/
endpoint_policy.go
136 lines (104 loc) · 2.99 KB
/
endpoint_policy.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
// Code generated by go-swagger; DO NOT EDIT.
package models
// This file was generated by the swagger tool.
// Editing this file might prove futile when you re-run the swagger generate command
import (
strfmt "github.com/go-openapi/strfmt"
"github.com/go-openapi/errors"
"github.com/go-openapi/swag"
)
// EndpointPolicy Policy information of an endpoint
// swagger:model EndpointPolicy
type EndpointPolicy struct {
// List of identities to which this endpoint is allowed to communicate
//
AllowedEgressIdentities []int64 `json:"allowed-egress-identities"`
// List of identities allowed to communicate to this endpoint
//
AllowedIngressIdentities []int64 `json:"allowed-ingress-identities"`
// Build number of calculated policy in use
Build int64 `json:"build,omitempty"`
// cidr policy
CidrPolicy *CIDRPolicy `json:"cidr-policy,omitempty"`
// Own identity of endpoint
ID int64 `json:"id,omitempty"`
// l4
L4 *L4Policy `json:"l4,omitempty"`
// Whether policy enforcement is enabled (ingress, egress, both or none)
PolicyEnabled EndpointPolicyEnabled `json:"policy-enabled,omitempty"`
// The agent-local policy revision
PolicyRevision int64 `json:"policy-revision,omitempty"`
}
// Validate validates this endpoint policy
func (m *EndpointPolicy) Validate(formats strfmt.Registry) error {
var res []error
if err := m.validateCidrPolicy(formats); err != nil {
res = append(res, err)
}
if err := m.validateL4(formats); err != nil {
res = append(res, err)
}
if err := m.validatePolicyEnabled(formats); err != nil {
res = append(res, err)
}
if len(res) > 0 {
return errors.CompositeValidationError(res...)
}
return nil
}
func (m *EndpointPolicy) validateCidrPolicy(formats strfmt.Registry) error {
if swag.IsZero(m.CidrPolicy) { // not required
return nil
}
if m.CidrPolicy != nil {
if err := m.CidrPolicy.Validate(formats); err != nil {
if ve, ok := err.(*errors.Validation); ok {
return ve.ValidateName("cidr-policy")
}
return err
}
}
return nil
}
func (m *EndpointPolicy) validateL4(formats strfmt.Registry) error {
if swag.IsZero(m.L4) { // not required
return nil
}
if m.L4 != nil {
if err := m.L4.Validate(formats); err != nil {
if ve, ok := err.(*errors.Validation); ok {
return ve.ValidateName("l4")
}
return err
}
}
return nil
}
func (m *EndpointPolicy) validatePolicyEnabled(formats strfmt.Registry) error {
if swag.IsZero(m.PolicyEnabled) { // not required
return nil
}
if err := m.PolicyEnabled.Validate(formats); err != nil {
if ve, ok := err.(*errors.Validation); ok {
return ve.ValidateName("policy-enabled")
}
return err
}
return nil
}
// MarshalBinary interface implementation
func (m *EndpointPolicy) MarshalBinary() ([]byte, error) {
if m == nil {
return nil, nil
}
return swag.WriteJSON(m)
}
// UnmarshalBinary interface implementation
func (m *EndpointPolicy) UnmarshalBinary(b []byte) error {
var res EndpointPolicy
if err := swag.ReadJSON(b, &res); err != nil {
return err
}
*m = res
return nil
}