Documentation ¶
Index ¶
- func Create(s *state.State, projectName string, aclInfo *api.NetworkACLsPost) error
- func Exists(s *state.State, projectName string, name ...string) error
- func OVNACLPortGroupName(networkACLID int64) openvswitch.OVNPortGroup
- func OVNApplyNetworkBaselineRules(client *openvswitch.OVN, switchName openvswitch.OVNSwitch, ...) error
- func OVNEnsureACLs(s *state.State, logger logger.Logger, client *openvswitch.OVN, ...) (*revert.Reverter, error)
- func OVNPortGroupDeleteIfUnused(s *state.State, logger logger.Logger, client *openvswitch.OVN, ...) error
- func UsedBy(s *state.State, aclProjectName string, ...) error
- type NetworkACL
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func Exists ¶
Exists checks the ACL name(s) provided exists in the project. If multiple names are provided, also checks that duplicate names aren't specified in the list.
func OVNACLPortGroupName ¶
func OVNACLPortGroupName(networkACLID int64) openvswitch.OVNPortGroup
OVNACLPortGroupName returns the port group name for a Network ACL ID.
func OVNApplyNetworkBaselineRules ¶
func OVNApplyNetworkBaselineRules(client *openvswitch.OVN, switchName openvswitch.OVNSwitch, routerPortName openvswitch.OVNSwitchPort, intRouterIPs []*net.IPNet, dnsIPs []net.IP) error
OVNApplyNetworkBaselineRules applies preset baseline logical switch rules to a allow access to network services.
func OVNEnsureACLs ¶
func OVNEnsureACLs(s *state.State, logger logger.Logger, client *openvswitch.OVN, aclProjectName string, aclNameIDs map[string]int64, aclNames []string, reapplyRules bool, addMembers ...openvswitch.OVNSwitchPort) (*revert.Reverter, error)
OVNEnsureACLs ensures that the requested aclNames exist as OVN port groups (creates & applies ACL rules if not), and adds the requested addMembers to the new or existing OVN port groups. If reapplyRules is true then the current ACL rules in the database are applied to the existing port groups rather than just new ones. Any ACLs referenced in the requested ACLs rules are also created as empty OVN port groups if needed. If a requested ACL exists, but has no ACL rules applied, then the current rules are loaded out of the database and applied.
func OVNPortGroupDeleteIfUnused ¶
func OVNPortGroupDeleteIfUnused(s *state.State, logger logger.Logger, client *openvswitch.OVN, aclProjectName string, ignoreUsageType interface{}, ignoreUsageNicName string, keepACLs ...string) error
OVNPortGroupDeleteIfUnused deletes unused port groups. Accepts optional ignoreUsageType and ignoreUsageNicName arguments, allowing the used by logic to ignore an instance or profile NIC or network (useful if config not applied to database yet). Also accepts optional list of ACLs to explicitly consider in use by OVN. The combination of ignoring the specifified usage type and explicit keep ACLs allows the caller to ensure that the desired ACLs are considered unused by the usage type even if the referring config has not yet been removed from the database.
func UsedBy ¶
func UsedBy(s *state.State, aclProjectName string, usageFunc func(matchedACLNames []string, usageType interface{}, nicName string, nicConfig map[string]string) error, matchACLNames ...string) error
UsedBy finds all networks, profiles and instance NICs that use any of the specified ACLs and executes usageFunc once for each resource using one or more of the ACLs with info about the resource and matched ACLs being used.
Types ¶
type NetworkACL ¶
type NetworkACL interface { // Info. ID() int64 Project() string Info() *api.NetworkACL Etag() []interface{} UsedBy() ([]string, error) // Modifications. Update(config *api.NetworkACLPut) error Rename(newName string) error Delete() error // contains filtered or unexported methods }
NetworkACL represents a Network ACL.
func LoadByName ¶
LoadByName loads and initialises a Network ACL from the database by project and name.