Browse Source

remove debug logs

abhishek9686 9 months ago
parent
commit
33a598ae47
2 changed files with 1 additions and 21 deletions
  1. 1 17
      logic/acls.go
  2. 0 4
      logic/peers.go

+ 1 - 17
logic/acls.go

@@ -575,12 +575,6 @@ func IsUserAllowedToCommunicate(userName string, peer models.Node) (bool, []mode
 
 
 // IsNodeAllowedToCommunicate - check node is allowed to communicate with the peer
 // IsNodeAllowedToCommunicate - check node is allowed to communicate with the peer
 func IsNodeAllowedToCommunicate(node, peer models.Node) (bool, []models.Acl) {
 func IsNodeAllowedToCommunicate(node, peer models.Node) (bool, []models.Acl) {
-	if node.ID.String() == "6901219b-9bee-412a-aa2a-4911c8387a6d" &&
-		peer.IsStatic && peer.StaticNode.ClientID == "cool-sky" {
-		fmt.Println("\n\n=========================================\n\n")
-		defer fmt.Println("\n\n=========================================\n\n")
-		fmt.Printf("=====> NODE: %s, Peer: %s", node.ID.String(), peer.ID.String())
-	}
 
 
 	if node.IsStatic {
 	if node.IsStatic {
 		node = node.StaticNode.ConvertToStaticNode()
 		node = node.StaticNode.ConvertToStaticNode()
@@ -604,13 +598,6 @@ func IsNodeAllowedToCommunicate(node, peer models.Node) (bool, []models.Acl) {
 		}
 		}
 		srcMap := convAclTagToValueMap(policy.Src)
 		srcMap := convAclTagToValueMap(policy.Src)
 		dstMap := convAclTagToValueMap(policy.Dst)
 		dstMap := convAclTagToValueMap(policy.Dst)
-		if node.ID.String() == "6901219b-9bee-412a-aa2a-4911c8387a6d" &&
-			peer.IsStatic && peer.StaticNode.ClientID == "cool-sky" {
-			fmt.Printf("\n======> SRCMAP: %+v\n", srcMap)
-			fmt.Printf("\n======> DSTMAP: %+v\n", dstMap)
-			fmt.Printf("\n======> node Tags: %+v\n", node.Tags)
-			fmt.Printf("\n======> peer Tags: %+v\n", peer.Tags)
-		}
 		for tagID := range node.Tags {
 		for tagID := range node.Tags {
 			allowed := false
 			allowed := false
 			if _, ok := dstMap[tagID.String()]; policy.AllowedDirection == models.TrafficDirectionBi && ok {
 			if _, ok := dstMap[tagID.String()]; policy.AllowedDirection == models.TrafficDirectionBi && ok {
@@ -688,10 +675,7 @@ func IsNodeAllowedToCommunicate(node, peer models.Node) (bool, []models.Acl) {
 			}
 			}
 		}
 		}
 	}
 	}
-	if node.ID.String() == "6901219b-9bee-412a-aa2a-4911c8387a6d" &&
-		peer.IsStatic && peer.StaticNode.ClientID == "cool-sky" {
-		fmt.Printf("====> ALLOWED POLICIES: %+v", allowedPolicies)
-	}
+
 	if len(allowedPolicies) > 0 {
 	if len(allowedPolicies) > 0 {
 		return true, allowedPolicies
 		return true, allowedPolicies
 	}
 	}

+ 0 - 4
logic/peers.go

@@ -169,10 +169,6 @@ func GetPeerUpdateForHost(network string, host *models.Host, allNodes []models.N
 			hostPeerUpdate.FwUpdate.AllowAll = false
 			hostPeerUpdate.FwUpdate.AllowAll = false
 		}
 		}
 		hostPeerUpdate.FwUpdate.AclRules = GetAclRulesForNode(&node)
 		hostPeerUpdate.FwUpdate.AclRules = GetAclRulesForNode(&node)
-		if host.Name == "lon-1" {
-			fmt.Println("##### DEF POL ", defaultDevicePolicy.Enabled, defaultUserPolicy.Enabled)
-			fmt.Printf("ACL Rules: %+v\n", hostPeerUpdate.FwUpdate.AclRules)
-		}
 		currentPeers := GetNetworkNodesMemory(allNodes, node.Network)
 		currentPeers := GetNetworkNodesMemory(allNodes, node.Network)
 		for _, peer := range currentPeers {
 		for _, peer := range currentPeers {
 			peer := peer
 			peer := peer