2013-12-20 01:14:46 +00:00
|
|
|
package agent
|
|
|
|
|
2013-12-20 23:33:13 +00:00
|
|
|
import (
|
2013-12-21 00:39:32 +00:00
|
|
|
"encoding/base64"
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2013-12-20 23:33:13 +00:00
|
|
|
"github.com/hashicorp/consul/consul"
|
2013-12-21 00:39:32 +00:00
|
|
|
"github.com/mitchellh/mapstructure"
|
|
|
|
"io"
|
2014-04-11 22:22:35 +00:00
|
|
|
"net"
|
2013-12-21 00:39:32 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2013-12-27 22:49:35 +00:00
|
|
|
"sort"
|
2013-12-21 00:39:32 +00:00
|
|
|
"strings"
|
2014-01-15 22:17:40 +00:00
|
|
|
"time"
|
2013-12-20 23:33:13 +00:00
|
|
|
)
|
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// Ports is used to simplify the configuration by
|
|
|
|
// providing default ports, and allowing the addresses
|
|
|
|
// to only be specified once
|
|
|
|
type PortConfig struct {
|
|
|
|
DNS int // DNS Query interface
|
|
|
|
HTTP int // HTTP API
|
|
|
|
RPC int // CLI RPC
|
|
|
|
SerfLan int `mapstructure:"serf_lan"` // LAN gossip (Client + Server)
|
2014-04-11 22:46:55 +00:00
|
|
|
SerfWan int `mapstructure:"serf_wan"` // WAN gossip (Server onlyg)
|
2014-04-11 22:22:35 +00:00
|
|
|
Server int // Server internal RPC
|
|
|
|
}
|
|
|
|
|
2013-12-20 01:14:46 +00:00
|
|
|
// Config is the configuration that can be set for an Agent.
|
|
|
|
// Some of this is configurable as CLI flags, but most must
|
|
|
|
// be set using a configuration file.
|
|
|
|
type Config struct {
|
2013-12-25 00:48:07 +00:00
|
|
|
// Bootstrap is used to bring up the first Consul server, and
|
|
|
|
// permits that node to elect itself leader
|
2014-02-07 19:49:51 +00:00
|
|
|
Bootstrap bool `mapstructure:"bootstrap"`
|
2013-12-25 00:48:07 +00:00
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// Server controls if this agent acts like a Consul server,
|
|
|
|
// or merely as a client. Servers have more state, take part
|
|
|
|
// in leader election, etc.
|
|
|
|
Server bool `mapstructure:"server"`
|
|
|
|
|
2013-12-20 23:33:13 +00:00
|
|
|
// Datacenter is the datacenter this node is in. Defaults to dc1
|
2014-02-07 19:49:51 +00:00
|
|
|
Datacenter string `mapstructure:"datacenter"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
|
|
|
// DataDir is the directory to store our state in
|
2014-02-07 19:49:51 +00:00
|
|
|
DataDir string `mapstructure:"data_dir"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
2014-01-03 23:43:35 +00:00
|
|
|
// DNSRecursor can be set to allow the DNS server to recursively
|
|
|
|
// resolve non-consul domains
|
2014-02-07 19:49:51 +00:00
|
|
|
DNSRecursor string `mapstructure:"recursor"`
|
2014-01-03 23:43:35 +00:00
|
|
|
|
2014-01-02 23:50:52 +00:00
|
|
|
// Domain is the DNS domain for the records. Defaults to "consul."
|
2014-02-07 19:49:51 +00:00
|
|
|
Domain string `mapstructure:"domain"`
|
2014-01-02 23:50:52 +00:00
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
// Encryption key to use for the Serf communication
|
2014-02-07 19:49:51 +00:00
|
|
|
EncryptKey string `mapstructure:"encrypt"`
|
2013-12-21 00:39:32 +00:00
|
|
|
|
2013-12-20 23:33:13 +00:00
|
|
|
// LogLevel is the level of the logs to putout
|
2014-02-07 19:49:51 +00:00
|
|
|
LogLevel string `mapstructure:"log_level"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
|
|
|
// Node name is the name we use to advertise. Defaults to hostname.
|
2014-02-07 19:49:51 +00:00
|
|
|
NodeName string `mapstructure:"node_name"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// ClientAddr is used to control the address we bind to for
|
|
|
|
// client services (DNS, HTTP, RPC)
|
|
|
|
ClientAddr string `mapstructure:"client_addr"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// BindAddr is used to control the address we bind to.
|
|
|
|
// If not specified, the first private IP we find is used.
|
|
|
|
// This controls the address we use for cluster facing
|
|
|
|
// services (Gossip, Server RPC)
|
|
|
|
BindAddr string `mapstructure:"bind_addr"`
|
2013-12-20 23:33:13 +00:00
|
|
|
|
2014-01-01 00:45:13 +00:00
|
|
|
// AdvertiseAddr is the address we use for advertising our Serf,
|
2014-04-11 22:22:35 +00:00
|
|
|
// and Consul RPC IP. If not specified, bind address is used.
|
2014-02-07 19:49:51 +00:00
|
|
|
AdvertiseAddr string `mapstructure:"advertise_addr"`
|
2014-01-01 00:45:13 +00:00
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// Port configurations
|
|
|
|
Ports PortConfig
|
2013-12-20 23:33:13 +00:00
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
// LeaveOnTerm controls if Serf does a graceful leave when receiving
|
|
|
|
// the TERM signal. Defaults false. This can be changed on reload.
|
|
|
|
LeaveOnTerm bool `mapstructure:"leave_on_terminate"`
|
|
|
|
|
|
|
|
// SkipLeaveOnInt controls if Serf skips a graceful leave when receiving
|
|
|
|
// the INT signal. Defaults false. This can be changed on reload.
|
|
|
|
SkipLeaveOnInt bool `mapstructure:"skip_leave_on_interrupt"`
|
|
|
|
|
2014-02-20 22:59:54 +00:00
|
|
|
// StatsiteAddr is the address of a statsite instance. If provided,
|
|
|
|
// metrics will be streamed to that instance.
|
|
|
|
StatsiteAddr string `mapstructure:"statsite_addr"`
|
|
|
|
|
2014-03-09 22:57:03 +00:00
|
|
|
// Protocol is the Consul protocol version to use.
|
|
|
|
Protocol int `mapstructure:"protocol"`
|
|
|
|
|
2014-03-20 00:49:57 +00:00
|
|
|
// EnableDebug is used to enable various debugging features
|
|
|
|
EnableDebug bool `mapstructure:"enable_debug"`
|
|
|
|
|
2014-04-04 23:52:39 +00:00
|
|
|
// VerifyIncoming is used to verify the authenticity of incoming connections.
|
|
|
|
// This means that TCP requests are forbidden, only allowing for TLS. TLS connections
|
|
|
|
// must match a provided certificate authority. This can be used to force client auth.
|
|
|
|
VerifyIncoming bool `mapstructure:"verify_incoming"`
|
|
|
|
|
|
|
|
// VerifyOutgoing is used to verify the authenticity of outgoing connections.
|
|
|
|
// This means that TLS requests are used. TLS connections must match a provided
|
|
|
|
// certificate authority. This is used to verify authenticity of server nodes.
|
|
|
|
VerifyOutgoing bool `mapstructure:"verify_outgoing"`
|
|
|
|
|
|
|
|
// CAFile is a path to a certificate authority file. This is used with VerifyIncoming
|
|
|
|
// or VerifyOutgoing to verify the TLS connection.
|
|
|
|
CAFile string `mapstructure:"ca_file"`
|
|
|
|
|
|
|
|
// CertFile is used to provide a TLS certificate that is used for serving TLS connections.
|
|
|
|
// Must be provided to serve TLS connections.
|
|
|
|
CertFile string `mapstructure:"cert_file"`
|
|
|
|
|
|
|
|
// KeyFile is used to provide a TLS key that is used for serving TLS connections.
|
|
|
|
// Must be provided to serve TLS connections.
|
|
|
|
KeyFile string `mapstructure:"key_file"`
|
|
|
|
|
2014-04-11 23:59:16 +00:00
|
|
|
// StartJoin is a list of addresses to attempt to join when the
|
|
|
|
// agent starts. If Serf is unable to communicate with any of these
|
|
|
|
// addresses, then the agent will error and exit.
|
|
|
|
StartJoin []string `mapstructure:"start_join"`
|
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// AEInterval controls the anti-entropy interval. This is how often
|
|
|
|
// the agent attempts to reconcile it's local state with the server'
|
|
|
|
// representation of our state. Defaults to every 60s.
|
|
|
|
AEInterval time.Duration `mapstructure:"-"`
|
|
|
|
|
2014-02-03 23:15:35 +00:00
|
|
|
// Checks holds the provided check definitions
|
2014-02-07 19:49:51 +00:00
|
|
|
Checks []*CheckDefinition `mapstructure:"-"`
|
2014-02-03 23:15:35 +00:00
|
|
|
|
|
|
|
// Services holds the provided service definitions
|
2014-02-07 19:49:51 +00:00
|
|
|
Services []*ServiceDefinition `mapstructure:"-"`
|
2014-02-03 23:15:35 +00:00
|
|
|
|
2013-12-20 23:33:13 +00:00
|
|
|
// ConsulConfig can either be provided or a default one created
|
2014-02-07 19:49:51 +00:00
|
|
|
ConsulConfig *consul.Config `mapstructure:"-"`
|
2013-12-20 01:14:46 +00:00
|
|
|
}
|
|
|
|
|
2013-12-27 22:49:35 +00:00
|
|
|
type dirEnts []os.FileInfo
|
|
|
|
|
2013-12-20 01:14:46 +00:00
|
|
|
// DefaultConfig is used to return a sane default configuration
|
|
|
|
func DefaultConfig() *Config {
|
2013-12-20 23:33:13 +00:00
|
|
|
return &Config{
|
2014-04-11 22:22:35 +00:00
|
|
|
Bootstrap: false,
|
|
|
|
Server: false,
|
|
|
|
Datacenter: consul.DefaultDC,
|
|
|
|
Domain: "consul.",
|
|
|
|
LogLevel: "INFO",
|
|
|
|
ClientAddr: "127.0.0.1",
|
2014-04-11 22:46:55 +00:00
|
|
|
BindAddr: "0.0.0.0",
|
2014-04-11 22:22:35 +00:00
|
|
|
Ports: PortConfig{
|
|
|
|
DNS: 8600,
|
|
|
|
HTTP: 8500,
|
|
|
|
RPC: 8400,
|
|
|
|
SerfLan: consul.DefaultLANSerfPort,
|
|
|
|
SerfWan: consul.DefaultWANSerfPort,
|
|
|
|
Server: 8300,
|
|
|
|
},
|
|
|
|
Protocol: consul.ProtocolVersionMax,
|
|
|
|
AEInterval: time.Minute,
|
2013-12-20 23:33:13 +00:00
|
|
|
}
|
2013-12-20 01:14:46 +00:00
|
|
|
}
|
2013-12-21 00:39:32 +00:00
|
|
|
|
|
|
|
// EncryptBytes returns the encryption key configured.
|
|
|
|
func (c *Config) EncryptBytes() ([]byte, error) {
|
|
|
|
return base64.StdEncoding.DecodeString(c.EncryptKey)
|
|
|
|
}
|
|
|
|
|
2014-04-11 22:22:35 +00:00
|
|
|
// ClientListener is used to format a listener for a
|
|
|
|
// port on a ClientAddr
|
|
|
|
func (c *Config) ClientListener(port int) (*net.TCPAddr, error) {
|
|
|
|
ip := net.ParseIP(c.ClientAddr)
|
|
|
|
if ip == nil {
|
|
|
|
return nil, fmt.Errorf("Failed to parse IP: %v", c.ClientAddr)
|
|
|
|
}
|
|
|
|
return &net.TCPAddr{IP: ip, Port: port}, nil
|
|
|
|
}
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
// DecodeConfig reads the configuration from the given reader in JSON
|
|
|
|
// format and decodes it into a proper Config structure.
|
|
|
|
func DecodeConfig(r io.Reader) (*Config, error) {
|
|
|
|
var raw interface{}
|
2014-02-03 23:15:35 +00:00
|
|
|
var result Config
|
2013-12-21 00:39:32 +00:00
|
|
|
dec := json.NewDecoder(r)
|
|
|
|
if err := dec.Decode(&raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2014-02-03 23:15:35 +00:00
|
|
|
// Check the result type
|
|
|
|
if obj, ok := raw.(map[string]interface{}); ok {
|
|
|
|
// Check for a "service" or "check" key, meaning
|
|
|
|
// this is actually a definition entry
|
|
|
|
if sub, ok := obj["service"]; ok {
|
|
|
|
service, err := DecodeServiceDefinition(sub)
|
|
|
|
result.Services = append(result.Services, service)
|
|
|
|
return &result, err
|
|
|
|
} else if sub, ok := obj["check"]; ok {
|
|
|
|
check, err := DecodeCheckDefinition(sub)
|
|
|
|
result.Checks = append(result.Checks, check)
|
|
|
|
return &result, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
// Decode
|
|
|
|
var md mapstructure.Metadata
|
|
|
|
msdec, err := mapstructure.NewDecoder(&mapstructure.DecoderConfig{
|
|
|
|
Metadata: &md,
|
|
|
|
Result: &result,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := msdec.Decode(raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &result, nil
|
|
|
|
}
|
|
|
|
|
2014-02-03 23:15:35 +00:00
|
|
|
// DecodeServiceDefinition is used to decode a service definition
|
|
|
|
func DecodeServiceDefinition(raw interface{}) (*ServiceDefinition, error) {
|
|
|
|
var sub interface{}
|
|
|
|
rawMap, ok := raw.(map[string]interface{})
|
|
|
|
if !ok {
|
|
|
|
goto AFTER_FIX
|
|
|
|
}
|
2014-04-03 21:22:43 +00:00
|
|
|
|
|
|
|
// If no 'tags', handle the deprecated 'tag' value.
|
|
|
|
if _, ok := rawMap["tags"]; !ok {
|
|
|
|
if tag, ok := rawMap["tag"]; ok {
|
|
|
|
rawMap["tags"] = []interface{}{tag}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-03 23:15:35 +00:00
|
|
|
sub, ok = rawMap["check"]
|
|
|
|
if !ok {
|
|
|
|
goto AFTER_FIX
|
|
|
|
}
|
|
|
|
if err := FixupCheckType(sub); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
AFTER_FIX:
|
|
|
|
var md mapstructure.Metadata
|
|
|
|
var result ServiceDefinition
|
|
|
|
msdec, err := mapstructure.NewDecoder(&mapstructure.DecoderConfig{
|
|
|
|
Metadata: &md,
|
|
|
|
Result: &result,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := msdec.Decode(raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func FixupCheckType(raw interface{}) error {
|
|
|
|
// Handle decoding of time durations
|
|
|
|
rawMap, ok := raw.(map[string]interface{})
|
|
|
|
if !ok {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if ttl, ok := rawMap["ttl"]; ok {
|
|
|
|
ttlS, ok := ttl.(string)
|
|
|
|
if ok {
|
|
|
|
if dur, err := time.ParseDuration(ttlS); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
rawMap["ttl"] = dur
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if interval, ok := rawMap["interval"]; ok {
|
|
|
|
intervalS, ok := interval.(string)
|
|
|
|
if ok {
|
|
|
|
if dur, err := time.ParseDuration(intervalS); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
rawMap["interval"] = dur
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// DecodeCheckDefinition is used to decode a check definition
|
|
|
|
func DecodeCheckDefinition(raw interface{}) (*CheckDefinition, error) {
|
|
|
|
if err := FixupCheckType(raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
var md mapstructure.Metadata
|
|
|
|
var result CheckDefinition
|
|
|
|
msdec, err := mapstructure.NewDecoder(&mapstructure.DecoderConfig{
|
|
|
|
Metadata: &md,
|
|
|
|
Result: &result,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := msdec.Decode(raw); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &result, nil
|
|
|
|
}
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
// MergeConfig merges two configurations together to make a single new
|
|
|
|
// configuration.
|
|
|
|
func MergeConfig(a, b *Config) *Config {
|
|
|
|
var result Config = *a
|
|
|
|
|
|
|
|
// Copy the strings if they're set
|
2013-12-25 00:48:07 +00:00
|
|
|
if b.Bootstrap {
|
|
|
|
result.Bootstrap = true
|
|
|
|
}
|
2013-12-21 00:39:32 +00:00
|
|
|
if b.Datacenter != "" {
|
|
|
|
result.Datacenter = b.Datacenter
|
|
|
|
}
|
|
|
|
if b.DataDir != "" {
|
|
|
|
result.DataDir = b.DataDir
|
|
|
|
}
|
2014-01-03 23:43:35 +00:00
|
|
|
if b.DNSRecursor != "" {
|
|
|
|
result.DNSRecursor = b.DNSRecursor
|
|
|
|
}
|
2014-01-02 23:50:52 +00:00
|
|
|
if b.Domain != "" {
|
|
|
|
result.Domain = b.Domain
|
|
|
|
}
|
2013-12-21 00:39:32 +00:00
|
|
|
if b.EncryptKey != "" {
|
|
|
|
result.EncryptKey = b.EncryptKey
|
|
|
|
}
|
|
|
|
if b.LogLevel != "" {
|
|
|
|
result.LogLevel = b.LogLevel
|
|
|
|
}
|
2014-03-09 22:57:03 +00:00
|
|
|
if b.Protocol > 0 {
|
|
|
|
result.Protocol = b.Protocol
|
|
|
|
}
|
2014-01-02 23:50:52 +00:00
|
|
|
if b.NodeName != "" {
|
|
|
|
result.NodeName = b.NodeName
|
|
|
|
}
|
2014-04-11 22:22:35 +00:00
|
|
|
if b.ClientAddr != "" {
|
|
|
|
result.ClientAddr = b.ClientAddr
|
2013-12-21 00:39:32 +00:00
|
|
|
}
|
2014-04-11 22:22:35 +00:00
|
|
|
if b.BindAddr != "" {
|
|
|
|
result.BindAddr = b.BindAddr
|
2013-12-21 00:39:32 +00:00
|
|
|
}
|
2014-01-02 23:50:52 +00:00
|
|
|
if b.AdvertiseAddr != "" {
|
|
|
|
result.AdvertiseAddr = b.AdvertiseAddr
|
|
|
|
}
|
2013-12-21 00:39:32 +00:00
|
|
|
if b.Server == true {
|
|
|
|
result.Server = b.Server
|
|
|
|
}
|
|
|
|
if b.LeaveOnTerm == true {
|
|
|
|
result.LeaveOnTerm = true
|
|
|
|
}
|
|
|
|
if b.SkipLeaveOnInt == true {
|
|
|
|
result.SkipLeaveOnInt = true
|
|
|
|
}
|
2014-03-20 00:49:57 +00:00
|
|
|
if b.EnableDebug {
|
|
|
|
result.EnableDebug = true
|
|
|
|
}
|
2014-04-04 23:52:39 +00:00
|
|
|
if b.VerifyIncoming {
|
|
|
|
result.VerifyIncoming = true
|
|
|
|
}
|
|
|
|
if b.VerifyOutgoing {
|
|
|
|
result.VerifyOutgoing = true
|
|
|
|
}
|
|
|
|
if b.CAFile != "" {
|
|
|
|
result.CAFile = b.CAFile
|
|
|
|
}
|
|
|
|
if b.CertFile != "" {
|
|
|
|
result.CertFile = b.CertFile
|
|
|
|
}
|
|
|
|
if b.KeyFile != "" {
|
|
|
|
result.KeyFile = b.KeyFile
|
|
|
|
}
|
2014-02-03 23:15:35 +00:00
|
|
|
if b.Checks != nil {
|
|
|
|
result.Checks = append(result.Checks, b.Checks...)
|
|
|
|
}
|
|
|
|
if b.Services != nil {
|
|
|
|
result.Services = append(result.Services, b.Services...)
|
|
|
|
}
|
2014-04-11 22:22:35 +00:00
|
|
|
if b.Ports.DNS != 0 {
|
|
|
|
result.Ports.DNS = b.Ports.DNS
|
|
|
|
}
|
|
|
|
if b.Ports.HTTP != 0 {
|
|
|
|
result.Ports.HTTP = b.Ports.HTTP
|
|
|
|
}
|
|
|
|
if b.Ports.RPC != 0 {
|
|
|
|
result.Ports.RPC = b.Ports.RPC
|
|
|
|
}
|
|
|
|
if b.Ports.SerfLan != 0 {
|
|
|
|
result.Ports.SerfLan = b.Ports.SerfLan
|
|
|
|
}
|
|
|
|
if b.Ports.SerfWan != 0 {
|
|
|
|
result.Ports.SerfWan = b.Ports.SerfWan
|
|
|
|
}
|
|
|
|
if b.Ports.Server != 0 {
|
|
|
|
result.Ports.Server = b.Ports.Server
|
|
|
|
}
|
2014-04-11 23:59:16 +00:00
|
|
|
|
|
|
|
// Copy the start join addresses
|
|
|
|
result.StartJoin = make([]string, 0, len(a.StartJoin)+len(b.StartJoin))
|
|
|
|
result.StartJoin = append(result.StartJoin, a.StartJoin...)
|
|
|
|
result.StartJoin = append(result.StartJoin, b.StartJoin...)
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
return &result
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadConfigPaths reads the paths in the given order to load configurations.
|
|
|
|
// The paths can be to files or directories. If the path is a directory,
|
|
|
|
// we read one directory deep and read any files ending in ".json" as
|
|
|
|
// configuration files.
|
|
|
|
func ReadConfigPaths(paths []string) (*Config, error) {
|
|
|
|
result := new(Config)
|
|
|
|
for _, path := range paths {
|
|
|
|
f, err := os.Open(path)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error reading '%s': %s", path, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
fi, err := f.Stat()
|
|
|
|
if err != nil {
|
|
|
|
f.Close()
|
|
|
|
return nil, fmt.Errorf("Error reading '%s': %s", path, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !fi.IsDir() {
|
|
|
|
config, err := DecodeConfig(f)
|
|
|
|
f.Close()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error decoding '%s': %s", path, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
result = MergeConfig(result, config)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
contents, err := f.Readdir(-1)
|
|
|
|
f.Close()
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error reading '%s': %s", path, err)
|
|
|
|
}
|
|
|
|
|
2013-12-27 22:49:35 +00:00
|
|
|
// Sort the contents, ensures lexical order
|
|
|
|
sort.Sort(dirEnts(contents))
|
|
|
|
|
2013-12-21 00:39:32 +00:00
|
|
|
for _, fi := range contents {
|
|
|
|
// Don't recursively read contents
|
|
|
|
if fi.IsDir() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// If it isn't a JSON file, ignore it
|
|
|
|
if !strings.HasSuffix(fi.Name(), ".json") {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
subpath := filepath.Join(path, fi.Name())
|
|
|
|
f, err := os.Open(subpath)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error reading '%s': %s", subpath, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
config, err := DecodeConfig(f)
|
|
|
|
f.Close()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error decoding '%s': %s", subpath, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
result = MergeConfig(result, config)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
}
|
2013-12-27 22:49:35 +00:00
|
|
|
|
|
|
|
// Implement the sort interface for dirEnts
|
|
|
|
func (d dirEnts) Len() int {
|
|
|
|
return len(d)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d dirEnts) Less(i, j int) bool {
|
|
|
|
return d[i].Name() < d[j].Name()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d dirEnts) Swap(i, j int) {
|
|
|
|
d[i], d[j] = d[j], d[i]
|
|
|
|
}
|