// Copyright (c) HashiCorp, Inc. // SPDX-License-Identifier: BUSL-1.1 package sprawl import ( "fmt" "github.com/hashicorp/consul/api" "github.com/hashicorp/consul/testing/deployer/topology" ) func policyForCrossNamespaceRead(partition string) *api.ACLPolicy { return &api.ACLPolicy{ Name: "cross-ns-catalog-read", Description: "cross-ns-catalog-read", Partition: partition, Rules: fmt.Sprintf(` partition %[1]q { namespace_prefix "" { node_prefix "" { policy = "read" } service_prefix "" { policy = "read" } } } `, partition), } } const anonymousTokenAccessorID = "00000000-0000-0000-0000-000000000002" func anonymousToken() *api.ACLToken { return &api.ACLToken{ AccessorID: anonymousTokenAccessorID, // SecretID: "anonymous", Description: "anonymous", Local: false, Policies: []*api.ACLTokenPolicyLink{ { Name: "anonymous", }, }, } } func anonymousPolicy(enterprise bool) *api.ACLPolicy { p := &api.ACLPolicy{ Name: "anonymous", Description: "anonymous", } if enterprise { p.Rules = ` partition_prefix "" { namespace_prefix "" { node_prefix "" { policy = "read" } service_prefix "" { policy = "read" } } } ` } else { p.Rules = ` node_prefix "" { policy = "read" } service_prefix "" { policy = "read" } ` } return p } func tokenForNode(node *topology.Node, enterprise bool) *api.ACLToken { nid := node.ID() tokenName := "agent--" + nid.ACLString() token := &api.ACLToken{ Description: tokenName, Local: false, NodeIdentities: []*api.ACLNodeIdentity{{ NodeName: node.PodName(), Datacenter: node.Datacenter, }}, } if enterprise { token.Partition = node.Partition token.Namespace = "default" } return token } // Deprecated: tokenForWorkload func tokenForService(wrk *topology.Workload, overridePolicy *api.ACLPolicy, enterprise bool) *api.ACLToken { return tokenForWorkload(wrk, overridePolicy, enterprise) } func tokenForWorkload(wrk *topology.Workload, overridePolicy *api.ACLPolicy, enterprise bool) *api.ACLToken { token := &api.ACLToken{ Description: "service--" + wrk.ID.ACLString(), Local: false, } if overridePolicy != nil { token.Policies = []*api.ACLTokenPolicyLink{{ID: overridePolicy.ID}} } else { token.ServiceIdentities = []*api.ACLServiceIdentity{{ ServiceName: wrk.ID.Name, }} } if enterprise { token.Namespace = wrk.ID.Namespace token.Partition = wrk.ID.Partition } return token } const ( meshGatewayCommunityRules = ` service "mesh-gateway" { policy = "write" } service_prefix "" { policy = "read" } node_prefix "" { policy = "read" } agent_prefix "" { policy = "read" } # for peering mesh = "write" peering = "read" ` meshGatewayEntDefaultRules = ` namespace_prefix "" { service "mesh-gateway" { policy = "write" } service_prefix "" { policy = "read" } node_prefix "" { policy = "read" } } agent_prefix "" { policy = "read" } # for peering mesh = "write" partition_prefix "" { peering = "read" } ` meshGatewayEntNonDefaultRules = ` namespace_prefix "" { service "mesh-gateway" { policy = "write" } service_prefix "" { policy = "read" } node_prefix "" { policy = "read" } } agent_prefix "" { policy = "read" } # for peering mesh = "write" ` ) func policyForMeshGateway(wrk *topology.Workload, enterprise bool) *api.ACLPolicy { policyName := "mesh-gateway--" + wrk.ID.ACLString() policy := &api.ACLPolicy{ Name: policyName, Description: policyName, } if enterprise { policy.Partition = wrk.ID.Partition policy.Namespace = "default" } if enterprise { if wrk.ID.Partition == "default" { policy.Rules = meshGatewayEntDefaultRules } else { policy.Rules = meshGatewayEntNonDefaultRules } } else { policy.Rules = meshGatewayCommunityRules } return policy }