|
|
|
package flags
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"github.com/spf13/cobra"
|
|
|
|
"github.com/spf13/pflag"
|
|
|
|
"github.com/spf13/viper"
|
|
|
|
)
|
|
|
|
|
|
|
|
// DockerAPIMinVersion is the minimum version of the docker api required to
|
|
|
|
// use watchtower
|
|
|
|
const DockerAPIMinVersion string = "1.25"
|
|
|
|
|
|
|
|
var defaultInterval = int((time.Hour * 24).Seconds())
|
|
|
|
|
|
|
|
// RegisterDockerFlags that are used directly by the docker api client
|
|
|
|
func RegisterDockerFlags(rootCmd *cobra.Command) {
|
|
|
|
flags := rootCmd.PersistentFlags()
|
|
|
|
flags.StringP("host", "H", envString("DOCKER_HOST"), "daemon socket to connect to")
|
|
|
|
flags.BoolP("tlsverify", "v", envBool("DOCKER_TLS_VERIFY"), "use TLS and verify the remote")
|
|
|
|
flags.StringP("api-version", "a", envString("DOCKER_API_VERSION"), "api version to use by docker client")
|
|
|
|
}
|
|
|
|
|
|
|
|
// RegisterSystemFlags that are used by watchtower to modify the program flow
|
|
|
|
func RegisterSystemFlags(rootCmd *cobra.Command) {
|
|
|
|
flags := rootCmd.PersistentFlags()
|
|
|
|
flags.IntP(
|
|
|
|
"interval",
|
|
|
|
"i",
|
|
|
|
envInt("WATCHTOWER_POLL_INTERVAL"),
|
|
|
|
"Poll interval (in seconds)")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"schedule",
|
|
|
|
"s",
|
|
|
|
envString("WATCHTOWER_SCHEDULE"),
|
|
|
|
"The cron expression which defines when to update")
|
|
|
|
|
|
|
|
flags.DurationP(
|
|
|
|
"stop-timeout",
|
|
|
|
"t",
|
|
|
|
envDuration("WATCHTOWER_TIMEOUT"),
|
|
|
|
"Timeout before a container is forcefully stopped")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"no-pull",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_NO_PULL"),
|
|
|
|
"Do not pull any new images")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"no-restart",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_NO_RESTART"),
|
|
|
|
"Do not restart any containers")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"no-startup-message",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_NO_STARTUP_MESSAGE"),
|
|
|
|
"Prevents watchtower from sending a startup message")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"cleanup",
|
|
|
|
"c",
|
|
|
|
envBool("WATCHTOWER_CLEANUP"),
|
|
|
|
"Remove previously used images after updating")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"remove-volumes",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_REMOVE_VOLUMES"),
|
|
|
|
"Remove attached volumes before updating")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"label-enable",
|
|
|
|
"e",
|
|
|
|
envBool("WATCHTOWER_LABEL_ENABLE"),
|
|
|
|
"Watch containers where the com.centurylinklabs.watchtower.enable label is true")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"log-format",
|
|
|
|
"l",
|
|
|
|
viper.GetString("WATCHTOWER_LOG_FORMAT"),
|
|
|
|
"Sets what logging format to use for console output. Possible values: Auto, LogFmt, Pretty, JSON")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"debug",
|
|
|
|
"d",
|
|
|
|
envBool("WATCHTOWER_DEBUG"),
|
|
|
|
"Enable debug mode with verbose logging")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"trace",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_TRACE"),
|
|
|
|
"Enable trace mode with very verbose logging - caution, exposes credentials")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"monitor-only",
|
|
|
|
"m",
|
|
|
|
envBool("WATCHTOWER_MONITOR_ONLY"),
|
|
|
|
"Will only monitor for new images, not update the containers")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"run-once",
|
|
|
|
"R",
|
|
|
|
envBool("WATCHTOWER_RUN_ONCE"),
|
|
|
|
"Run once now and exit")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"include-restarting",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_INCLUDE_RESTARTING"),
|
|
|
|
"Will also include restarting containers")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"include-stopped",
|
|
|
|
"S",
|
|
|
|
envBool("WATCHTOWER_INCLUDE_STOPPED"),
|
|
|
|
"Will also include created and exited containers")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"revive-stopped",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_REVIVE_STOPPED"),
|
|
|
|
"Will also start stopped containers that were updated, if include-stopped is active")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"enable-lifecycle-hooks",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_LIFECYCLE_HOOKS"),
|
|
|
|
"Enable the execution of commands triggered by pre- and post-update lifecycle hooks")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"rolling-restart",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_ROLLING_RESTART"),
|
|
|
|
"Restart containers one at a time")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"http-api-update",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_HTTP_API_UPDATE"),
|
|
|
|
"Runs Watchtower in HTTP API mode, so that image updates must to be triggered by a request")
|
|
|
|
flags.BoolP(
|
|
|
|
"http-api-metrics",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_HTTP_API_METRICS"),
|
|
|
|
"Runs Watchtower with the Prometheus metrics API enabled")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"http-api-token",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_HTTP_API_TOKEN"),
|
|
|
|
"Sets an authentication token to HTTP API requests.")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"http-api-periodic-polls",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_HTTP_API_PERIODIC_POLLS"),
|
|
|
|
"Also run periodic updates (specified with --interval and --schedule) if HTTP API is enabled")
|
|
|
|
|
|
|
|
// https://no-color.org/
|
|
|
|
flags.BoolP(
|
|
|
|
"no-color",
|
|
|
|
"",
|
|
|
|
viper.IsSet("NO_COLOR"),
|
|
|
|
"Disable ANSI color escape codes in log output")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"scope",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_SCOPE"),
|
|
|
|
"Defines a monitoring scope for the Watchtower instance.")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"porcelain",
|
|
|
|
"P",
|
|
|
|
envString("WATCHTOWER_PORCELAIN"),
|
|
|
|
`Write session results to stdout using a stable versioned format. Supported values: "v1"`)
|
|
|
|
|
|
|
|
flags.String(
|
|
|
|
"log-level",
|
|
|
|
envString("WATCHTOWER_LOG_LEVEL"),
|
|
|
|
"The maximum log level that will be written to STDERR. Possible values: panic, fatal, error, warn, info, debug or trace")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"health-check",
|
|
|
|
"",
|
|
|
|
false,
|
|
|
|
"Do health check and exit")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"label-take-precedence",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_LABEL_TAKE_PRECEDENCE"),
|
|
|
|
"Label applied to containers take precedence over arguments")
|
|
|
|
}
|
|
|
|
|
|
|
|
// RegisterNotificationFlags that are used by watchtower to send notifications
|
|
|
|
func RegisterNotificationFlags(rootCmd *cobra.Command) {
|
|
|
|
flags := rootCmd.PersistentFlags()
|
|
|
|
|
|
|
|
flags.StringSliceP(
|
|
|
|
"notifications",
|
|
|
|
"n",
|
|
|
|
envStringSlice("WATCHTOWER_NOTIFICATIONS"),
|
|
|
|
" Notification types to send (valid: email, slack, msteams, gotify, shoutrrr)")
|
|
|
|
|
|
|
|
flags.String(
|
|
|
|
"notifications-level",
|
|
|
|
envString("WATCHTOWER_NOTIFICATIONS_LEVEL"),
|
|
|
|
"The log level used for sending notifications. Possible values: panic, fatal, error, warn, info or debug")
|
|
|
|
|
|
|
|
flags.IntP(
|
|
|
|
"notifications-delay",
|
|
|
|
"",
|
|
|
|
envInt("WATCHTOWER_NOTIFICATIONS_DELAY"),
|
|
|
|
"Delay before sending notifications, expressed in seconds")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notifications-hostname",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATIONS_HOSTNAME"),
|
|
|
|
"Custom hostname for notification titles")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-email-from",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_EMAIL_FROM"),
|
|
|
|
"Address to send notification emails from")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-email-to",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_EMAIL_TO"),
|
|
|
|
"Address to send notification emails to")
|
|
|
|
|
|
|
|
flags.IntP(
|
|
|
|
"notification-email-delay",
|
|
|
|
"",
|
|
|
|
envInt("WATCHTOWER_NOTIFICATION_EMAIL_DELAY"),
|
|
|
|
"Delay before sending notifications, expressed in seconds")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-email-server",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_EMAIL_SERVER"),
|
|
|
|
"SMTP server to send notification emails through")
|
|
|
|
|
|
|
|
flags.IntP(
|
|
|
|
"notification-email-server-port",
|
|
|
|
"",
|
|
|
|
envInt("WATCHTOWER_NOTIFICATION_EMAIL_SERVER_PORT"),
|
|
|
|
"SMTP server port to send notification emails through")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"notification-email-server-tls-skip-verify",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_NOTIFICATION_EMAIL_SERVER_TLS_SKIP_VERIFY"),
|
|
|
|
`Controls whether watchtower verifies the SMTP server's certificate chain and host name.
|
|
|
|
Should only be used for testing.`)
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-email-server-user",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_EMAIL_SERVER_USER"),
|
|
|
|
"SMTP server user for sending notifications")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-email-server-password",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_EMAIL_SERVER_PASSWORD"),
|
|
|
|
"SMTP server password for sending notifications")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-email-subjecttag",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_EMAIL_SUBJECTTAG"),
|
|
|
|
"Subject prefix tag for notifications via mail")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-slack-hook-url",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_SLACK_HOOK_URL"),
|
|
|
|
"The Slack Hook URL to send notifications to")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-slack-identifier",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_SLACK_IDENTIFIER"),
|
|
|
|
"A string which will be used to identify the messages coming from this watchtower instance")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-slack-channel",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_SLACK_CHANNEL"),
|
|
|
|
"A string which overrides the webhook's default channel. Example: #my-custom-channel")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-slack-icon-emoji",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_SLACK_ICON_EMOJI"),
|
|
|
|
"An emoji code string to use in place of the default icon")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-slack-icon-url",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_SLACK_ICON_URL"),
|
|
|
|
"An icon image URL string to use in place of the default icon")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-msteams-hook",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_MSTEAMS_HOOK_URL"),
|
|
|
|
"The MSTeams WebHook URL to send notifications to")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"notification-msteams-data",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_NOTIFICATION_MSTEAMS_USE_LOG_DATA"),
|
|
|
|
"The MSTeams notifier will try to extract log entry fields as MSTeams message facts")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-gotify-url",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_GOTIFY_URL"),
|
|
|
|
"The Gotify URL to send notifications to")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-gotify-token",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_GOTIFY_TOKEN"),
|
|
|
|
"The Gotify Application required to query the Gotify API")
|
|
|
|
|
|
|
|
flags.BoolP(
|
|
|
|
"notification-gotify-tls-skip-verify",
|
|
|
|
"",
|
|
|
|
envBool("WATCHTOWER_NOTIFICATION_GOTIFY_TLS_SKIP_VERIFY"),
|
|
|
|
`Controls whether watchtower verifies the Gotify server's certificate chain and host name.
|
|
|
|
Should only be used for testing.`)
|
|
|
|
|
|
|
|
flags.String(
|
|
|
|
"notification-template",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_TEMPLATE"),
|
|
|
|
"The shoutrrr text/template for the messages")
|
|
|
|
|
|
|
|
flags.StringArray(
|
|
|
|
"notification-url",
|
|
|
|
envStringSlice("WATCHTOWER_NOTIFICATION_URL"),
|
|
|
|
"The shoutrrr URL to send notifications to")
|
|
|
|
|
|
|
|
flags.Bool("notification-report",
|
|
|
|
envBool("WATCHTOWER_NOTIFICATION_REPORT"),
|
|
|
|
"Use the session report as the notification template data")
|
|
|
|
|
|
|
|
flags.StringP(
|
|
|
|
"notification-title-tag",
|
|
|
|
"",
|
|
|
|
envString("WATCHTOWER_NOTIFICATION_TITLE_TAG"),
|
|
|
|
"Title prefix tag for notifications")
|
|
|
|
|
|
|
|
flags.Bool("notification-skip-title",
|
|
|
|
envBool("WATCHTOWER_NOTIFICATION_SKIP_TITLE"),
|
|
|
|
"Do not pass the title param to notifications")
|
|
|
|
|
|
|
|
flags.String(
|
|
|
|
"warn-on-head-failure",
|
|
|
|
envString("WATCHTOWER_WARN_ON_HEAD_FAILURE"),
|
|
|
|
"When to warn about HEAD pull requests failing. Possible values: always, auto or never")
|
|
|
|
|
|
|
|
flags.Bool(
|
|
|
|
"notification-log-stdout",
|
|
|
|
envBool("WATCHTOWER_NOTIFICATION_LOG_STDOUT"),
|
|
|
|
"Write notification logs to stdout instead of logging (to stderr)")
|
|
|
|
}
|
|
|
|
|
|
|
|
func envString(key string) string {
|
|
|
|
viper.MustBindEnv(key)
|
|
|
|
return viper.GetString(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
func envStringSlice(key string) []string {
|
|
|
|
viper.MustBindEnv(key)
|
|
|
|
return viper.GetStringSlice(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
func envInt(key string) int {
|
|
|
|
viper.MustBindEnv(key)
|
|
|
|
return viper.GetInt(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
func envBool(key string) bool {
|
|
|
|
viper.MustBindEnv(key)
|
|
|
|
return viper.GetBool(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
func envDuration(key string) time.Duration {
|
|
|
|
viper.MustBindEnv(key)
|
|
|
|
return viper.GetDuration(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetDefaults provides default values for environment variables
|
|
|
|
func SetDefaults() {
|
|
|
|
viper.AutomaticEnv()
|
|
|
|
viper.SetDefault("DOCKER_HOST", "unix:///var/run/docker.sock")
|
|
|
|
viper.SetDefault("DOCKER_API_VERSION", DockerAPIMinVersion)
|
|
|
|
viper.SetDefault("WATCHTOWER_POLL_INTERVAL", defaultInterval)
|
|
|
|
viper.SetDefault("WATCHTOWER_TIMEOUT", time.Second*10)
|
|
|
|
viper.SetDefault("WATCHTOWER_NOTIFICATIONS", []string{})
|
|
|
|
viper.SetDefault("WATCHTOWER_NOTIFICATIONS_LEVEL", "info")
|
|
|
|
viper.SetDefault("WATCHTOWER_NOTIFICATION_EMAIL_SERVER_PORT", 25)
|
|
|
|
viper.SetDefault("WATCHTOWER_NOTIFICATION_EMAIL_SUBJECTTAG", "")
|
|
|
|
viper.SetDefault("WATCHTOWER_NOTIFICATION_SLACK_IDENTIFIER", "watchtower")
|
|
|
|
viper.SetDefault("WATCHTOWER_LOG_LEVEL", "info")
|
|
|
|
viper.SetDefault("WATCHTOWER_LOG_FORMAT", "auto")
|
|
|
|
}
|
|
|
|
|
|
|
|
// EnvConfig translates the command-line options into environment variables
|
|
|
|
// that will initialize the api client
|
|
|
|
func EnvConfig(cmd *cobra.Command) error {
|
|
|
|
var err error
|
|
|
|
var host string
|
|
|
|
var tls bool
|
|
|
|
var version string
|
|
|
|
|
|
|
|
flags := cmd.PersistentFlags()
|
|
|
|
|
|
|
|
if host, err = flags.GetString("host"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if tls, err = flags.GetBool("tlsverify"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if version, err = flags.GetString("api-version"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err = setEnvOptStr("DOCKER_HOST", host); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err = setEnvOptBool("DOCKER_TLS_VERIFY", tls); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err = setEnvOptStr("DOCKER_API_VERSION", version); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadFlags reads common flags used in the main program flow of watchtower
|
|
|
|
func ReadFlags(cmd *cobra.Command) (bool, bool, bool, time.Duration) {
|
|
|
|
flags := cmd.PersistentFlags()
|
|
|
|
|
|
|
|
var err error
|
|
|
|
var cleanup bool
|
|
|
|
var noRestart bool
|
|
|
|
var monitorOnly bool
|
|
|
|
var timeout time.Duration
|
|
|
|
|
|
|
|
if cleanup, err = flags.GetBool("cleanup"); err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
if noRestart, err = flags.GetBool("no-restart"); err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
if monitorOnly, err = flags.GetBool("monitor-only"); err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
if timeout, err = flags.GetDuration("stop-timeout"); err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return cleanup, noRestart, monitorOnly, timeout
|
|
|
|
}
|
|
|
|
|
|
|
|
func setEnvOptStr(env string, opt string) error {
|
|
|
|
if opt == "" || opt == os.Getenv(env) {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
err := os.Setenv(env, opt)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func setEnvOptBool(env string, opt bool) error {
|
|
|
|
if opt {
|
|
|
|
return setEnvOptStr(env, "1")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetSecretsFromFiles checks if passwords/tokens/webhooks have been passed as a file instead of plaintext.
|
|
|
|
// If so, the value of the flag will be replaced with the contents of the file.
|
|
|
|
func GetSecretsFromFiles(rootCmd *cobra.Command) {
|
|
|
|
flags := rootCmd.PersistentFlags()
|
|
|
|
|
|
|
|
secrets := []string{
|
|
|
|
"notification-email-server-password",
|
|
|
|
"notification-slack-hook-url",
|
|
|
|
"notification-msteams-hook",
|
|
|
|
"notification-gotify-token",
|
|
|
|
"notification-url",
|
|
|
|
"http-api-token",
|
|
|
|
}
|
|
|
|
for _, secret := range secrets {
|
|
|
|
if err := getSecretFromFile(flags, secret); err != nil {
|
|
|
|
log.Fatalf("failed to get secret from flag %v: %s", secret, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// getSecretFromFile will check if the flag contains a reference to a file; if it does, replaces the value of the flag with the contents of the file.
|
|
|
|
func getSecretFromFile(flags *pflag.FlagSet, secret string) error {
|
|
|
|
flag := flags.Lookup(secret)
|
|
|
|
if sliceValue, ok := flag.Value.(pflag.SliceValue); ok {
|
|
|
|
oldValues := sliceValue.GetSlice()
|
|
|
|
values := make([]string, 0, len(oldValues))
|
|
|
|
for _, value := range oldValues {
|
|
|
|
if value != "" && isFile(value) {
|
|
|
|
file, err := os.Open(value)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
scanner := bufio.NewScanner(file)
|
|
|
|
for scanner.Scan() {
|
|
|
|
line := scanner.Text()
|
|
|
|
if line == "" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
values = append(values, line)
|
|
|
|
}
|
|
|
|
if err := file.Close(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
values = append(values, value)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return sliceValue.Replace(values)
|
|
|
|
}
|
|
|
|
|
|
|
|
value := flag.Value.String()
|
|
|
|
if value != "" && isFile(value) {
|
|
|
|
content, err := os.ReadFile(value)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return flags.Set(secret, strings.TrimSpace(string(content)))
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func isFile(s string) bool {
|
|
|
|
firstColon := strings.IndexRune(s, ':')
|
|
|
|
if firstColon != 1 && firstColon != -1 {
|
|
|
|
// If the string contains a ':', but it's not the second character, it's probably not a file
|
|
|
|
// and will cause a fatal error on windows if stat'ed
|
|
|
|
// This still allows for paths that start with 'c:\' etc.
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
_, err := os.Stat(s)
|
|
|
|
return !errors.Is(err, os.ErrNotExist)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ProcessFlagAliases updates the value of flags that are being set by helper flags
|
|
|
|
func ProcessFlagAliases(flags *pflag.FlagSet) {
|
|
|
|
|
|
|
|
porcelain, err := flags.GetString(`porcelain`)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf(`Failed to get flag: %v`, err)
|
|
|
|
}
|
|
|
|
if porcelain != "" {
|
|
|
|
if porcelain != "v1" {
|
|
|
|
log.Fatalf(`Unknown porcelain version %q. Supported values: "v1"`, porcelain)
|
|
|
|
}
|
|
|
|
if err = appendFlagValue(flags, `notification-url`, `logger://`); err != nil {
|
|
|
|
log.Errorf(`Failed to set flag: %v`, err)
|
|
|
|
}
|
|
|
|
setFlagIfDefault(flags, `notification-log-stdout`, `true`)
|
|
|
|
setFlagIfDefault(flags, `notification-report`, `true`)
|
|
|
|
tpl := fmt.Sprintf(`porcelain.%s.summary-no-log`, porcelain)
|
|
|
|
setFlagIfDefault(flags, `notification-template`, tpl)
|
|
|
|
}
|
|
|
|
|
|
|
|
scheduleChanged := flags.Changed(`schedule`)
|
|
|
|
intervalChanged := flags.Changed(`interval`)
|
|
|
|
// FIXME: snakeswap
|
|
|
|
// due to how viper is integrated by swapping the defaults for the flags, we need this hack:
|
|
|
|
if val, _ := flags.GetString(`schedule`); val != `` {
|
|
|
|
scheduleChanged = true
|
|
|
|
}
|
|
|
|
if val, _ := flags.GetInt(`interval`); val != defaultInterval {
|
|
|
|
intervalChanged = true
|
|
|
|
}
|
|
|
|
|
|
|
|
if intervalChanged && scheduleChanged {
|
|
|
|
log.Fatal(`Only schedule or interval can be defined, not both.`)
|
|
|
|
}
|
|
|
|
|
|
|
|
// update schedule flag to match interval if it's set, or to the default if none of them are
|
|
|
|
if intervalChanged || !scheduleChanged {
|
|
|
|
interval, _ := flags.GetInt(`interval`)
|
|
|
|
_ = flags.Set(`schedule`, fmt.Sprintf(`@every %ds`, interval))
|
|
|
|
}
|
|
|
|
|
|
|
|
if flagIsEnabled(flags, `debug`) {
|
|
|
|
_ = flags.Set(`log-level`, `debug`)
|
|
|
|
}
|
|
|
|
|
|
|
|
if flagIsEnabled(flags, `trace`) {
|
|
|
|
_ = flags.Set(`log-level`, `trace`)
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// SetupLogging reads only the flags that is needed to set up logging and applies them to the global logger
|
|
|
|
func SetupLogging(f *pflag.FlagSet) error {
|
|
|
|
logFormat, _ := f.GetString(`log-format`)
|
|
|
|
noColor, _ := f.GetBool("no-color")
|
|
|
|
|
|
|
|
switch strings.ToLower(logFormat) {
|
|
|
|
case "auto":
|
|
|
|
// This will either use the "pretty" or "logfmt" format, based on whether the standard out is connected to a TTY
|
|
|
|
log.SetFormatter(&log.TextFormatter{
|
|
|
|
DisableColors: noColor,
|
|
|
|
// enable logrus built-in support for https://bixense.com/clicolors/
|
|
|
|
EnvironmentOverrideColors: true,
|
|
|
|
})
|
|
|
|
case "json":
|
|
|
|
log.SetFormatter(&log.JSONFormatter{})
|
|
|
|
case "logfmt":
|
|
|
|
log.SetFormatter(&log.TextFormatter{
|
|
|
|
DisableColors: true,
|
|
|
|
FullTimestamp: true,
|
|
|
|
})
|
|
|
|
case "pretty":
|
|
|
|
log.SetFormatter(&log.TextFormatter{
|
|
|
|
// "Pretty" format combined with `--no-color` will only change the timestamp to the time since start
|
|
|
|
ForceColors: !noColor,
|
|
|
|
FullTimestamp: false,
|
|
|
|
})
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("invalid log format: %s", logFormat)
|
|
|
|
}
|
|
|
|
|
|
|
|
rawLogLevel, _ := f.GetString(`log-level`)
|
|
|
|
if logLevel, err := log.ParseLevel(rawLogLevel); err != nil {
|
|
|
|
return fmt.Errorf("invalid log level: %e", err)
|
|
|
|
} else {
|
|
|
|
log.SetLevel(logLevel)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func flagIsEnabled(flags *pflag.FlagSet, name string) bool {
|
|
|
|
value, err := flags.GetBool(name)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf(`The flag %q is not defined`, name)
|
|
|
|
}
|
|
|
|
return value
|
|
|
|
}
|
|
|
|
|
|
|
|
func appendFlagValue(flags *pflag.FlagSet, name string, values ...string) error {
|
|
|
|
flag := flags.Lookup(name)
|
|
|
|
if flag == nil {
|
|
|
|
return fmt.Errorf(`invalid flag name %q`, name)
|
|
|
|
}
|
|
|
|
|
|
|
|
if flagValues, ok := flag.Value.(pflag.SliceValue); ok {
|
|
|
|
for _, value := range values {
|
|
|
|
_ = flagValues.Append(value)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return fmt.Errorf(`the value for flag %q is not a slice value`, name)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func setFlagIfDefault(flags *pflag.FlagSet, name string, value string) {
|
|
|
|
if flags.Changed(name) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err := flags.Set(name, value); err != nil {
|
|
|
|
log.Errorf(`Failed to set flag: %v`, err)
|
|
|
|
}
|
|
|
|
}
|