dd0e8eec14
* copyright headers for agent folder * Ignore test data files * fix proto files and remove headers in agent/uiserver folder * ignore deep-copy files
79 lines
2.4 KiB
Go
79 lines
2.4 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
//go:build !consulent
|
|
// +build !consulent
|
|
|
|
package state
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/go-memdb"
|
|
|
|
"github.com/hashicorp/consul/acl"
|
|
"github.com/hashicorp/consul/agent/configentry"
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
)
|
|
|
|
func indexFromConfigEntryKindName(arg interface{}) ([]byte, error) {
|
|
var b indexBuilder
|
|
|
|
switch n := arg.(type) {
|
|
case *acl.EnterpriseMeta:
|
|
return nil, nil
|
|
case acl.EnterpriseMeta:
|
|
return b.Bytes(), nil
|
|
case ConfigEntryKindQuery:
|
|
b.String(strings.ToLower(n.Kind))
|
|
return b.Bytes(), nil
|
|
case configentry.KindName:
|
|
b.String(strings.ToLower(n.Kind))
|
|
b.String(strings.ToLower(n.Name))
|
|
return b.Bytes(), nil
|
|
}
|
|
|
|
return nil, fmt.Errorf("invalid type for ConfigEntryKindName query: %T", arg)
|
|
}
|
|
|
|
func validateConfigEntryEnterprise(_ ReadTxn, _ structs.ConfigEntry) error {
|
|
return nil
|
|
}
|
|
|
|
func getAllConfigEntriesWithTxn(tx ReadTxn, _ *acl.EnterpriseMeta) (memdb.ResultIterator, error) {
|
|
return tx.Get(tableConfigEntries, indexID)
|
|
}
|
|
|
|
func getAllConfigEntriesByKindWithTxn(tx ReadTxn, kind string) (memdb.ResultIterator, error) {
|
|
return getConfigEntryKindsWithTxn(tx, kind, nil)
|
|
}
|
|
|
|
func getConfigEntryKindsWithTxn(tx ReadTxn, kind string, _ *acl.EnterpriseMeta) (memdb.ResultIterator, error) {
|
|
return tx.Get(tableConfigEntries, indexID+"_prefix", ConfigEntryKindQuery{Kind: kind})
|
|
}
|
|
|
|
func configIntentionsConvertToList(iter memdb.ResultIterator, _ *acl.EnterpriseMeta) structs.Intentions {
|
|
var results structs.Intentions
|
|
for v := iter.Next(); v != nil; v = iter.Next() {
|
|
entry := v.(*structs.ServiceIntentionsConfigEntry)
|
|
for _, src := range entry.Sources {
|
|
results = append(results, entry.ToIntention(src))
|
|
}
|
|
}
|
|
return results
|
|
}
|
|
|
|
// getExportedServicesMatchServicesNames returns a list of service names that are considered matches when
|
|
// found in a list of exported-services config entries. For OSS, namespace is not considered, so a match is one of:
|
|
// - the service name matches
|
|
// - the service name is a wildcard
|
|
//
|
|
// This value can be used to filter exported-services config entries for a given service name.
|
|
func getExportedServicesMatchServiceNames(serviceName string, entMeta *acl.EnterpriseMeta) []structs.ServiceName {
|
|
return []structs.ServiceName{
|
|
structs.NewServiceName(serviceName, entMeta),
|
|
structs.NewServiceName(structs.WildcardSpecifier, entMeta),
|
|
}
|
|
}
|