2021-04-18 15:41:13 -04:00
// Copyright (c) 2015-2021 MinIO, Inc.
//
// This file is part of MinIO Object Storage stack
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
2019-10-23 01:59:13 -04:00
package config
import (
2019-11-27 12:36:08 -05:00
"bufio"
2019-10-23 01:59:13 -04:00
"fmt"
2019-11-27 12:36:08 -05:00
"io"
2019-11-14 17:19:57 -05:00
"regexp"
2022-08-05 01:21:52 -04:00
"sort"
2019-10-23 01:59:13 -04:00
"strings"
2023-06-19 20:53:08 -04:00
"github.com/minio/madmin-go/v3"
2020-07-14 12:38:05 -04:00
"github.com/minio/minio-go/v7/pkg/set"
2021-06-01 17:59:40 -04:00
"github.com/minio/minio/internal/auth"
2023-09-04 15:57:37 -04:00
"github.com/minio/pkg/v2/env"
2019-10-23 01:59:13 -04:00
)
2022-11-18 13:28:14 -05:00
// ErrorConfig holds the config error types
type ErrorConfig interface {
ErrConfigGeneric | ErrConfigNotFound
2019-12-04 18:32:37 -05:00
}
2022-11-18 13:28:14 -05:00
// ErrConfigGeneric is a generic config type
type ErrConfigGeneric struct {
msg string
2019-10-31 02:39:09 -04:00
}
2022-11-18 13:28:14 -05:00
func ( ge * ErrConfigGeneric ) setMsg ( msg string ) {
ge . msg = msg
}
func ( ge ErrConfigGeneric ) Error ( ) string {
return ge . msg
}
// ErrConfigNotFound is an error to indicate
// that a config parameter is not found
type ErrConfigNotFound struct {
ErrConfigGeneric
}
// Error creates an error message and wraps
// it with the error type specified in the type parameter
func Error [ T ErrorConfig , PT interface {
* T
setMsg ( string )
} ] ( format string , vals ... interface { } ,
) T {
pt := PT ( new ( T ) )
pt . setMsg ( fmt . Sprintf ( format , vals ... ) )
return * pt
}
// Errorf formats an error and returns it as a generic config error
func Errorf ( format string , vals ... interface { } ) ErrConfigGeneric {
return Error [ ErrConfigGeneric ] ( format , vals ... )
2019-10-23 01:59:13 -04:00
}
// Default keys
const (
2019-11-05 09:18:26 -05:00
Default = madmin . Default
2019-12-04 18:32:37 -05:00
Enable = madmin . EnableKey
2019-12-03 13:50:20 -05:00
Comment = madmin . CommentKey
2019-10-23 01:59:13 -04:00
2022-08-05 01:21:52 -04:00
EnvSeparator = "="
2019-12-04 18:32:37 -05:00
// Enable values
EnableOn = madmin . EnableOn
EnableOff = madmin . EnableOff
2019-10-23 01:59:13 -04:00
2021-11-25 16:06:25 -05:00
RegionKey = "region"
NameKey = "name"
2019-10-23 01:59:13 -04:00
RegionName = "name"
AccessKey = "access_key"
SecretKey = "secret_key"
2021-12-03 12:32:11 -05:00
License = "license" // Deprecated Dec 2021
APIKey = "api_key"
2022-02-01 12:52:38 -05:00
Proxy = "proxy"
2019-10-23 01:59:13 -04:00
)
// Top level config constants.
const (
2022-08-13 17:50:16 -04:00
PolicyOPASubSys = madmin . PolicyOPASubSys
PolicyPluginSubSys = madmin . PolicyPluginSubSys
IdentityOpenIDSubSys = madmin . IdentityOpenIDSubSys
IdentityLDAPSubSys = madmin . IdentityLDAPSubSys
IdentityTLSSubSys = madmin . IdentityTLSSubSys
IdentityPluginSubSys = madmin . IdentityPluginSubSys
CacheSubSys = madmin . CacheSubSys
SiteSubSys = madmin . SiteSubSys
RegionSubSys = madmin . RegionSubSys
EtcdSubSys = madmin . EtcdSubSys
StorageClassSubSys = madmin . StorageClassSubSys
APISubSys = madmin . APISubSys
CompressionSubSys = madmin . CompressionSubSys
LoggerWebhookSubSys = madmin . LoggerWebhookSubSys
AuditWebhookSubSys = madmin . AuditWebhookSubSys
AuditKafkaSubSys = madmin . AuditKafkaSubSys
HealSubSys = madmin . HealSubSys
ScannerSubSys = madmin . ScannerSubSys
CrawlerSubSys = madmin . CrawlerSubSys
SubnetSubSys = madmin . SubnetSubSys
CallhomeSubSys = madmin . CallhomeSubSys
2023-11-27 12:15:06 -05:00
DriveSubSys = madmin . DriveSubSys
2023-12-02 05:51:33 -05:00
BatchSubSys = madmin . BatchSubSys
2024-01-01 11:36:33 -05:00
BrowserSubSys = madmin . BrowserSubSys
2023-12-02 05:51:33 -05:00
2022-08-13 17:50:16 -04:00
// Add new constants here (similar to above) if you add new fields to config.
2019-10-23 01:59:13 -04:00
)
// Notification config constants.
const (
2022-08-13 17:50:16 -04:00
NotifyKafkaSubSys = madmin . NotifyKafkaSubSys
NotifyMQTTSubSys = madmin . NotifyMQTTSubSys
NotifyMySQLSubSys = madmin . NotifyMySQLSubSys
NotifyNATSSubSys = madmin . NotifyNATSSubSys
NotifyNSQSubSys = madmin . NotifyNSQSubSys
NotifyESSubSys = madmin . NotifyESSubSys
NotifyAMQPSubSys = madmin . NotifyAMQPSubSys
NotifyPostgresSubSys = madmin . NotifyPostgresSubSys
NotifyRedisSubSys = madmin . NotifyRedisSubSys
NotifyWebhookSubSys = madmin . NotifyWebhookSubSys
// Add new constants here (similar to above) if you add new fields to config.
2019-10-23 01:59:13 -04:00
)
2023-03-07 11:12:41 -05:00
// Lambda config constants.
const (
LambdaWebhookSubSys = madmin . LambdaWebhookSubSys
)
2022-02-08 13:36:41 -05:00
// NotifySubSystems - all notification sub-systems
var NotifySubSystems = set . CreateStringSet (
NotifyKafkaSubSys ,
NotifyMQTTSubSys ,
NotifyMySQLSubSys ,
NotifyNATSSubSys ,
NotifyNSQSubSys ,
NotifyESSubSys ,
NotifyAMQPSubSys ,
NotifyPostgresSubSys ,
NotifyRedisSubSys ,
NotifyWebhookSubSys ,
)
2023-03-07 11:12:41 -05:00
// LambdaSubSystems - all lambda sub-systesm
var LambdaSubSystems = set . CreateStringSet (
LambdaWebhookSubSys ,
)
2022-02-08 13:36:41 -05:00
// LoggerSubSystems - all sub-systems related to logger
var LoggerSubSystems = set . CreateStringSet (
LoggerWebhookSubSys ,
AuditWebhookSubSys ,
AuditKafkaSubSys ,
)
2019-10-23 01:59:13 -04:00
// SubSystems - all supported sub-systems
2022-08-13 17:50:16 -04:00
var SubSystems = madmin . SubSystems
2020-12-04 12:32:35 -05:00
// SubSystemsDynamic - all sub-systems that have dynamic config.
var SubSystemsDynamic = set . CreateStringSet (
APISubSys ,
CompressionSubSys ,
2021-02-17 15:04:11 -05:00
ScannerSubSys ,
2020-12-04 12:32:35 -05:00
HealSubSys ,
2021-09-15 00:54:25 -04:00
SubnetSubSys ,
2022-06-06 19:14:52 -04:00
CallhomeSubSys ,
2023-11-27 12:15:06 -05:00
DriveSubSys ,
2022-02-17 14:11:15 -05:00
LoggerWebhookSubSys ,
2022-02-24 12:05:33 -05:00
AuditWebhookSubSys ,
AuditKafkaSubSys ,
2022-04-21 15:07:33 -04:00
StorageClassSubSys ,
2023-11-22 16:46:17 -05:00
CacheSubSys ,
2023-12-02 05:51:33 -05:00
BatchSubSys ,
2024-01-01 11:36:33 -05:00
BrowserSubSys ,
2020-12-04 12:32:35 -05:00
)
2019-10-23 01:59:13 -04:00
// SubSystemsSingleTargets - subsystems which only support single target.
2022-08-16 20:46:46 -04:00
var SubSystemsSingleTargets = set . CreateStringSet (
2021-11-25 16:06:25 -05:00
SiteSubSys ,
2019-10-23 01:59:13 -04:00
RegionSubSys ,
2019-10-30 03:04:39 -04:00
EtcdSubSys ,
2019-10-23 01:59:13 -04:00
CacheSubSys ,
2020-04-14 15:46:37 -04:00
APISubSys ,
2019-10-23 01:59:13 -04:00
StorageClassSubSys ,
CompressionSubSys ,
PolicyOPASubSys ,
2022-05-10 20:14:55 -04:00
PolicyPluginSubSys ,
2019-10-23 01:59:13 -04:00
IdentityLDAPSubSys ,
2021-09-07 22:03:48 -04:00
IdentityTLSSubSys ,
2022-05-26 20:58:09 -04:00
IdentityPluginSubSys ,
2020-10-14 16:51:51 -04:00
HealSubSys ,
2021-02-17 15:04:11 -05:00
ScannerSubSys ,
2022-08-16 20:46:46 -04:00
SubnetSubSys ,
CallhomeSubSys ,
2023-11-27 12:15:06 -05:00
DriveSubSys ,
2023-12-02 05:51:33 -05:00
BatchSubSys ,
2024-01-01 11:36:33 -05:00
BrowserSubSys ,
2022-08-16 20:46:46 -04:00
)
2019-10-23 01:59:13 -04:00
// Constant separators
const (
2019-11-05 09:18:26 -05:00
SubSystemSeparator = madmin . SubSystemSeparator
KvSeparator = madmin . KvSeparator
KvSpaceSeparator = madmin . KvSpaceSeparator
2019-12-03 13:50:20 -05:00
KvComment = madmin . KvComment
2019-11-05 09:18:26 -05:00
KvNewline = madmin . KvNewline
KvDoubleQuote = madmin . KvDoubleQuote
KvSingleQuote = madmin . KvSingleQuote
2019-10-30 03:04:39 -04:00
// Env prefix used for all envs in MinIO
2022-08-13 17:50:16 -04:00
EnvPrefix = madmin . EnvPrefix
EnvWordDelimiter = madmin . EnvWordDelimiter
2019-10-23 01:59:13 -04:00
)
2019-11-27 12:36:08 -05:00
// DefaultKVS - default kvs for all sub-systems
2023-06-23 10:45:27 -04:00
var DefaultKVS = map [ string ] KVS { }
2019-11-27 12:36:08 -05:00
// RegisterDefaultKVS - this function saves input kvsMap
// globally, this should be called only once preferably
// during `init()`.
func RegisterDefaultKVS ( kvsMap map [ string ] KVS ) {
for subSys , kvs := range kvsMap {
DefaultKVS [ subSys ] = kvs
}
}
// HelpSubSysMap - help for all individual KVS for each sub-systems
// also carries a special empty sub-system which dumps
// help for each sub-system key.
2023-06-23 10:45:27 -04:00
var HelpSubSysMap = map [ string ] HelpKVS { }
2019-11-27 12:36:08 -05:00
// RegisterHelpSubSys - this function saves
// input help KVS for each sub-system globally,
// this function should be called only once
// preferably in during `init()`.
func RegisterHelpSubSys ( helpKVSMap map [ string ] HelpKVS ) {
for subSys , hkvs := range helpKVSMap {
HelpSubSysMap [ subSys ] = hkvs
}
}
2021-11-25 16:06:25 -05:00
// HelpDeprecatedSubSysMap - help for all deprecated sub-systems, that may be
// removed in the future.
2023-06-23 10:45:27 -04:00
var HelpDeprecatedSubSysMap = map [ string ] HelpKV { }
2021-11-25 16:06:25 -05:00
// RegisterHelpDeprecatedSubSys - saves input help KVS for deprecated
// sub-systems globally. Should be called only once at init.
func RegisterHelpDeprecatedSubSys ( helpDeprecatedKVMap map [ string ] HelpKV ) {
for k , v := range helpDeprecatedKVMap {
HelpDeprecatedSubSysMap [ k ] = v
}
}
2019-11-20 18:10:24 -05:00
// KV - is a shorthand of each key value.
type KV struct {
Key string ` json:"key" `
Value string ` json:"value" `
2022-11-01 11:04:07 -04:00
2024-01-04 18:07:17 -05:00
HiddenIfEmpty bool ` json:"-" `
2022-11-01 11:04:07 -04:00
}
func ( kv KV ) String ( ) string {
var s strings . Builder
s . WriteString ( kv . Key )
s . WriteString ( KvSeparator )
spc := madmin . HasSpace ( kv . Value )
if spc {
s . WriteString ( KvDoubleQuote )
}
s . WriteString ( kv . Value )
if spc {
s . WriteString ( KvDoubleQuote )
}
return s . String ( )
2019-11-20 18:10:24 -05:00
}
2019-10-23 01:59:13 -04:00
// KVS - is a shorthand for some wrapper functions
// to operate on list of key values.
2019-11-20 18:10:24 -05:00
type KVS [ ] KV
2019-10-23 01:59:13 -04:00
2019-11-13 20:38:05 -05:00
// Empty - return if kv is empty
func ( kvs KVS ) Empty ( ) bool {
return len ( kvs ) == 0
}
2021-11-10 13:01:32 -05:00
// Clone - returns a copy of the KVS
func ( kvs KVS ) Clone ( ) KVS {
return append ( make ( KVS , 0 , len ( kvs ) ) , kvs ... )
}
// GetWithDefault - returns default value if key not set
func ( kvs KVS ) GetWithDefault ( key string , defaultKVS KVS ) string {
v := kvs . Get ( key )
if len ( v ) == 0 {
return defaultKVS . Get ( key )
}
return v
}
2020-04-10 00:45:17 -04:00
// Keys returns the list of keys for the current KVS
func ( kvs KVS ) Keys ( ) [ ] string {
2022-01-02 12:15:06 -05:00
keys := make ( [ ] string , len ( kvs ) )
2020-04-10 14:44:28 -04:00
var foundComment bool
2020-04-10 00:45:17 -04:00
for i := range kvs {
2020-04-10 14:44:28 -04:00
if kvs [ i ] . Key == madmin . CommentKey {
foundComment = true
}
2020-04-10 00:45:17 -04:00
keys [ i ] = kvs [ i ] . Key
}
2020-04-10 14:44:28 -04:00
// Comment KV not found, add it explicitly.
if ! foundComment {
keys = append ( keys , madmin . CommentKey )
}
2020-04-10 00:45:17 -04:00
return keys
}
2019-10-23 01:59:13 -04:00
func ( kvs KVS ) String ( ) string {
var s strings . Builder
2019-11-20 18:10:24 -05:00
for _ , kv := range kvs {
2022-11-01 11:04:07 -04:00
s . WriteString ( kv . String ( ) )
2019-10-23 01:59:13 -04:00
s . WriteString ( KvSpaceSeparator )
}
return s . String ( )
}
2021-07-13 12:39:13 -04:00
// Merge environment values with on disk KVS, environment values overrides
// anything on the disk.
func Merge ( cfgKVS map [ string ] KVS , envname string , defaultKVS KVS ) map [ string ] KVS {
newCfgKVS := make ( map [ string ] KVS )
for _ , e := range env . List ( envname ) {
tgt := strings . TrimPrefix ( e , envname + Default )
if tgt == envname {
tgt = Default
}
newCfgKVS [ tgt ] = defaultKVS
}
for tgt , kv := range cfgKVS {
newCfgKVS [ tgt ] = kv
}
return newCfgKVS
}
2019-12-04 18:32:37 -05:00
// Set sets a value, if not sets a default value.
func ( kvs * KVS ) Set ( key , value string ) {
for i , kv := range * kvs {
if kv . Key == key {
( * kvs ) [ i ] = KV {
Key : key ,
Value : value ,
}
return
}
}
* kvs = append ( * kvs , KV {
Key : key ,
Value : value ,
} )
}
2019-10-23 01:59:13 -04:00
// Get - returns the value of a key, if not found returns empty.
func ( kvs KVS ) Get ( key string ) string {
2019-11-20 18:10:24 -05:00
v , ok := kvs . Lookup ( key )
if ok {
return v
}
return ""
}
2020-09-23 12:14:33 -04:00
// Delete - deletes the key if present from the KV list.
func ( kvs * KVS ) Delete ( key string ) {
for i , kv := range * kvs {
if kv . Key == key {
* kvs = append ( ( * kvs ) [ : i ] , ( * kvs ) [ i + 1 : ] ... )
return
}
}
}
2022-11-01 11:04:07 -04:00
// LookupKV returns the KV by its key
func ( kvs KVS ) LookupKV ( key string ) ( KV , bool ) {
for _ , kv := range kvs {
if kv . Key == key {
return kv , true
}
}
return KV { } , false
}
2019-11-20 18:10:24 -05:00
// Lookup - lookup a key in a list of KVS
func ( kvs KVS ) Lookup ( key string ) ( string , bool ) {
for _ , kv := range kvs {
if kv . Key == key {
return kv . Value , true
}
}
return "" , false
2019-10-23 01:59:13 -04:00
}
// Config - MinIO server config structure.
type Config map [ string ] map [ string ] KVS
2019-11-27 12:36:08 -05:00
// DelFrom - deletes all keys in the input reader.
func ( c Config ) DelFrom ( r io . Reader ) error {
scanner := bufio . NewScanner ( r )
for scanner . Scan ( ) {
// Skip any empty lines, or comment like characters
2019-12-03 13:50:20 -05:00
text := scanner . Text ( )
if text == "" || strings . HasPrefix ( text , KvComment ) {
2019-11-27 12:36:08 -05:00
continue
}
2019-12-03 13:50:20 -05:00
if err := c . DelKVS ( text ) ; err != nil {
2019-11-27 12:36:08 -05:00
return err
}
}
2021-05-25 17:17:33 -04:00
return scanner . Err ( )
2019-11-27 12:36:08 -05:00
}
2023-05-25 01:57:37 -04:00
// ContextKeyString is type(string) for contextKey
type ContextKeyString string
// ContextKeyForTargetFromConfig - key for context for target from config
const ContextKeyForTargetFromConfig = ContextKeyString ( "ContextKeyForTargetFromConfig" )
// ParseConfigTargetID - read all targetIDs from reader
func ParseConfigTargetID ( r io . Reader ) ( ids map [ string ] bool , err error ) {
ids = make ( map [ string ] bool )
scanner := bufio . NewScanner ( r )
for scanner . Scan ( ) {
// Skip any empty lines, or comment like characters
text := scanner . Text ( )
if text == "" || strings . HasPrefix ( text , KvComment ) {
continue
}
_ , _ , tgt , err := GetSubSys ( text )
if err != nil {
return nil , err
}
ids [ tgt ] = true
}
if err := scanner . Err ( ) ; err != nil {
return nil , err
}
return
}
2020-12-04 12:32:35 -05:00
// ReadConfig - read content from input and write into c.
// Returns whether all parameters were dynamic.
func ( c Config ) ReadConfig ( r io . Reader ) ( dynOnly bool , err error ) {
2019-11-27 12:36:08 -05:00
var n int
scanner := bufio . NewScanner ( r )
2020-12-04 12:32:35 -05:00
dynOnly = true
2019-11-27 12:36:08 -05:00
for scanner . Scan ( ) {
// Skip any empty lines, or comment like characters
2019-12-03 13:50:20 -05:00
text := scanner . Text ( )
if text == "" || strings . HasPrefix ( text , KvComment ) {
2019-11-27 12:36:08 -05:00
continue
}
2020-12-04 12:32:35 -05:00
dynamic , err := c . SetKVS ( text , DefaultKVS )
if err != nil {
return false , err
2019-11-27 12:36:08 -05:00
}
2020-12-04 12:32:35 -05:00
dynOnly = dynOnly && dynamic
2019-12-03 13:50:20 -05:00
n += len ( text )
2019-11-27 12:36:08 -05:00
}
if err := scanner . Err ( ) ; err != nil {
2020-12-04 12:32:35 -05:00
return false , err
2019-11-27 12:36:08 -05:00
}
2020-12-04 12:32:35 -05:00
return dynOnly , nil
2019-11-27 12:36:08 -05:00
}
2021-06-03 11:15:44 -04:00
// RedactSensitiveInfo - removes sensitive information
// like urls and credentials from the configuration
func ( c Config ) RedactSensitiveInfo ( ) Config {
nc := c . Clone ( )
for configName , configVals := range nc {
for _ , helpKV := range HelpSubSysMap [ configName ] {
if helpKV . Sensitive {
for name , kvs := range configVals {
for i := range kvs {
if kvs [ i ] . Key == helpKV . Key && len ( kvs [ i ] . Value ) > 0 {
kvs [ i ] . Value = "*redacted*"
}
}
configVals [ name ] = kvs
}
}
}
}
return nc
}
2019-10-23 01:59:13 -04:00
// Default KV configs for worm and region
var (
DefaultCredentialKVS = KVS {
2019-11-20 18:10:24 -05:00
KV {
Key : AccessKey ,
Value : auth . DefaultAccessKey ,
} ,
KV {
Key : SecretKey ,
Value : auth . DefaultSecretKey ,
} ,
2019-10-23 01:59:13 -04:00
}
2021-11-25 16:06:25 -05:00
DefaultSiteKVS = KVS {
KV {
Key : NameKey ,
Value : "" ,
} ,
KV {
Key : RegionKey ,
Value : "" ,
} ,
}
2019-10-23 01:59:13 -04:00
DefaultRegionKVS = KVS {
2019-11-20 18:10:24 -05:00
KV {
Key : RegionName ,
Value : "" ,
} ,
2019-10-23 01:59:13 -04:00
}
)
2021-11-25 16:06:25 -05:00
// Site - holds site info - name and region.
type Site struct {
Name string
Region string
}
2019-11-14 17:19:57 -05:00
var validRegionRegex = regexp . MustCompile ( "^[a-zA-Z][a-zA-Z0-9-_-]+$" )
2021-11-25 16:06:25 -05:00
// validSiteNameRegex - allows lowercase letters, digits and '-', starts with
// letter. At least 2 characters long.
var validSiteNameRegex = regexp . MustCompile ( "^[a-z][a-z0-9-]+$" )
// LookupSite - get site related configuration. Loads configuration from legacy
// region sub-system as well.
func LookupSite ( siteKV KVS , regionKV KVS ) ( s Site , err error ) {
if err = CheckValidKeys ( SiteSubSys , siteKV , DefaultSiteKVS ) ; err != nil {
return
2019-10-23 01:59:13 -04:00
}
region := env . Get ( EnvRegion , "" )
if region == "" {
2021-11-25 16:06:25 -05:00
env . Get ( EnvRegionName , "" )
}
if region == "" {
region = env . Get ( EnvSiteRegion , siteKV . Get ( RegionKey ) )
}
if region == "" {
// No region config found in the site-subsystem. So lookup the legacy
// region sub-system.
if err = CheckValidKeys ( RegionSubSys , regionKV , DefaultRegionKVS ) ; err != nil {
// An invalid key was found in the region sub-system.
// Since the region sub-system cannot be (re)set as it
// is legacy, we return an error to tell the user to
// reset the region via the new command.
err = Errorf ( "could not load region from legacy configuration as it was invalid - use 'mc admin config set myminio site region=myregion name=myname' to set a region and name (%v)" , err )
return
}
region = regionKV . Get ( RegionName )
2019-10-23 01:59:13 -04:00
}
2019-11-14 17:19:57 -05:00
if region != "" {
2021-11-25 16:06:25 -05:00
if ! validRegionRegex . MatchString ( region ) {
err = Errorf (
"region '%s' is invalid, expected simple characters such as [us-east-1, myregion...]" ,
region )
return
2019-11-14 17:19:57 -05:00
}
2021-11-25 16:06:25 -05:00
s . Region = region
2019-11-14 17:19:57 -05:00
}
2021-11-25 16:06:25 -05:00
name := env . Get ( EnvSiteName , siteKV . Get ( NameKey ) )
if name != "" {
if ! validSiteNameRegex . MatchString ( name ) {
err = Errorf (
"site name '%s' is invalid, expected simple characters such as [cal-rack0, myname...]" ,
name )
return
}
s . Name = name
}
return
2019-10-23 01:59:13 -04:00
}
// CheckValidKeys - checks if inputs KVS has the necessary keys,
// returns error if it find extra or superflous keys.
2023-06-22 13:04:02 -04:00
func CheckValidKeys ( subSys string , kv KVS , validKVS KVS , deprecatedKeys ... string ) error {
2019-10-23 01:59:13 -04:00
nkv := KVS { }
2019-11-20 18:10:24 -05:00
for _ , kv := range kv {
2019-12-05 07:47:42 -05:00
// Comment is a valid key, its also fully optional
// ignore it since it is a valid key for all
// sub-systems.
if kv . Key == Comment {
continue
}
2023-06-22 13:04:02 -04:00
var skip bool
for _ , deprecatedKey := range deprecatedKeys {
if kv . Key == deprecatedKey {
skip = true
break
}
}
if skip {
continue
}
2019-11-20 18:10:24 -05:00
if _ , ok := validKVS . Lookup ( kv . Key ) ; ! ok {
nkv = append ( nkv , kv )
2019-10-23 01:59:13 -04:00
}
}
if len ( nkv ) > 0 {
2019-12-04 18:32:37 -05:00
return Errorf (
"found invalid keys (%s) for '%s' sub-system, use 'mc admin config reset myminio %s' to fix invalid keys" , nkv . String ( ) , subSys , subSys )
2019-10-23 01:59:13 -04:00
}
return nil
}
// LookupWorm - check if worm is enabled
2019-11-20 18:10:24 -05:00
func LookupWorm ( ) ( bool , error ) {
2019-12-04 18:32:37 -05:00
return ParseBool ( env . Get ( EnvWorm , EnableOff ) )
2019-10-23 01:59:13 -04:00
}
2021-02-17 15:04:11 -05:00
// Carries all the renamed sub-systems from their
// previously known names
var renamedSubsys = map [ string ] string {
CrawlerSubSys : ScannerSubSys ,
// Add future sub-system renames
}
2023-04-11 22:22:10 -04:00
const ( // deprecated keys
apiReplicationWorkers = "replication_workers"
apiReplicationFailedWorkers = "replication_failed_workers"
)
// map of subsystem to deleted keys
var deletedSubSysKeys = map [ string ] [ ] string {
APISubSys : { apiReplicationWorkers , apiReplicationFailedWorkers } ,
// Add future sub-system deleted keys
}
2020-05-23 20:38:39 -04:00
// Merge - merges a new config with all the
// missing values for default configs,
// returns a config.
func ( c Config ) Merge ( ) Config {
cp := New ( )
for subSys , tgtKV := range c {
for tgt := range tgtKV {
ckvs := c [ subSys ] [ tgt ]
for _ , kv := range cp [ subSys ] [ Default ] {
_ , ok := c [ subSys ] [ tgt ] . Lookup ( kv . Key )
if ! ok {
ckvs . Set ( kv . Key , kv . Value )
}
}
2020-09-08 11:57:04 -04:00
if _ , ok := cp [ subSys ] ; ! ok {
2021-02-17 15:04:11 -05:00
rnSubSys , ok := renamedSubsys [ subSys ]
if ! ok {
// A config subsystem was removed or server was downgraded.
continue
}
// Copy over settings from previous sub-system
// to newly renamed sub-system
for _ , kv := range cp [ rnSubSys ] [ Default ] {
_ , ok := c [ subSys ] [ tgt ] . Lookup ( kv . Key )
if ! ok {
ckvs . Set ( kv . Key , kv . Value )
}
}
subSys = rnSubSys
2020-09-08 11:57:04 -04:00
}
2023-04-11 22:22:10 -04:00
// Delete deprecated keys for subsystem if any
if keys , ok := deletedSubSysKeys [ subSys ] ; ok {
for _ , key := range keys {
ckvs . Delete ( key )
}
}
2020-05-23 20:38:39 -04:00
cp [ subSys ] [ tgt ] = ckvs
}
}
2023-04-11 22:22:10 -04:00
2020-05-23 20:38:39 -04:00
return cp
}
2019-10-23 01:59:13 -04:00
// New - initialize a new server config.
func New ( ) Config {
srvCfg := make ( Config )
for _ , k := range SubSystems . ToSlice ( ) {
srvCfg [ k ] = map [ string ] KVS { }
2019-12-03 13:50:20 -05:00
srvCfg [ k ] [ Default ] = DefaultKVS [ k ]
2019-10-23 01:59:13 -04:00
}
return srvCfg
}
2019-12-06 05:43:10 -05:00
// Target signifies an individual target
type Target struct {
SubSystem string
KVS KVS
}
// Targets sub-system targets
type Targets [ ] Target
2019-10-23 01:59:13 -04:00
// GetKVS - get kvs from specific subsystem.
2019-12-06 05:43:10 -05:00
func ( c Config ) GetKVS ( s string , defaultKVS map [ string ] KVS ) ( Targets , error ) {
2019-10-23 01:59:13 -04:00
if len ( s ) == 0 {
2019-12-14 20:27:57 -05:00
return nil , Errorf ( "input cannot be empty" )
2019-10-23 01:59:13 -04:00
}
inputs := strings . Fields ( s )
if len ( inputs ) > 1 {
2019-12-14 20:27:57 -05:00
return nil , Errorf ( "invalid number of arguments %s" , s )
2019-10-23 01:59:13 -04:00
}
subSystemValue := strings . SplitN ( inputs [ 0 ] , SubSystemSeparator , 2 )
if len ( subSystemValue ) == 0 {
2019-12-14 20:27:57 -05:00
return nil , Errorf ( "invalid number of arguments %s" , s )
2019-10-23 01:59:13 -04:00
}
found := SubSystems . Contains ( subSystemValue [ 0 ] )
if ! found {
2019-11-14 17:19:57 -05:00
// Check for sub-prefix only if the input value is only a
// single value, this rejects invalid inputs if any.
2019-10-23 01:59:13 -04:00
found = ! SubSystems . FuncMatch ( strings . HasPrefix , subSystemValue [ 0 ] ) . IsEmpty ( ) && len ( subSystemValue ) == 1
}
if ! found {
2019-12-14 20:27:57 -05:00
return nil , Errorf ( "unknown sub-system %s" , s )
2019-10-23 01:59:13 -04:00
}
2019-12-06 05:43:10 -05:00
targets := Targets { }
2019-11-20 18:10:24 -05:00
subSysPrefix := subSystemValue [ 0 ]
2019-10-23 01:59:13 -04:00
if len ( subSystemValue ) == 2 {
if len ( subSystemValue [ 1 ] ) == 0 {
2019-12-14 20:27:57 -05:00
return nil , Errorf ( "sub-system target '%s' cannot be empty" , s )
2019-10-23 01:59:13 -04:00
}
2019-12-06 05:43:10 -05:00
kvs , ok := c [ subSysPrefix ] [ subSystemValue [ 1 ] ]
2019-10-23 01:59:13 -04:00
if ! ok {
2019-12-14 20:27:57 -05:00
return nil , Errorf ( "sub-system target '%s' doesn't exist" , s )
2019-10-23 01:59:13 -04:00
}
2019-12-06 05:43:10 -05:00
for _ , kv := range defaultKVS [ subSysPrefix ] {
_ , ok = kvs . Lookup ( kv . Key )
if ! ok {
kvs . Set ( kv . Key , kv . Value )
}
}
targets = append ( targets , Target {
SubSystem : inputs [ 0 ] ,
KVS : kvs ,
} )
2019-11-20 18:10:24 -05:00
} else {
2021-11-25 16:06:25 -05:00
// Use help for sub-system to preserve the order. Add deprecated
// keys at the end (in some order).
kvsOrder := append ( [ ] HelpKV { } , HelpSubSysMap [ "" ] ... )
for _ , v := range HelpDeprecatedSubSysMap {
kvsOrder = append ( kvsOrder , v )
}
for _ , hkv := range kvsOrder {
2019-12-06 05:43:10 -05:00
if ! strings . HasPrefix ( hkv . Key , subSysPrefix ) {
2019-11-20 18:10:24 -05:00
continue
}
2019-12-06 16:53:51 -05:00
if c [ hkv . Key ] [ Default ] . Empty ( ) {
targets = append ( targets , Target {
SubSystem : hkv . Key ,
KVS : defaultKVS [ hkv . Key ] ,
} )
}
2019-12-06 05:43:10 -05:00
for k , kvs := range c [ hkv . Key ] {
2019-12-06 16:53:51 -05:00
for _ , dkv := range defaultKVS [ hkv . Key ] {
2019-12-06 05:43:10 -05:00
_ , ok := kvs . Lookup ( dkv . Key )
if ! ok {
kvs . Set ( dkv . Key , dkv . Value )
}
}
2019-11-20 18:10:24 -05:00
if k != Default {
2019-12-06 05:43:10 -05:00
targets = append ( targets , Target {
SubSystem : hkv . Key + SubSystemSeparator + k ,
KVS : kvs ,
} )
2019-11-20 18:10:24 -05:00
} else {
2019-12-06 05:43:10 -05:00
targets = append ( targets , Target {
SubSystem : hkv . Key ,
KVS : kvs ,
} )
2019-11-20 18:10:24 -05:00
}
2019-10-23 01:59:13 -04:00
}
}
}
2019-12-06 05:43:10 -05:00
return targets , nil
2019-10-23 01:59:13 -04:00
}
// DelKVS - delete a specific key.
func ( c Config ) DelKVS ( s string ) error {
2022-07-22 17:48:23 -04:00
subSys , inputs , tgt , err := GetSubSys ( s )
if err != nil {
if ! SubSystems . Contains ( subSys ) && len ( inputs ) == 1 {
// Unknown sub-system found try to remove it anyways.
delete ( c , subSys )
return nil
2019-10-23 01:59:13 -04:00
}
2022-07-22 17:48:23 -04:00
return err
2019-11-20 18:10:24 -05:00
}
2022-07-22 17:48:23 -04:00
ck , ok := c [ subSys ] [ tgt ]
2019-11-20 18:10:24 -05:00
if ! ok {
2022-11-18 13:28:14 -05:00
return Error [ ErrConfigNotFound ] ( "sub-system %s:%s already deleted or does not exist" , subSys , tgt )
2022-07-22 17:48:23 -04:00
}
if len ( inputs ) == 2 {
currKVS := ck . Clone ( )
defKVS := DefaultKVS [ subSys ]
for _ , delKey := range strings . Fields ( inputs [ 1 ] ) {
_ , ok := currKVS . Lookup ( delKey )
if ! ok {
2022-11-18 13:28:14 -05:00
return Error [ ErrConfigNotFound ] ( "key %s doesn't exist" , delKey )
2022-07-22 17:48:23 -04:00
}
defVal , isDef := defKVS . Lookup ( delKey )
if isDef {
currKVS . Set ( delKey , defVal )
} else {
currKVS . Delete ( delKey )
}
}
c [ subSys ] [ tgt ] = currKVS
} else {
delete ( c [ subSys ] , tgt )
2019-10-23 01:59:13 -04:00
}
2019-11-13 20:38:05 -05:00
return nil
2019-10-23 01:59:13 -04:00
}
// Clone - clones a config map entirely.
func ( c Config ) Clone ( ) Config {
cp := New ( )
for subSys , tgtKV := range c {
cp [ subSys ] = make ( map [ string ] KVS )
for tgt , kv := range tgtKV {
2019-11-20 18:10:24 -05:00
cp [ subSys ] [ tgt ] = append ( cp [ subSys ] [ tgt ] , kv ... )
2019-10-23 01:59:13 -04:00
}
}
return cp
}
2022-02-08 13:36:41 -05:00
// GetSubSys - extracts subssystem info from given config string
func GetSubSys ( s string ) ( subSys string , inputs [ ] string , tgt string , e error ) {
tgt = Default
2019-10-23 01:59:13 -04:00
if len ( s ) == 0 {
2022-02-08 13:36:41 -05:00
return subSys , inputs , tgt , Errorf ( "input arguments cannot be empty" )
2019-10-23 01:59:13 -04:00
}
2022-02-08 13:36:41 -05:00
inputs = strings . SplitN ( s , KvSpaceSeparator , 2 )
2022-02-22 13:59:28 -05:00
2019-10-23 01:59:13 -04:00
subSystemValue := strings . SplitN ( inputs [ 0 ] , SubSystemSeparator , 2 )
2022-02-22 13:59:28 -05:00
subSys = subSystemValue [ 0 ]
if ! SubSystems . Contains ( subSys ) {
return subSys , inputs , tgt , Errorf ( "unknown sub-system %s" , s )
2019-10-23 01:59:13 -04:00
}
if SubSystemsSingleTargets . Contains ( subSystemValue [ 0 ] ) && len ( subSystemValue ) == 2 {
2022-02-08 13:36:41 -05:00
return subSys , inputs , tgt , Errorf ( "sub-system '%s' only supports single target" , subSystemValue [ 0 ] )
2019-10-23 01:59:13 -04:00
}
2020-04-10 00:45:17 -04:00
if len ( subSystemValue ) == 2 {
tgt = subSystemValue [ 1 ]
}
2022-02-08 13:36:41 -05:00
return subSys , inputs , tgt , e
}
2022-08-18 18:55:17 -04:00
// kvFields - converts an input string of form "k1=v1 k2=v2" into
// fields of ["k1=v1", "k2=v2"], the tokenization of each `k=v`
// happens with the right number of input keys, if keys
// input is empty returned value is empty slice as well.
func kvFields ( input string , keys [ ] string ) [ ] string {
valueIndexes := make ( [ ] int , 0 , len ( keys ) )
for _ , key := range keys {
i := strings . Index ( input , key + KvSeparator )
if i == - 1 {
continue
}
valueIndexes = append ( valueIndexes , i )
}
sort . Ints ( valueIndexes )
fields := make ( [ ] string , len ( valueIndexes ) )
for i := range valueIndexes {
j := i + 1
if j < len ( valueIndexes ) {
fields [ i ] = strings . TrimSpace ( input [ valueIndexes [ i ] : valueIndexes [ j ] ] )
} else {
fields [ i ] = strings . TrimSpace ( input [ valueIndexes [ i ] : ] )
}
}
return fields
}
2022-02-08 13:36:41 -05:00
// SetKVS - set specific key values per sub-system.
func ( c Config ) SetKVS ( s string , defaultKVS map [ string ] KVS ) ( dynamic bool , err error ) {
subSys , inputs , tgt , err := GetSubSys ( s )
if err != nil {
return false , err
}
dynamic = SubSystemsDynamic . Contains ( subSys )
2022-08-18 18:55:17 -04:00
fields := kvFields ( inputs [ 1 ] , defaultKVS [ subSys ] . Keys ( ) )
2020-04-10 00:45:17 -04:00
if len ( fields ) == 0 {
2020-12-04 12:32:35 -05:00
return false , Errorf ( "sub-system '%s' cannot have empty keys" , subSys )
2020-04-10 00:45:17 -04:00
}
2022-01-02 12:15:06 -05:00
kvs := KVS { }
2019-10-23 01:59:13 -04:00
var prevK string
2020-04-10 00:45:17 -04:00
for _ , v := range fields {
2019-10-23 01:59:13 -04:00
kv := strings . SplitN ( v , KvSeparator , 2 )
if len ( kv ) == 0 {
continue
}
if len ( kv ) == 1 && prevK != "" {
2019-12-05 07:47:42 -05:00
value := strings . Join ( [ ] string {
kvs . Get ( prevK ) ,
madmin . SanitizeValue ( kv [ 0 ] ) ,
} , KvSpaceSeparator )
kvs . Set ( prevK , value )
2019-10-23 01:59:13 -04:00
continue
}
2019-12-05 07:47:42 -05:00
if len ( kv ) == 2 {
prevK = kv [ 0 ]
kvs . Set ( prevK , madmin . SanitizeValue ( kv [ 1 ] ) )
continue
2019-11-12 06:16:25 -05:00
}
2020-12-04 12:32:35 -05:00
return false , Errorf ( "key '%s', cannot have empty value" , kv [ 0 ] )
2019-10-23 01:59:13 -04:00
}
2019-12-04 18:32:37 -05:00
_ , ok := kvs . Lookup ( Enable )
// Check if state is required
2019-12-12 20:02:14 -05:00
_ , enableRequired := defaultKVS [ subSys ] . Lookup ( Enable )
if ! ok && enableRequired {
2019-11-14 17:19:57 -05:00
// implicit state "on" if not specified.
2019-12-05 07:47:42 -05:00
kvs . Set ( Enable , EnableOn )
2019-11-20 18:10:24 -05:00
}
2019-12-04 18:32:37 -05:00
2021-11-10 13:01:32 -05:00
var currKVS KVS
ck , ok := c [ subSys ] [ tgt ]
2019-12-05 07:47:42 -05:00
if ! ok {
2021-11-10 13:01:32 -05:00
currKVS = defaultKVS [ subSys ] . Clone ( )
2020-01-10 19:57:18 -05:00
} else {
2021-11-10 13:01:32 -05:00
currKVS = ck . Clone ( )
2020-01-10 19:57:18 -05:00
for _ , kv := range defaultKVS [ subSys ] {
if _ , ok = currKVS . Lookup ( kv . Key ) ; ! ok {
currKVS . Set ( kv . Key , kv . Value )
}
}
2019-12-05 07:47:42 -05:00
}
2019-12-04 18:32:37 -05:00
for _ , kv := range kvs {
2019-12-05 07:47:42 -05:00
if kv . Key == Comment {
// Skip comment and add it later.
continue
}
2019-12-04 18:32:37 -05:00
currKVS . Set ( kv . Key , kv . Value )
}
2019-12-05 07:47:42 -05:00
v , ok := kvs . Lookup ( Comment )
if ok {
currKVS . Set ( Comment , v )
2019-10-23 01:59:13 -04:00
}
2019-12-04 18:32:37 -05:00
2019-12-12 17:55:07 -05:00
hkvs := HelpSubSysMap [ subSys ]
for _ , hkv := range hkvs {
2019-12-12 20:02:14 -05:00
var enabled bool
if enableRequired {
enabled = currKVS . Get ( Enable ) == EnableOn
} else {
// when enable arg is not required
// then it is implicit on for the sub-system.
enabled = true
}
2019-12-12 17:55:07 -05:00
v , _ := currKVS . Lookup ( hkv . Key )
2019-12-12 20:02:14 -05:00
if v == "" && ! hkv . Optional && enabled {
// Return error only if the
// key is enabled, for state=off
// let it be empty.
2020-12-04 12:32:35 -05:00
return false , Errorf (
2019-12-12 17:55:07 -05:00
"'%s' is not optional for '%s' sub-system, please check '%s' documentation" ,
hkv . Key , subSys , subSys )
}
}
2019-12-05 07:47:42 -05:00
c [ subSys ] [ tgt ] = currKVS
2020-12-04 12:32:35 -05:00
return dynamic , nil
2019-10-23 01:59:13 -04:00
}
2022-06-17 14:39:21 -04:00
// CheckValidKeys - checks if the config parameters for the given subsystem and
// target are valid. It checks both the configuration store as well as
// environment variables.
func ( c Config ) CheckValidKeys ( subSys string , deprecatedKeys [ ] string ) error {
defKVS , ok := DefaultKVS [ subSys ]
if ! ok {
2022-08-20 18:11:49 -04:00
return Errorf ( "Subsystem %s does not exist" , subSys )
2022-06-17 14:39:21 -04:00
}
// Make a list of valid keys for the subsystem including the `comment`
// key.
validKeys := make ( [ ] string , 0 , len ( defKVS ) + 1 )
for _ , param := range defKVS {
validKeys = append ( validKeys , param . Key )
}
validKeys = append ( validKeys , Comment )
subSysEnvVars := env . List ( fmt . Sprintf ( "%s%s" , EnvPrefix , strings . ToUpper ( subSys ) ) )
// Set of env vars for the sub-system to validate.
candidates := set . CreateStringSet ( subSysEnvVars ... )
// Remove all default target env vars from the candidates set (as they
// are valid).
for _ , param := range validKeys {
paramEnvName := getEnvVarName ( subSys , Default , param )
candidates . Remove ( paramEnvName )
}
isSingleTarget := SubSystemsSingleTargets . Contains ( subSys )
if isSingleTarget && len ( candidates ) > 0 {
2022-08-20 18:11:49 -04:00
return Errorf ( "The following environment variables are unknown: %s" ,
2022-06-17 14:39:21 -04:00
strings . Join ( candidates . ToSlice ( ) , ", " ) )
}
if ! isSingleTarget {
// Validate other env vars for all targets.
envVars := candidates . ToSlice ( )
for _ , envVar := range envVars {
for _ , param := range validKeys {
pEnvName := getEnvVarName ( subSys , Default , param ) + Default
if len ( envVar ) > len ( pEnvName ) && strings . HasPrefix ( envVar , pEnvName ) {
// This envVar is valid - it has a
// non-empty target.
candidates . Remove ( envVar )
}
}
}
// Whatever remains are invalid env vars - return an error.
if len ( candidates ) > 0 {
2022-08-20 18:11:49 -04:00
return Errorf ( "The following environment variables are unknown: %s" ,
2022-06-17 14:39:21 -04:00
strings . Join ( candidates . ToSlice ( ) , ", " ) )
}
}
validKeysSet := set . CreateStringSet ( validKeys ... )
validKeysSet = validKeysSet . Difference ( set . CreateStringSet ( deprecatedKeys ... ) )
kvsMap := c [ subSys ]
for tgt , kvs := range kvsMap {
invalidKV := KVS { }
for _ , kv := range kvs {
if ! validKeysSet . Contains ( kv . Key ) {
invalidKV = append ( invalidKV , kv )
}
}
if len ( invalidKV ) > 0 {
return Errorf (
"found invalid keys (%s) for '%s:%s' sub-system, use 'mc admin config reset myminio %s:%s' to fix invalid keys" ,
invalidKV . String ( ) , subSys , tgt , subSys , tgt )
}
}
return nil
}
// GetAvailableTargets - returns a list of targets configured for the given
// subsystem (whether they are enabled or not). A target could be configured via
// environment variables or via the configuration store. The default target is
2022-08-05 01:21:52 -04:00
// `_` and is always returned. The result is sorted so that the default target
// is the first one and the remaining entries are sorted in ascending order.
2022-06-17 14:39:21 -04:00
func ( c Config ) GetAvailableTargets ( subSys string ) ( [ ] string , error ) {
if SubSystemsSingleTargets . Contains ( subSys ) {
return [ ] string { Default } , nil
}
defKVS , ok := DefaultKVS [ subSys ]
if ! ok {
2022-08-20 18:11:49 -04:00
return nil , Errorf ( "Subsystem %s does not exist" , subSys )
2022-06-17 14:39:21 -04:00
}
kvsMap := c [ subSys ]
2022-08-05 01:21:52 -04:00
seen := set . NewStringSet ( )
2022-06-17 14:39:21 -04:00
// Add all targets that are configured in the config store.
for k := range kvsMap {
2022-08-05 01:21:52 -04:00
seen . Add ( k )
2022-06-17 14:39:21 -04:00
}
2023-10-26 11:12:57 -04:00
// env:prefix
filterMap := map [ string ] string { }
2022-06-17 14:39:21 -04:00
// Add targets that are configured via environment variables.
for _ , param := range defKVS {
envVarPrefix := getEnvVarName ( subSys , Default , param . Key ) + Default
envsWithPrefix := env . List ( envVarPrefix )
for _ , k := range envsWithPrefix {
tgtName := strings . TrimPrefix ( k , envVarPrefix )
if tgtName != "" {
2023-10-26 11:12:57 -04:00
if v , ok := filterMap [ k ] ; ok {
if strings . HasPrefix ( envVarPrefix , v ) {
filterMap [ k ] = envVarPrefix
}
} else {
filterMap [ k ] = envVarPrefix
}
2022-06-17 14:39:21 -04:00
}
}
}
2023-10-26 11:12:57 -04:00
for k , v := range filterMap {
seen . Add ( strings . TrimPrefix ( k , v ) )
}
2022-08-05 01:21:52 -04:00
seen . Remove ( Default )
targets := seen . ToSlice ( )
sort . Strings ( targets )
targets = append ( [ ] string { Default } , targets ... )
return targets , nil
2022-06-17 14:39:21 -04:00
}
func getEnvVarName ( subSys , target , param string ) string {
if target == Default {
2022-06-29 19:32:04 -04:00
return fmt . Sprintf ( "%s%s%s%s" , EnvPrefix , strings . ToUpper ( subSys ) , Default , strings . ToUpper ( param ) )
2022-06-17 14:39:21 -04:00
}
2022-08-05 01:21:52 -04:00
return fmt . Sprintf ( "%s%s%s%s%s%s" , EnvPrefix , strings . ToUpper ( subSys ) , Default , strings . ToUpper ( param ) ,
Default , target )
2022-06-17 14:39:21 -04:00
}
2022-12-13 17:28:48 -05:00
var resolvableSubsystems = set . CreateStringSet ( IdentityOpenIDSubSys , IdentityLDAPSubSys , PolicyPluginSubSys )
2022-06-17 14:39:21 -04:00
// ValueSource represents the source of a config parameter value.
type ValueSource uint8
// Constants for ValueSource
const (
ValueSourceAbsent ValueSource = iota // this is an error case
ValueSourceDef
ValueSourceCfg
ValueSourceEnv
)
// ResolveConfigParam returns the effective value of a configuration parameter,
// within a subsystem and subsystem target. The effective value is, in order of
// decreasing precedence:
//
// 1. the value of the corresponding environment variable if set,
// 2. the value of the parameter in the config store if set,
// 3. the default value,
//
// This function only works for a subset of sub-systems, others return
// `ValueSourceAbsent`. FIXME: some parameters have custom environment
// variables for which support needs to be added.
2023-06-23 10:45:27 -04:00
//
// When redactSecrets is true, the returned value is empty if the configuration
// parameter is a secret, and the returned isRedacted flag is set.
func ( c Config ) ResolveConfigParam ( subSys , target , cfgParam string , redactSecrets bool ,
) ( value string , cs ValueSource , isRedacted bool ) {
2022-06-17 14:39:21 -04:00
// cs = ValueSourceAbsent initially as it is iota by default.
// Initially only support OpenID
if ! resolvableSubsystems . Contains ( subSys ) {
return
}
// Check if config param requested is valid.
defKVS , ok := DefaultKVS [ subSys ]
if ! ok {
return
}
defValue , isFound := defKVS . Lookup ( cfgParam )
2022-07-05 21:18:04 -04:00
// Comments usually are absent from `defKVS`, so we handle it specially.
2022-08-05 01:21:52 -04:00
if ! isFound && cfgParam == Comment {
2022-07-05 21:18:04 -04:00
defValue , isFound = "" , true
}
2022-06-17 14:39:21 -04:00
if ! isFound {
return
}
if target == "" {
target = Default
}
2023-06-23 10:45:27 -04:00
if redactSecrets {
// If the configuration parameter is a secret, make sure to redact it when
// we return.
helpKV , _ := HelpSubSysMap [ subSys ] . Lookup ( cfgParam )
if helpKV . Secret {
defer func ( ) {
value = ""
isRedacted = true
} ( )
}
}
2022-06-17 14:39:21 -04:00
envVar := getEnvVarName ( subSys , target , cfgParam )
// Lookup Env var.
value = env . Get ( envVar , "" )
if value != "" {
cs = ValueSourceEnv
return
}
// Lookup config store.
if subSysStore , ok := c [ subSys ] ; ok {
if kvs , ok2 := subSysStore [ target ] ; ok2 {
var ok3 bool
value , ok3 = kvs . Lookup ( cfgParam )
if ok3 {
cs = ValueSourceCfg
return
}
}
}
// Return the default value.
value = defValue
cs = ValueSourceDef
return
}
2022-07-05 21:18:04 -04:00
// KVSrc represents a configuration parameter key and value along with the
// source of the value.
type KVSrc struct {
Key string
Value string
Src ValueSource
}
// GetResolvedConfigParams returns all applicable config parameters with their
// value sources.
2023-06-23 10:45:27 -04:00
func ( c Config ) GetResolvedConfigParams ( subSys , target string , redactSecrets bool ) ( [ ] KVSrc , error ) {
2022-07-05 21:18:04 -04:00
if ! resolvableSubsystems . Contains ( subSys ) {
2022-08-20 18:11:49 -04:00
return nil , Errorf ( "unsupported subsystem: %s" , subSys )
2022-07-05 21:18:04 -04:00
}
// Check if config param requested is valid.
defKVS , ok := DefaultKVS [ subSys ]
if ! ok {
2022-08-20 18:11:49 -04:00
return nil , Errorf ( "unknown subsystem: %s" , subSys )
2022-07-05 21:18:04 -04:00
}
r := make ( [ ] KVSrc , 0 , len ( defKVS ) + 1 )
for _ , kv := range defKVS {
2023-06-23 10:45:27 -04:00
v , vs , isRedacted := c . ResolveConfigParam ( subSys , target , kv . Key , redactSecrets )
2022-07-05 21:18:04 -04:00
// Fix `vs` when default.
if v == kv . Value {
vs = ValueSourceDef
}
2023-06-23 10:45:27 -04:00
if redactSecrets && isRedacted {
// Skip adding redacted secrets to the output.
continue
}
2022-07-05 21:18:04 -04:00
r = append ( r , KVSrc {
Key : kv . Key ,
Value : v ,
Src : vs ,
} )
}
2023-06-23 10:45:27 -04:00
// Add the comment key as well if non-empty (and comments are never
// redacted).
v , vs , _ := c . ResolveConfigParam ( subSys , target , Comment , redactSecrets )
2022-07-05 21:18:04 -04:00
if vs != ValueSourceDef {
r = append ( r , KVSrc {
Key : Comment ,
Value : v ,
Src : vs ,
} )
}
return r , nil
}
2022-08-05 01:21:52 -04:00
2023-06-23 10:45:27 -04:00
// getTargetKVS returns configuration KVs for the given subsystem and target. It
// does not return any secrets in the configuration values when `redactSecrets`
// is set.
func ( c Config ) getTargetKVS ( subSys , target string , redactSecrets bool ) KVS {
2022-08-05 01:21:52 -04:00
store , ok := c [ subSys ]
if ! ok {
return nil
}
2023-06-23 10:45:27 -04:00
// Lookup will succeed, because this function only works with valid subSys
// values.
resultKVS := make ( [ ] KV , 0 , len ( store [ target ] ) )
hkvs := HelpSubSysMap [ subSys ]
for _ , kv := range store [ target ] {
hkv , _ := hkvs . Lookup ( kv . Key )
if hkv . Secret && redactSecrets && kv . Value != "" {
// Skip returning secrets.
continue
// clonedKV := kv
// clonedKV.Value = redactedSecret
// resultKVS = append(resultKVS, clonedKV)
}
2023-12-06 21:17:03 -05:00
resultKVS = append ( resultKVS , kv )
2023-06-23 10:45:27 -04:00
}
return resultKVS
}
// getTargetEnvs returns configured environment variable settings for the given
// subsystem and target.
func ( c Config ) getTargetEnvs ( subSys , target string , defKVS KVS , redactSecrets bool ) map [ string ] EnvPair {
hkvs := HelpSubSysMap [ subSys ]
envMap := make ( map [ string ] EnvPair )
// Add all env vars that are set.
for _ , kv := range defKVS {
envName := getEnvVarName ( subSys , target , kv . Key )
envPair := EnvPair {
Name : envName ,
Value : env . Get ( envName , "" ) ,
}
if envPair . Value != "" {
hkv , _ := hkvs . Lookup ( kv . Key )
if hkv . Secret && redactSecrets {
// Skip adding any secret to the returned value.
continue
// envPair.Value = redactedSecret
}
envMap [ kv . Key ] = envPair
}
}
return envMap
2022-08-05 01:21:52 -04:00
}
// EnvPair represents an environment variable and its value.
type EnvPair struct {
Name , Value string
}
// SubsysInfo holds config info for a subsystem target.
type SubsysInfo struct {
SubSys , Target string
2022-08-13 13:39:01 -04:00
Defaults KVS
Config KVS
2022-08-05 01:21:52 -04:00
// map of config parameter name to EnvPair.
EnvMap map [ string ] EnvPair
}
2022-08-25 03:17:05 -04:00
// GetSubsysInfo returns `SubsysInfo`s for all targets for the subsystem, when
// target is empty. Otherwise returns `SubsysInfo` for the desired target only.
// To request the default target only, target must be set to `Default`.
2023-06-23 10:45:27 -04:00
func ( c Config ) GetSubsysInfo ( subSys , target string , redactSecrets bool ) ( [ ] SubsysInfo , error ) {
2022-08-05 01:21:52 -04:00
// Check if config param requested is valid.
defKVS1 , ok := DefaultKVS [ subSys ]
if ! ok {
2022-08-20 18:11:49 -04:00
return nil , Errorf ( "unknown subsystem: %s" , subSys )
2022-08-05 01:21:52 -04:00
}
targets , err := c . GetAvailableTargets ( subSys )
if err != nil {
return nil , err
}
2022-08-25 03:17:05 -04:00
if target != "" {
found := false
for _ , t := range targets {
if t == target {
found = true
break
}
}
if ! found {
return nil , Errorf ( "there is no target `%s` for subsystem `%s`" , target , subSys )
}
targets = [ ] string { target }
}
2022-08-05 01:21:52 -04:00
// The `Comment` configuration variable is optional but is available to be
// set for all sub-systems. It is not present in the `DefaultKVS` map's
// values. To enable fetching a configured comment value from the
// environment we add it to the list of default keys for the subsystem.
defKVS := make ( [ ] KV , len ( defKVS1 ) , len ( defKVS1 ) + 1 )
copy ( defKVS , defKVS1 )
defKVS = append ( defKVS , KV { Key : Comment } )
r := make ( [ ] SubsysInfo , 0 , len ( targets ) )
for _ , target := range targets {
2023-06-23 10:45:27 -04:00
r = append ( r , SubsysInfo {
2022-08-13 13:39:01 -04:00
SubSys : subSys ,
Target : target ,
Defaults : defKVS ,
2023-06-23 10:45:27 -04:00
Config : c . getTargetKVS ( subSys , target , redactSecrets ) ,
EnvMap : c . getTargetEnvs ( subSys , target , defKVS , redactSecrets ) ,
} )
2022-08-05 01:21:52 -04:00
}
return r , nil
}
// AddEnvString adds env vars to the given string builder.
func ( cs * SubsysInfo ) AddEnvString ( b * strings . Builder ) {
2022-08-13 13:39:01 -04:00
for _ , v := range cs . Defaults {
2022-08-05 01:21:52 -04:00
if ep , ok := cs . EnvMap [ v . Key ] ; ok {
b . WriteString ( KvComment )
b . WriteString ( KvSpaceSeparator )
b . WriteString ( ep . Name )
b . WriteString ( EnvSeparator )
b . WriteString ( ep . Value )
b . WriteString ( KvNewline )
}
}
}
2022-11-01 11:04:07 -04:00
// WriteTo writes the string representation of the configuration to the given
2022-08-05 01:21:52 -04:00
// builder. When off is true, adds a comment character before the config system
2022-11-01 11:04:07 -04:00
// output. It also ignores values when empty and deprecated.
func ( cs * SubsysInfo ) WriteTo ( b * strings . Builder , off bool ) {
2022-08-05 01:21:52 -04:00
cs . AddEnvString ( b )
if off {
b . WriteString ( KvComment )
b . WriteString ( KvSpaceSeparator )
}
b . WriteString ( cs . SubSys )
if cs . Target != Default {
b . WriteString ( SubSystemSeparator )
b . WriteString ( cs . Target )
}
b . WriteString ( KvSpaceSeparator )
2022-11-01 11:04:07 -04:00
for _ , kv := range cs . Config {
dkv , ok := cs . Defaults . LookupKV ( kv . Key )
if ! ok {
continue
}
// Ignore empty and deprecated values
2024-01-04 18:07:17 -05:00
if dkv . HiddenIfEmpty && kv . Value == "" {
2022-11-01 11:04:07 -04:00
continue
}
// Do not need to print if state is on
if kv . Key == Enable && kv . Value == EnableOn {
continue
}
b . WriteString ( kv . String ( ) )
b . WriteString ( KvSpaceSeparator )
}
2022-08-05 01:21:52 -04:00
b . WriteString ( KvNewline )
}