open-consul/agent/connect
Matt Keeler baa89c7c65
Intentions ACL enforcement updates (#7028)
* Renamed structs.IntentionWildcard to structs.WildcardSpecifier

* Refactor ACL Config

Get rid of remnants of enterprise only renaming.

Add a WildcardName field for specifying what string should be used to indicate a wildcard.

* Add wildcard support in the ACL package

For read operations they can call anyAllowed to determine if any read access to the given resource would be granted.

For write operations they can call allAllowed to ensure that write access is granted to everything.

* Make v1/agent/connect/authorize namespace aware

* Update intention ACL enforcement

This also changes how intention:read is granted. Before the Intention.List RPC would allow viewing an intention if the token had intention:read on the destination. However Intention.Match allowed viewing if access was allowed for either the source or dest side. Now Intention.List and Intention.Get fall in line with Intention.Matches previous behavior.

Due to this being done a few different places ACL enforcement for a singular intention is now done with the CanRead and CanWrite methods on the intention itself.

* Refactor Intention.Apply to make things easier to follow.
2020-01-13 15:51:40 -05:00
..
ca connect: derive connect certificate serial numbers from a memdb index instead of the provider table max index (#7011) 2020-01-09 16:32:19 +01:00
common_names.go connect: Add AWS PCA provider (#6795) 2019-11-21 17:40:29 +00:00
csr.go
generate.go
generate_test.go
parsing.go
sni.go
sni_test.go
testing_ca.go
testing_ca_test.go
testing_spiffe.go
uri.go
uri_agent.go
uri_agent_test.go
uri_service.go Intentions ACL enforcement updates (#7028) 2020-01-13 15:51:40 -05:00
uri_service_test.go Intentions ACL enforcement updates (#7028) 2020-01-13 15:51:40 -05:00
uri_signing.go
uri_signing_test.go
uri_test.go