// ParseFlags is a helper function for parsing command line flags using Go's // Flag library. This is extracted into a helper to keep the main function // small, but it also makes writing tests for parsing command line arguments // much easier and cleaner. func (cli *CLI) ParseFlags(args []string) (*config.Config, bool, bool, bool, error) { var dry, once, version bool c := config.DefaultConfig() // configPaths stores the list of configuration paths on disk configPaths := make([]string, 0, 6) // Parse the flags and options flags := flag.NewFlagSet(Name, flag.ContinueOnError) flags.SetOutput(cli.errStream) flags.Usage = func() { fmt.Fprintf(cli.errStream, usage, Name) } flags.Var((funcVar)(func(s string) error { configPaths = append(configPaths, s) return nil }), "config", "") flags.Var((funcVar)(func(s string) error { c.Consul.Address = config.String(s) return nil }), "consul-addr", "") flags.Var((funcVar)(func(s string) error { a, err := config.ParseAuthConfig(s) if err != nil { return err } c.Consul.Auth = a return nil }), "consul-auth", "") flags.Var((funcBoolVar)(func(b bool) error { c.Consul.Retry.Enabled = config.Bool(b) return nil }), "consul-retry", "") flags.Var((funcIntVar)(func(i int) error { c.Consul.Retry.Attempts = config.Int(i) return nil }), "consul-retry-attempts", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.Consul.Retry.Backoff = config.TimeDuration(d) return nil }), "consul-retry-backoff", "") flags.Var((funcBoolVar)(func(b bool) error { c.Consul.SSL.Enabled = config.Bool(b) return nil }), "consul-ssl", "") flags.Var((funcVar)(func(s string) error { c.Consul.SSL.CaCert = config.String(s) return nil }), "consul-ssl-ca-cert", "") flags.Var((funcVar)(func(s string) error { c.Consul.SSL.CaPath = config.String(s) return nil }), "consul-ssl-ca-path", "") flags.Var((funcVar)(func(s string) error { c.Consul.SSL.Cert = config.String(s) return nil }), "consul-ssl-cert", "") flags.Var((funcVar)(func(s string) error { c.Consul.SSL.Key = config.String(s) return nil }), "consul-ssl-key", "") flags.Var((funcVar)(func(s string) error { c.Consul.SSL.ServerName = config.String(s) return nil }), "consul-ssl-server-name", "") flags.Var((funcBoolVar)(func(b bool) error { c.Consul.SSL.Verify = config.Bool(b) return nil }), "consul-ssl-verify", "") flags.Var((funcBoolVar)(func(b bool) error { c.Dedup.Enabled = config.Bool(b) return nil }), "dedup", "") flags.BoolVar(&dry, "dry", false, "") flags.Var((funcVar)(func(s string) error { c.Exec.Enabled = config.Bool(true) c.Exec.Command = config.String(s) return nil }), "exec", "") flags.Var((funcVar)(func(s string) error { sig, err := signals.Parse(s) if err != nil { return err } c.Exec.KillSignal = config.Signal(sig) return nil }), "exec-kill-signal", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.Exec.KillTimeout = config.TimeDuration(d) return nil }), "exec-kill-timeout", "") flags.Var((funcVar)(func(s string) error { sig, err := signals.Parse(s) if err != nil { return err } c.Exec.ReloadSignal = config.Signal(sig) return nil }), "exec-reload-signal", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.Exec.Splay = config.TimeDuration(d) return nil }), "exec-splay", "") flags.Var((funcVar)(func(s string) error { sig, err := signals.Parse(s) if err != nil { return err } c.KillSignal = config.Signal(sig) return nil }), "kill-signal", "") flags.Var((funcVar)(func(s string) error { c.LogLevel = config.String(s) return nil }), "log-level", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.MaxStale = config.TimeDuration(d) return nil }), "max-stale", "") flags.BoolVar(&once, "once", false, "") flags.Var((funcVar)(func(s string) error { c.PidFile = config.String(s) return nil }), "pid-file", "") flags.Var((funcVar)(func(s string) error { sig, err := signals.Parse(s) if err != nil { return err } c.ReloadSignal = config.Signal(sig) return nil }), "reload-signal", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.Consul.Retry.Backoff = config.TimeDuration(d) return nil }), "retry", "") flags.Var((funcBoolVar)(func(b bool) error { c.Syslog.Enabled = config.Bool(b) return nil }), "syslog", "") flags.Var((funcVar)(func(s string) error { c.Syslog.Facility = config.String(s) return nil }), "syslog-facility", "") flags.Var((funcVar)(func(s string) error { t, err := config.ParseTemplateConfig(s) if err != nil { return err } *c.Templates = append(*c.Templates, t) return nil }), "template", "") flags.Var((funcVar)(func(s string) error { c.Consul.Token = config.String(s) return nil }), "token", "") flags.Var((funcVar)(func(s string) error { c.Vault.Address = config.String(s) return nil }), "vault-addr", "") flags.Var((funcBoolVar)(func(b bool) error { c.Vault.RenewToken = config.Bool(b) return nil }), "vault-renew-token", "") flags.Var((funcBoolVar)(func(b bool) error { c.Vault.Retry.Enabled = config.Bool(b) return nil }), "vault-retry", "") flags.Var((funcIntVar)(func(i int) error { c.Vault.Retry.Attempts = config.Int(i) return nil }), "vault-retry-attempts", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.Vault.Retry.Backoff = config.TimeDuration(d) return nil }), "vault-retry-backoff", "") flags.Var((funcBoolVar)(func(b bool) error { c.Vault.SSL.Enabled = config.Bool(b) return nil }), "vault-ssl", "") flags.Var((funcVar)(func(s string) error { c.Vault.SSL.CaCert = config.String(s) return nil }), "vault-ssl-ca-cert", "") flags.Var((funcVar)(func(s string) error { c.Vault.SSL.CaPath = config.String(s) return nil }), "vault-ssl-ca-path", "") flags.Var((funcVar)(func(s string) error { c.Vault.SSL.Cert = config.String(s) return nil }), "vault-ssl-cert", "") flags.Var((funcVar)(func(s string) error { c.Vault.SSL.Key = config.String(s) return nil }), "vault-ssl-key", "") flags.Var((funcVar)(func(s string) error { c.Vault.SSL.ServerName = config.String(s) return nil }), "vault-ssl-server-name", "") flags.Var((funcBoolVar)(func(b bool) error { c.Vault.SSL.Verify = config.Bool(b) return nil }), "vault-ssl-verify", "") flags.Var((funcVar)(func(s string) error { c.Vault.Token = config.String(s) return nil }), "vault-token", "") flags.Var((funcBoolVar)(func(b bool) error { c.Vault.UnwrapToken = config.Bool(b) return nil }), "vault-unwrap-token", "") flags.Var((funcVar)(func(s string) error { w, err := config.ParseWaitConfig(s) if err != nil { return err } c.Wait = w return nil }), "wait", "") flags.BoolVar(&version, "v", false, "") flags.BoolVar(&version, "version", false, "") // TODO: Deprecations for i, a := range args { if a == "-auth" || strings.HasPrefix(a, "-auth=") { log.Println("[WARN] -auth has been renamed to -consul-auth") args[i] = strings.Replace(a, "-auth", "-consul-auth", 1) } if a == "-consul" || strings.HasPrefix(a, "-consul=") { log.Println("[WARN] -consul has been renamed to -consul-addr") args[i] = strings.Replace(a, "-consul", "-consul-addr", 1) } if strings.HasPrefix(a, "-ssl") { log.Println("[WARN] -ssl options should be prefixed with -consul") args[i] = strings.Replace(a, "-ssl", "-consul-ssl", 1) } } // If there was a parser error, stop if err := flags.Parse(args); err != nil { return nil, false, false, false, err } // Error if extra arguments are present args = flags.Args() if len(args) > 0 { return nil, false, false, false, fmt.Errorf("cli: extra args: %q", args) } // Create the final configuration finalC := config.DefaultConfig() // Merge all the provided configurations in the order supplied for _, path := range configPaths { c, err := config.FromPath(path) if err != nil { return nil, false, false, false, err } finalC = finalC.Merge(c) } // Add any CLI configuration options, since that's highest precedence finalC = finalC.Merge(c) // Finalize the configuration finalC.Finalize() return finalC, once, dry, version, nil }
// init() creates the Runner's underlying data structures and returns an error // if any problems occur. func (r *Runner) init() error { // Ensure default configuration values r.config = config.DefaultConfig().Merge(r.config) // Print the final config for debugging result, err := json.Marshal(r.config) if err != nil { return err } log.Printf("[DEBUG] (runner) final config: %s", result) // Create the clientset clients, err := newClientSet(r.config) if err != nil { return fmt.Errorf("runner: %s", err) } // Create the watcher watcher, err := newWatcher(r.config, clients, r.once) if err != nil { return fmt.Errorf("runner: %s", err) } r.watcher = watcher numTemplates := len(*r.config.Templates) templates := make([]*template.Template, 0, numTemplates) ctemplatesMap := make(map[string]config.TemplateConfigs) // Iterate over each TemplateConfig, creating a new Template resource for each // entry. Templates are parsed and saved, and a map of templates to their // config templates is kept so templates can lookup their commands and output // destinations. for _, ctmpl := range *r.config.Templates { tmpl, err := template.NewTemplate(&template.NewTemplateInput{ Source: config.StringVal(ctmpl.Source), Contents: config.StringVal(ctmpl.Contents), LeftDelim: config.StringVal(ctmpl.LeftDelim), RightDelim: config.StringVal(ctmpl.RightDelim), }) if err != nil { return err } if _, ok := ctemplatesMap[tmpl.ID()]; !ok { templates = append(templates, tmpl) } if _, ok := ctemplatesMap[tmpl.ID()]; !ok { ctemplatesMap[tmpl.ID()] = make([]*config.TemplateConfig, 0, 1) } ctemplatesMap[tmpl.ID()] = append(ctemplatesMap[tmpl.ID()], ctmpl) } // Convert the map of templates (which was only used to ensure uniqueness) // back into an array of templates. r.templates = templates r.renderEvents = make(map[string]*RenderEvent, numTemplates) r.dependencies = make(map[string]dep.Dependency) r.renderedCh = make(chan struct{}, 1) r.ctemplatesMap = ctemplatesMap r.inStream = os.Stdin r.outStream = os.Stdout r.errStream = os.Stderr r.brain = template.NewBrain() r.ErrCh = make(chan error) r.DoneCh = make(chan struct{}) r.quiescenceMap = make(map[string]*quiescence) r.quiescenceCh = make(chan *template.Template) // Setup the dedup manager if needed. This is if config.BoolVal(r.config.Dedup.Enabled) { if r.once { log.Printf("[INFO] (runner) disabling de-duplication in once mode") } else { r.dedup, err = NewDedupManager(r.config.Dedup, clients, r.brain, r.templates) if err != nil { return err } } } return nil }