zrepl/config/config.go

627 lines
15 KiB
Go
Raw Permalink Normal View History

2018-08-26 15:17:15 +02:00
package config
import (
"fmt"
"io/ioutil"
"log/syslog"
2018-08-26 16:44:34 +02:00
"os"
"reflect"
2018-08-26 19:20:08 +02:00
"regexp"
"strconv"
2018-08-26 16:44:34 +02:00
"time"
2019-03-22 19:41:12 +01:00
"github.com/pkg/errors"
"github.com/zrepl/yaml-config"
2018-08-26 15:17:15 +02:00
)
2018-08-26 16:44:34 +02:00
type Config struct {
Jobs []JobEnum `yaml:"jobs"`
Global *Global `yaml:"global,optional,fromdefaults"`
2018-08-26 16:44:34 +02:00
}
func (c *Config) Job(name string) (*JobEnum, error) {
for _, j := range c.Jobs {
if j.Name() == name {
return &j, nil
}
}
return nil, fmt.Errorf("job %q not defined in config", name)
}
2018-08-26 16:44:34 +02:00
type JobEnum struct {
2018-08-26 15:17:15 +02:00
Ret interface{}
}
func (j JobEnum) Name() string {
var name string
switch v := j.Ret.(type) {
2019-03-22 19:41:12 +01:00
case *SnapJob:
name = v.Name
case *PushJob:
name = v.Name
case *SinkJob:
name = v.Name
case *PullJob:
name = v.Name
case *SourceJob:
name = v.Name
default:
panic(fmt.Sprintf("unknown job type %T", v))
}
return name
}
type ActiveJob struct {
2019-03-22 19:41:12 +01:00
Type string `yaml:"type"`
Name string `yaml:"name"`
Connect ConnectEnum `yaml:"connect"`
Pruning PruningSenderReceiver `yaml:"pruning"`
Debug JobDebugSettings `yaml:"debug,optional"`
2018-08-26 15:17:15 +02:00
}
type PassiveJob struct {
2019-03-22 19:41:12 +01:00
Type string `yaml:"type"`
Name string `yaml:"name"`
Serve ServeEnum `yaml:"serve"`
Debug JobDebugSettings `yaml:"debug,optional"`
2018-08-26 15:17:15 +02:00
}
type SnapJob struct {
2019-03-22 19:41:12 +01:00
Type string `yaml:"type"`
Name string `yaml:"name"`
Pruning PruningLocal `yaml:"pruning"`
Debug JobDebugSettings `yaml:"debug,optional"`
Snapshotting SnapshottingEnum `yaml:"snapshotting"`
Filesystems FilesystemsFilter `yaml:"filesystems"`
}
type PushJob struct {
2019-03-22 19:41:12 +01:00
ActiveJob `yaml:",inline"`
Snapshotting SnapshottingEnum `yaml:"snapshotting"`
Filesystems FilesystemsFilter `yaml:"filesystems"`
}
2018-08-26 23:11:50 +02:00
type PullJob struct {
ActiveJob `yaml:",inline"`
2019-03-22 19:41:12 +01:00
RootFS string `yaml:"root_fs"`
Interval PositiveDurationOrManual `yaml:"interval"`
}
type PositiveDurationOrManual struct {
Interval time.Duration
Manual bool
}
var _ yaml.Unmarshaler = (*PositiveDurationOrManual)(nil)
func (i *PositiveDurationOrManual) UnmarshalYAML(u func(interface{}, bool) error) (err error) {
var s string
if err := u(&s, true); err != nil {
return err
}
switch s {
case "manual":
i.Manual = true
i.Interval = 0
case "":
return fmt.Errorf("value must not be empty")
default:
i.Manual = false
i.Interval, err = time.ParseDuration(s)
if err != nil {
return err
}
if i.Interval <= 0 {
return fmt.Errorf("value must be a positive duration, got %q", s)
}
}
return nil
}
type SinkJob struct {
PassiveJob `yaml:",inline"`
RootFS string `yaml:"root_fs"`
2018-08-26 23:11:50 +02:00
}
type SourceJob struct {
2019-03-22 19:41:12 +01:00
PassiveJob `yaml:",inline"`
Snapshotting SnapshottingEnum `yaml:"snapshotting"`
Filesystems FilesystemsFilter `yaml:"filesystems"`
2018-08-26 23:11:50 +02:00
}
type FilesystemsFilter map[string]bool
2018-08-26 23:29:57 +02:00
type SnapshottingEnum struct {
Ret interface{}
}
type SnapshottingPeriodic struct {
2019-03-22 19:41:12 +01:00
Type string `yaml:"type"`
Prefix string `yaml:"prefix"`
Interval time.Duration `yaml:"interval,positive"`
Hooks HookList `yaml:"hooks,optional"`
}
type SnapshottingManual struct {
Type string `yaml:"type"`
2018-08-26 15:17:15 +02:00
}
2018-08-26 23:11:50 +02:00
type PruningSenderReceiver struct {
KeepSender []PruningEnum `yaml:"keep_sender"`
KeepReceiver []PruningEnum `yaml:"keep_receiver"`
}
type PruningLocal struct {
Keep []PruningEnum `yaml:"keep"`
2018-08-26 15:17:15 +02:00
}
type LoggingOutletEnumList []LoggingOutletEnum
func (l *LoggingOutletEnumList) SetDefault() {
def := `
type: "stdout"
time: true
level: "warn"
format: "human"
`
2018-10-18 15:43:50 +02:00
s := &StdoutLoggingOutlet{}
err := yaml.UnmarshalStrict([]byte(def), &s)
if err != nil {
panic(err)
}
*l = []LoggingOutletEnum{LoggingOutletEnum{Ret: s}}
}
var _ yaml.Defaulter = &LoggingOutletEnumList{}
2018-08-26 15:17:15 +02:00
type Global struct {
Logging *LoggingOutletEnumList `yaml:"logging,optional,fromdefaults"`
Monitoring []MonitoringEnum `yaml:"monitoring,optional"`
Control *GlobalControl `yaml:"control,optional,fromdefaults"`
Serve *GlobalServe `yaml:"serve,optional,fromdefaults"`
}
func Default(i interface{}) {
v := reflect.ValueOf(i)
if v.Kind() != reflect.Ptr {
panic(v)
}
y := `{}`
err := yaml.Unmarshal([]byte(y), v.Interface())
if err != nil {
panic(err)
}
}
2018-08-26 15:17:15 +02:00
type ConnectEnum struct {
Ret interface{}
}
type ConnectCommon struct {
2019-03-22 19:41:12 +01:00
Type string `yaml:"type"`
}
2018-08-26 15:17:15 +02:00
type TCPConnect struct {
ConnectCommon `yaml:",inline"`
Address string `yaml:"address,hostport"`
DialTimeout time.Duration `yaml:"dial_timeout,zeropositive,default=10s"`
2018-08-26 15:17:15 +02:00
}
type TLSConnect struct {
ConnectCommon `yaml:",inline"`
Address string `yaml:"address,hostport"`
Ca string `yaml:"ca"`
Cert string `yaml:"cert"`
Key string `yaml:"key"`
ServerCN string `yaml:"server_cn"`
DialTimeout time.Duration `yaml:"dial_timeout,zeropositive,default=10s"`
2018-08-26 15:17:15 +02:00
}
2018-08-26 23:46:59 +02:00
type SSHStdinserverConnect struct {
ConnectCommon `yaml:",inline"`
2018-08-27 15:18:08 +02:00
Host string `yaml:"host"`
User string `yaml:"user"`
Port uint16 `yaml:"port"`
IdentityFile string `yaml:"identity_file"`
TransportOpenCommand []string `yaml:"transport_open_command,optional"` //TODO unused
SSHCommand string `yaml:"ssh_command,optional"` //TODO unused
Options []string `yaml:"options,optional"`
DialTimeout time.Duration `yaml:"dial_timeout,zeropositive,default=10s"`
2018-08-26 23:46:59 +02:00
}
type LocalConnect struct {
2019-03-22 19:41:12 +01:00
ConnectCommon `yaml:",inline"`
ListenerName string `yaml:"listener_name"`
ClientIdentity string `yaml:"client_identity"`
DialTimeout time.Duration `yaml:"dial_timeout,zeropositive,default=2s"`
}
2018-08-26 15:17:15 +02:00
type ServeEnum struct {
Ret interface{}
}
type ServeCommon struct {
2019-03-22 19:41:12 +01:00
Type string `yaml:"type"`
}
2018-08-26 15:17:15 +02:00
type TCPServe struct {
ServeCommon `yaml:",inline"`
Listen string `yaml:"listen,hostport"`
Clients map[string]string `yaml:"clients"`
2018-08-26 15:17:15 +02:00
}
type TLSServe struct {
ServeCommon `yaml:",inline"`
Listen string `yaml:"listen,hostport"`
Ca string `yaml:"ca"`
Cert string `yaml:"cert"`
Key string `yaml:"key"`
ClientCNs []string `yaml:"client_cns"`
HandshakeTimeout time.Duration `yaml:"handshake_timeout,zeropositive,default=10s"`
2018-08-26 15:17:15 +02:00
}
2018-08-26 23:46:59 +02:00
type StdinserverServer struct {
2019-03-22 19:41:12 +01:00
ServeCommon `yaml:",inline"`
ClientIdentities []string `yaml:"client_identities"`
2018-08-26 23:46:59 +02:00
}
type LocalServe struct {
2019-03-22 19:41:12 +01:00
ServeCommon `yaml:",inline"`
ListenerName string `yaml:"listener_name"`
}
2018-08-26 15:17:15 +02:00
type PruningEnum struct {
Ret interface{}
}
type PruneKeepNotReplicated struct {
2019-03-22 19:41:12 +01:00
Type string `yaml:"type"`
KeepSnapshotAtCursor bool `yaml:"keep_snapshot_at_cursor,optional,default=true"`
2018-08-26 15:17:15 +02:00
}
type PruneKeepLastN struct {
2018-08-26 16:44:34 +02:00
Type string `yaml:"type"`
Count int `yaml:"count"`
2018-08-26 15:17:15 +02:00
}
type PruneKeepRegex struct { // FIXME rename to KeepRegex
2019-03-22 19:41:12 +01:00
Type string `yaml:"type"`
Regex string `yaml:"regex"`
Negate bool `yaml:"negate,optional,default=false"`
2018-08-27 15:18:08 +02:00
}
2018-08-26 15:17:15 +02:00
type LoggingOutletEnum struct {
Ret interface{}
}
2018-08-26 16:44:34 +02:00
type LoggingOutletCommon struct {
Type string `yaml:"type"`
Level string `yaml:"level"`
Format string `yaml:"format"`
}
2018-08-26 15:17:15 +02:00
type StdoutLoggingOutlet struct {
2018-08-26 16:44:34 +02:00
LoggingOutletCommon `yaml:",inline"`
Time bool `yaml:"time,default=true"`
2018-09-05 02:25:10 +02:00
Color bool `yaml:"color,default=true"`
2018-08-26 15:17:15 +02:00
}
type SyslogLoggingOutlet struct {
2018-08-26 16:44:34 +02:00
LoggingOutletCommon `yaml:",inline"`
Facility *SyslogFacility `yaml:"facility,optional,fromdefaults"`
2019-03-22 19:41:12 +01:00
RetryInterval time.Duration `yaml:"retry_interval,positive,default=10s"`
2018-08-26 16:44:34 +02:00
}
type TCPLoggingOutlet struct {
LoggingOutletCommon `yaml:",inline"`
Address string `yaml:"address,hostport"`
2018-08-26 23:11:50 +02:00
Net string `yaml:"net,default=tcp"`
RetryInterval time.Duration `yaml:"retry_interval,positive,default=10s"`
TLS *TCPLoggingOutletTLS `yaml:"tls,optional"`
2018-08-26 16:44:34 +02:00
}
type TCPLoggingOutletTLS struct {
CA string `yaml:"ca"`
Cert string `yaml:"cert"`
Key string `yaml:"key"`
2018-08-26 15:17:15 +02:00
}
2018-08-26 20:25:06 +02:00
type MonitoringEnum struct {
Ret interface{}
}
type PrometheusMonitoring struct {
Type string `yaml:"type"`
Listen string `yaml:"listen,hostport"`
2018-08-26 20:25:06 +02:00
}
type SyslogFacility syslog.Priority
func (f *SyslogFacility) SetDefault() {
*f = SyslogFacility(syslog.LOG_LOCAL0)
}
var _ yaml.Defaulter = (*SyslogFacility)(nil)
2018-08-26 23:11:50 +02:00
type GlobalControl struct {
SockPath string `yaml:"sockpath,default=/var/run/zrepl/control"`
}
type GlobalServe struct {
StdinServer *GlobalStdinServer `yaml:"stdinserver,optional,fromdefaults"`
2018-08-26 23:11:50 +02:00
}
type GlobalStdinServer struct {
SockDir string `yaml:"sockdir,default=/var/run/zrepl/stdinserver"`
}
2018-08-27 15:18:08 +02:00
type JobDebugSettings struct {
Conn *struct {
2018-08-27 15:18:08 +02:00
ReadDump string `yaml:"read_dump"`
WriteDump string `yaml:"write_dump"`
} `yaml:"conn,optional"`
RPCLog bool `yaml:"rpc_log,optional,default=false"`
2018-08-27 15:18:08 +02:00
}
type HookList []HookEnum
type HookEnum struct {
Ret interface{}
}
type HookCommand struct {
Path string `yaml:"path"`
Timeout time.Duration `yaml:"timeout,optional,positive,default=30s"`
Filesystems FilesystemsFilter `yaml:"filesystems,optional,default={'<': true}"`
HookSettingsCommon `yaml:",inline"`
}
type HookPostgresCheckpoint struct {
HookSettingsCommon `yaml:",inline"`
DSN string `yaml:"dsn"`
Timeout time.Duration `yaml:"timeout,optional,positive,default=30s"`
Filesystems FilesystemsFilter `yaml:"filesystems"` // required, user should not CHECKPOINT for every FS
}
type HookMySQLLockTables struct {
HookSettingsCommon `yaml:",inline"`
DSN string `yaml:"dsn"`
Timeout time.Duration `yaml:"timeout,optional,positive,default=30s"`
Filesystems FilesystemsFilter `yaml:"filesystems"`
}
type HookSettingsCommon struct {
Type string `yaml:"type"`
ErrIsFatal bool `yaml:"err_is_fatal,optional,default=false"`
}
2018-08-26 15:17:15 +02:00
func enumUnmarshal(u func(interface{}, bool) error, types map[string]interface{}) (interface{}, error) {
var in struct {
Type string
}
if err := u(&in, true); err != nil {
return nil, err
}
if in.Type == "" {
2018-09-05 02:25:10 +02:00
return nil, &yaml.TypeError{Errors: []string{"must specify type"}}
2018-08-26 15:17:15 +02:00
}
v, ok := types[in.Type]
if !ok {
2018-09-05 02:25:10 +02:00
return nil, &yaml.TypeError{Errors: []string{fmt.Sprintf("invalid type name %q", in.Type)}}
2018-08-26 15:17:15 +02:00
}
if err := u(v, false); err != nil {
return nil, err
}
return v, nil
}
2018-08-26 16:44:34 +02:00
func (t *JobEnum) UnmarshalYAML(u func(interface{}, bool) error) (err error) {
2018-08-26 15:17:15 +02:00
t.Ret, err = enumUnmarshal(u, map[string]interface{}{
"snap": &SnapJob{},
2018-08-26 23:11:50 +02:00
"push": &PushJob{},
"sink": &SinkJob{},
"pull": &PullJob{},
"source": &SourceJob{},
2018-08-26 15:17:15 +02:00
})
return
}
func (t *ConnectEnum) UnmarshalYAML(u func(interface{}, bool) error) (err error) {
t.Ret, err = enumUnmarshal(u, map[string]interface{}{
2018-08-27 15:18:08 +02:00
"tcp": &TCPConnect{},
"tls": &TLSConnect{},
2018-08-26 23:46:59 +02:00
"ssh+stdinserver": &SSHStdinserverConnect{},
2019-03-22 19:41:12 +01:00
"local": &LocalConnect{},
2018-08-26 15:17:15 +02:00
})
return
}
func (t *ServeEnum) UnmarshalYAML(u func(interface{}, bool) error) (err error) {
t.Ret, err = enumUnmarshal(u, map[string]interface{}{
2018-08-27 15:18:08 +02:00
"tcp": &TCPServe{},
"tls": &TLSServe{},
2018-08-26 23:46:59 +02:00
"stdinserver": &StdinserverServer{},
2019-03-22 19:41:12 +01:00
"local": &LocalServe{},
2018-08-26 15:17:15 +02:00
})
return
}
func (t *PruningEnum) UnmarshalYAML(u func(interface{}, bool) error) (err error) {
t.Ret, err = enumUnmarshal(u, map[string]interface{}{
"not_replicated": &PruneKeepNotReplicated{},
2018-08-26 16:44:34 +02:00
"last_n": &PruneKeepLastN{},
"grid": &PruneGrid{},
"regex": &PruneKeepRegex{},
2018-08-26 15:17:15 +02:00
})
return
}
func (t *SnapshottingEnum) UnmarshalYAML(u func(interface{}, bool) error) (err error) {
t.Ret, err = enumUnmarshal(u, map[string]interface{}{
"periodic": &SnapshottingPeriodic{},
2019-03-22 19:41:12 +01:00
"manual": &SnapshottingManual{},
})
return
}
2018-08-26 15:17:15 +02:00
func (t *LoggingOutletEnum) UnmarshalYAML(u func(interface{}, bool) error) (err error) {
t.Ret, err = enumUnmarshal(u, map[string]interface{}{
"stdout": &StdoutLoggingOutlet{},
"syslog": &SyslogLoggingOutlet{},
2018-08-26 16:44:34 +02:00
"tcp": &TCPLoggingOutlet{},
2018-08-26 15:17:15 +02:00
})
return
}
2018-08-26 20:25:06 +02:00
func (t *MonitoringEnum) UnmarshalYAML(u func(interface{}, bool) error) (err error) {
t.Ret, err = enumUnmarshal(u, map[string]interface{}{
"prometheus": &PrometheusMonitoring{},
})
return
}
func (t *SyslogFacility) UnmarshalYAML(u func(interface{}, bool) error) (err error) {
var s string
if err := u(&s, true); err != nil {
return err
}
var level syslog.Priority
switch s {
2019-03-22 19:41:12 +01:00
case "kern":
level = syslog.LOG_KERN
case "user":
level = syslog.LOG_USER
case "mail":
level = syslog.LOG_MAIL
case "daemon":
level = syslog.LOG_DAEMON
case "auth":
level = syslog.LOG_AUTH
case "syslog":
level = syslog.LOG_SYSLOG
case "lpr":
level = syslog.LOG_LPR
case "news":
level = syslog.LOG_NEWS
case "uucp":
level = syslog.LOG_UUCP
case "cron":
level = syslog.LOG_CRON
case "authpriv":
level = syslog.LOG_AUTHPRIV
case "ftp":
level = syslog.LOG_FTP
case "local0":
level = syslog.LOG_LOCAL0
case "local1":
level = syslog.LOG_LOCAL1
case "local2":
level = syslog.LOG_LOCAL2
case "local3":
level = syslog.LOG_LOCAL3
case "local4":
level = syslog.LOG_LOCAL4
case "local5":
level = syslog.LOG_LOCAL5
case "local6":
level = syslog.LOG_LOCAL6
case "local7":
level = syslog.LOG_LOCAL7
default:
return fmt.Errorf("invalid syslog level: %q", s)
}
*t = SyslogFacility(level)
2019-03-22 19:41:12 +01:00
return nil
}
func (t *HookEnum) UnmarshalYAML(u func(interface{}, bool) error) (err error) {
t.Ret, err = enumUnmarshal(u, map[string]interface{}{
"command": &HookCommand{},
"postgres-checkpoint": &HookPostgresCheckpoint{},
"mysql-lock-tables": &HookMySQLLockTables{},
})
return
}
2018-08-26 15:17:15 +02:00
var ConfigFileDefaultLocations = []string{
"/etc/zrepl/zrepl.yml",
"/usr/local/etc/zrepl/zrepl.yml",
}
func ParseConfig(path string) (i *Config, err error) {
2018-08-26 15:17:15 +02:00
if path == "" {
// Try default locations
for _, l := range ConfigFileDefaultLocations {
stat, statErr := os.Stat(l)
if statErr != nil {
continue
}
if !stat.Mode().IsRegular() {
err = errors.Errorf("file at default location is not a regular file: %s", l)
return
}
path = l
break
}
}
var bytes []byte
if bytes, err = ioutil.ReadFile(path); err != nil {
return
}
return ParseConfigBytes(bytes)
}
2018-08-26 15:17:15 +02:00
func ParseConfigBytes(bytes []byte) (*Config, error) {
var c *Config
if err := yaml.UnmarshalStrict(bytes, &c); err != nil {
return nil, err
}
if c == nil {
return nil, fmt.Errorf("config is empty or only consists of comments")
}
return c, nil
2018-08-26 15:17:15 +02:00
}
2018-08-26 19:20:08 +02:00
var durationStringRegex *regexp.Regexp = regexp.MustCompile(`^\s*(\d+)\s*(s|m|h|d|w)\s*$`)
func parsePostitiveDuration(e string) (d time.Duration, err error) {
comps := durationStringRegex.FindStringSubmatch(e)
if len(comps) != 3 {
err = fmt.Errorf("does not match regex: %s %#v", e, comps)
return
}
durationFactor, err := strconv.ParseInt(comps[1], 10, 64)
if err != nil {
return 0, err
}
if durationFactor <= 0 {
return 0, errors.New("duration must be positive integer")
}
var durationUnit time.Duration
switch comps[2] {
case "s":
durationUnit = time.Second
case "m":
durationUnit = time.Minute
case "h":
durationUnit = time.Hour
case "d":
durationUnit = 24 * time.Hour
case "w":
durationUnit = 24 * 7 * time.Hour
default:
err = fmt.Errorf("contains unknown time unit '%s'", comps[2])
return
}
d = time.Duration(durationFactor) * durationUnit
return
}