generated from cloudoperators/repository-template
-
Notifications
You must be signed in to change notification settings - Fork 1
/
flag.go
63 lines (53 loc) · 1.57 KB
/
flag.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
// SPDX-FileCopyrightText: 2024 SAP SE or an SAP affiliate company and Greenhouse contributors
// SPDX-License-Identifier: Apache-2.0
package flag
import (
"fmt"
"os"
"strings"
flag "github.com/spf13/pflag"
)
var (
//ignore a few stupid flags that come with dependencies
flagBlacklist = []string{"v", "version", "vmodule", "master", "alsologtostderr", "kubeconfig", "log_backtrace_at", "log_dir", "stderrthreshold", "logtostderr"}
envVarReplacer = strings.NewReplacer(
"-", "_",
".", "_",
"/", "_",
)
)
// Parse sets flags that have not been set explicitly from environment variables
// This is a trimmed down version of https://github.com/peterbourgon/ff/blob/a2a0e274f2e9702f96865c2c31d9238129432dca/parse.go#L15
func Parse(fs *flag.FlagSet, args []string) error {
// First priority: commandline flags (explicit user preference).
if err := fs.Parse(args); err != nil {
return fmt.Errorf("error parsing commandline args: %w", err)
}
provided := map[string]bool{}
fs.Visit(func(f *flag.Flag) {
provided[f.Name] = true
})
blacklisted := map[string]bool{}
for _, name := range flagBlacklist {
blacklisted[name] = true
}
var visitErr error
fs.VisitAll(func(f *flag.Flag) {
if visitErr != nil {
return
}
if provided[f.Name] || blacklisted[f.Name] {
return
}
var key = strings.ToUpper(f.Name)
key = envVarReplacer.Replace(key)
value := os.Getenv(key)
if value == "" {
return
}
if err := fs.Set(f.Name, value); err != nil {
visitErr = fmt.Errorf("error setting flag %q from env var %q: %w", f.Name, key, err)
}
})
return visitErr
}