|
@@ -1777,7 +1777,6 @@ func GetEgressRulesForNode(targetnode models.Node) (rules map[string]models.AclR
|
|
for _, rangeI := range targetnode.EgressGatewayRanges {
|
|
for _, rangeI := range targetnode.EgressGatewayRanges {
|
|
targetNodeTags[models.TagID(rangeI)] = struct{}{}
|
|
targetNodeTags[models.TagID(rangeI)] = struct{}{}
|
|
}
|
|
}
|
|
- fmt.Println("TAGETR NODE TAGS: ", targetNodeTags)
|
|
|
|
for _, acl := range acls {
|
|
for _, acl := range acls {
|
|
if !acl.Enabled {
|
|
if !acl.Enabled {
|
|
continue
|
|
continue
|
|
@@ -1786,10 +1785,7 @@ func GetEgressRulesForNode(targetnode models.Node) (rules map[string]models.AclR
|
|
dstTags := convAclTagToValueMap(acl.Dst)
|
|
dstTags := convAclTagToValueMap(acl.Dst)
|
|
_, srcAll := srcTags["*"]
|
|
_, srcAll := srcTags["*"]
|
|
_, dstAll := dstTags["*"]
|
|
_, dstAll := dstTags["*"]
|
|
- fmt.Println("====> SRC TAGS: ", srcTags)
|
|
|
|
- fmt.Println("====> DST TAGS: ", dstTags)
|
|
|
|
for nodeTag := range targetNodeTags {
|
|
for nodeTag := range targetNodeTags {
|
|
- fmt.Println("====> CHECKINg NODE TAG: ", nodeTag)
|
|
|
|
aclRule := models.AclRule{
|
|
aclRule := models.AclRule{
|
|
ID: acl.ID,
|
|
ID: acl.ID,
|
|
AllowedProtocol: acl.Proto,
|
|
AllowedProtocol: acl.Proto,
|
|
@@ -1935,19 +1931,15 @@ func GetEgressRulesForNode(targetnode models.Node) (rules map[string]models.AclR
|
|
}
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
} else {
|
|
- fmt.Println("====> HEREEEEEE 4 ", nodeTag)
|
|
|
|
_, all := dstTags["*"]
|
|
_, all := dstTags["*"]
|
|
if _, ok := dstTags[nodeTag.String()]; ok || all {
|
|
if _, ok := dstTags[nodeTag.String()]; ok || all {
|
|
// get all src tags
|
|
// get all src tags
|
|
- fmt.Println("====> HEREEEEEE 5 ", nodeTag, srcTags)
|
|
|
|
for src := range srcTags {
|
|
for src := range srcTags {
|
|
if src == nodeTag.String() {
|
|
if src == nodeTag.String() {
|
|
continue
|
|
continue
|
|
}
|
|
}
|
|
- fmt.Println("===> checking SRC: 1", src)
|
|
|
|
// Get peers in the tags and add allowed rules
|
|
// Get peers in the tags and add allowed rules
|
|
nodes := taggedNodes[models.TagID(src)]
|
|
nodes := taggedNodes[models.TagID(src)]
|
|
- fmt.Println("===> checking SRC: 2 ", src, nodes)
|
|
|
|
for _, node := range nodes {
|
|
for _, node := range nodes {
|
|
if node.ID == targetnode.ID {
|
|
if node.ID == targetnode.ID {
|
|
continue
|
|
continue
|
|
@@ -1965,7 +1957,6 @@ func GetEgressRulesForNode(targetnode models.Node) (rules map[string]models.AclR
|
|
aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())
|
|
aclRule.IP6List = append(aclRule.IP6List, node.StaticNode.AddressIPNet6())
|
|
}
|
|
}
|
|
}
|
|
}
|
|
- fmt.Printf("ACL: RUELS: %+v\n", aclRule)
|
|
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|