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Default the EnterpriseMeta based on the Tokens meta or actual defaults
|
|
|
|
// in the case of unknown identity
|
|
|
|
if identity != nil {
|
|
|
|
entMeta.Merge(identity.EnterpriseMetadata())
|
|
|
|
} else {
|
2021-07-22 18:20:45 +00:00
|
|
|
entMeta.Merge(structs.DefaultEnterpriseMetaInDefaultPartition())
|
2019-12-18 18:46:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Use the meta to fill in the ACL authorization context
|
|
|
|
entMeta.FillAuthzContext(authzContext)
|
|
|
|
|
|
|
|
return authz, err
|
|
|
|
}
|