-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Service Discovery ACLs #1024
Service Discovery ACLs #1024
Conversation
@@ -126,7 +126,7 @@ func (c *Catalog) ListNodes(args *structs.DCSpecificRequest, reply *structs.Inde | |||
state.QueryTables("Nodes"), | |||
func() error { | |||
reply.Index, reply.Nodes = state.Nodes() | |||
return nil | |||
return c.srv.filterACL(args.Token, reply) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do nodes need to be filtered?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh probably not, haha good catch.
Minor comments, but LGTM! 💪 👍 |
|
||
case *structs.IndexedNodeDump: | ||
filt.filterNodeDump(&v.Dump) | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This seems like the kind of thing that should freak out if a new type is encountered (we could add case
clauses for ones that we explicitly don't care to filter).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah yeah, like a default: panic
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems reasonable, will add that in!
0c5191c
to
389f892
Compare
… is offline (hashicorp#1024) * Fail scheduling all pods that are not part of consul when the webhook is unhealthy. Co-authored-by: Iryna Shustava <[email protected]>
Implements a filter on top of the state store to allow restricting read access to services. This allows issuing tokens which can only see services they have explicit permissions to read. The documentation is purposely left kind of half-complete so that we can polish it off after the DNS side of this is more complete, but we can tackle that in a separate PR.