2015-01-21 21:00:14 +00:00
|
|
|
package command
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
|
|
|
// MaintCommand is a Command implementation that enables or disables
|
|
|
|
// node or service maintenance mode.
|
|
|
|
type MaintCommand struct {
|
pkg refactor
command/agent/* -> agent/*
command/consul/* -> agent/consul/*
command/agent/command{,_test}.go -> command/agent{,_test}.go
command/base/command.go -> command/base.go
command/base/* -> command/*
commands.go -> command/commands.go
The script which did the refactor is:
(
cd $GOPATH/src/github.com/hashicorp/consul
git mv command/agent/command.go command/agent.go
git mv command/agent/command_test.go command/agent_test.go
git mv command/agent/flag_slice_value{,_test}.go command/
git mv command/agent .
git mv command/base/command.go command/base.go
git mv command/base/config_util{,_test}.go command/
git mv commands.go command/
git mv consul agent
rmdir command/base/
gsed -i -e 's|package agent|package command|' command/agent{,_test}.go
gsed -i -e 's|package agent|package command|' command/flag_slice_value{,_test}.go
gsed -i -e 's|package base|package command|' command/base.go command/config_util{,_test}.go
gsed -i -e 's|package main|package command|' command/commands.go
gsed -i -e 's|base.Command|BaseCommand|' command/commands.go
gsed -i -e 's|agent.Command|AgentCommand|' command/commands.go
gsed -i -e 's|\tCommand:|\tBaseCommand:|' command/commands.go
gsed -i -e 's|base\.||' command/commands.go
gsed -i -e 's|command\.||' command/commands.go
gsed -i -e 's|command|c|' main.go
gsed -i -e 's|range Commands|range command.Commands|' main.go
gsed -i -e 's|Commands: Commands|Commands: command.Commands|' main.go
gsed -i -e 's|base\.BoolValue|BoolValue|' command/operator_autopilot_set.go
gsed -i -e 's|base\.DurationValue|DurationValue|' command/operator_autopilot_set.go
gsed -i -e 's|base\.StringValue|StringValue|' command/operator_autopilot_set.go
gsed -i -e 's|base\.UintValue|UintValue|' command/operator_autopilot_set.go
gsed -i -e 's|\bCommand\b|BaseCommand|' command/base.go
gsed -i -e 's|BaseCommand Options|Command Options|' command/base.go
gsed -i -e 's|base.Command|BaseCommand|' command/*.go
gsed -i -e 's|c\.Command|c.BaseCommand|g' command/*.go
gsed -i -e 's|\tCommand:|\tBaseCommand:|' command/*_test.go
gsed -i -e 's|base\.||' command/*_test.go
gsed -i -e 's|\bCommand\b|AgentCommand|' command/agent{,_test}.go
gsed -i -e 's|cmd.AgentCommand|cmd.BaseCommand|' command/agent.go
gsed -i -e 's|cli.AgentCommand = new(Command)|cli.Command = new(AgentCommand)|' command/agent_test.go
gsed -i -e 's|exec.AgentCommand|exec.Command|' command/agent_test.go
gsed -i -e 's|exec.BaseCommand|exec.Command|' command/agent_test.go
gsed -i -e 's|NewTestAgent|agent.NewTestAgent|' command/agent_test.go
gsed -i -e 's|= TestConfig|= agent.TestConfig|' command/agent_test.go
gsed -i -e 's|: RetryJoin|: agent.RetryJoin|' command/agent_test.go
gsed -i -e 's|\.\./\.\./|../|' command/config_util_test.go
gsed -i -e 's|\bverifyUniqueListeners|VerifyUniqueListeners|' agent/config{,_test}.go command/agent.go
gsed -i -e 's|\bserfLANKeyring\b|SerfLANKeyring|g' agent/{agent,keyring,testagent}.go command/agent.go
gsed -i -e 's|\bserfWANKeyring\b|SerfWANKeyring|g' agent/{agent,keyring,testagent}.go command/agent.go
gsed -i -e 's|\bNewAgent\b|agent.New|g' command/agent{,_test}.go
gsed -i -e 's|\bNewAgent|New|' agent/{acl_test,agent,testagent}.go
gsed -i -e 's|\bAgent\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bBool\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bDefaultConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bDevConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bMergeConfig\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bReadConfigPaths\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bParseMetaPair\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bSerfLANKeyring\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|\bSerfWANKeyring\b|agent.&|g' command/agent{,_test}.go
gsed -i -e 's|circonus\.agent|circonus|g' command/agent{,_test}.go
gsed -i -e 's|logger\.agent|logger|g' command/agent{,_test}.go
gsed -i -e 's|metrics\.agent|metrics|g' command/agent{,_test}.go
gsed -i -e 's|// agent.Agent|// agent|' command/agent{,_test}.go
gsed -i -e 's|a\.agent\.Config|a.Config|' command/agent{,_test}.go
gsed -i -e 's|agent\.AppendSliceValue|AppendSliceValue|' command/{configtest,validate}.go
gsed -i -e 's|consul/consul|agent/consul|' GNUmakefile
gsed -i -e 's|\.\./test|../../test|' agent/consul/server_test.go
# fix imports
f=$(grep -rl 'github.com/hashicorp/consul/command/agent' * | grep '\.go')
gsed -i -e 's|github.com/hashicorp/consul/command/agent|github.com/hashicorp/consul/agent|' $f
goimports -w $f
f=$(grep -rl 'github.com/hashicorp/consul/consul' * | grep '\.go')
gsed -i -e 's|github.com/hashicorp/consul/consul|github.com/hashicorp/consul/agent/consul|' $f
goimports -w $f
goimports -w command/*.go main.go
)
2017-06-09 22:28:28 +00:00
|
|
|
BaseCommand
|
2017-10-11 12:51:18 +00:00
|
|
|
|
|
|
|
// flags
|
|
|
|
enable bool
|
|
|
|
disable bool
|
|
|
|
reason string
|
|
|
|
serviceID string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *MaintCommand) initFlags() {
|
|
|
|
c.InitFlagSet()
|
|
|
|
c.FlagSet.BoolVar(&c.enable, "enable", false,
|
|
|
|
"Enable maintenance mode.")
|
|
|
|
c.FlagSet.BoolVar(&c.disable, "disable", false,
|
|
|
|
"Disable maintenance mode.")
|
|
|
|
c.FlagSet.StringVar(&c.reason, "reason", "",
|
|
|
|
"Text describing the maintenance reason.")
|
|
|
|
c.FlagSet.StringVar(&c.serviceID, "service", "",
|
|
|
|
"Control maintenance mode for a specific service ID.")
|
2015-01-21 21:00:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *MaintCommand) Help() string {
|
2017-10-11 12:51:18 +00:00
|
|
|
c.initFlags()
|
|
|
|
return c.HelpCommand(`
|
2015-01-21 21:00:14 +00:00
|
|
|
Usage: consul maint [options]
|
|
|
|
|
|
|
|
Places a node or service into maintenance mode. During maintenance mode,
|
|
|
|
the node or service will be excluded from all queries through the DNS
|
|
|
|
or API interfaces, effectively taking it out of the pool of available
|
|
|
|
nodes. This is done by registering an additional critical health check.
|
|
|
|
|
|
|
|
When enabling maintenance mode for a node or service, you may optionally
|
|
|
|
specify a reason string. This string will appear in the "Notes" field
|
|
|
|
of the critical health check which is registered against the node or
|
|
|
|
service. If no reason is provided, a default value will be used.
|
|
|
|
|
|
|
|
Maintenance mode is persistent, and will be restored in the event of an
|
|
|
|
agent restart. It is therefore required to disable maintenance mode on
|
|
|
|
a given node or service before it will be placed back into the pool.
|
|
|
|
|
|
|
|
By default, we operate on the node as a whole. By specifying the
|
|
|
|
"-service" argument, this behavior can be changed to enable or disable
|
|
|
|
only a specific service.
|
|
|
|
|
2015-01-22 18:26:17 +00:00
|
|
|
If no arguments are given, the agent's maintenance status will be shown.
|
|
|
|
This will return blank if nothing is currently under maintenance.
|
|
|
|
|
2017-10-11 12:51:18 +00:00
|
|
|
`)
|
2015-01-21 21:00:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *MaintCommand) Run(args []string) int {
|
2017-10-11 12:51:18 +00:00
|
|
|
c.initFlags()
|
|
|
|
if err := c.FlagSet.Parse(args); err != nil {
|
2015-01-21 21:00:14 +00:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure we don't have conflicting args
|
2017-10-11 12:51:18 +00:00
|
|
|
if c.enable && c.disable {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Error("Only one of -enable or -disable may be provided")
|
2015-01-21 21:00:14 +00:00
|
|
|
return 1
|
|
|
|
}
|
2017-10-11 12:51:18 +00:00
|
|
|
if !c.enable && c.reason != "" {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Error("Reason may only be provided with -enable")
|
2015-01-21 21:00:14 +00:00
|
|
|
return 1
|
|
|
|
}
|
2017-10-11 12:51:18 +00:00
|
|
|
if !c.enable && !c.disable && c.serviceID != "" {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Error("Service requires either -enable or -disable")
|
2015-01-22 19:20:32 +00:00
|
|
|
return 1
|
|
|
|
}
|
2015-01-21 21:00:14 +00:00
|
|
|
|
|
|
|
// Create and test the HTTP client
|
2017-10-11 12:51:18 +00:00
|
|
|
client, err := c.HTTPClient()
|
2015-01-21 21:00:14 +00:00
|
|
|
if err != nil {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Error(fmt.Sprintf("Error connecting to Consul agent: %s", err))
|
2015-01-21 21:00:14 +00:00
|
|
|
return 1
|
|
|
|
}
|
2015-01-22 18:26:17 +00:00
|
|
|
a := client.Agent()
|
|
|
|
nodeName, err := a.NodeName()
|
|
|
|
if err != nil {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Error(fmt.Sprintf("Error querying Consul agent: %s", err))
|
2015-01-21 21:00:14 +00:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2017-10-11 12:51:18 +00:00
|
|
|
if !c.enable && !c.disable {
|
2015-01-22 18:26:17 +00:00
|
|
|
// List mode - list nodes/services in maintenance mode
|
|
|
|
checks, err := a.Checks()
|
|
|
|
if err != nil {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Error(fmt.Sprintf("Error getting checks: %s", err))
|
2015-01-22 18:26:17 +00:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, check := range checks {
|
2015-01-22 19:14:28 +00:00
|
|
|
if check.CheckID == "_node_maintenance" {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Output("Node:")
|
|
|
|
c.UI.Output(" Name: " + nodeName)
|
|
|
|
c.UI.Output(" Reason: " + check.Notes)
|
|
|
|
c.UI.Output("")
|
2016-06-07 20:24:51 +00:00
|
|
|
} else if strings.HasPrefix(string(check.CheckID), "_service_maintenance:") {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Output("Service:")
|
|
|
|
c.UI.Output(" ID: " + check.ServiceID)
|
|
|
|
c.UI.Output(" Reason: " + check.Notes)
|
|
|
|
c.UI.Output("")
|
2015-01-22 18:26:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2017-10-11 12:51:18 +00:00
|
|
|
if c.enable {
|
2015-01-21 21:00:14 +00:00
|
|
|
// Enable node maintenance
|
2017-10-11 12:51:18 +00:00
|
|
|
if c.serviceID == "" {
|
|
|
|
if err := a.EnableNodeMaintenance(c.reason); err != nil {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Error(fmt.Sprintf("Error enabling node maintenance: %s", err))
|
2015-01-21 21:00:14 +00:00
|
|
|
return 1
|
|
|
|
}
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Output("Node maintenance is now enabled")
|
2015-01-21 21:00:14 +00:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// Enable service maintenance
|
2017-10-11 12:51:18 +00:00
|
|
|
if err := a.EnableServiceMaintenance(c.serviceID, c.reason); err != nil {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Error(fmt.Sprintf("Error enabling service maintenance: %s", err))
|
2015-01-21 21:00:14 +00:00
|
|
|
return 1
|
|
|
|
}
|
2017-10-11 12:51:18 +00:00
|
|
|
c.UI.Output(fmt.Sprintf("Service maintenance is now enabled for %q", c.serviceID))
|
2015-01-21 21:11:23 +00:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2017-10-11 12:51:18 +00:00
|
|
|
if c.disable {
|
2015-01-21 21:11:23 +00:00
|
|
|
// Disable node maintenance
|
2017-10-11 12:51:18 +00:00
|
|
|
if c.serviceID == "" {
|
2015-01-22 18:26:17 +00:00
|
|
|
if err := a.DisableNodeMaintenance(); err != nil {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Error(fmt.Sprintf("Error disabling node maintenance: %s", err))
|
2015-01-21 21:11:23 +00:00
|
|
|
return 1
|
|
|
|
}
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Output("Node maintenance is now disabled")
|
2015-01-21 21:11:23 +00:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// Disable service maintenance
|
2017-10-11 12:51:18 +00:00
|
|
|
if err := a.DisableServiceMaintenance(c.serviceID); err != nil {
|
2017-04-21 00:02:42 +00:00
|
|
|
c.UI.Error(fmt.Sprintf("Error disabling service maintenance: %s", err))
|
2015-01-21 21:11:23 +00:00
|
|
|
return 1
|
|
|
|
}
|
2017-10-11 12:51:18 +00:00
|
|
|
c.UI.Output(fmt.Sprintf("Service maintenance is now disabled for %q", c.serviceID))
|
2015-01-21 21:11:23 +00:00
|
|
|
return 0
|
2015-01-21 21:00:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *MaintCommand) Synopsis() string {
|
|
|
|
return "Controls node or service maintenance mode"
|
|
|
|
}
|