mirror of https://github.com/status-im/consul.git
93 lines
3.2 KiB
Go
93 lines
3.2 KiB
Go
|
package flags
|
||
|
|
||
|
import (
|
||
|
"flag"
|
||
|
|
||
|
"github.com/hashicorp/consul/api"
|
||
|
)
|
||
|
|
||
|
type HTTPFlags struct {
|
||
|
// client api flags
|
||
|
address StringValue
|
||
|
token StringValue
|
||
|
caFile StringValue
|
||
|
caPath StringValue
|
||
|
certFile StringValue
|
||
|
keyFile StringValue
|
||
|
tlsServerName StringValue
|
||
|
|
||
|
// server flags
|
||
|
datacenter StringValue
|
||
|
stale BoolValue
|
||
|
}
|
||
|
|
||
|
func (f *HTTPFlags) ClientFlags() *flag.FlagSet {
|
||
|
fs := flag.NewFlagSet("", flag.ContinueOnError)
|
||
|
fs.Var(&f.address, "http-addr",
|
||
|
"The `address` and port of the Consul HTTP agent. The value can be an IP "+
|
||
|
"address or DNS address, but it must also include the port. This can "+
|
||
|
"also be specified via the CONSUL_HTTP_ADDR environment variable. The "+
|
||
|
"default value is http://127.0.0.1:8500. The scheme can also be set to "+
|
||
|
"HTTPS by setting the environment variable CONSUL_HTTP_SSL=true.")
|
||
|
fs.Var(&f.token, "token",
|
||
|
"ACL token to use in the request. This can also be specified via the "+
|
||
|
"CONSUL_HTTP_TOKEN environment variable. If unspecified, the query will "+
|
||
|
"default to the token of the Consul agent at the HTTP address.")
|
||
|
fs.Var(&f.caFile, "ca-file",
|
||
|
"Path to a CA file to use for TLS when communicating with Consul. This "+
|
||
|
"can also be specified via the CONSUL_CACERT environment variable.")
|
||
|
fs.Var(&f.caPath, "ca-path",
|
||
|
"Path to a directory of CA certificates to use for TLS when communicating "+
|
||
|
"with Consul. This can also be specified via the CONSUL_CAPATH environment variable.")
|
||
|
fs.Var(&f.certFile, "client-cert",
|
||
|
"Path to a client cert file to use for TLS when 'verify_incoming' is enabled. This "+
|
||
|
"can also be specified via the CONSUL_CLIENT_CERT environment variable.")
|
||
|
fs.Var(&f.keyFile, "client-key",
|
||
|
"Path to a client key file to use for TLS when 'verify_incoming' is enabled. This "+
|
||
|
"can also be specified via the CONSUL_CLIENT_KEY environment variable.")
|
||
|
fs.Var(&f.tlsServerName, "tls-server-name",
|
||
|
"The server name to use as the SNI host when connecting via TLS. This "+
|
||
|
"can also be specified via the CONSUL_TLS_SERVER_NAME environment variable.")
|
||
|
|
||
|
return fs
|
||
|
}
|
||
|
|
||
|
func (f *HTTPFlags) ServerFlags() *flag.FlagSet {
|
||
|
fs := flag.NewFlagSet("", flag.ContinueOnError)
|
||
|
fs.Var(&f.datacenter, "datacenter",
|
||
|
"Name of the datacenter to query. If unspecified, this will default to "+
|
||
|
"the datacenter of the queried agent.")
|
||
|
fs.Var(&f.stale, "stale",
|
||
|
"Permit any Consul server (non-leader) to respond to this request. This "+
|
||
|
"allows for lower latency and higher throughput, but can result in "+
|
||
|
"stale data. This option has no effect on non-read operations. The "+
|
||
|
"default value is false.")
|
||
|
return fs
|
||
|
}
|
||
|
|
||
|
func (f *HTTPFlags) Datacenter() string {
|
||
|
return f.datacenter.String()
|
||
|
}
|
||
|
|
||
|
func (f *HTTPFlags) Stale() bool {
|
||
|
if f.stale.v == nil {
|
||
|
return false
|
||
|
}
|
||
|
return *f.stale.v
|
||
|
}
|
||
|
|
||
|
func (f *HTTPFlags) APIClient() (*api.Client, error) {
|
||
|
c := api.DefaultConfig()
|
||
|
|
||
|
f.address.Merge(&c.Address)
|
||
|
f.token.Merge(&c.Token)
|
||
|
f.caFile.Merge(&c.TLSConfig.CAFile)
|
||
|
f.caPath.Merge(&c.TLSConfig.CAPath)
|
||
|
f.certFile.Merge(&c.TLSConfig.CertFile)
|
||
|
f.keyFile.Merge(&c.TLSConfig.KeyFile)
|
||
|
f.tlsServerName.Merge(&c.TLSConfig.Address)
|
||
|
f.datacenter.Merge(&c.Datacenter)
|
||
|
|
||
|
return api.NewClient(c)
|
||
|
}
|