a5283e4361
Once a peering is marked for deletion a new leader routine will now clean up all imported resources and then the peering itself. A lot of the logic was grabbed from the namespace/partitions deferred deletions but with a handful of simplifications: - The rate limiting is not configurable. - Deleting imported nodes/services/checks is done by deleting nodes with the Txn API. The services and checks are deleted as a side-effect. - There is no "round rate limiter" like with namespaces and partitions. This is because peerings are purely local, and deleting a peering in the datacenter does not depend on deleting data from other DCs like with WAN-federated namespaces. All rate limiting is handled by the Raft rate limiter.
122 lines
2.7 KiB
Go
122 lines
2.7 KiB
Go
//go:build !consulent
|
|
// +build !consulent
|
|
|
|
package consul
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"net"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/go-version"
|
|
"github.com/hashicorp/serf/serf"
|
|
|
|
"github.com/hashicorp/consul/acl"
|
|
"github.com/hashicorp/consul/agent/pool"
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
)
|
|
|
|
var (
|
|
// minMultiDCConnectVersion is the minimum version in order to support multi-DC Connect
|
|
// features.
|
|
minMultiDCConnectVersion = version.Must(version.NewVersion("1.6.0"))
|
|
)
|
|
|
|
type EnterpriseServer struct{}
|
|
|
|
func (s *Server) initEnterprise(_ Deps) error {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) startEnterprise() error {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) handleEnterpriseUserEvents(event serf.UserEvent) bool {
|
|
return false
|
|
}
|
|
|
|
func (s *Server) handleEnterpriseRPCConn(rtype pool.RPCType, conn net.Conn, isTLS bool) bool {
|
|
return false
|
|
}
|
|
|
|
func (s *Server) handleEnterpriseNativeTLSConn(alpnProto string, conn net.Conn) bool {
|
|
return false
|
|
}
|
|
|
|
func (s *Server) handleEnterpriseLeave() {
|
|
return
|
|
}
|
|
|
|
func (s *Server) establishEnterpriseLeadership(_ context.Context) error {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) revokeEnterpriseLeadership() error {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) startTenancyDeferredDeletion(ctx context.Context) {
|
|
}
|
|
|
|
func (s *Server) stopTenancyDeferredDeletion() {
|
|
}
|
|
|
|
func (s *Server) validateEnterpriseRequest(entMeta *acl.EnterpriseMeta, write bool) error {
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) validateEnterpriseIntentionPartition(partition string) error {
|
|
if partition == "" {
|
|
return nil
|
|
} else if strings.ToLower(partition) == "default" {
|
|
return nil
|
|
}
|
|
|
|
// No special handling for wildcard partitions as they are pointless in OSS.
|
|
|
|
return errors.New("Partitions is a Consul Enterprise feature")
|
|
}
|
|
|
|
func (s *Server) validateEnterpriseIntentionNamespace(ns string, _ bool) error {
|
|
if ns == "" {
|
|
return nil
|
|
} else if strings.ToLower(ns) == structs.IntentionDefaultNamespace {
|
|
return nil
|
|
}
|
|
|
|
// No special handling for wildcard namespaces as they are pointless in OSS.
|
|
|
|
return errors.New("Namespaces is a Consul Enterprise feature")
|
|
}
|
|
|
|
// setupSerfLAN is used to setup and initialize a Serf for the LAN
|
|
func (s *Server) setupSerfLAN(config *Config) error {
|
|
var err error
|
|
// Initialize the LAN Serf for the default network segment.
|
|
s.serfLAN, _, err = s.setupSerf(setupSerfOptions{
|
|
Config: config.SerfLANConfig,
|
|
EventCh: s.eventChLAN,
|
|
SnapshotPath: serfLANSnapshot,
|
|
Listener: s.Listener,
|
|
WAN: false,
|
|
Segment: "",
|
|
Partition: "",
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (s *Server) shutdownSerfLAN() {
|
|
if s.serfLAN != nil {
|
|
s.serfLAN.Shutdown()
|
|
}
|
|
}
|
|
|
|
func addEnterpriseSerfTags(_ map[string]string, _ *acl.EnterpriseMeta) {
|
|
// do nothing
|
|
}
|