72a515f5ec
Highlights: - add new endpoint to query for intentions by exact match - using this endpoint from the CLI instead of the dump+filter approach - enforcing that OSS can only read/write intentions with a SourceNS or DestinationNS field of "default". - preexisting OSS intentions with now-invalid namespace fields will delete those intentions on initial election or for wildcard namespaces an attempt will be made to downgrade them to "default" unless one exists. - also allow the '-namespace' CLI arg on all of the intention subcommands - update lots of docs
85 lines
1.9 KiB
Go
85 lines
1.9 KiB
Go
// +build !consulent
|
|
|
|
package consul
|
|
|
|
import (
|
|
"errors"
|
|
"net"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/consul/agent/pool"
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
"github.com/hashicorp/go-version"
|
|
"github.com/hashicorp/serf/serf"
|
|
)
|
|
|
|
var (
|
|
// minMultiDCConnectVersion is the minimum version in order to support multi-DC Connect
|
|
// features.
|
|
minMultiDCConnectVersion = version.Must(version.NewVersion("1.6.0"))
|
|
)
|
|
|
|
type EnterpriseServer struct{}
|
|
|
|
func (s *Server) initEnterprise() error {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) startEnterprise() error {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) handleEnterpriseUserEvents(event serf.UserEvent) bool {
|
|
return false
|
|
}
|
|
|
|
func (s *Server) handleEnterpriseRPCConn(rtype pool.RPCType, conn net.Conn, isTLS bool) bool {
|
|
return false
|
|
}
|
|
|
|
func (s *Server) handleEnterpriseNativeTLSConn(alpnProto string, conn net.Conn) bool {
|
|
return false
|
|
}
|
|
|
|
func (s *Server) handleEnterpriseLeave() {
|
|
return
|
|
}
|
|
|
|
func (s *Server) enterpriseStats() map[string]map[string]string {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) establishEnterpriseLeadership() error {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) revokeEnterpriseLeadership() error {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) validateEnterpriseRequest(entMeta *structs.EnterpriseMeta, write bool) error {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) validateEnterpriseIntentionNamespace(ns string, _ bool) error {
|
|
if ns == "" {
|
|
return nil
|
|
} else if strings.ToLower(ns) == structs.IntentionDefaultNamespace {
|
|
return nil
|
|
}
|
|
|
|
// No special handling for wildcard namespaces as they are pointless in OSS.
|
|
|
|
return errors.New("Namespaces is a Consul Enterprise feature")
|
|
}
|
|
|
|
func (_ *Server) addEnterpriseSerfTags(_ map[string]string) {
|
|
// do nothing
|
|
}
|
|
|
|
// updateEnterpriseSerfTags in enterprise will update any instances of Serf with the tag that
|
|
// are not the normal LAN or WAN serf instances (network segments and network areas)
|
|
func (_ *Server) updateEnterpriseSerfTags(_, _ string) {
|
|
// do nothing
|
|
}
|