forked from projectcalico/confd
-
Notifications
You must be signed in to change notification settings - Fork 1
/
config.go
339 lines (317 loc) · 10.4 KB
/
config.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
package main
import (
"errors"
"flag"
"fmt"
"io/ioutil"
"net"
"os"
"path/filepath"
"strconv"
"strings"
"github.com/BurntSushi/toml"
"github.com/kelseyhightower/confd/backends"
"github.com/kelseyhightower/confd/log"
"github.com/kelseyhightower/confd/resource/template"
)
var (
configFile = ""
defaultConfigFile = "/etc/confd/confd.toml"
authToken string
authType string
backend string
basicAuth bool
clientCaKeys string
clientCert string
clientKey string
confdir string
config Config // holds the global confd config.
interval int
keepStageFile bool
logLevel string
nodes Nodes
noop bool
onetime bool
prefix string
printVersion bool
scheme string
srvDomain string
srvRecord string
syncOnly bool
table string
templateConfig template.Config
backendsConfig backends.Config
username string
password string
watch bool
appID string
userID string
yamlFile string
kubeconfig string
)
// A Config structure is used to configure confd.
type Config struct {
AuthToken string `toml:"auth_token"`
AuthType string `toml:"auth_type"`
Backend string `toml:"backend"`
BasicAuth bool `toml:"basic_auth"`
BackendNodes []string `toml:"nodes"`
ClientCaKeys string `toml:"client_cakeys"`
ClientCert string `toml:"client_cert"`
ClientKey string `toml:"client_key"`
ConfDir string `toml:"confdir"`
Interval int `toml:"interval"`
Noop bool `toml:"noop"`
Password string `toml:"password"`
Prefix string `toml:"prefix"`
SRVDomain string `toml:"srv_domain"`
SRVRecord string `toml:"srv_record"`
Scheme string `toml:"scheme"`
SyncOnly bool `toml:"sync-only"`
Table string `toml:"table"`
Username string `toml:"username"`
LogLevel string `toml:"log-level"`
Watch bool `toml:"watch"`
AppID string `toml:"app_id"`
UserID string `toml:"user_id"`
YAMLFile string `toml:"file"`
KubeConfig string `toml:"kubeconfig"`
}
func init() {
flag.StringVar(&authToken, "auth-token", "", "Auth bearer token to use")
flag.StringVar(&backend, "backend", "etcd", "backend to use")
flag.BoolVar(&basicAuth, "basic-auth", false, "Use Basic Auth to authenticate (only used with -backend=etcd)")
flag.StringVar(&clientCaKeys, "client-ca-keys", "", "client ca keys")
flag.StringVar(&clientCert, "client-cert", "", "the client cert")
flag.StringVar(&clientKey, "client-key", "", "the client key")
flag.StringVar(&confdir, "confdir", "/etc/confd", "confd conf directory")
flag.StringVar(&configFile, "config-file", "", "the confd config file")
flag.StringVar(&yamlFile, "file", "", "the YAML/JSON file to watch for changes")
flag.IntVar(&interval, "interval", 600, "backend polling interval")
flag.BoolVar(&keepStageFile, "keep-stage-file", false, "keep staged files")
flag.StringVar(&logLevel, "log-level", "", "level which confd should log messages")
flag.Var(&nodes, "node", "list of backend nodes")
flag.BoolVar(&noop, "noop", false, "only show pending changes")
flag.BoolVar(&onetime, "onetime", false, "run once and exit")
flag.StringVar(&prefix, "prefix", "", "key path prefix")
flag.BoolVar(&printVersion, "version", false, "print version and exit")
flag.StringVar(&scheme, "scheme", "http", "the backend URI scheme for nodes retrieved from DNS SRV records (http or https)")
flag.StringVar(&srvDomain, "srv-domain", "", "the name of the resource record")
flag.StringVar(&srvRecord, "srv-record", "", "the SRV record to search for backends nodes. Example: _etcd-client._tcp.example.com")
flag.BoolVar(&syncOnly, "sync-only", false, "sync without check_cmd and reload_cmd")
flag.StringVar(&authType, "auth-type", "", "Vault auth backend type to use (only used with -backend=vault)")
flag.StringVar(&appID, "app-id", "", "Vault app-id to use with the app-id backend (only used with -backend=vault and auth-type=app-id)")
flag.StringVar(&userID, "user-id", "", "Vault user-id to use with the app-id backend (only used with -backend=value and auth-type=app-id)")
flag.StringVar(&table, "table", "", "the name of the DynamoDB table (only used with -backend=dynamodb)")
flag.StringVar(&username, "username", "", "the username to authenticate as (only used with vault and etcd backends)")
flag.StringVar(&password, "password", "", "the password to authenticate with (only used with vault and etcd backends)")
flag.BoolVar(&watch, "watch", false, "enable watch support")
flag.StringVar(&kubeconfig, "kubeconfig", "", "Kubernetes kubeconfig file path")
}
// initConfig initializes the confd configuration by first setting defaults,
// then overriding settings from the confd config file, then overriding
// settings from environment variables, and finally overriding
// settings from flags set on the command line.
// It returns an error if any.
func initConfig() error {
if configFile == "" {
if _, err := os.Stat(defaultConfigFile); !os.IsNotExist(err) {
configFile = defaultConfigFile
}
}
// Set defaults.
config = Config{
Backend: "etcd",
ConfDir: "/etc/confd",
Interval: 600,
Prefix: "",
Scheme: "http",
}
// Update config from the TOML configuration file.
if configFile == "" {
log.Info("Skipping confd config file.")
} else {
log.Info("Loading " + configFile)
configBytes, err := ioutil.ReadFile(configFile)
if err != nil {
return err
}
_, err = toml.Decode(string(configBytes), &config)
if err != nil {
return err
}
}
// Update config from environment variables.
processEnv()
// Update config from commandline flags.
processFlags()
if config.LogLevel != "" {
log.SetLevel(config.LogLevel)
}
if config.SRVDomain != "" && config.SRVRecord == "" {
config.SRVRecord = fmt.Sprintf("_%s._tcp.%s.", config.Backend, config.SRVDomain)
}
// Update BackendNodes from SRV records.
if config.Backend != "env" && config.SRVRecord != "" {
log.Info("SRV record set to " + config.SRVRecord)
srvNodes, err := getBackendNodesFromSRV(config.SRVRecord, config.Scheme)
if err != nil {
return errors.New("Cannot get nodes from SRV records " + err.Error())
}
config.BackendNodes = srvNodes
}
if len(config.BackendNodes) == 0 {
switch config.Backend {
case "consul":
config.BackendNodes = []string{"127.0.0.1:8500"}
case "etcd":
peerstr := os.Getenv("ETCDCTL_PEERS")
if len(peerstr) > 0 {
config.BackendNodes = strings.Split(peerstr, ",")
} else {
config.BackendNodes = []string{"http://127.0.0.1:4001"}
}
case "etcdv3":
config.BackendNodes = []string{"127.0.0.1:2379"}
case "redis":
config.BackendNodes = []string{"127.0.0.1:6379"}
case "vault":
config.BackendNodes = []string{"http://127.0.0.1:8200"}
case "zookeeper":
config.BackendNodes = []string{"127.0.0.1:2181"}
}
}
// Initialize the storage client
log.Info("Backend set to " + config.Backend)
if config.Watch {
unsupportedBackends := map[string]bool{
"redis": true,
"dynamodb": true,
"rancher": true,
"k8s": true,
}
if unsupportedBackends[config.Backend] {
log.Info(fmt.Sprintf("Watch is not supported for backend %s. Exiting...", config.Backend))
os.Exit(1)
}
}
if config.Backend == "dynamodb" && config.Table == "" {
return errors.New("No DynamoDB table configured")
}
backendsConfig = backends.Config{
AuthToken: config.AuthToken,
AuthType: config.AuthType,
Backend: config.Backend,
BasicAuth: config.BasicAuth,
ClientCaKeys: config.ClientCaKeys,
ClientCert: config.ClientCert,
ClientKey: config.ClientKey,
BackendNodes: config.BackendNodes,
Password: config.Password,
Scheme: config.Scheme,
Table: config.Table,
Username: config.Username,
AppID: config.AppID,
UserID: config.UserID,
YAMLFile: config.YAMLFile,
Kubeconfig: config.KubeConfig,
}
// Template configuration.
templateConfig = template.Config{
ConfDir: config.ConfDir,
ConfigDir: filepath.Join(config.ConfDir, "conf.d"),
KeepStageFile: keepStageFile,
Noop: config.Noop,
Prefix: config.Prefix,
SyncOnly: config.SyncOnly,
TemplateDir: filepath.Join(config.ConfDir, "templates"),
}
return nil
}
func getBackendNodesFromSRV(record, scheme string) ([]string, error) {
nodes := make([]string, 0)
// Ignore the CNAME as we don't need it.
_, addrs, err := net.LookupSRV("", "", record)
if err != nil {
return nodes, err
}
for _, srv := range addrs {
host := strings.TrimRight(srv.Target, ".")
port := strconv.FormatUint(uint64(srv.Port), 10)
nodes = append(nodes, fmt.Sprintf("%s://%s", scheme, net.JoinHostPort(host, port)))
}
return nodes, nil
}
// processFlags iterates through each flag set on the command line and
// overrides corresponding configuration settings.
func processFlags() {
flag.Visit(setConfigFromFlag)
}
func processEnv() {
cakeys := os.Getenv("CONFD_CLIENT_CAKEYS")
if len(cakeys) > 0 {
config.ClientCaKeys = cakeys
}
cert := os.Getenv("CONFD_CLIENT_CERT")
if len(cert) > 0 {
config.ClientCert = cert
}
key := os.Getenv("CONFD_CLIENT_KEY")
if len(key) > 0 {
config.ClientKey = key
}
}
func setConfigFromFlag(f *flag.Flag) {
switch f.Name {
case "auth-token":
config.AuthToken = authToken
case "auth-type":
config.AuthType = authType
case "backend":
config.Backend = backend
case "basic-auth":
config.BasicAuth = basicAuth
case "client-cert":
config.ClientCert = clientCert
case "client-key":
config.ClientKey = clientKey
case "client-ca-keys":
config.ClientCaKeys = clientCaKeys
case "confdir":
config.ConfDir = confdir
case "node":
config.BackendNodes = nodes
case "interval":
config.Interval = interval
case "noop":
config.Noop = noop
case "password":
config.Password = password
case "prefix":
config.Prefix = prefix
case "scheme":
config.Scheme = scheme
case "srv-domain":
config.SRVDomain = srvDomain
case "srv-record":
config.SRVRecord = srvRecord
case "sync-only":
config.SyncOnly = syncOnly
case "table":
config.Table = table
case "username":
config.Username = username
case "log-level":
config.LogLevel = logLevel
case "watch":
config.Watch = watch
case "app-id":
config.AppID = appID
case "user-id":
config.UserID = userID
case "file":
config.YAMLFile = yamlFile
case "kubeconfig":
config.KubeConfig = kubeconfig
}
}