// DefaultConfig returns the default configuration struct. func DefaultConfig() *Config { logLevel := os.Getenv("CONSUL_REPLICATE_LOG") if logLevel == "" { logLevel = "WARN" } return &Config{ Auth: &AuthConfig{ Enabled: false, }, SSL: &SSLConfig{ Enabled: false, Verify: true, }, Syslog: &SyslogConfig{ Enabled: false, Facility: "LOCAL0", }, LogLevel: logLevel, Prefixes: []*Prefix{}, Excludes: []*Exclude{}, Retry: 5 * time.Second, StatusDir: "service/consul-replicate/statuses", Wait: &config.WaitConfig{ Min: config.TimeDuration(150 * time.Millisecond), Max: config.TimeDuration(400 * time.Millisecond), }, setKeys: make(map[string]struct{}), } }
func TestParseFlags_wait(t *testing.T) { cli := NewCLI(ioutil.Discard, ioutil.Discard) c, _, _, err := cli.parseFlags([]string{ "-wait", "10h:11h", }) if err != nil { t.Fatal(err) } expected := &config.WaitConfig{ Min: config.TimeDuration(10 * time.Hour), Max: config.TimeDuration(11 * time.Hour), } if !reflect.DeepEqual(c.Wait, expected) { t.Errorf("expected %v to be %v", c.Wait, expected) } if !c.WasSet("wait") { t.Errorf("expected wait to be set") } }
// ParseFlags is a helper function for parsing command line flags using Go's // Flag library. This is extracted into a helper to keep the main function // small, but it also makes writing tests for parsing command line arguments // much easier and cleaner. func (cli *CLI) ParseFlags(args []string) (*config.Config, bool, bool, bool, error) { var dry, once, version bool c := config.DefaultConfig() // configPaths stores the list of configuration paths on disk configPaths := make([]string, 0, 6) // Parse the flags and options flags := flag.NewFlagSet(Name, flag.ContinueOnError) flags.SetOutput(cli.errStream) flags.Usage = func() { fmt.Fprintf(cli.errStream, usage, Name) } flags.Var((funcVar)(func(s string) error { configPaths = append(configPaths, s) return nil }), "config", "") flags.Var((funcVar)(func(s string) error { c.Consul.Address = config.String(s) return nil }), "consul-addr", "") flags.Var((funcVar)(func(s string) error { a, err := config.ParseAuthConfig(s) if err != nil { return err } c.Consul.Auth = a return nil }), "consul-auth", "") flags.Var((funcBoolVar)(func(b bool) error { c.Consul.Retry.Enabled = config.Bool(b) return nil }), "consul-retry", "") flags.Var((funcIntVar)(func(i int) error { c.Consul.Retry.Attempts = config.Int(i) return nil }), "consul-retry-attempts", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.Consul.Retry.Backoff = config.TimeDuration(d) return nil }), "consul-retry-backoff", "") flags.Var((funcBoolVar)(func(b bool) error { c.Consul.SSL.Enabled = config.Bool(b) return nil }), "consul-ssl", "") flags.Var((funcVar)(func(s string) error { c.Consul.SSL.CaCert = config.String(s) return nil }), "consul-ssl-ca-cert", "") flags.Var((funcVar)(func(s string) error { c.Consul.SSL.CaPath = config.String(s) return nil }), "consul-ssl-ca-path", "") flags.Var((funcVar)(func(s string) error { c.Consul.SSL.Cert = config.String(s) return nil }), "consul-ssl-cert", "") flags.Var((funcVar)(func(s string) error { c.Consul.SSL.Key = config.String(s) return nil }), "consul-ssl-key", "") flags.Var((funcVar)(func(s string) error { c.Consul.SSL.ServerName = config.String(s) return nil }), "consul-ssl-server-name", "") flags.Var((funcBoolVar)(func(b bool) error { c.Consul.SSL.Verify = config.Bool(b) return nil }), "consul-ssl-verify", "") flags.Var((funcBoolVar)(func(b bool) error { c.Dedup.Enabled = config.Bool(b) return nil }), "dedup", "") flags.BoolVar(&dry, "dry", false, "") flags.Var((funcVar)(func(s string) error { c.Exec.Enabled = config.Bool(true) c.Exec.Command = config.String(s) return nil }), "exec", "") flags.Var((funcVar)(func(s string) error { sig, err := signals.Parse(s) if err != nil { return err } c.Exec.KillSignal = config.Signal(sig) return nil }), "exec-kill-signal", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.Exec.KillTimeout = config.TimeDuration(d) return nil }), "exec-kill-timeout", "") flags.Var((funcVar)(func(s string) error { sig, err := signals.Parse(s) if err != nil { return err } c.Exec.ReloadSignal = config.Signal(sig) return nil }), "exec-reload-signal", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.Exec.Splay = config.TimeDuration(d) return nil }), "exec-splay", "") flags.Var((funcVar)(func(s string) error { sig, err := signals.Parse(s) if err != nil { return err } c.KillSignal = config.Signal(sig) return nil }), "kill-signal", "") flags.Var((funcVar)(func(s string) error { c.LogLevel = config.String(s) return nil }), "log-level", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.MaxStale = config.TimeDuration(d) return nil }), "max-stale", "") flags.BoolVar(&once, "once", false, "") flags.Var((funcVar)(func(s string) error { c.PidFile = config.String(s) return nil }), "pid-file", "") flags.Var((funcVar)(func(s string) error { sig, err := signals.Parse(s) if err != nil { return err } c.ReloadSignal = config.Signal(sig) return nil }), "reload-signal", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.Consul.Retry.Backoff = config.TimeDuration(d) return nil }), "retry", "") flags.Var((funcBoolVar)(func(b bool) error { c.Syslog.Enabled = config.Bool(b) return nil }), "syslog", "") flags.Var((funcVar)(func(s string) error { c.Syslog.Facility = config.String(s) return nil }), "syslog-facility", "") flags.Var((funcVar)(func(s string) error { t, err := config.ParseTemplateConfig(s) if err != nil { return err } *c.Templates = append(*c.Templates, t) return nil }), "template", "") flags.Var((funcVar)(func(s string) error { c.Consul.Token = config.String(s) return nil }), "token", "") flags.Var((funcVar)(func(s string) error { c.Vault.Address = config.String(s) return nil }), "vault-addr", "") flags.Var((funcBoolVar)(func(b bool) error { c.Vault.RenewToken = config.Bool(b) return nil }), "vault-renew-token", "") flags.Var((funcBoolVar)(func(b bool) error { c.Vault.Retry.Enabled = config.Bool(b) return nil }), "vault-retry", "") flags.Var((funcIntVar)(func(i int) error { c.Vault.Retry.Attempts = config.Int(i) return nil }), "vault-retry-attempts", "") flags.Var((funcDurationVar)(func(d time.Duration) error { c.Vault.Retry.Backoff = config.TimeDuration(d) return nil }), "vault-retry-backoff", "") flags.Var((funcBoolVar)(func(b bool) error { c.Vault.SSL.Enabled = config.Bool(b) return nil }), "vault-ssl", "") flags.Var((funcVar)(func(s string) error { c.Vault.SSL.CaCert = config.String(s) return nil }), "vault-ssl-ca-cert", "") flags.Var((funcVar)(func(s string) error { c.Vault.SSL.CaPath = config.String(s) return nil }), "vault-ssl-ca-path", "") flags.Var((funcVar)(func(s string) error { c.Vault.SSL.Cert = config.String(s) return nil }), "vault-ssl-cert", "") flags.Var((funcVar)(func(s string) error { c.Vault.SSL.Key = config.String(s) return nil }), "vault-ssl-key", "") flags.Var((funcVar)(func(s string) error { c.Vault.SSL.ServerName = config.String(s) return nil }), "vault-ssl-server-name", "") flags.Var((funcBoolVar)(func(b bool) error { c.Vault.SSL.Verify = config.Bool(b) return nil }), "vault-ssl-verify", "") flags.Var((funcVar)(func(s string) error { c.Vault.Token = config.String(s) return nil }), "vault-token", "") flags.Var((funcBoolVar)(func(b bool) error { c.Vault.UnwrapToken = config.Bool(b) return nil }), "vault-unwrap-token", "") flags.Var((funcVar)(func(s string) error { w, err := config.ParseWaitConfig(s) if err != nil { return err } c.Wait = w return nil }), "wait", "") flags.BoolVar(&version, "v", false, "") flags.BoolVar(&version, "version", false, "") // TODO: Deprecations for i, a := range args { if a == "-auth" || strings.HasPrefix(a, "-auth=") { log.Println("[WARN] -auth has been renamed to -consul-auth") args[i] = strings.Replace(a, "-auth", "-consul-auth", 1) } if a == "-consul" || strings.HasPrefix(a, "-consul=") { log.Println("[WARN] -consul has been renamed to -consul-addr") args[i] = strings.Replace(a, "-consul", "-consul-addr", 1) } if strings.HasPrefix(a, "-ssl") { log.Println("[WARN] -ssl options should be prefixed with -consul") args[i] = strings.Replace(a, "-ssl", "-consul-ssl", 1) } } // If there was a parser error, stop if err := flags.Parse(args); err != nil { return nil, false, false, false, err } // Error if extra arguments are present args = flags.Args() if len(args) > 0 { return nil, false, false, false, fmt.Errorf("cli: extra args: %q", args) } // Create the final configuration finalC := config.DefaultConfig() // Merge all the provided configurations in the order supplied for _, path := range configPaths { c, err := config.FromPath(path) if err != nil { return nil, false, false, false, err } finalC = finalC.Merge(c) } // Add any CLI configuration options, since that's highest precedence finalC = finalC.Merge(c) // Finalize the configuration finalC.Finalize() return finalC, once, dry, version, nil }
func TestParseConfig_correctValues(t *testing.T) { configFile := test.CreateTempfile([]byte(` consul = "nyc1.demo.consul.io" max_stale = "5s" token = "abcd1234" wait = "5s:10s" retry = "10s" pid_file = "/var/run/ct" log_level = "warn" status_dir = "global/statuses/replicators" auth { enabled = true username = "******" password = "******" } ssl { enabled = true verify = false } syslog { enabled = true facility = "LOCAL5" } `), t) defer test.DeleteTempfile(configFile, t) c, err := ParseConfig(configFile.Name()) if err != nil { t.Fatal(err) } expected := &Config{ Path: configFile.Name(), PidFile: "/var/run/ct", Consul: "nyc1.demo.consul.io", Token: "abcd1234", MaxStale: time.Second * 5, Auth: &AuthConfig{ Enabled: true, Username: "******", Password: "******", }, Prefixes: []*Prefix{}, Excludes: []*Exclude{}, SSL: &SSLConfig{ Enabled: true, Verify: false, }, Syslog: &SyslogConfig{ Enabled: true, Facility: "LOCAL5", }, Wait: &config.WaitConfig{ Min: config.TimeDuration(time.Second * 5), Max: config.TimeDuration(time.Second * 10), }, Retry: 10 * time.Second, LogLevel: "warn", StatusDir: "global/statuses/replicators", setKeys: c.setKeys, } if !reflect.DeepEqual(c, expected) { t.Fatalf("expected \n%#v\n\n, got \n\n%#v\n\n", expected, c) } }