forked from Venafi/vcert
/
config.go
98 lines (89 loc) · 2.52 KB
/
config.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
/*
* Copyright 2018 Venafi, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package main
import (
"fmt"
"github.com/Venafi/vcert"
"github.com/Venafi/vcert/pkg/endpoint"
"io/ioutil"
"math/rand"
"time"
)
func buildConfig(cf *commandFlags) (*vcert.Config, error) {
cfg := &vcert.Config{}
cfg.LogVerbose = cf.verbose
if cf.config != "" {
// loading from file
cfg.ConfigFile = cf.config
cfg.ConfigSection = cf.profile
err := cfg.LoadFromFile()
if err != nil {
return nil, err
}
} else {
// or filling from cli flags
var connectorType endpoint.ConnectorType
var baseUrl string
var auth = &endpoint.Authentication{}
if cf.testMode {
connectorType = endpoint.ConnectorTypeFake
if cf.testModeDelay > 0 {
logger.Println("Running in -test-mode with emulating endpoint delay")
var delay = rand.Intn(cf.testModeDelay)
for i := 0; i < delay; i++ {
time.Sleep(1 * time.Second)
}
}
} else if cf.tppURL != "" {
connectorType = endpoint.ConnectorTypeTPP
baseUrl = cf.tppURL
if cf.tppPassword == "" {
logger.Panicf("A password is required to communicate with TPP")
}
auth.User = cf.tppUser
auth.Password = cf.tppPassword
} else {
connectorType = endpoint.ConnectorTypeCloud
baseUrl = cf.cloudURL
auth.APIKey = cf.apiKey
}
cfg.ConnectorType = connectorType
cfg.Credentials = auth
cfg.BaseUrl = baseUrl
}
// trust bundle may be overridden by cli flag
if cf.trustBundle != "" {
if cfg.ConnectionTrust != "" {
logf("overriding trust-bundle based on commandline flag")
}
data, err := ioutil.ReadFile(cf.trustBundle)
if err != nil {
logger.Panicf("failed to read trust bundle: %s", err)
}
cfg.ConnectionTrust = string(data)
}
// zone may be overridden by cli flag
if cf.zone != "" {
if cfg.Zone != "" {
logf("overriding Zone value based on commandline flag")
}
cfg.Zone = cf.zone
}
if cfg.Zone == "" && cfg.ConnectorType != endpoint.ConnectorTypeFake {
return nil, fmt.Errorf("Zone cannot be empty. Use -z option")
}
return cfg, nil
}