2013-12-20 01:14:46 +00:00
|
|
|
package agent
|
|
|
|
|
2013-12-20 23:33:13 +00:00
|
|
|
import (
|
2013-12-21 00:39:32 +00:00
|
|
|
"encoding/base64"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
2014-04-11 22:22:35 +00:00
|
|
|
"net"
|
2013-12-21 00:39:32 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2013-12-27 22:49:35 +00:00
|
|
|
"sort"
|
2013-12-21 00:39:32 +00:00
|
|
|
"strings"
|
2014-01-15 22:17:40 +00:00
|
|
|
"time"
|
2014-06-16 21:36:12 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/consul/consul"
|
2014-08-21 20:09:13 +00:00
|
|
|
"github.com/hashicorp/consul/watch"
|
2014-06-16 21:36:12 +00:00
|
|
|
"github.com/mitchellh/mapstructure"
|
2013-12-20 23:33:13 +00:00
|
|
|
)
|
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// Ports is used to simplify the configuration by
|
|
|
|
// providing default ports, and allowing the addresses
|
|
|
|
// to only be specified once
|
|
|
|
type PortConfig struct {
|
|
|
|
DNS int // DNS Query interface
|
|
|
|
HTTP int // HTTP API
|
2014-11-14 19:39:19 +00:00
|
|
|
HTTPS int // HTTPS API
|
2014-04-11 22:22:35 +00:00
|
|
|
RPC int // CLI RPC
|
|
|
|
SerfLan int `mapstructure:"serf_lan"` // LAN gossip (Client + Server)
|
2015-09-15 12:22:08 +00:00
|
|
|
SerfWan int `mapstructure:"serf_wan"` // WAN gossip (Server only)
|
2014-04-11 22:22:35 +00:00
|
|
|
Server int // Server internal RPC
|
|
|
|
}
|
|
|
|
|
2014-09-02 19:42:14 +00:00
|
|
|
// AddressConfig is used to provide address overrides
|
|
|
|
// for specific services. By default, either ClientAddress
|
|
|
|
// or ServerAddress is used.
|
|
|
|
type AddressConfig struct {
|
2014-11-14 19:39:19 +00:00
|
|
|
DNS string // DNS Query interface
|
|
|
|
HTTP string // HTTP API
|
|
|
|
HTTPS string // HTTPS API
|
|
|
|
RPC string // CLI RPC
|
2014-09-02 19:42:14 +00:00
|
|
|
}
|
|
|
|
|
2015-06-05 11:44:42 +00:00
|
|
|
type AdvertiseAddrsConfig struct {
|
|
|
|
SerfLan *net.TCPAddr `mapstructure:"-"`
|
|
|
|
SerfLanRaw string `mapstructure:"serf_lan"`
|
|
|
|
SerfWan *net.TCPAddr `mapstructure:"-"`
|
|
|
|
SerfWanRaw string `mapstructure:"serf_wan"`
|
|
|
|
RPC *net.TCPAddr `mapstructure:"-"`
|
|
|
|
RPCRaw string `mapstructure:"rpc"`
|
|
|
|
}
|
|
|
|
|
2014-06-08 20:14:07 +00:00
|
|
|
// DNSConfig is used to fine tune the DNS sub-system.
|
|
|
|
// It can be used to control cache values, and stale
|
|
|
|
// reads
|
|
|
|
type DNSConfig struct {
|
|
|
|
// NodeTTL provides the TTL value for a node query
|
|
|
|
NodeTTL time.Duration `mapstructure:"-"`
|
|
|
|
NodeTTLRaw string `mapstructure:"node_ttl" json:"-"`
|
|
|
|
|
|
|
|
// ServiceTTL provides the TTL value for a service
|
|
|
|
// query for given service. The "*" wildcard can be used
|
|
|
|
// to set a default for all services.
|
|
|
|
ServiceTTL map[string]time.Duration `mapstructure:"-"`
|
|
|
|
ServiceTTLRaw map[string]string `mapstructure:"service_ttl" json:"-"`
|
|
|
|
|
|
|
|
// AllowStale is used to enable lookups with stale
|
|
|
|
// data. This gives horizontal read scalability since
|
|
|
|
// any Consul server can service the query instead of
|
|
|
|
// only the leader.
|
|
|
|
AllowStale bool `mapstructure:"allow_stale"`
|
|
|
|
|
2014-09-30 19:15:36 +00:00
|
|
|
// EnableTruncate is used to enable setting the truncate
|
|
|
|
// flag for UDP DNS queries. This allows unmodified
|
|
|
|
// clients to re-query the consul server using TCP
|
|
|
|
// when the total number of records exceeds the number
|
|
|
|
// returned by default for UDP.
|
|
|
|
EnableTruncate bool `mapstructure:"enable_truncate"`
|
|
|
|
|
2014-06-08 20:14:07 +00:00
|
|
|
// MaxStale is used to bound how stale of a result is
|
|
|
|
// accepted for a DNS lookup. This can be used with
|
|
|
|
// AllowStale to limit how old of a value is served up.
|
|
|
|
// If the stale result exceeds this, another non-stale
|
|
|
|
// stale read is performed.
|
|
|
|
MaxStale time.Duration `mapstructure:"-"`
|
|
|
|
MaxStaleRaw string `mapstructure:"max_stale" json:"-"`
|
2015-01-10 12:11:32 +00:00
|
|
|
|
|
|
|
// OnlyPassing is used to determine whether to filter nodes
|
|
|
|
// whose health checks are in any non-passing state. By
|
|
|
|
// default, only nodes in a critical state are excluded.
|
|
|
|
OnlyPassing bool `mapstructure:"only_passing"`
|
2014-06-08 20:14:07 +00:00
|
|
|
}
|
|
|
|
|
2013-12-20 01:14:46 +00:00
|
|
|
// Config is the configuration that can be set for an Agent.
|
|
|
|
// Some of this is configurable as CLI flags, but most must
|
|
|
|
// be set using a configuration file.
|
|
|
|
type Config struct {
|
2013-12-25 00:48:07 +00:00
|
|
|
// Bootstrap is used to bring up the first Consul server, and
|
|
|
|
// permits that node to elect itself leader
|
2014-02-07 19:49:51 +00:00
|
|
|
Bootstrap bool `mapstructure:"bootstrap"`
|
2013-12-25 00:48:07 +00:00
|
|
|
|
2014-06-20 00:08:48 +00:00
|
|
|
// BootstrapExpect tries to automatically bootstrap the Consul cluster,
|
2015-09-15 12:22:08 +00:00
|
|
|
// by withholding peers until enough servers join.
|
2014-06-20 00:08:48 +00:00
|
|
|
BootstrapExpect int `mapstructure:"bootstrap_expect"`
|
2014-06-16 21:36:12 +00:00
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// Server controls if this agent acts like a Consul server,
|
|
|
|
// or merely as a client. Servers have more state, take part
|
|
|
|
// in leader election, etc.
|
|
|
|
Server bool `mapstructure:"server"`
|
|
|
|
|
2013-12-20 23:33:13 +00:00
|
|
|
// Datacenter is the datacenter this node is in. Defaults to dc1
|
2014-02-07 19:49:51 +00:00
|
|
|
Datacenter string `mapstructure:"datacenter"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
|
|
|
// DataDir is the directory to store our state in
|
2014-02-07 19:49:51 +00:00
|
|
|
DataDir string `mapstructure:"data_dir"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
2014-11-03 19:28:21 +00:00
|
|
|
// DNSRecursors can be set to allow the DNS servers to recursively
|
|
|
|
// resolve non-consul domains. It is deprecated, and merges into the
|
|
|
|
// recursors array.
|
|
|
|
DNSRecursor string `mapstructure:"recursor"`
|
|
|
|
|
2014-10-31 19:19:41 +00:00
|
|
|
// DNSRecursors can be set to allow the DNS servers to recursively
|
2014-01-03 23:43:35 +00:00
|
|
|
// resolve non-consul domains
|
2014-10-31 19:19:41 +00:00
|
|
|
DNSRecursors []string `mapstructure:"recursors"`
|
2014-01-03 23:43:35 +00:00
|
|
|
|
2014-06-08 20:14:07 +00:00
|
|
|
// DNS configuration
|
|
|
|
DNSConfig DNSConfig `mapstructure:"dns_config"`
|
|
|
|
|
2014-01-02 23:50:52 +00:00
|
|
|
// Domain is the DNS domain for the records. Defaults to "consul."
|
2014-02-07 19:49:51 +00:00
|
|
|
Domain string `mapstructure:"domain"`
|
2014-01-02 23:50:52 +00:00
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
// Encryption key to use for the Serf communication
|
2014-05-29 18:24:37 +00:00
|
|
|
EncryptKey string `mapstructure:"encrypt" json:"-"`
|
2013-12-21 00:39:32 +00:00
|
|
|
|
2013-12-20 23:33:13 +00:00
|
|
|
// LogLevel is the level of the logs to putout
|
2014-02-07 19:49:51 +00:00
|
|
|
LogLevel string `mapstructure:"log_level"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
|
|
|
// Node name is the name we use to advertise. Defaults to hostname.
|
2014-02-07 19:49:51 +00:00
|
|
|
NodeName string `mapstructure:"node_name"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// ClientAddr is used to control the address we bind to for
|
2014-11-14 19:39:19 +00:00
|
|
|
// client services (DNS, HTTP, HTTPS, RPC)
|
2014-04-11 22:22:35 +00:00
|
|
|
ClientAddr string `mapstructure:"client_addr"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// BindAddr is used to control the address we bind to.
|
|
|
|
// If not specified, the first private IP we find is used.
|
|
|
|
// This controls the address we use for cluster facing
|
|
|
|
// services (Gossip, Server RPC)
|
|
|
|
BindAddr string `mapstructure:"bind_addr"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
2014-01-01 00:45:13 +00:00
|
|
|
// AdvertiseAddr is the address we use for advertising our Serf,
|
2014-04-11 22:22:35 +00:00
|
|
|
// and Consul RPC IP. If not specified, bind address is used.
|
2014-02-07 19:49:51 +00:00
|
|
|
AdvertiseAddr string `mapstructure:"advertise_addr"`
|
2014-01-01 00:45:13 +00:00
|
|
|
|
2015-06-05 11:44:42 +00:00
|
|
|
// AdvertiseAddrs configuration
|
|
|
|
AdvertiseAddrs AdvertiseAddrsConfig `mapstructure:"advertise_addrs"`
|
|
|
|
|
2015-03-21 09:14:03 +00:00
|
|
|
// AdvertiseAddrWan is the address we use for advertising our
|
|
|
|
// Serf WAN IP. If not specified, the general advertise address is used.
|
|
|
|
AdvertiseAddrWan string `mapstructure:"advertise_addr_wan"`
|
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// Port configurations
|
|
|
|
Ports PortConfig
|
2013-12-20 23:33:13 +00:00
|
|
|
|
2014-09-02 19:42:14 +00:00
|
|
|
// Address configurations
|
|
|
|
Addresses AddressConfig
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
// LeaveOnTerm controls if Serf does a graceful leave when receiving
|
|
|
|
// the TERM signal. Defaults false. This can be changed on reload.
|
|
|
|
LeaveOnTerm bool `mapstructure:"leave_on_terminate"`
|
|
|
|
|
|
|
|
// SkipLeaveOnInt controls if Serf skips a graceful leave when receiving
|
|
|
|
// the INT signal. Defaults false. This can be changed on reload.
|
|
|
|
SkipLeaveOnInt bool `mapstructure:"skip_leave_on_interrupt"`
|
|
|
|
|
2014-02-20 22:59:54 +00:00
|
|
|
// StatsiteAddr is the address of a statsite instance. If provided,
|
|
|
|
// metrics will be streamed to that instance.
|
|
|
|
StatsiteAddr string `mapstructure:"statsite_addr"`
|
|
|
|
|
2015-05-03 23:46:20 +00:00
|
|
|
// StatsitePrefix is the prefix used to write stats values to. By
|
|
|
|
// default this is set to 'consul'.
|
|
|
|
StatsitePrefix string `mapstructure:"statsite_prefix"`
|
|
|
|
|
2014-09-02 18:26:08 +00:00
|
|
|
// StatsdAddr is the address of a statsd instance. If provided,
|
|
|
|
// metrics will be sent to that instance.
|
|
|
|
StatsdAddr string `mapstructure:"statsd_addr"`
|
|
|
|
|
2014-03-09 22:57:03 +00:00
|
|
|
// Protocol is the Consul protocol version to use.
|
|
|
|
Protocol int `mapstructure:"protocol"`
|
|
|
|
|
2014-03-20 00:49:57 +00:00
|
|
|
// EnableDebug is used to enable various debugging features
|
|
|
|
EnableDebug bool `mapstructure:"enable_debug"`
|
|
|
|
|
2014-04-04 23:52:39 +00:00
|
|
|
// VerifyIncoming is used to verify the authenticity of incoming connections.
|
|
|
|
// This means that TCP requests are forbidden, only allowing for TLS. TLS connections
|
|
|
|
// must match a provided certificate authority. This can be used to force client auth.
|
|
|
|
VerifyIncoming bool `mapstructure:"verify_incoming"`
|
|
|
|
|
|
|
|
// VerifyOutgoing is used to verify the authenticity of outgoing connections.
|
|
|
|
// This means that TLS requests are used. TLS connections must match a provided
|
|
|
|
// certificate authority. This is used to verify authenticity of server nodes.
|
|
|
|
VerifyOutgoing bool `mapstructure:"verify_outgoing"`
|
|
|
|
|
2015-05-11 22:13:58 +00:00
|
|
|
// VerifyServerHostname is used to enable hostname verification of servers. This
|
|
|
|
// ensures that the certificate presented is valid for server.<datacenter>.<domain>.
|
|
|
|
// This prevents a compromised client from being restarted as a server, and then
|
|
|
|
// intercepting request traffic as well as being added as a raft peer. This should be
|
|
|
|
// enabled by default with VerifyOutgoing, but for legacy reasons we cannot break
|
|
|
|
// existing clients.
|
|
|
|
VerifyServerHostname bool `mapstructure:"verify_server_hostname"`
|
|
|
|
|
2014-04-04 23:52:39 +00:00
|
|
|
// CAFile is a path to a certificate authority file. This is used with VerifyIncoming
|
|
|
|
// or VerifyOutgoing to verify the TLS connection.
|
|
|
|
CAFile string `mapstructure:"ca_file"`
|
|
|
|
|
|
|
|
// CertFile is used to provide a TLS certificate that is used for serving TLS connections.
|
|
|
|
// Must be provided to serve TLS connections.
|
|
|
|
CertFile string `mapstructure:"cert_file"`
|
|
|
|
|
|
|
|
// KeyFile is used to provide a TLS key that is used for serving TLS connections.
|
|
|
|
// Must be provided to serve TLS connections.
|
|
|
|
KeyFile string `mapstructure:"key_file"`
|
|
|
|
|
2014-06-13 18:10:27 +00:00
|
|
|
// ServerName is used with the TLS certificates to ensure the name we
|
2015-09-15 12:22:08 +00:00
|
|
|
// provide matches the certificate
|
2014-06-13 18:10:27 +00:00
|
|
|
ServerName string `mapstructure:"server_name"`
|
|
|
|
|
2014-04-11 23:59:16 +00:00
|
|
|
// StartJoin is a list of addresses to attempt to join when the
|
|
|
|
// agent starts. If Serf is unable to communicate with any of these
|
|
|
|
// addresses, then the agent will error and exit.
|
|
|
|
StartJoin []string `mapstructure:"start_join"`
|
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
// StartJoinWan is a list of addresses to attempt to join -wan when the
|
2014-11-14 15:02:42 +00:00
|
|
|
// agent starts. If Serf is unable to communicate with any of these
|
|
|
|
// addresses, then the agent will error and exit.
|
2014-11-17 22:14:59 +00:00
|
|
|
StartJoinWan []string `mapstructure:"start_join_wan"`
|
2014-11-14 15:02:42 +00:00
|
|
|
|
2014-10-12 17:50:15 +00:00
|
|
|
// RetryJoin is a list of addresses to join with retry enabled.
|
|
|
|
RetryJoin []string `mapstructure:"retry_join"`
|
|
|
|
|
|
|
|
// RetryMaxAttempts specifies the maximum number of times to retry joining a
|
|
|
|
// host on startup. This is useful for cases where we know the node will be
|
|
|
|
// online eventually.
|
|
|
|
RetryMaxAttempts int `mapstructure:"retry_max"`
|
|
|
|
|
|
|
|
// RetryInterval specifies the amount of time to wait in between join
|
|
|
|
// attempts on agent start. The minimum allowed value is 1 second and
|
|
|
|
// the default is 30s.
|
|
|
|
RetryInterval time.Duration `mapstructure:"-" json:"-"`
|
|
|
|
RetryIntervalRaw string `mapstructure:"retry_interval"`
|
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
// RetryJoinWan is a list of addresses to join -wan with retry enabled.
|
|
|
|
RetryJoinWan []string `mapstructure:"retry_join_wan"`
|
2014-11-14 15:02:42 +00:00
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
// RetryMaxAttemptsWan specifies the maximum number of times to retry joining a
|
2014-11-14 15:02:42 +00:00
|
|
|
// -wan host on startup. This is useful for cases where we know the node will be
|
|
|
|
// online eventually.
|
2014-11-17 22:14:59 +00:00
|
|
|
RetryMaxAttemptsWan int `mapstructure:"retry_max_wan"`
|
2014-11-14 15:02:42 +00:00
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
// RetryIntervalWan specifies the amount of time to wait in between join
|
2014-11-14 15:02:42 +00:00
|
|
|
// -wan attempts on agent start. The minimum allowed value is 1 second and
|
|
|
|
// the default is 30s.
|
2014-11-17 22:14:59 +00:00
|
|
|
RetryIntervalWan time.Duration `mapstructure:"-" json:"-"`
|
|
|
|
RetryIntervalWanRaw string `mapstructure:"retry_interval_wan"`
|
2014-11-14 15:02:42 +00:00
|
|
|
|
2014-04-23 19:36:49 +00:00
|
|
|
// UiDir is the directory containing the Web UI resources.
|
|
|
|
// If provided, the UI endpoints will be enabled.
|
|
|
|
UiDir string `mapstructure:"ui_dir"`
|
|
|
|
|
2014-05-06 03:29:50 +00:00
|
|
|
// PidFile is the file to store our PID in
|
|
|
|
PidFile string `mapstructure:"pid_file"`
|
|
|
|
|
2014-05-21 19:06:03 +00:00
|
|
|
// EnableSyslog is used to also tee all the logs over to syslog. Only supported
|
|
|
|
// on linux and OSX. Other platforms will generate an error.
|
|
|
|
EnableSyslog bool `mapstructure:"enable_syslog"`
|
|
|
|
|
2014-06-11 17:18:19 +00:00
|
|
|
// SyslogFacility is used to control where the syslog messages go
|
|
|
|
// By default, goes to LOCAL0
|
|
|
|
SyslogFacility string `mapstructure:"syslog_facility"`
|
|
|
|
|
2014-05-21 19:32:24 +00:00
|
|
|
// RejoinAfterLeave controls our interaction with the cluster after leave.
|
|
|
|
// When set to false (default), a leave causes Consul to not rejoin
|
|
|
|
// the cluster until an explicit join is received. If this is set to
|
|
|
|
// true, we ignore the leave, and rejoin the cluster on start.
|
|
|
|
RejoinAfterLeave bool `mapstructure:"rejoin_after_leave"`
|
|
|
|
|
2014-06-09 19:13:14 +00:00
|
|
|
// CheckUpdateInterval controls the interval on which the output of a health check
|
|
|
|
// is updated if there is no change to the state. For example, a check in a steady
|
|
|
|
// state may run every 5 second generating a unique output (timestamp, etc), forcing
|
|
|
|
// constant writes. This allows Consul to defer the write for some period of time,
|
|
|
|
// reducing the write pressure when the state is steady.
|
|
|
|
CheckUpdateInterval time.Duration `mapstructure:"-"`
|
|
|
|
CheckUpdateIntervalRaw string `mapstructure:"check_update_interval" json:"-"`
|
|
|
|
|
2014-08-05 18:05:55 +00:00
|
|
|
// ACLToken is the default token used to make requests if a per-request
|
|
|
|
// token is not provided. If not configured the 'anonymous' token is used.
|
|
|
|
ACLToken string `mapstructure:"acl_token" json:"-"`
|
|
|
|
|
2014-08-05 22:36:08 +00:00
|
|
|
// ACLMasterToken is used to bootstrap the ACL system. It should be specified
|
|
|
|
// on the servers in the ACLDatacenter. When the leader comes online, it ensures
|
|
|
|
// that the Master token is available. This provides the initial token.
|
|
|
|
ACLMasterToken string `mapstructure:"acl_master_token" json:"-"`
|
|
|
|
|
2014-08-05 18:05:55 +00:00
|
|
|
// ACLDatacenter is the central datacenter that holds authoritative
|
|
|
|
// ACL records. This must be the same for the entire cluster.
|
|
|
|
// If this is not set, ACLs are not enabled. Off by default.
|
|
|
|
ACLDatacenter string `mapstructure:"acl_datacenter"`
|
|
|
|
|
2014-08-05 22:03:47 +00:00
|
|
|
// ACLTTL is used to control the time-to-live of cached ACLs . This has
|
2014-08-05 18:05:55 +00:00
|
|
|
// a major impact on performance. By default, it is set to 30 seconds.
|
2014-08-05 22:03:47 +00:00
|
|
|
ACLTTL time.Duration `mapstructure:"-"`
|
|
|
|
ACLTTLRaw string `mapstructure:"acl_ttl"`
|
|
|
|
|
|
|
|
// ACLDefaultPolicy is used to control the ACL interaction when
|
|
|
|
// there is no defined policy. This can be "allow" which means
|
|
|
|
// ACLs are used to black-list, or "deny" which means ACLs are
|
|
|
|
// white-lists.
|
|
|
|
ACLDefaultPolicy string `mapstructure:"acl_default_policy"`
|
2014-08-05 18:05:55 +00:00
|
|
|
|
|
|
|
// ACLDownPolicy is used to control the ACL interaction when we cannot
|
|
|
|
// reach the ACLDatacenter and the token is not in the cache.
|
|
|
|
// There are two modes:
|
|
|
|
// * deny - Deny all requests
|
|
|
|
// * extend-cache - Ignore the cache expiration, and allow cached
|
|
|
|
// ACL's to be used to service requests. This
|
|
|
|
// is the default. If the ACL is not in the cache,
|
|
|
|
// this acts like deny.
|
|
|
|
ACLDownPolicy string `mapstructure:"acl_down_policy"`
|
|
|
|
|
2014-08-19 21:19:31 +00:00
|
|
|
// Watches are used to monitor various endpoints and to invoke a
|
|
|
|
// handler to act appropriately. These are managed entirely in the
|
|
|
|
// agent layer using the standard APIs.
|
2014-08-21 18:52:36 +00:00
|
|
|
Watches []map[string]interface{} `mapstructure:"watches"`
|
2014-08-19 21:19:31 +00:00
|
|
|
|
2014-08-29 18:24:01 +00:00
|
|
|
// DisableRemoteExec is used to turn off the remote execution
|
|
|
|
// feature. This is for security to prevent unknown scripts from running.
|
|
|
|
DisableRemoteExec bool `mapstructure:"disable_remote_exec"`
|
|
|
|
|
2014-09-02 21:23:43 +00:00
|
|
|
// DisableUpdateCheck is used to turn off the automatic update and
|
|
|
|
// security bulletin checking.
|
|
|
|
DisableUpdateCheck bool `mapstructure:"disable_update_check"`
|
|
|
|
|
|
|
|
// DisableAnonymousSignature is used to turn off the anonymous signature
|
|
|
|
// send with the update check. This is used to deduplicate messages.
|
|
|
|
DisableAnonymousSignature bool `mapstructure:"disable_anonymous_signature"`
|
|
|
|
|
2014-12-28 04:53:19 +00:00
|
|
|
// HTTPAPIResponseHeaders are used to add HTTP header response fields to the HTTP API responses.
|
|
|
|
HTTPAPIResponseHeaders map[string]string `mapstructure:"http_api_response_headers"`
|
|
|
|
|
2015-02-06 20:44:55 +00:00
|
|
|
// AtlasInfrastructure is the name of the infrastructure we belong to. e.g. hashicorp/stage
|
|
|
|
AtlasInfrastructure string `mapstructure:"atlas_infrastructure"`
|
2015-02-05 01:19:01 +00:00
|
|
|
|
|
|
|
// AtlasToken is our authentication token from Atlas
|
2015-02-09 19:32:12 +00:00
|
|
|
AtlasToken string `mapstructure:"atlas_token" json:"-"`
|
2015-02-05 01:19:01 +00:00
|
|
|
|
|
|
|
// AtlasACLToken is applied to inbound requests if no other token
|
|
|
|
// is provided. This takes higher precedence than the ACLToken.
|
|
|
|
// Without this, the ACLToken is used. If that is not specified either,
|
|
|
|
// then the 'anonymous' token is used. This can be set to 'anonymous'
|
|
|
|
// to reduce the Atlas privileges to below that of the ACLToken.
|
2015-02-09 19:32:12 +00:00
|
|
|
AtlasACLToken string `mapstructure:"atlas_acl_token" json:"-"`
|
2015-02-05 01:19:01 +00:00
|
|
|
|
2015-02-05 02:45:08 +00:00
|
|
|
// AtlasJoin controls if Atlas will attempt to auto-join the node
|
|
|
|
// to it's cluster. Requires Atlas integration.
|
|
|
|
AtlasJoin bool `mapstructure:"atlas_join"`
|
|
|
|
|
2015-08-27 18:08:01 +00:00
|
|
|
// AtlasEndpoint is the SCADA endpoint used for Atlas integration. If
|
|
|
|
// empty, the defaults from the provider are used.
|
|
|
|
AtlasEndpoint string `mapstructure:"atlas_endpoint"`
|
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// AEInterval controls the anti-entropy interval. This is how often
|
2015-06-06 03:31:33 +00:00
|
|
|
// the agent attempts to reconcile its local state with the server's
|
2014-04-11 22:22:35 +00:00
|
|
|
// representation of our state. Defaults to every 60s.
|
2014-05-29 18:24:37 +00:00
|
|
|
AEInterval time.Duration `mapstructure:"-" json:"-"`
|
2014-04-11 22:22:35 +00:00
|
|
|
|
2015-06-20 00:47:42 +00:00
|
|
|
// DisableCoordinates controls features related to network coordinates.
|
2015-07-30 18:22:56 +00:00
|
|
|
DisableCoordinates bool `mapstructure:"disable_coordinates"`
|
2015-06-06 03:31:33 +00:00
|
|
|
|
2015-06-30 19:02:05 +00:00
|
|
|
// SyncCoordinateRateTarget controls the rate for sending network
|
|
|
|
// coordinates to the server, in updates per second. This is the max rate
|
|
|
|
// that the server supports, so we scale our interval based on the size
|
|
|
|
// of the cluster to try to achieve this in aggregate at the server.
|
|
|
|
SyncCoordinateRateTarget float64 `mapstructure:"-" json:"-"`
|
|
|
|
|
|
|
|
// SyncCoordinateIntervalMin sets the minimum interval that coordinates
|
|
|
|
// will be sent to the server. We scale the interval based on the cluster
|
|
|
|
// size, but below a certain interval it doesn't make sense send them any
|
|
|
|
// faster.
|
|
|
|
SyncCoordinateIntervalMin time.Duration `mapstructure:"-" json:"-"`
|
2015-04-15 23:12:45 +00:00
|
|
|
|
2014-02-03 23:15:35 +00:00
|
|
|
// Checks holds the provided check definitions
|
2014-05-29 18:24:37 +00:00
|
|
|
Checks []*CheckDefinition `mapstructure:"-" json:"-"`
|
2014-02-03 23:15:35 +00:00
|
|
|
|
|
|
|
// Services holds the provided service definitions
|
2014-05-29 18:24:37 +00:00
|
|
|
Services []*ServiceDefinition `mapstructure:"-" json:"-"`
|
2014-02-03 23:15:35 +00:00
|
|
|
|
2013-12-20 23:33:13 +00:00
|
|
|
// ConsulConfig can either be provided or a default one created
|
2014-05-29 18:24:37 +00:00
|
|
|
ConsulConfig *consul.Config `mapstructure:"-" json:"-"`
|
2014-06-06 21:40:22 +00:00
|
|
|
|
|
|
|
// Revision is the GitCommit this maps to
|
|
|
|
Revision string `mapstructure:"-"`
|
|
|
|
|
|
|
|
// Version is the release version number
|
|
|
|
Version string `mapstructure:"-"`
|
|
|
|
|
|
|
|
// VersionPrerelease is a label for pre-release builds
|
|
|
|
VersionPrerelease string `mapstructure:"-"`
|
2014-08-21 20:09:13 +00:00
|
|
|
|
|
|
|
// WatchPlans contains the compiled watches
|
|
|
|
WatchPlans []*watch.WatchPlan `mapstructure:"-" json:"-"`
|
2015-01-20 21:44:27 +00:00
|
|
|
|
|
|
|
// UnixSockets is a map of socket configuration data
|
2015-01-21 02:53:18 +00:00
|
|
|
UnixSockets UnixSocketConfig `mapstructure:"unix_sockets"`
|
2015-03-27 05:30:04 +00:00
|
|
|
|
|
|
|
// Minimum Session TTL
|
|
|
|
SessionTTLMin time.Duration `mapstructure:"-"`
|
|
|
|
SessionTTLMinRaw string `mapstructure:"session_ttl_min"`
|
2015-01-21 02:53:18 +00:00
|
|
|
}
|
|
|
|
|
2015-01-21 04:30:59 +00:00
|
|
|
// UnixSocketPermissions contains information about a unix socket, and
|
2015-01-21 02:53:18 +00:00
|
|
|
// implements the FilePermissions interface.
|
2015-01-21 04:30:59 +00:00
|
|
|
type UnixSocketPermissions struct {
|
2015-01-21 02:53:18 +00:00
|
|
|
Usr string `mapstructure:"user"`
|
|
|
|
Grp string `mapstructure:"group"`
|
|
|
|
Perms string `mapstructure:"mode"`
|
|
|
|
}
|
|
|
|
|
2015-01-21 04:30:59 +00:00
|
|
|
func (u UnixSocketPermissions) User() string {
|
2015-01-21 02:53:18 +00:00
|
|
|
return u.Usr
|
|
|
|
}
|
|
|
|
|
2015-01-21 04:30:59 +00:00
|
|
|
func (u UnixSocketPermissions) Group() string {
|
2015-01-21 02:53:18 +00:00
|
|
|
return u.Grp
|
|
|
|
}
|
|
|
|
|
2015-01-21 04:30:59 +00:00
|
|
|
func (u UnixSocketPermissions) Mode() string {
|
2015-01-21 02:53:18 +00:00
|
|
|
return u.Perms
|
2013-12-20 01:14:46 +00:00
|
|
|
}
|
|
|
|
|
2015-01-21 04:30:59 +00:00
|
|
|
// UnixSocketConfig stores information about various unix sockets which
|
|
|
|
// Consul creates and uses for communication.
|
|
|
|
type UnixSocketConfig struct {
|
|
|
|
UnixSocketPermissions `mapstructure:",squash"`
|
2013-12-20 01:14:46 +00:00
|
|
|
}
|
|
|
|
|
2015-01-16 01:24:15 +00:00
|
|
|
// unixSocketAddr tests if a given address describes a domain socket,
|
|
|
|
// and returns the relevant path part of the string if it is.
|
|
|
|
func unixSocketAddr(addr string) (string, bool) {
|
2015-01-08 16:38:09 +00:00
|
|
|
if !strings.HasPrefix(addr, "unix://") {
|
2015-01-16 01:24:15 +00:00
|
|
|
return "", false
|
2015-01-08 16:38:09 +00:00
|
|
|
}
|
2015-01-16 01:24:15 +00:00
|
|
|
return strings.TrimPrefix(addr, "unix://"), true
|
2015-01-08 16:38:09 +00:00
|
|
|
}
|
|
|
|
|
2013-12-27 22:49:35 +00:00
|
|
|
type dirEnts []os.FileInfo
|
|
|
|
|
2013-12-20 01:14:46 +00:00
|
|
|
// DefaultConfig is used to return a sane default configuration
|
|
|
|
func DefaultConfig() *Config {
|
2013-12-20 23:33:13 +00:00
|
|
|
return &Config{
|
2014-06-20 00:08:48 +00:00
|
|
|
Bootstrap: false,
|
|
|
|
BootstrapExpect: 0,
|
|
|
|
Server: false,
|
|
|
|
Datacenter: consul.DefaultDC,
|
|
|
|
Domain: "consul.",
|
|
|
|
LogLevel: "INFO",
|
|
|
|
ClientAddr: "127.0.0.1",
|
|
|
|
BindAddr: "0.0.0.0",
|
2014-04-11 22:22:35 +00:00
|
|
|
Ports: PortConfig{
|
|
|
|
DNS: 8600,
|
|
|
|
HTTP: 8500,
|
2014-11-14 19:39:19 +00:00
|
|
|
HTTPS: -1,
|
2014-04-11 22:22:35 +00:00
|
|
|
RPC: 8400,
|
|
|
|
SerfLan: consul.DefaultLANSerfPort,
|
|
|
|
SerfWan: consul.DefaultWANSerfPort,
|
|
|
|
Server: 8300,
|
|
|
|
},
|
2014-06-08 22:26:33 +00:00
|
|
|
DNSConfig: DNSConfig{
|
|
|
|
MaxStale: 5 * time.Second,
|
|
|
|
},
|
2015-06-30 21:25:40 +00:00
|
|
|
StatsitePrefix: "consul",
|
|
|
|
SyslogFacility: "LOCAL0",
|
2015-10-16 02:28:31 +00:00
|
|
|
Protocol: consul.ProtocolVersion2Compatible,
|
2015-06-30 21:25:40 +00:00
|
|
|
CheckUpdateInterval: 5 * time.Minute,
|
|
|
|
AEInterval: time.Minute,
|
|
|
|
DisableCoordinates: false,
|
2015-06-30 19:02:05 +00:00
|
|
|
|
|
|
|
// SyncCoordinateRateTarget is set based on the rate that we want
|
|
|
|
// the server to handle as an aggregate across the entire cluster.
|
|
|
|
// If you update this, you'll need to adjust CoordinateUpdate* in
|
|
|
|
// the server-side config accordingly.
|
2015-07-01 00:12:31 +00:00
|
|
|
SyncCoordinateRateTarget: 64.0, // updates / second
|
|
|
|
SyncCoordinateIntervalMin: 15 * time.Second,
|
2015-06-30 19:02:05 +00:00
|
|
|
|
2015-06-30 21:25:40 +00:00
|
|
|
ACLTTL: 30 * time.Second,
|
|
|
|
ACLDownPolicy: "extend-cache",
|
|
|
|
ACLDefaultPolicy: "allow",
|
|
|
|
RetryInterval: 30 * time.Second,
|
|
|
|
RetryIntervalWan: 30 * time.Second,
|
2013-12-20 23:33:13 +00:00
|
|
|
}
|
2013-12-20 01:14:46 +00:00
|
|
|
}
|
2013-12-21 00:39:32 +00:00
|
|
|
|
|
|
|
// EncryptBytes returns the encryption key configured.
|
|
|
|
func (c *Config) EncryptBytes() ([]byte, error) {
|
|
|
|
return base64.StdEncoding.DecodeString(c.EncryptKey)
|
|
|
|
}
|
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// ClientListener is used to format a listener for a
|
|
|
|
// port on a ClientAddr
|
2015-01-08 16:38:09 +00:00
|
|
|
func (c *Config) ClientListener(override string, port int) (net.Addr, error) {
|
2014-09-02 19:47:40 +00:00
|
|
|
var addr string
|
|
|
|
if override != "" {
|
|
|
|
addr = override
|
|
|
|
} else {
|
|
|
|
addr = c.ClientAddr
|
|
|
|
}
|
2015-01-08 16:38:09 +00:00
|
|
|
|
2015-01-16 01:24:15 +00:00
|
|
|
if path, ok := unixSocketAddr(addr); ok {
|
|
|
|
return &net.UnixAddr{Name: path, Net: "unix"}, nil
|
|
|
|
}
|
|
|
|
ip := net.ParseIP(addr)
|
|
|
|
if ip == nil {
|
|
|
|
return nil, fmt.Errorf("Failed to parse IP: %v", addr)
|
2014-08-21 20:09:13 +00:00
|
|
|
}
|
2015-01-16 01:24:15 +00:00
|
|
|
return &net.TCPAddr{IP: ip, Port: port}, nil
|
2014-08-21 20:09:13 +00:00
|
|
|
}
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
// DecodeConfig reads the configuration from the given reader in JSON
|
|
|
|
// format and decodes it into a proper Config structure.
|
|
|
|
func DecodeConfig(r io.Reader) (*Config, error) {
|
|
|
|
var raw interface{}
|
2014-02-03 23:15:35 +00:00
|
|
|
var result Config
|
2013-12-21 00:39:32 +00:00
|
|
|
dec := json.NewDecoder(r)
|
|
|
|
if err := dec.Decode(&raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2014-02-03 23:15:35 +00:00
|
|
|
// Check the result type
|
|
|
|
if obj, ok := raw.(map[string]interface{}); ok {
|
2014-10-24 02:22:25 +00:00
|
|
|
// Check for a "services", "service" or "check" key, meaning
|
2014-02-03 23:15:35 +00:00
|
|
|
// this is actually a definition entry
|
2014-10-24 02:22:25 +00:00
|
|
|
if sub, ok := obj["services"]; ok {
|
|
|
|
if list, ok := sub.([]interface{}); ok {
|
|
|
|
for _, srv := range list {
|
|
|
|
service, err := DecodeServiceDefinition(srv)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
result.Services = append(result.Services, service)
|
|
|
|
}
|
|
|
|
}
|
2014-10-26 20:11:25 +00:00
|
|
|
}
|
|
|
|
if sub, ok := obj["service"]; ok {
|
2014-02-03 23:15:35 +00:00
|
|
|
service, err := DecodeServiceDefinition(sub)
|
2014-10-26 20:11:25 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2014-02-03 23:15:35 +00:00
|
|
|
result.Services = append(result.Services, service)
|
2014-10-26 20:11:25 +00:00
|
|
|
}
|
|
|
|
if sub, ok := obj["checks"]; ok {
|
|
|
|
if list, ok := sub.([]interface{}); ok {
|
|
|
|
for _, chk := range list {
|
|
|
|
check, err := DecodeCheckDefinition(chk)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
result.Checks = append(result.Checks, check)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if sub, ok := obj["check"]; ok {
|
2014-02-03 23:15:35 +00:00
|
|
|
check, err := DecodeCheckDefinition(sub)
|
2014-10-26 20:11:25 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2014-02-03 23:15:35 +00:00
|
|
|
result.Checks = append(result.Checks, check)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
// Decode
|
|
|
|
var md mapstructure.Metadata
|
|
|
|
msdec, err := mapstructure.NewDecoder(&mapstructure.DecoderConfig{
|
|
|
|
Metadata: &md,
|
|
|
|
Result: &result,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := msdec.Decode(raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-01-05 22:41:19 +00:00
|
|
|
// Check unused fields and verify that no bad configuration options were
|
|
|
|
// passed to Consul. There are a few additional fields which don't directly
|
|
|
|
// use mapstructure decoding, so we need to account for those as well.
|
|
|
|
allowedKeys := []string{"service", "services", "check", "checks"}
|
|
|
|
var unused []string
|
|
|
|
for _, field := range md.Unused {
|
|
|
|
if !strContains(allowedKeys, field) {
|
|
|
|
unused = append(unused, field)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(unused) > 0 {
|
|
|
|
return nil, fmt.Errorf("Config has invalid keys: %s", strings.Join(unused, ","))
|
|
|
|
}
|
|
|
|
|
2014-06-08 22:26:33 +00:00
|
|
|
// Handle time conversions
|
|
|
|
if raw := result.DNSConfig.NodeTTLRaw; raw != "" {
|
|
|
|
dur, err := time.ParseDuration(raw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("NodeTTL invalid: %v", err)
|
|
|
|
}
|
|
|
|
result.DNSConfig.NodeTTL = dur
|
|
|
|
}
|
|
|
|
|
|
|
|
if raw := result.DNSConfig.MaxStaleRaw; raw != "" {
|
|
|
|
dur, err := time.ParseDuration(raw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("MaxStale invalid: %v", err)
|
|
|
|
}
|
|
|
|
result.DNSConfig.MaxStale = dur
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(result.DNSConfig.ServiceTTLRaw) != 0 {
|
|
|
|
if result.DNSConfig.ServiceTTL == nil {
|
|
|
|
result.DNSConfig.ServiceTTL = make(map[string]time.Duration)
|
|
|
|
}
|
|
|
|
for service, raw := range result.DNSConfig.ServiceTTLRaw {
|
|
|
|
dur, err := time.ParseDuration(raw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("ServiceTTL %s invalid: %v", service, err)
|
|
|
|
}
|
|
|
|
result.DNSConfig.ServiceTTL[service] = dur
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-06-09 19:13:14 +00:00
|
|
|
if raw := result.CheckUpdateIntervalRaw; raw != "" {
|
|
|
|
dur, err := time.ParseDuration(raw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("CheckUpdateInterval invalid: %v", err)
|
|
|
|
}
|
|
|
|
result.CheckUpdateInterval = dur
|
|
|
|
}
|
|
|
|
|
2014-08-05 22:03:47 +00:00
|
|
|
if raw := result.ACLTTLRaw; raw != "" {
|
2014-08-05 18:05:55 +00:00
|
|
|
dur, err := time.ParseDuration(raw)
|
|
|
|
if err != nil {
|
2014-08-05 22:03:47 +00:00
|
|
|
return nil, fmt.Errorf("ACL TTL invalid: %v", err)
|
2014-08-05 18:05:55 +00:00
|
|
|
}
|
2014-08-05 22:03:47 +00:00
|
|
|
result.ACLTTL = dur
|
2014-08-05 18:05:55 +00:00
|
|
|
}
|
|
|
|
|
2014-10-12 17:50:15 +00:00
|
|
|
if raw := result.RetryIntervalRaw; raw != "" {
|
|
|
|
dur, err := time.ParseDuration(raw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("RetryInterval invalid: %v", err)
|
|
|
|
}
|
|
|
|
result.RetryInterval = dur
|
|
|
|
}
|
|
|
|
|
2014-11-17 22:14:59 +00:00
|
|
|
if raw := result.RetryIntervalWanRaw; raw != "" {
|
2014-11-14 15:02:42 +00:00
|
|
|
dur, err := time.ParseDuration(raw)
|
|
|
|
if err != nil {
|
2014-11-17 22:14:59 +00:00
|
|
|
return nil, fmt.Errorf("RetryIntervalWan invalid: %v", err)
|
2014-11-14 15:02:42 +00:00
|
|
|
}
|
2014-11-17 22:14:59 +00:00
|
|
|
result.RetryIntervalWan = dur
|
2014-11-14 15:02:42 +00:00
|
|
|
}
|
|
|
|
|
2014-11-03 19:28:21 +00:00
|
|
|
// Merge the single recursor
|
|
|
|
if result.DNSRecursor != "" {
|
|
|
|
result.DNSRecursors = append(result.DNSRecursors, result.DNSRecursor)
|
|
|
|
}
|
|
|
|
|
2015-03-27 05:30:04 +00:00
|
|
|
if raw := result.SessionTTLMinRaw; raw != "" {
|
|
|
|
dur, err := time.ParseDuration(raw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Session TTL Min invalid: %v", err)
|
|
|
|
}
|
|
|
|
result.SessionTTLMin = dur
|
|
|
|
}
|
|
|
|
|
2015-06-05 11:44:42 +00:00
|
|
|
if result.AdvertiseAddrs.SerfLanRaw != "" {
|
|
|
|
addr, err := net.ResolveTCPAddr("tcp", result.AdvertiseAddrs.SerfLanRaw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("AdvertiseAddrs.SerfLan is invalid: %v", err)
|
|
|
|
}
|
|
|
|
result.AdvertiseAddrs.SerfLan = addr
|
|
|
|
}
|
|
|
|
|
|
|
|
if result.AdvertiseAddrs.SerfWanRaw != "" {
|
|
|
|
addr, err := net.ResolveTCPAddr("tcp", result.AdvertiseAddrs.SerfWanRaw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("AdvertiseAddrs.SerfWan is invalid: %v", err)
|
|
|
|
}
|
|
|
|
result.AdvertiseAddrs.SerfWan = addr
|
|
|
|
}
|
|
|
|
|
|
|
|
if result.AdvertiseAddrs.RPCRaw != "" {
|
|
|
|
addr, err := net.ResolveTCPAddr("tcp", result.AdvertiseAddrs.RPCRaw)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("AdvertiseAddrs.RPC is invalid: %v", err)
|
|
|
|
}
|
|
|
|
result.AdvertiseAddrs.RPC = addr
|
|
|
|
}
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
return &result, nil
|
|
|
|
}
|
|
|
|
|
2014-02-03 23:15:35 +00:00
|
|
|
// DecodeServiceDefinition is used to decode a service definition
|
|
|
|
func DecodeServiceDefinition(raw interface{}) (*ServiceDefinition, error) {
|
|
|
|
rawMap, ok := raw.(map[string]interface{})
|
|
|
|
if !ok {
|
|
|
|
goto AFTER_FIX
|
|
|
|
}
|
2014-04-03 21:22:43 +00:00
|
|
|
|
|
|
|
// If no 'tags', handle the deprecated 'tag' value.
|
|
|
|
if _, ok := rawMap["tags"]; !ok {
|
|
|
|
if tag, ok := rawMap["tag"]; ok {
|
|
|
|
rawMap["tags"] = []interface{}{tag}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-01 02:27:37 +00:00
|
|
|
for k, v := range rawMap {
|
2015-01-14 01:52:17 +00:00
|
|
|
switch strings.ToLower(k) {
|
|
|
|
case "check":
|
|
|
|
if err := FixupCheckType(v); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
case "checks":
|
|
|
|
chkTypes, ok := v.([]interface{})
|
|
|
|
if !ok {
|
|
|
|
goto AFTER_FIX
|
|
|
|
}
|
|
|
|
for _, chkType := range chkTypes {
|
|
|
|
if err := FixupCheckType(chkType); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
2014-12-01 02:27:37 +00:00
|
|
|
}
|
|
|
|
}
|
2014-02-03 23:15:35 +00:00
|
|
|
AFTER_FIX:
|
|
|
|
var md mapstructure.Metadata
|
|
|
|
var result ServiceDefinition
|
|
|
|
msdec, err := mapstructure.NewDecoder(&mapstructure.DecoderConfig{
|
|
|
|
Metadata: &md,
|
|
|
|
Result: &result,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := msdec.Decode(raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func FixupCheckType(raw interface{}) error {
|
2015-02-02 08:29:42 +00:00
|
|
|
var ttlKey, intervalKey, timeoutKey string
|
2015-01-14 01:52:17 +00:00
|
|
|
|
2014-02-03 23:15:35 +00:00
|
|
|
// Handle decoding of time durations
|
|
|
|
rawMap, ok := raw.(map[string]interface{})
|
|
|
|
if !ok {
|
|
|
|
return nil
|
|
|
|
}
|
2014-04-25 02:44:27 +00:00
|
|
|
|
2015-01-14 01:52:17 +00:00
|
|
|
for k, v := range rawMap {
|
|
|
|
switch strings.ToLower(k) {
|
|
|
|
case "ttl":
|
2014-04-25 02:44:27 +00:00
|
|
|
ttlKey = k
|
2015-01-14 01:52:17 +00:00
|
|
|
case "interval":
|
2014-04-25 02:44:27 +00:00
|
|
|
intervalKey = k
|
2015-02-02 08:29:42 +00:00
|
|
|
case "timeout":
|
|
|
|
timeoutKey = k
|
2015-01-14 01:52:17 +00:00
|
|
|
case "service_id":
|
|
|
|
rawMap["serviceid"] = v
|
|
|
|
delete(rawMap, "service_id")
|
2014-04-25 02:44:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ttl, ok := rawMap[ttlKey]; ok {
|
2014-02-03 23:15:35 +00:00
|
|
|
ttlS, ok := ttl.(string)
|
|
|
|
if ok {
|
|
|
|
if dur, err := time.ParseDuration(ttlS); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
2014-04-25 02:44:27 +00:00
|
|
|
rawMap[ttlKey] = dur
|
2014-02-03 23:15:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-04-25 02:44:27 +00:00
|
|
|
|
|
|
|
if interval, ok := rawMap[intervalKey]; ok {
|
2014-02-03 23:15:35 +00:00
|
|
|
intervalS, ok := interval.(string)
|
|
|
|
if ok {
|
|
|
|
if dur, err := time.ParseDuration(intervalS); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
2014-04-25 02:44:27 +00:00
|
|
|
rawMap[intervalKey] = dur
|
2014-02-03 23:15:35 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-02-02 08:29:42 +00:00
|
|
|
|
|
|
|
if timeout, ok := rawMap[timeoutKey]; ok {
|
|
|
|
timeoutS, ok := timeout.(string)
|
|
|
|
if ok {
|
|
|
|
if dur, err := time.ParseDuration(timeoutS); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
rawMap[timeoutKey] = dur
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-03 23:15:35 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// DecodeCheckDefinition is used to decode a check definition
|
|
|
|
func DecodeCheckDefinition(raw interface{}) (*CheckDefinition, error) {
|
|
|
|
if err := FixupCheckType(raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
var md mapstructure.Metadata
|
|
|
|
var result CheckDefinition
|
|
|
|
msdec, err := mapstructure.NewDecoder(&mapstructure.DecoderConfig{
|
|
|
|
Metadata: &md,
|
|
|
|
Result: &result,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := msdec.Decode(raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &result, nil
|
|
|
|
}
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
// MergeConfig merges two configurations together to make a single new
|
|
|
|
// configuration.
|
|
|
|
func MergeConfig(a, b *Config) *Config {
|
|
|
|
var result Config = *a
|
|
|
|
|
|
|
|
// Copy the strings if they're set
|
2013-12-25 00:48:07 +00:00
|
|
|
if b.Bootstrap {
|
|
|
|
result.Bootstrap = true
|
|
|
|
}
|
2014-06-20 00:08:48 +00:00
|
|
|
if b.BootstrapExpect != 0 {
|
|
|
|
result.BootstrapExpect = b.BootstrapExpect
|
2014-06-16 21:36:12 +00:00
|
|
|
}
|
2013-12-21 00:39:32 +00:00
|
|
|
if b.Datacenter != "" {
|
|
|
|
result.Datacenter = b.Datacenter
|
|
|
|
}
|
|
|
|
if b.DataDir != "" {
|
|
|
|
result.DataDir = b.DataDir
|
|
|
|
}
|
2014-10-31 19:19:41 +00:00
|
|
|
|
|
|
|
// Copy the dns recursors
|
|
|
|
result.DNSRecursors = make([]string, 0, len(a.DNSRecursors)+len(b.DNSRecursors))
|
|
|
|
result.DNSRecursors = append(result.DNSRecursors, a.DNSRecursors...)
|
|
|
|
result.DNSRecursors = append(result.DNSRecursors, b.DNSRecursors...)
|
|
|
|
|
2014-01-02 23:50:52 +00:00
|
|
|
if b.Domain != "" {
|
|
|
|
result.Domain = b.Domain
|
|
|
|
}
|
2013-12-21 00:39:32 +00:00
|
|
|
if b.EncryptKey != "" {
|
|
|
|
result.EncryptKey = b.EncryptKey
|
|
|
|
}
|
|
|
|
if b.LogLevel != "" {
|
|
|
|
result.LogLevel = b.LogLevel
|
|
|
|
}
|
2014-03-09 22:57:03 +00:00
|
|
|
if b.Protocol > 0 {
|
|
|
|
result.Protocol = b.Protocol
|
|
|
|
}
|
2014-01-02 23:50:52 +00:00
|
|
|
if b.NodeName != "" {
|
|
|
|
result.NodeName = b.NodeName
|
|
|
|
}
|
2014-04-11 22:22:35 +00:00
|
|
|
if b.ClientAddr != "" {
|
|
|
|
result.ClientAddr = b.ClientAddr
|
2013-12-21 00:39:32 +00:00
|
|
|
}
|
2014-04-11 22:22:35 +00:00
|
|
|
if b.BindAddr != "" {
|
|
|
|
result.BindAddr = b.BindAddr
|
2013-12-21 00:39:32 +00:00
|
|
|
}
|
2014-01-02 23:50:52 +00:00
|
|
|
if b.AdvertiseAddr != "" {
|
|
|
|
result.AdvertiseAddr = b.AdvertiseAddr
|
|
|
|
}
|
2015-03-21 09:14:03 +00:00
|
|
|
if b.AdvertiseAddrWan != "" {
|
|
|
|
result.AdvertiseAddrWan = b.AdvertiseAddrWan
|
|
|
|
}
|
2015-06-05 11:44:42 +00:00
|
|
|
if b.AdvertiseAddrs.SerfLan != nil {
|
|
|
|
result.AdvertiseAddrs.SerfLan = b.AdvertiseAddrs.SerfLan
|
|
|
|
result.AdvertiseAddrs.SerfLanRaw = b.AdvertiseAddrs.SerfLanRaw
|
|
|
|
}
|
|
|
|
if b.AdvertiseAddrs.SerfWan != nil {
|
|
|
|
result.AdvertiseAddrs.SerfWan = b.AdvertiseAddrs.SerfWan
|
|
|
|
result.AdvertiseAddrs.SerfWanRaw = b.AdvertiseAddrs.SerfWanRaw
|
|
|
|
}
|
|
|
|
if b.AdvertiseAddrs.RPC != nil {
|
|
|
|
result.AdvertiseAddrs.RPC = b.AdvertiseAddrs.RPC
|
|
|
|
result.AdvertiseAddrs.RPCRaw = b.AdvertiseAddrs.RPCRaw
|
|
|
|
}
|
2013-12-21 00:39:32 +00:00
|
|
|
if b.Server == true {
|
|
|
|
result.Server = b.Server
|
|
|
|
}
|
|
|
|
if b.LeaveOnTerm == true {
|
|
|
|
result.LeaveOnTerm = true
|
|
|
|
}
|
|
|
|
if b.SkipLeaveOnInt == true {
|
|
|
|
result.SkipLeaveOnInt = true
|
|
|
|
}
|
2014-07-11 01:16:47 +00:00
|
|
|
if b.StatsiteAddr != "" {
|
|
|
|
result.StatsiteAddr = b.StatsiteAddr
|
|
|
|
}
|
2015-05-03 23:46:20 +00:00
|
|
|
if b.StatsitePrefix != "" {
|
|
|
|
result.StatsitePrefix = b.StatsitePrefix
|
|
|
|
}
|
2014-09-02 18:26:08 +00:00
|
|
|
if b.StatsdAddr != "" {
|
|
|
|
result.StatsdAddr = b.StatsdAddr
|
|
|
|
}
|
2014-03-20 00:49:57 +00:00
|
|
|
if b.EnableDebug {
|
|
|
|
result.EnableDebug = true
|
|
|
|
}
|
2014-04-04 23:52:39 +00:00
|
|
|
if b.VerifyIncoming {
|
|
|
|
result.VerifyIncoming = true
|
|
|
|
}
|
|
|
|
if b.VerifyOutgoing {
|
|
|
|
result.VerifyOutgoing = true
|
|
|
|
}
|
2015-05-11 22:13:58 +00:00
|
|
|
if b.VerifyServerHostname {
|
|
|
|
result.VerifyServerHostname = true
|
|
|
|
}
|
2014-04-04 23:52:39 +00:00
|
|
|
if b.CAFile != "" {
|
|
|
|
result.CAFile = b.CAFile
|
|
|
|
}
|
|
|
|
if b.CertFile != "" {
|
|
|
|
result.CertFile = b.CertFile
|
|
|
|
}
|
|
|
|
if b.KeyFile != "" {
|
|
|
|
result.KeyFile = b.KeyFile
|
|
|
|
}
|
2014-06-13 18:10:27 +00:00
|
|
|
if b.ServerName != "" {
|
|
|
|
result.ServerName = b.ServerName
|
|
|
|
}
|
2014-02-03 23:15:35 +00:00
|
|
|
if b.Checks != nil {
|
|
|
|
result.Checks = append(result.Checks, b.Checks...)
|
|
|
|
}
|
|
|
|
if b.Services != nil {
|
|
|
|
result.Services = append(result.Services, b.Services...)
|
|
|
|
}
|
2014-04-11 22:22:35 +00:00
|
|
|
if b.Ports.DNS != 0 {
|
|
|
|
result.Ports.DNS = b.Ports.DNS
|
|
|
|
}
|
|
|
|
if b.Ports.HTTP != 0 {
|
|
|
|
result.Ports.HTTP = b.Ports.HTTP
|
|
|
|
}
|
2014-11-14 19:39:19 +00:00
|
|
|
if b.Ports.HTTPS != 0 {
|
|
|
|
result.Ports.HTTPS = b.Ports.HTTPS
|
|
|
|
}
|
2014-04-11 22:22:35 +00:00
|
|
|
if b.Ports.RPC != 0 {
|
|
|
|
result.Ports.RPC = b.Ports.RPC
|
|
|
|
}
|
|
|
|
if b.Ports.SerfLan != 0 {
|
|
|
|
result.Ports.SerfLan = b.Ports.SerfLan
|
|
|
|
}
|
|
|
|
if b.Ports.SerfWan != 0 {
|
|
|
|
result.Ports.SerfWan = b.Ports.SerfWan
|
|
|
|
}
|
|
|
|
if b.Ports.Server != 0 {
|
|
|
|
result.Ports.Server = b.Ports.Server
|
|
|
|
}
|
2014-09-02 19:42:14 +00:00
|
|
|
if b.Addresses.DNS != "" {
|
|
|
|
result.Addresses.DNS = b.Addresses.DNS
|
|
|
|
}
|
|
|
|
if b.Addresses.HTTP != "" {
|
|
|
|
result.Addresses.HTTP = b.Addresses.HTTP
|
|
|
|
}
|
2014-11-14 19:39:19 +00:00
|
|
|
if b.Addresses.HTTPS != "" {
|
|
|
|
result.Addresses.HTTPS = b.Addresses.HTTPS
|
|
|
|
}
|
2014-09-02 19:42:14 +00:00
|
|
|
if b.Addresses.RPC != "" {
|
|
|
|
result.Addresses.RPC = b.Addresses.RPC
|
|
|
|
}
|
2014-04-23 19:36:49 +00:00
|
|
|
if b.UiDir != "" {
|
|
|
|
result.UiDir = b.UiDir
|
|
|
|
}
|
2014-05-06 03:29:50 +00:00
|
|
|
if b.PidFile != "" {
|
|
|
|
result.PidFile = b.PidFile
|
|
|
|
}
|
2014-05-21 19:06:03 +00:00
|
|
|
if b.EnableSyslog {
|
|
|
|
result.EnableSyslog = true
|
|
|
|
}
|
2014-05-21 19:32:24 +00:00
|
|
|
if b.RejoinAfterLeave {
|
|
|
|
result.RejoinAfterLeave = true
|
|
|
|
}
|
2014-10-12 17:50:15 +00:00
|
|
|
if b.RetryMaxAttempts != 0 {
|
|
|
|
result.RetryMaxAttempts = b.RetryMaxAttempts
|
|
|
|
}
|
2014-10-12 17:54:53 +00:00
|
|
|
if b.RetryInterval != 0 {
|
|
|
|
result.RetryInterval = b.RetryInterval
|
|
|
|
}
|
2014-11-17 22:14:59 +00:00
|
|
|
if b.RetryMaxAttemptsWan != 0 {
|
|
|
|
result.RetryMaxAttemptsWan = b.RetryMaxAttemptsWan
|
2014-11-14 15:02:42 +00:00
|
|
|
}
|
2014-11-17 22:14:59 +00:00
|
|
|
if b.RetryIntervalWan != 0 {
|
|
|
|
result.RetryIntervalWan = b.RetryIntervalWan
|
2014-11-14 15:02:42 +00:00
|
|
|
}
|
2014-06-08 22:26:33 +00:00
|
|
|
if b.DNSConfig.NodeTTL != 0 {
|
|
|
|
result.DNSConfig.NodeTTL = b.DNSConfig.NodeTTL
|
|
|
|
}
|
|
|
|
if len(b.DNSConfig.ServiceTTL) != 0 {
|
|
|
|
if result.DNSConfig.ServiceTTL == nil {
|
|
|
|
result.DNSConfig.ServiceTTL = make(map[string]time.Duration)
|
|
|
|
}
|
|
|
|
for service, dur := range b.DNSConfig.ServiceTTL {
|
|
|
|
result.DNSConfig.ServiceTTL[service] = dur
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if b.DNSConfig.AllowStale {
|
|
|
|
result.DNSConfig.AllowStale = true
|
|
|
|
}
|
2014-09-30 19:15:36 +00:00
|
|
|
if b.DNSConfig.EnableTruncate {
|
|
|
|
result.DNSConfig.EnableTruncate = true
|
|
|
|
}
|
2014-06-08 22:26:33 +00:00
|
|
|
if b.DNSConfig.MaxStale != 0 {
|
|
|
|
result.DNSConfig.MaxStale = b.DNSConfig.MaxStale
|
|
|
|
}
|
2015-01-10 12:11:32 +00:00
|
|
|
if b.DNSConfig.OnlyPassing {
|
|
|
|
result.DNSConfig.OnlyPassing = true
|
|
|
|
}
|
2014-06-10 04:34:19 +00:00
|
|
|
if b.CheckUpdateIntervalRaw != "" || b.CheckUpdateInterval != 0 {
|
2014-06-09 19:13:14 +00:00
|
|
|
result.CheckUpdateInterval = b.CheckUpdateInterval
|
|
|
|
}
|
2014-06-11 17:18:19 +00:00
|
|
|
if b.SyslogFacility != "" {
|
|
|
|
result.SyslogFacility = b.SyslogFacility
|
|
|
|
}
|
2014-08-05 18:05:55 +00:00
|
|
|
if b.ACLToken != "" {
|
|
|
|
result.ACLToken = b.ACLToken
|
|
|
|
}
|
2014-08-05 22:36:08 +00:00
|
|
|
if b.ACLMasterToken != "" {
|
|
|
|
result.ACLMasterToken = b.ACLMasterToken
|
|
|
|
}
|
2014-08-05 18:05:55 +00:00
|
|
|
if b.ACLDatacenter != "" {
|
|
|
|
result.ACLDatacenter = b.ACLDatacenter
|
|
|
|
}
|
2014-08-05 22:03:47 +00:00
|
|
|
if b.ACLTTLRaw != "" {
|
|
|
|
result.ACLTTL = b.ACLTTL
|
|
|
|
result.ACLTTLRaw = b.ACLTTLRaw
|
2014-08-05 18:05:55 +00:00
|
|
|
}
|
|
|
|
if b.ACLDownPolicy != "" {
|
|
|
|
result.ACLDownPolicy = b.ACLDownPolicy
|
|
|
|
}
|
2014-08-05 22:03:47 +00:00
|
|
|
if b.ACLDefaultPolicy != "" {
|
|
|
|
result.ACLDefaultPolicy = b.ACLDefaultPolicy
|
|
|
|
}
|
2014-08-19 21:19:31 +00:00
|
|
|
if len(b.Watches) != 0 {
|
|
|
|
result.Watches = append(result.Watches, b.Watches...)
|
|
|
|
}
|
2014-08-21 20:09:13 +00:00
|
|
|
if len(b.WatchPlans) != 0 {
|
|
|
|
result.WatchPlans = append(result.WatchPlans, b.WatchPlans...)
|
|
|
|
}
|
2014-08-29 18:24:01 +00:00
|
|
|
if b.DisableRemoteExec {
|
|
|
|
result.DisableRemoteExec = true
|
|
|
|
}
|
2014-09-02 21:49:23 +00:00
|
|
|
if b.DisableUpdateCheck {
|
|
|
|
result.DisableUpdateCheck = true
|
|
|
|
}
|
|
|
|
if b.DisableAnonymousSignature {
|
|
|
|
result.DisableAnonymousSignature = true
|
|
|
|
}
|
2015-01-21 02:53:18 +00:00
|
|
|
if b.UnixSockets.Usr != "" {
|
|
|
|
result.UnixSockets.Usr = b.UnixSockets.Usr
|
|
|
|
}
|
|
|
|
if b.UnixSockets.Grp != "" {
|
|
|
|
result.UnixSockets.Grp = b.UnixSockets.Grp
|
|
|
|
}
|
|
|
|
if b.UnixSockets.Perms != "" {
|
|
|
|
result.UnixSockets.Perms = b.UnixSockets.Perms
|
|
|
|
}
|
2015-02-06 20:44:55 +00:00
|
|
|
if b.AtlasInfrastructure != "" {
|
|
|
|
result.AtlasInfrastructure = b.AtlasInfrastructure
|
2015-02-05 01:19:01 +00:00
|
|
|
}
|
|
|
|
if b.AtlasToken != "" {
|
|
|
|
result.AtlasToken = b.AtlasToken
|
|
|
|
}
|
|
|
|
if b.AtlasACLToken != "" {
|
|
|
|
result.AtlasACLToken = b.AtlasACLToken
|
|
|
|
}
|
2015-02-05 02:45:08 +00:00
|
|
|
if b.AtlasJoin {
|
|
|
|
result.AtlasJoin = true
|
|
|
|
}
|
2015-08-27 18:08:01 +00:00
|
|
|
if b.AtlasEndpoint != "" {
|
|
|
|
result.AtlasEndpoint = b.AtlasEndpoint
|
|
|
|
}
|
2015-07-30 18:22:56 +00:00
|
|
|
if b.DisableCoordinates {
|
|
|
|
result.DisableCoordinates = true
|
|
|
|
}
|
2015-03-27 05:30:04 +00:00
|
|
|
if b.SessionTTLMinRaw != "" {
|
|
|
|
result.SessionTTLMin = b.SessionTTLMin
|
|
|
|
result.SessionTTLMinRaw = b.SessionTTLMinRaw
|
|
|
|
}
|
2014-12-28 04:53:19 +00:00
|
|
|
if len(b.HTTPAPIResponseHeaders) != 0 {
|
|
|
|
if result.HTTPAPIResponseHeaders == nil {
|
|
|
|
result.HTTPAPIResponseHeaders = make(map[string]string)
|
|
|
|
}
|
|
|
|
for field, value := range b.HTTPAPIResponseHeaders {
|
|
|
|
result.HTTPAPIResponseHeaders[field] = value
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-11 23:59:16 +00:00
|
|
|
// Copy the start join addresses
|
|
|
|
result.StartJoin = make([]string, 0, len(a.StartJoin)+len(b.StartJoin))
|
|
|
|
result.StartJoin = append(result.StartJoin, a.StartJoin...)
|
|
|
|
result.StartJoin = append(result.StartJoin, b.StartJoin...)
|
|
|
|
|
2014-11-14 15:02:42 +00:00
|
|
|
// Copy the start join addresses
|
2014-11-17 22:14:59 +00:00
|
|
|
result.StartJoinWan = make([]string, 0, len(a.StartJoinWan)+len(b.StartJoinWan))
|
|
|
|
result.StartJoinWan = append(result.StartJoinWan, a.StartJoinWan...)
|
|
|
|
result.StartJoinWan = append(result.StartJoinWan, b.StartJoinWan...)
|
2014-11-14 15:02:42 +00:00
|
|
|
|
2014-10-12 17:50:15 +00:00
|
|
|
// Copy the retry join addresses
|
|
|
|
result.RetryJoin = make([]string, 0, len(a.RetryJoin)+len(b.RetryJoin))
|
|
|
|
result.RetryJoin = append(result.RetryJoin, a.RetryJoin...)
|
|
|
|
result.RetryJoin = append(result.RetryJoin, b.RetryJoin...)
|
|
|
|
|
2014-11-14 15:02:42 +00:00
|
|
|
// Copy the retry join -wan addresses
|
2014-11-17 22:14:59 +00:00
|
|
|
result.RetryJoinWan = make([]string, 0, len(a.RetryJoinWan)+len(b.RetryJoinWan))
|
|
|
|
result.RetryJoinWan = append(result.RetryJoinWan, a.RetryJoinWan...)
|
|
|
|
result.RetryJoinWan = append(result.RetryJoinWan, b.RetryJoinWan...)
|
2014-11-14 15:02:42 +00:00
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
return &result
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadConfigPaths reads the paths in the given order to load configurations.
|
|
|
|
// The paths can be to files or directories. If the path is a directory,
|
|
|
|
// we read one directory deep and read any files ending in ".json" as
|
|
|
|
// configuration files.
|
|
|
|
func ReadConfigPaths(paths []string) (*Config, error) {
|
|
|
|
result := new(Config)
|
|
|
|
for _, path := range paths {
|
|
|
|
f, err := os.Open(path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error reading '%s': %s", path, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
fi, err := f.Stat()
|
|
|
|
if err != nil {
|
|
|
|
f.Close()
|
|
|
|
return nil, fmt.Errorf("Error reading '%s': %s", path, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !fi.IsDir() {
|
|
|
|
config, err := DecodeConfig(f)
|
|
|
|
f.Close()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error decoding '%s': %s", path, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
result = MergeConfig(result, config)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
contents, err := f.Readdir(-1)
|
|
|
|
f.Close()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error reading '%s': %s", path, err)
|
|
|
|
}
|
|
|
|
|
2013-12-27 22:49:35 +00:00
|
|
|
// Sort the contents, ensures lexical order
|
|
|
|
sort.Sort(dirEnts(contents))
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
for _, fi := range contents {
|
|
|
|
// Don't recursively read contents
|
|
|
|
if fi.IsDir() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// If it isn't a JSON file, ignore it
|
|
|
|
if !strings.HasSuffix(fi.Name(), ".json") {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
subpath := filepath.Join(path, fi.Name())
|
|
|
|
f, err := os.Open(subpath)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error reading '%s': %s", subpath, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
config, err := DecodeConfig(f)
|
|
|
|
f.Close()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error decoding '%s': %s", subpath, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
result = MergeConfig(result, config)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
}
|
2013-12-27 22:49:35 +00:00
|
|
|
|
|
|
|
// Implement the sort interface for dirEnts
|
|
|
|
func (d dirEnts) Len() int {
|
|
|
|
return len(d)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d dirEnts) Less(i, j int) bool {
|
|
|
|
return d[i].Name() < d[j].Name()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d dirEnts) Swap(i, j int) {
|
|
|
|
d[i], d[j] = d[j], d[i]
|
|
|
|
}
|