2018-09-18 03:03:00 +00:00
|
|
|
// +build !enterprise
|
|
|
|
|
|
|
|
package vault
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
|
|
|
|
"github.com/hashicorp/vault/helper/namespace"
|
2019-04-12 21:54:35 +00:00
|
|
|
"github.com/hashicorp/vault/sdk/logical"
|
2018-09-18 03:03:00 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type entPolicyStore struct{}
|
|
|
|
|
|
|
|
func (ps *PolicyStore) extraInit() {
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ps *PolicyStore) loadNamespacePolicies(context.Context, *Core) error { return nil }
|
|
|
|
|
|
|
|
func (ps *PolicyStore) getACLView(*namespace.Namespace) *BarrierView {
|
|
|
|
return ps.aclView
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ps *PolicyStore) getRGPView(ns *namespace.Namespace) *BarrierView {
|
|
|
|
return ps.rgpView
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ps *PolicyStore) getEGPView(ns *namespace.Namespace) *BarrierView {
|
|
|
|
return ps.egpView
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ps *PolicyStore) getBarrierView(ns *namespace.Namespace, _ PolicyType) *BarrierView {
|
|
|
|
return ps.getACLView(ns)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ps *PolicyStore) handleSentinelPolicy(context.Context, *Policy, *BarrierView, *logical.StorageEntry) error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ps *PolicyStore) parseEGPPaths(*Policy) error { return nil }
|
|
|
|
|
|
|
|
func (ps *PolicyStore) invalidateEGPTreePath(string) {}
|
|
|
|
|
|
|
|
func (ps *PolicyStore) pathsToEGPPaths(*Policy) ([]*egpPath, error) { return nil, nil }
|
|
|
|
|
|
|
|
func (ps *PolicyStore) loadACLPolicyNamespaces(ctx context.Context, policyName, policyText string) error {
|
|
|
|
return ps.loadACLPolicyInternal(namespace.RootContext(ctx), policyName, policyText)
|
|
|
|
}
|