// +build !consulent package agent import ( "fmt" "net/http" "strings" "github.com/hashicorp/consul/agent/structs" ) func (s *HTTPServer) parseEntMeta(req *http.Request, entMeta *structs.EnterpriseMeta) error { if headerNS := req.Header.Get("X-Consul-Namespace"); headerNS != "" { return BadRequestError{Reason: "Invalid header: \"X-Consul-Namespace\" - Namespaces is a Consul Enterprise feature"} } if queryNS := req.URL.Query().Get("ns"); queryNS != "" { return BadRequestError{Reason: "Invalid query parameter: \"ns\" - Namespaces is a Consul Enterprise feature"} } return nil } func (s *HTTPServer) parseEntMetaNoWildcard(req *http.Request, _ *structs.EnterpriseMeta) error { return s.parseEntMeta(req, nil) } func (s *HTTPServer) rewordUnknownEnterpriseFieldError(err error) error { if err == nil { return nil } msg := err.Error() if strings.Contains(msg, "json: unknown field ") { quotedField := strings.TrimPrefix(msg, "json: unknown field ") switch quotedField { case `"Namespace"`: return fmt.Errorf("%v - Namespaces is a Consul Enterprise feature", err) } } return err } func (s *HTTPServer) addEnterpriseHTMLTemplateVars(vars map[string]interface{}) {} func parseACLAuthMethodEnterpriseMeta(req *http.Request, _ *structs.ACLAuthMethodEnterpriseMeta) error { if methodNS := req.URL.Query().Get("authmethod-ns"); methodNS != "" { return BadRequestError{Reason: "Invalid query parameter: \"authmethod-ns\" - Namespaces is a Consul Enterprise feature"} } return nil } // auditReq is a noop stub for the corresponding func in http_ent.go func (s *HTTPServer) auditReq(req *http.Request) interface{} { // note(kit): We return an nil here so we can pass it to auditResp. Auditing the response requires the // request object for context, so we have it pass it even when it's disabled return nil } // auditResp is a noop stub for the corresponding func in http_ent.go func (s *HTTPServer) auditResp(reqPayload interface{}, httpCode int) { }