Documentation ¶
Overview ¶
Package policy describes a generic interface for retrieving policies. Different implementations are possible for environments such as Kubernetes, Mesos or other custom environments. An implementation has to provide a method for retrieving policy based on the metadata associated with the container and deleting the policy when the container dies. It is up to the implementation to decide how to generate the policy. The package also defines the basic data structure for communicating policy information. The implementations are responsible for providing all the necessary data.
Index ¶
- Constants
- func DefaultAcceptLogPrefix(contextID string) string
- func DefaultDroppedPacketLogPrefix(contextID string) string
- func DefaultLogPrefix(contextID string) string
- func EncodedStringToAction(e string) (ActionType, ObserveActionType, error)
- func ErrPUAlreadyActivated(puID string, err error) error
- func ErrPUCreateFailed(puID string, err error) error
- func ErrPUNotFound(puID string, err error) error
- func ErrPUNotUnique(puID string, err error) error
- func ErrPUPolicyEnforcementFailed(puID string, err error) error
- func ErrPUPolicyPending(puID string, err error) error
- func Fnv32Hash(data ...string) (string, error)
- func IsErrPUAlreadyActivated(err error) bool
- func IsErrPUCreateFailed(err error) bool
- func IsErrPUEnforcementFailed(err error) bool
- func IsErrPUNotFound(err error) bool
- func IsErrPUNotUnique(err error) bool
- func IsErrPUPolicyPending(err error) bool
- type ActionType
- type ApplicationService
- type ApplicationServicesList
- type DNSRuleList
- type EnforcerType
- type Error
- type ErrorReason
- type ExtendedMap
- type FlowPolicy
- type HTTPRule
- type IPRule
- type IPRuleList
- type KeyValueOperator
- type ObserveActionType
- type Operator
- type OptionsType
- type PUAction
- type PUInfo
- type PUPolicy
- func (p *PUPolicy) AddIdentityTag(k, v string)
- func (p *PUPolicy) AddReceiverRules(t TagSelector)
- func (p *PUPolicy) AddTransmitterRules(t TagSelector)
- func (p *PUPolicy) Annotations() *TagStore
- func (p *PUPolicy) ApplicationACLs() IPRuleList
- func (p *PUPolicy) Clone() *PUPolicy
- func (p *PUPolicy) CompressedTags() *TagStore
- func (p *PUPolicy) DNSNameACLs() DNSRuleList
- func (p *PUPolicy) DNSProxyPort() string
- func (p *PUPolicy) DependentServices() ApplicationServicesList
- func (p *PUPolicy) EnforcerType() EnforcerType
- func (p *PUPolicy) ExposedServices() ApplicationServicesList
- func (p *PUPolicy) IPAddresses() ExtendedMap
- func (p *PUPolicy) Identity() *TagStore
- func (p *PUPolicy) ManagementID() string
- func (p *PUPolicy) ManagementNamespace() string
- func (p *PUPolicy) NetworkACLs() IPRuleList
- func (p *PUPolicy) ReceiverRules() TagSelectorList
- func (p *PUPolicy) Scopes() []string
- func (p *PUPolicy) ServiceCertificates() (string, string, string)
- func (p *PUPolicy) ServicesListeningPort() string
- func (p *PUPolicy) SetIPAddresses(l ExtendedMap)
- func (p *PUPolicy) SetTriremeAction(action PUAction)
- func (p *PUPolicy) ToPublicPolicy() *PUPolicyPublic
- func (p *PUPolicy) TransmitterRules() TagSelectorList
- func (p *PUPolicy) TriremeAction() PUAction
- func (p *PUPolicy) UpdateDNSNetworks(networks DNSRuleList)
- func (p *PUPolicy) UpdateServiceCertificates(cert, key string)
- type PUPolicyPublic
- type PURuntime
- func (r *PURuntime) Clone() *PURuntime
- func (r *PURuntime) IPAddresses() ExtendedMap
- func (r *PURuntime) MarshalJSON() ([]byte, error)
- func (r *PURuntime) NSPath() string
- func (r *PURuntime) Name() string
- func (r *PURuntime) Options() OptionsType
- func (r *PURuntime) PUType() common.PUType
- func (r *PURuntime) Pid() int
- func (r *PURuntime) PortMap() map[nat.Port][]string
- func (r *PURuntime) SetIPAddresses(ipa ExtendedMap)
- func (r *PURuntime) SetNSPath(nsPath string)
- func (r *PURuntime) SetOptions(options OptionsType)
- func (r *PURuntime) SetPUType(puType common.PUType)
- func (r *PURuntime) SetPid(pid int)
- func (r *PURuntime) SetServices(services []common.Service)
- func (r *PURuntime) SetTags(t *TagStore)
- func (r *PURuntime) Tag(key string) (string, bool)
- func (r *PURuntime) Tags() *TagStore
- func (r *PURuntime) UnmarshalJSON(param []byte) error
- type PURuntimeJSON
- type PingConfig
- type PortProtocolPolicy
- type Resolver
- type RuntimeError
- type RuntimeReader
- type ServiceType
- type TagSelector
- type TagSelectorList
- type TagStore
- type UserAuthorizationTypeValues
Constants ¶
const ( // AllowAll allows everything for the specific PU. AllowAll = 0x1 // Police filters on the PU based on the PolicyRules. Police = 0x2 )
const ( // Equal is the equal operator Equal = "=" // NotEqual is the not equal operator NotEqual = "=!" // KeyExists is the key=* operator KeyExists = "*" // KeyNotExists means that the key doesnt exist in the incoming tags KeyNotExists = "!*" )
const (
// DefaultNamespace is the default namespace for applying policy
DefaultNamespace = "bridge"
)
Variables ¶
This section is empty.
Functions ¶
func DefaultAcceptLogPrefix ¶
DefaultAcceptLogPrefix return the prefix used in nf-log action for default rule.
func DefaultDroppedPacketLogPrefix ¶
DefaultDroppedPacketLogPrefix generates the nflog prefix for packets logged by the catch all default rule
func DefaultLogPrefix ¶
DefaultLogPrefix return the prefix used in nf-log action for default rule.
func EncodedStringToAction ¶
func EncodedStringToAction(e string) (ActionType, ObserveActionType, error)
EncodedStringToAction returns action and observed action from encoded string.
func ErrPUAlreadyActivated ¶
ErrPUAlreadyActivated creates a new PU already activated error
func ErrPUCreateFailed ¶
ErrPUCreateFailed creates a new PU create failed error
func ErrPUNotFound ¶
ErrPUNotFound creates a new context not found error
func ErrPUNotUnique ¶
ErrPUNotUnique creates a new not unique error
func ErrPUPolicyEnforcementFailed ¶
ErrPUPolicyEnforcementFailed creates a new PU policy pending error.
func ErrPUPolicyPending ¶
ErrPUPolicyPending creates a new PU policy pending error.
func IsErrPUAlreadyActivated ¶
IsErrPUAlreadyActivated checks if this error is a PU already activated error
func IsErrPUCreateFailed ¶
IsErrPUCreateFailed checks if this error is a PU not unique error
func IsErrPUEnforcementFailed ¶
IsErrPUEnforcementFailed checks if this error is a PU policy pending error.
func IsErrPUNotFound ¶
IsErrPUNotFound checks if this error is a PU not found error
func IsErrPUNotUnique ¶
IsErrPUNotUnique checks if this error is a PU not unique error
func IsErrPUPolicyPending ¶
IsErrPUPolicyPending checks if this error is a PU policy pending error.
Types ¶
type ActionType ¶
type ActionType byte
ActionType is the action that can be applied to a flow.
const ( // Accept is the accept action Accept ActionType = 0x1 // Reject is the reject action Reject ActionType = 0x2 // Encrypt instructs data to be encrypted Encrypt ActionType = 0x4 // Log instructs the datapath to log the IP addresses Log ActionType = 0x8 // Observe instructs the datapath to observe policy results Observe ActionType = 0x10 )
func (ActionType) Accepted ¶
func (f ActionType) Accepted() bool
Accepted returns if the action mask contains the Accepted mask.
func (ActionType) ActionString ¶
func (f ActionType) ActionString() string
ActionString returns if the action if accepted of rejected as a long string.
func (ActionType) Encrypted ¶
func (f ActionType) Encrypted() bool
Encrypted returns if the action mask contains the Encrypted mask.
func (ActionType) Logged ¶
func (f ActionType) Logged() bool
Logged returns if the action mask contains the Logged mask.
func (ActionType) Observed ¶
func (f ActionType) Observed() bool
Observed returns if the action mask contains the Observed mask.
func (ActionType) Rejected ¶
func (f ActionType) Rejected() bool
Rejected returns if the action mask contains the Rejected mask.
func (ActionType) String ¶
func (f ActionType) String() string
type ApplicationService ¶
type ApplicationService struct { // ID is the id of the service ID string // NetworkInfo provides the network information (addresses/ports) of the service. // This is the public facing network information, or how the service can be // accessed. In the case of Load Balancers for example, this would be the // IP/port of the load balancer. NetworkInfo *common.Service // PrivateNetworkInfo captures the network service definition of an application // as seen by the application. For example the port that the application is // listening to. This is needed in the case of port mappings. PrivateNetworkInfo *common.Service // PrivateTLSListener indicates that the service uses a TLS listener. As a // result we must TLS for traffic send locally in the service. PrivateTLSListener bool // NoTLSExternalService indicates that TLS should not be used for an external // service. This option is used for API calls to local metadata APIs and // should not be used for access to the Internet. NoTLSExternalService bool // PublicNetworkInfo provides the network information where the enforcer // should listen for incoming connections of the service. This can be // different than the PrivateNetworkInfo where the application is listening // and it essentially allows users to create Virtual IPs and Virtual Ports // for the new exposed TLS services. So, if an application is listening // on port 80, users do not need to access the application from external // network through TLS on port 80, that looks weird. They can instead create // a PublicNetworkInfo and have the trireme listen on port 443, while the // application is still listening on port 80. PublicNetworkInfo *common.Service // Type is the type of the service. Type ServiceType // HTTPRules are only valid for HTTP Services and capture the list of APIs // exposed by the service. HTTPRules []*HTTPRule // Tags are the tags of the service. Tags *TagStore // FallbackJWTAuthorizationCert is the certificate that has been used to sign // JWTs if they are not signed by the datapath FallbackJWTAuthorizationCert string // UserAuthorizationType is the type of user authorization that must be used. UserAuthorizationType UserAuthorizationTypeValues // UserAuthorizationHandler is the token handler for validating user tokens. UserAuthorizationHandler usertokens.Verifier // UserTokenToHTTPMappings is a map of mappings between JWT claims arriving in // a user request and outgoing HTTP headers towards an application. It // is used to allow operators to map claims to HTTP headers that downstream // applications can understand. UserTokenToHTTPMappings map[string]string // UserRedirectOnAuthorizationFail is the URL that the user can be redirected // if there is an authorization failure. This allows the display of a custom // message. UserRedirectOnAuthorizationFail string // External indicates if this is an external service. For external services // access control is implemented at the ingress. External bool // CACert is the certificate of the CA of external services. This allows TLS to // work with external services that use private CAs. CACert []byte // AuthToken is the authentication token for any external API service calls. It is // used for example by the secrets proxy. AuthToken string // MutualTLSTrustedRoots is the CA that must be used for mutual TLS authentication. MutualTLSTrustedRoots []byte // PublicServiceCertificate is a publically signed certificate that can be used // by the service to expose TLS to users without a Trireme client PublicServiceCertificate []byte // PublicServiceCertificateKey is the corresponding private key. PublicServiceCertificateKey []byte // PublicServiceNoTLS indicates that TLS will not be enabled in the public application // ports. This is useful for health checks. It should not be used for API access. PublicServiceNoTLS bool }
ApplicationService is the type of service that this PU exposes.
type ApplicationServicesList ¶
type ApplicationServicesList []*ApplicationService
ApplicationServicesList is a list of ApplicationServices.
type DNSRuleList ¶
type DNSRuleList map[string][]PortProtocolPolicy
DNSRuleList is a map from fqdns to a list of policies.
func (DNSRuleList) Copy ¶
func (l DNSRuleList) Copy() DNSRuleList
Copy creates a clone of DNS rule list
type EnforcerType ¶
type EnforcerType int
EnforcerType defines which enforcer type should be selected
const ( // EnforcerMapping lets the default enforcer configuration deal with it EnforcerMapping EnforcerType = iota // EnvoyAuthorizerEnforcer specifically asks for running an envoy enforcer/authorizer EnvoyAuthorizerEnforcer )
func EnforcerTypeFromString ¶
func EnforcerTypeFromString(str string) (EnforcerType, error)
EnforcerTypeFromString parses `str` and tries to convert it to
func (EnforcerType) String ¶
func (t EnforcerType) String() string
String implements the string interface
type Error ¶
type Error struct {
// contains filtered or unexported fields
}
Error is a specific error type for context
type ErrorReason ¶
type ErrorReason string
ErrorReason is the reason for an error
const ( // PUNotFound error reason PUNotFound ErrorReason = "PUNotFound" // PUNotUnique error reason PUNotUnique ErrorReason = "PUNotUnique" // PUCreateFailed error reason PUCreateFailed ErrorReason = "PUCreateFailed" // PUAlreadyActivated error reason PUAlreadyActivated ErrorReason = "PUAlreadyActivated" // PUPolicyPending error reason indicates that policy activation is pending. PUPolicyPending ErrorReason = "PUPolicyPending" // PUPolicyEnforcementFailed error reason indicates that enforcement failed. PUPolicyEnforcementFailed )
type ExtendedMap ¶
ExtendedMap is a common map with additional functions
type FlowPolicy ¶
type FlowPolicy struct { ObserveAction ObserveActionType Action ActionType ServiceID string PolicyID string Labels []string }
FlowPolicy captures the policy for a particular flow
func (*FlowPolicy) EncodedActionString ¶
func (f *FlowPolicy) EncodedActionString() string
EncodedActionString is used to encode observed action as well as action
func (*FlowPolicy) LogPrefix ¶
func (f *FlowPolicy) LogPrefix(contextID string) string
LogPrefix is the prefix used in nf-log action. It must be less than
func (*FlowPolicy) LogPrefixAction ¶
func (f *FlowPolicy) LogPrefixAction(contextID string, action string) string
LogPrefixAction is the prefix used in nf-log action with the given action. NOTE: If 0 or empty action is passed, the default is reject (6).
type HTTPRule ¶
type HTTPRule struct { // URIs is a list of regular expressions that describe the URIs that // a service is exposing. URIs []string // Methods is a list of the allowed verbs for the given list of URIs. Methods []string // ClaimMatchingRules is a list of matching rules associated with this rule. Clients // must present a set of claims that will satisfy these rules. Each rule // is an AND clause. The list of expressions is an OR of the AND clauses. ClaimMatchingRules [][]string // Public indicates that this is a public API and anyone can access it. // No authorization will be performed on public APIs. Public bool // HookMethod indicates that this rule is not for generic proxying but // must first be processed by the hook with the corresponding name. HookMethod string }
HTTPRule holds a rule for a particular HTTPService. The rule relates a set of URIs defined as regular expressions with associated verbs. The * VERB indicates all actions.
type IPRule ¶
type IPRule struct { Addresses []string Ports []string Protocols []string Extensions []string Policy *FlowPolicy }
IPRule holds IP rules to external services
type IPRuleList ¶
type IPRuleList []IPRule
IPRuleList is a list of IP rules
func (IPRuleList) Copy ¶
func (l IPRuleList) Copy() IPRuleList
Copy creates a clone of the IP rule list
type KeyValueOperator ¶
KeyValueOperator describes an individual matching rule
type ObserveActionType ¶
type ObserveActionType byte
ObserveActionType is the action that can be applied to a flow for an observation rule.
const ( // ObserveNone specifies if any observation was made or not. ObserveNone ObserveActionType = 0x0 // ObserveContinue is used to not take any action on packet and is deferred to // an actual rule with accept or deny action. ObserveContinue ObserveActionType = 0x1 // ObserveApply is used to apply action to packets hitting this rule. ObserveApply ObserveActionType = 0x2 )
Observe actions are used in conjunction with action.
func (ObserveActionType) ObserveApply ¶
func (f ObserveActionType) ObserveApply() bool
ObserveApply returns if the action of observation rule is allow.
func (ObserveActionType) ObserveContinue ¶
func (f ObserveActionType) ObserveContinue() bool
ObserveContinue returns if the action of observation rule is continue.
func (ObserveActionType) Observed ¶
func (f ObserveActionType) Observed() bool
Observed returns true if any observed action was found.
func (ObserveActionType) String ¶
func (f ObserveActionType) String() string
type OptionsType ¶
type OptionsType struct { // CgroupName is the name of the cgroup CgroupName string // CgroupMark is the tag of the cgroup CgroupMark string // UserID is the user ID if it exists UserID string // AutoPort option is set if auto port is enabled AutoPort bool // Services is the list of services of interest Services []common.Service // PolicyExtensions is policy resolution extensions PolicyExtensions interface{} // PortMap maps container port -> host ports. PortMap map[nat.Port][]string // ConvertedDockerPU is set when a docker PU is converted to LinuxProcess // in order to implement host network containers. ConvertedDockerPU bool }
OptionsType is a set of options that can be passed with a policy request
type PUAction ¶
type PUAction int
PUAction defines the action types that applies for a specific PU as a whole.
type PUInfo ¶
type PUInfo struct { // ContextID is the ID of the container that the policy applies to ContextID string // Policy is an instantiation of the container policy Policy *PUPolicy // RunTime captures all data that are captured from the container Runtime *PURuntime }
PUInfo captures all policy information related to a connection as well as runtime. It makes passing data around simpler.
type PUPolicy ¶
type PUPolicy struct { // dnsACLs is the list of DNS names and the associated ports that the container is // allowed to talk to outside the data center DNSACLs DNSRuleList sync.Mutex // contains filtered or unexported fields }
PUPolicy captures all policy information related ot the container
func NewPUPolicy ¶
func NewPUPolicy( id string, namespace string, action PUAction, appACLs IPRuleList, netACLs IPRuleList, dnsACLs DNSRuleList, txtags TagSelectorList, rxtags TagSelectorList, identity *TagStore, annotations *TagStore, compressedTags *TagStore, ips ExtendedMap, servicesListeningPort int, dnsProxyPort int, exposedServices ApplicationServicesList, dependentServices ApplicationServicesList, scopes []string, enforcerType EnforcerType, ) *PUPolicy
NewPUPolicy generates a new ContainerPolicyInfo appACLs are the ACLs for packet coming from the Application/PU to the Network. netACLs are the ACLs for packet coming from the Network to the Application/PU.
func NewPUPolicyWithDefaults ¶
func NewPUPolicyWithDefaults() *PUPolicy
NewPUPolicyWithDefaults sets up a PU policy with defaults
func (*PUPolicy) AddIdentityTag ¶
AddIdentityTag adds a policy tag
func (*PUPolicy) AddReceiverRules ¶
func (p *PUPolicy) AddReceiverRules(t TagSelector)
AddReceiverRules adds a receiver rule
func (*PUPolicy) AddTransmitterRules ¶
func (p *PUPolicy) AddTransmitterRules(t TagSelector)
AddTransmitterRules adds a transmitter rule
func (*PUPolicy) Annotations ¶
Annotations returns a copy of the annotations
func (*PUPolicy) ApplicationACLs ¶
func (p *PUPolicy) ApplicationACLs() IPRuleList
ApplicationACLs returns a copy of IPRuleList
func (*PUPolicy) CompressedTags ¶
CompressedTags returns the compressed tags of the policy.
func (*PUPolicy) DNSNameACLs ¶
func (p *PUPolicy) DNSNameACLs() DNSRuleList
DNSNameACLs returns a copy of DNSRuleList
func (*PUPolicy) DNSProxyPort ¶
DNSProxyPort gets the dns proxy port
func (*PUPolicy) DependentServices ¶
func (p *PUPolicy) DependentServices() ApplicationServicesList
DependentServices returns the external services.
func (*PUPolicy) EnforcerType ¶
func (p *PUPolicy) EnforcerType() EnforcerType
EnforcerType returns the enforcer type of the policy.
func (*PUPolicy) ExposedServices ¶
func (p *PUPolicy) ExposedServices() ApplicationServicesList
ExposedServices returns the exposed services
func (*PUPolicy) IPAddresses ¶
func (p *PUPolicy) IPAddresses() ExtendedMap
IPAddresses returns all the IP addresses for the processing unit
func (*PUPolicy) ManagementID ¶
ManagementID returns the management ID
func (*PUPolicy) ManagementNamespace ¶
ManagementNamespace returns the management Namespace
func (*PUPolicy) NetworkACLs ¶
func (p *PUPolicy) NetworkACLs() IPRuleList
NetworkACLs returns a copy of IPRuleList
func (*PUPolicy) ReceiverRules ¶
func (p *PUPolicy) ReceiverRules() TagSelectorList
ReceiverRules returns a copy of TagSelectorList
func (*PUPolicy) ServiceCertificates ¶
ServiceCertificates returns the service certificate.
func (*PUPolicy) ServicesListeningPort ¶
ServicesListeningPort returns the port that should be used by the proxies.
func (*PUPolicy) SetIPAddresses ¶
func (p *PUPolicy) SetIPAddresses(l ExtendedMap)
SetIPAddresses sets the IP addresses for the processing unit
func (*PUPolicy) SetTriremeAction ¶
SetTriremeAction returns the TriremeAction
func (*PUPolicy) ToPublicPolicy ¶
func (p *PUPolicy) ToPublicPolicy() *PUPolicyPublic
ToPublicPolicy converts the object to a marshallable object.
func (*PUPolicy) TransmitterRules ¶
func (p *PUPolicy) TransmitterRules() TagSelectorList
TransmitterRules returns a copy of TagSelectorList
func (*PUPolicy) TriremeAction ¶
TriremeAction returns the TriremeAction
func (*PUPolicy) UpdateDNSNetworks ¶
func (p *PUPolicy) UpdateDNSNetworks(networks DNSRuleList)
UpdateDNSNetworks updates the set of FQDN names allowed by the policy
func (*PUPolicy) UpdateServiceCertificates ¶
UpdateServiceCertificates updates the certificate and private key of the policy
type PUPolicyPublic ¶
type PUPolicyPublic struct { ManagementID string `json:"managementID,omitempty"` ManagementNamespace string `json:"managementNamespace,omitempty"` TriremeAction PUAction `json:"triremeAction,omitempty"` ApplicationACLs IPRuleList `json:"applicationACLs,omitempty"` NetworkACLs IPRuleList `json:"networkACLs,omitempty"` DNSACLs DNSRuleList `json:"dnsACLs,omitempty"` Identity *TagStore `json:"identity,omitempty"` Annotations *TagStore `json:"annotations,omitempty"` CompressedTags *TagStore `json:"compressedtags,omitempty"` TransmitterRules TagSelectorList `json:"transmitterRules,omitempty"` ReceiverRules TagSelectorList `json:"receiverRules,omitempty"` IPs ExtendedMap `json:"IPs,omitempty"` ServicesListeningPort int `json:"servicesListeningPort,omitempty"` DNSProxyPort int `json:"dnsProxyPort,omitempty"` ExposedServices ApplicationServicesList `json:"exposedServices,omitempty"` DependentServices ApplicationServicesList `json:"dependentServices,omitempty"` ServicesCertificate string `json:"servicesCertificate,omitempty"` ServicesPrivateKey string `json:"servicesPrivateKey,omitempty"` ServicesCA string `json:"servicesCA,omitempty"` Scopes []string `json:"scopes,omitempty"` EnforcerType EnforcerType `json:"enforcerTypes,omitempty"` }
PUPolicyPublic captures all policy information related ot the processing unit in an object that can be marshalled and transmitted over the RPC interface.
func (*PUPolicyPublic) ToPrivatePolicy ¶
func (p *PUPolicyPublic) ToPrivatePolicy(convert bool) (*PUPolicy, error)
ToPrivatePolicy converts the object to a private object.
type PURuntime ¶
PURuntime holds all data related to the status of the container run time
func NewPURuntime ¶
func NewPURuntime(name string, pid int, nsPath string, tags *TagStore, ips ExtendedMap, puType common.PUType, options *OptionsType) *PURuntime
NewPURuntime Generate a new RuntimeInfo
func NewPURuntimeWithDefaults ¶
func NewPURuntimeWithDefaults() *PURuntime
NewPURuntimeWithDefaults sets up PURuntime with defaults
func (*PURuntime) IPAddresses ¶
func (r *PURuntime) IPAddresses() ExtendedMap
IPAddresses returns all the IP addresses for the processing unit
func (*PURuntime) MarshalJSON ¶
MarshalJSON Marshals this struct.
func (*PURuntime) Options ¶
func (r *PURuntime) Options() OptionsType
Options returns tags for the processing unit
func (*PURuntime) SetIPAddresses ¶
func (r *PURuntime) SetIPAddresses(ipa ExtendedMap)
SetIPAddresses sets up all the IP addresses for the processing unit
func (*PURuntime) SetOptions ¶
func (r *PURuntime) SetOptions(options OptionsType)
SetOptions sets the Options
func (*PURuntime) SetServices ¶
SetServices updates the services of the runtime.
func (*PURuntime) UnmarshalJSON ¶
UnmarshalJSON Unmarshals this struct.
type PURuntimeJSON ¶
type PURuntimeJSON struct { // PUType is the type of the PU PUType common.PUType // Pid holds the value of the first process of the container Pid int // NSPath is the path to the networking namespace for this PURuntime if applicable. NSPath string // Name is the name of the container Name string // IPAddress is the IP Address of the container IPAddresses ExtendedMap // Tags is a map of the metadata of the container Tags *TagStore // Options is a map of the options of the container Options *OptionsType }
PURuntimeJSON is a Json representation of PURuntime
type PingConfig ¶
type PingConfig struct { Type claimsheader.PingType IP net.IP Ports []*portspec.PortSpec Requests int }
PingConfig holds the configuration to run ping.
type PortProtocolPolicy ¶
type PortProtocolPolicy struct { Ports []string Protocols []string Policy *FlowPolicy }
PortProtocolPolicy holds the assicated ports, protocols and policy
type Resolver ¶
type Resolver interface { // HandlePUEvent is called by all monitors when a PU event is generated. The implementer // is responsible to update all components by explicitly adding a new PU. HandlePUEvent(ctx context.Context, puID string, event common.Event, runtime RuntimeReader) error }
A Resolver must be implemented by a policy engine that receives monitor events.
type RuntimeError ¶
RuntimeError is an error detected by the TriremeController that has to be returned at a later time to the policy engine to take action.
type RuntimeReader ¶
type RuntimeReader interface { // Pid returns the Pid of the Runtime. Pid() int // Name returns the process name of the Runtime. Name() string // NSPath returns the path to the namespace of the PU, if applicable NSPath() string // Tag returns the value of the given tag. Tag(string) (string, bool) // Tags returns a copy of the list of the tags. Tags() *TagStore // Options returns a copy of the list of options. Options() OptionsType // IPAddresses returns a copy of all the IP addresses. IPAddresses() ExtendedMap // Returns the PUType for the PU PUType() common.PUType // SetServices sets the services of the runtime. SetServices(services []common.Service) // PortMap returns portmap (container port -> host port) PortMap() map[nat.Port][]string }
A RuntimeReader allows to get the specific parameters stored in the Runtime
type ServiceType ¶
type ServiceType int
ServiceType are the types of services that can are suported.
const ( ServiceL3 ServiceType = iota ServiceHTTP ServiceTCP ServiceSecretsProxy )
Values of ServiceType
type TagSelector ¶
type TagSelector struct { Clause []KeyValueOperator Policy *FlowPolicy }
TagSelector info describes a tag selector key Operator value
type TagSelectorList ¶
type TagSelectorList []TagSelector
TagSelectorList defines a list of TagSelectors
func (TagSelectorList) Copy ¶
func (t TagSelectorList) Copy() TagSelectorList
Copy returns a copy of the TagSelectorList
type TagStore ¶
type TagStore struct {
Tags []string
}
TagStore stores the tags - it allows duplicate key values
func NewTagStoreFromMap ¶
NewTagStoreFromMap creates a tag store from an input map
func NewTagStoreFromSlice ¶
NewTagStoreFromSlice creates a new tag store from a slice.
func (*TagStore) AppendKeyValue ¶
AppendKeyValue appends a key and value to the tag store
type UserAuthorizationTypeValues ¶
type UserAuthorizationTypeValues int
UserAuthorizationTypeValues is the types of user authorization methods that are supported.
const ( UserAuthorizationNone UserAuthorizationTypeValues = iota UserAuthorizationMutualTLS UserAuthorizationJWT UserAuthorizationOIDC )
Values of UserAuthorizationTypeValues
Source Files ¶
Directories ¶
Path | Synopsis |
---|---|
Package mockpolicy is a generated GoMock package.
|
Package mockpolicy is a generated GoMock package. |