surrealpatch/cli/setup.go
2017-11-16 19:54:55 +00:00

369 lines
8.2 KiB
Go

// Copyright © 2016 Abcum Ltd
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package cli
import (
"fmt"
"net"
"os"
"path"
"regexp"
"strings"
"github.com/abcum/surreal/cnf"
"github.com/abcum/surreal/log"
"github.com/abcum/surreal/util/rand"
"github.com/abcum/surreal/util/uuid"
)
func setup() {
// --------------------------------------------------
// DB
// --------------------------------------------------
// Ensure that the default
// database options are set
if opts.DB.Path == "" {
opts.DB.Path = "memory"
}
if opts.DB.Base == "" {
opts.DB.Base = "surreal"
}
if opts.DB.Code != "" {
opts.DB.Key = []byte(opts.DB.Code)
}
switch len(opts.DB.Key) {
case 0, 16, 24, 32:
default:
log.Fatal("Specify a valid encryption key length. Valid key sizes are 16bit, 24bit, or 32bit.")
}
if opts.DB.Path != "memory" {
if ok, _ := regexp.MatchString(`^(s3|gcs|logr|file|rixxdb|dendrodb)://(.+)$`, opts.DB.Path); !ok {
log.Fatalf("Invalid path %s. Specify a valid data store configuration path", opts.DB.Path)
}
}
if strings.HasPrefix(opts.DB.Cert.CA, "-----") {
var err error
var doc *os.File
if doc, err = os.Create("db.ca"); err != nil {
log.Fatal("Can not decode PEM encoded CA into db.ca")
}
doc.Write([]byte(opts.DB.Cert.CA))
doc.Close()
opts.Cert.Crt = "db.ca"
}
if strings.HasPrefix(opts.DB.Cert.Crt, "-----") {
var err error
var doc *os.File
if doc, err = os.Create("db.key"); err != nil {
log.Fatal("Can not decode PEM encoded certificate into db.crt")
}
doc.Write([]byte(opts.DB.Cert.Crt))
doc.Close()
opts.Cert.Crt = "db.crt"
}
if strings.HasPrefix(opts.DB.Cert.Key, "-----") {
var err error
var doc *os.File
if doc, err = os.Create("db.crt"); err != nil {
log.Fatal("Can not decode PEM encoded private key into db.key")
}
doc.Write([]byte(opts.DB.Cert.Key))
doc.Close()
opts.Cert.Crt = "db.key"
}
if opts.DB.Cert.CA != "" || opts.DB.Cert.Crt != "" || opts.DB.Cert.Key != "" {
opts.DB.Cert.SSL = true
}
if opts.DB.Cert.CA == "" && opts.DB.Cert.SSL {
log.Fatal("Specify a valid PEM encoded CA file.")
}
if opts.DB.Cert.Crt == "" && opts.DB.Cert.SSL {
log.Fatal("Specify a valid PEM encoded certificate file.")
}
if opts.DB.Cert.Key == "" && opts.DB.Cert.SSL {
log.Fatal("Specify a valid PEM encoded private key file.")
}
// --------------------------------------------------
// Auth
// --------------------------------------------------
if opts.Auth.Auth != "" {
if opts.Auth.User != "" {
log.Fatal("Specify only --auth or --auth-user")
}
if opts.Auth.Pass != "" {
log.Fatal("Specify only --auth or --auth-pass")
}
both := strings.SplitN(opts.Auth.Auth, ":", 2)
if len(both) == 2 {
opts.Auth.User = both[0]
opts.Auth.Pass = both[1]
}
}
// Ensure that security
// is enabled by default
if opts.Auth.User == "" {
opts.Auth.User = "root"
}
if opts.Auth.Pass == "" {
opts.Auth.Pass = string(rand.New(20))
}
// Ensure that login as
// root can only be from
// specified ip addresses
for _, cidr := range opts.Auth.Addr {
_, subn, err := net.ParseCIDR(cidr)
if err != nil {
log.Fatalf("Invalid cidr %s. Please specify a valid CIDR address for --auth-addr", cidr)
}
opts.Auth.Nets = append(opts.Auth.Nets, subn)
}
// --------------------------------------------------
// Nodes
// --------------------------------------------------
// Ensure that the default
// node details are defined
if opts.Node.Host == "" {
opts.Node.Host, _ = os.Hostname()
}
if opts.Node.Name == "" {
opts.Node.Name = opts.Node.Host
}
if opts.Node.UUID == "" {
opts.Node.UUID = opts.Node.Name + "-" + uuid.NewV4().String()
}
// --------------------------------------------------
// Ports
// --------------------------------------------------
// Specify default port
if opts.Port.Web == 0 {
opts.Port.Web = 8000
}
// Specify default port
if opts.Port.Tcp == 0 {
opts.Port.Tcp = 33693
}
// Ensure port number is valid
if opts.Port.Web < 0 || opts.Port.Web > 65535 {
log.Fatalf("Invalid port %d. Please specify a valid port number for --port-web", opts.Port.Web)
}
// Ensure port number is valid
if opts.Port.Tcp < 0 || opts.Port.Tcp > 65535 {
log.Fatalf("Invalid port %d. Please specify a valid port number for --port-tcp", opts.Port.Tcp)
}
// Store the ports in host:port string format
opts.Conn.Web = fmt.Sprintf("%s:%d", opts.Node.Host, opts.Port.Web)
opts.Conn.Tcp = fmt.Sprintf("%s:%d", opts.Node.Host, opts.Port.Tcp)
// --------------------------------------------------
// Certs
// --------------------------------------------------
if strings.HasPrefix(opts.Cert.Crt, "-----") {
var err error
var doc *os.File
var out string = path.Join(os.TempDir(), "surreal.crt")
if doc, err = os.Create(out); err != nil {
log.Fatalf("Can not decode PEM encoded certificate into %s", out)
}
doc.Write([]byte(opts.Cert.Crt))
doc.Close()
opts.Cert.Crt = out
}
if strings.HasPrefix(opts.Cert.Key, "-----") {
var err error
var doc *os.File
var out string = path.Join(os.TempDir(), "surreal.key")
if doc, err = os.Create(out); err != nil {
log.Fatalf("Can not decode PEM encoded private key into %s: %s", out)
}
doc.Write([]byte(opts.Cert.Key))
doc.Close()
opts.Cert.Key = out
}
// --------------------------------------------------
// Logging
// --------------------------------------------------
var chk map[string]bool
// Ensure that the specified
// logging level is allowed
if opts.Logging.Level != "" {
chk = map[string]bool{
"debug": true,
"info": true,
"warning": true,
"error": true,
"fatal": true,
"panic": true,
}
if _, ok := chk[opts.Logging.Level]; !ok {
log.Fatal("Incorrect log level specified")
}
log.SetLevel(opts.Logging.Level)
}
// Ensure that the specified
// logging format is allowed
if opts.Logging.Format != "" {
chk = map[string]bool{
"text": true,
"json": true,
}
if _, ok := chk[opts.Logging.Format]; !ok {
log.Fatal("Incorrect log format specified")
}
log.SetFormat(opts.Logging.Format)
}
// Ensure that the specified
// logging output is allowed
if opts.Logging.Output != "" {
chk = map[string]bool{
"none": true,
"stdout": true,
"stderr": true,
"google": true,
"syslog": true,
}
if _, ok := chk[opts.Logging.Output]; !ok {
log.Fatal("Incorrect log output specified")
}
if opts.Logging.Output == "google" {
hook, err := log.NewGoogleHook(
opts.Logging.Level,
opts.Logging.Google.Name,
opts.Logging.Google.Project,
opts.Logging.Google.Credentials,
)
if err != nil {
log.Fatal("There was a problem configuring the google logging driver")
}
log.Instance().Hooks.Add(hook)
opts.Logging.Output = "none"
}
if opts.Logging.Output == "syslog" {
chk = map[string]bool{
"": true,
"tcp": true,
"udp": true,
}
if _, ok := chk[opts.Logging.Syslog.Protocol]; !ok {
log.Fatal("Incorrect log protocol specified for syslog logging driver")
}
chk = map[string]bool{
"debug": true,
"info": true,
"notice": true,
"warning": true,
"err": true,
"crit": true,
"alert": true,
"emerg": true,
}
if _, ok := chk[opts.Logging.Syslog.Priority]; !ok {
log.Fatal("Incorrect log priority specified for syslog logging driver")
}
hook, err := log.NewSyslogHook(
opts.Logging.Level,
opts.Logging.Syslog.Protocol,
opts.Logging.Syslog.Host,
opts.Logging.Syslog.Priority,
opts.Logging.Syslog.Tag,
)
if err != nil {
log.Fatal("There was a problem configuring the syslog logging driver")
}
log.Instance().Hooks.Add(hook)
opts.Logging.Output = "none"
}
log.SetOutput(opts.Logging.Output)
}
// Enable global options object
cnf.Settings = opts
}