Forráskód Böngészése

remove debug logs

abhishek9686 5 hónapja
szülő
commit
207ce3b8f9
3 módosított fájl, 0 hozzáadás és 12 törlés
  1. 0 9
      logic/acls.go
  2. 0 2
      logic/extpeers.go
  3. 0 1
      logic/peers.go

+ 0 - 9
logic/acls.go

@@ -1777,7 +1777,6 @@ func GetEgressRulesForNode(targetnode models.Node) (rules map[string]models.AclR
 	for _, rangeI := range targetnode.EgressGatewayRanges {
 		targetNodeTags[models.TagID(rangeI)] = struct{}{}
 	}
-	fmt.Println("TAGETR NODE TAGS: ", targetNodeTags)
 	for _, acl := range acls {
 		if !acl.Enabled {
 			continue
@@ -1786,10 +1785,7 @@ func GetEgressRulesForNode(targetnode models.Node) (rules map[string]models.AclR
 		dstTags := convAclTagToValueMap(acl.Dst)
 		_, srcAll := srcTags["*"]
 		_, dstAll := dstTags["*"]
-		fmt.Println("====> SRC TAGS: ", srcTags)
-		fmt.Println("====> DST TAGS: ", dstTags)
 		for nodeTag := range targetNodeTags {
-			fmt.Println("====> CHECKINg NODE TAG: ", nodeTag)
 			aclRule := models.AclRule{
 				ID:              acl.ID,
 				AllowedProtocol: acl.Proto,
@@ -1935,19 +1931,15 @@ func GetEgressRulesForNode(targetnode models.Node) (rules map[string]models.AclR
 					}
 				}
 			} else {
-				fmt.Println("====> HEREEEEEE 4 ", nodeTag)
 				_, all := dstTags["*"]
 				if _, ok := dstTags[nodeTag.String()]; ok || all {
 					// get all src tags
-					fmt.Println("====> HEREEEEEE 5 ", nodeTag, srcTags)
 					for src := range srcTags {
 						if src == nodeTag.String() {
 							continue
 						}
-						fmt.Println("===> checking SRC: 1", src)
 						// Get peers in the tags and add allowed rules
 						nodes := taggedNodes[models.TagID(src)]
-						fmt.Println("===> checking SRC: 2 ", src, nodes)
 						for _, node := range nodes {
 							if node.ID == targetnode.ID {
 								continue
@@ -1965,7 +1957,6 @@ func GetEgressRulesForNode(targetnode models.Node) (rules map[string]models.AclR
 								aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())
 							}
 						}
-						fmt.Printf("ACL: RUELS: %+v\n", aclRule)
 					}
 				}
 			}

+ 0 - 2
logic/extpeers.go

@@ -779,13 +779,11 @@ func GetExtPeers(node, peer *models.Node) ([]wgtypes.PeerConfig, []models.IDandA
 	}
 	for _, extPeer := range extPeers {
 		extPeer := extPeer
-		fmt.Println("=====> checking EXT peer: ", extPeer.ClientID)
 		if !IsClientNodeAllowed(&extPeer, peer.ID.String()) {
 			continue
 		}
 		if extPeer.RemoteAccessClientID == "" {
 			if ok := IsPeerAllowed(extPeer.ConvertToStaticNode(), *peer, true); !ok {
-				fmt.Println("=====>1 checking EXT peer: ", extPeer.ClientID)
 				continue
 			}
 		} else {

+ 0 - 1
logic/peers.go

@@ -425,7 +425,6 @@ func GetPeerUpdateForHost(network string, host *models.Host, allNodes []models.N
 		}
 		if node.IsEgressGateway {
 			if !networkAllowAll {
-				fmt.Println("======>1 HEREEEEE")
 				egressInfo := hostPeerUpdate.FwUpdate.EgressInfo[node.ID.String()]
 				if egressInfo.EgressFwRules == nil {
 					egressInfo.EgressFwRules = make(map[string]models.AclRule)