mirror of https://github.com/docker/cli.git
Swarm init: use local IPNetSliceValue
This flag type was not yet merged upstream, so instead of using a fork of spf13/pflag, define the type locally, so that we can vendor the upstream package again. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
This commit is contained in:
parent
cd7fb33f3f
commit
80a2256478
|
@ -51,7 +51,7 @@ func newInitCommand(dockerCli command.Cli) *cobra.Command {
|
||||||
flags.BoolVar(&opts.forceNewCluster, "force-new-cluster", false, "Force create a new cluster from current state")
|
flags.BoolVar(&opts.forceNewCluster, "force-new-cluster", false, "Force create a new cluster from current state")
|
||||||
flags.BoolVar(&opts.autolock, flagAutolock, false, "Enable manager autolocking (requiring an unlock key to start a stopped manager)")
|
flags.BoolVar(&opts.autolock, flagAutolock, false, "Enable manager autolocking (requiring an unlock key to start a stopped manager)")
|
||||||
flags.StringVar(&opts.availability, flagAvailability, "active", `Availability of the node ("active"|"pause"|"drain")`)
|
flags.StringVar(&opts.availability, flagAvailability, "active", `Availability of the node ("active"|"pause"|"drain")`)
|
||||||
flags.IPNetSliceVar(&opts.defaultAddrPools, flagDefaultAddrPool, []net.IPNet{}, "default address pool in CIDR format")
|
flags.Var(newIPNetSliceValue([]net.IPNet{}, &opts.defaultAddrPools), flagDefaultAddrPool, "default address pool in CIDR format")
|
||||||
flags.SetAnnotation(flagDefaultAddrPool, "version", []string{"1.39"})
|
flags.SetAnnotation(flagDefaultAddrPool, "version", []string{"1.39"})
|
||||||
flags.Uint32Var(&opts.DefaultAddrPoolMaskLength, flagDefaultAddrPoolMaskLength, 24, "default address pool subnet mask length")
|
flags.Uint32Var(&opts.DefaultAddrPoolMaskLength, flagDefaultAddrPoolMaskLength, 24, "default address pool subnet mask length")
|
||||||
flags.SetAnnotation(flagDefaultAddrPoolMaskLength, "version", []string{"1.39"})
|
flags.SetAnnotation(flagDefaultAddrPoolMaskLength, "version", []string{"1.39"})
|
||||||
|
|
|
@ -0,0 +1,94 @@
|
||||||
|
package swarm
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/csv"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net"
|
||||||
|
"strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
// -- ipNetSlice Value
|
||||||
|
type ipNetSliceValue struct {
|
||||||
|
value *[]net.IPNet
|
||||||
|
changed bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func newIPNetSliceValue(val []net.IPNet, p *[]net.IPNet) *ipNetSliceValue {
|
||||||
|
ipnsv := new(ipNetSliceValue)
|
||||||
|
ipnsv.value = p
|
||||||
|
*ipnsv.value = val
|
||||||
|
return ipnsv
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set converts, and assigns, the comma-separated IPNet argument string representation as the []net.IPNet value of this flag.
|
||||||
|
// If Set is called on a flag that already has a []net.IPNet assigned, the newly converted values will be appended.
|
||||||
|
func (s *ipNetSliceValue) Set(val string) error {
|
||||||
|
|
||||||
|
// remove all quote characters
|
||||||
|
rmQuote := strings.NewReplacer(`"`, "", `'`, "", "`", "")
|
||||||
|
|
||||||
|
// read flag arguments with CSV parser
|
||||||
|
ipNetStrSlice, err := readAsCSV(rmQuote.Replace(val))
|
||||||
|
if err != nil && err != io.EOF {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// parse ip values into slice
|
||||||
|
out := make([]net.IPNet, 0, len(ipNetStrSlice))
|
||||||
|
for _, ipNetStr := range ipNetStrSlice {
|
||||||
|
_, n, err := net.ParseCIDR(strings.TrimSpace(ipNetStr))
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("invalid string being converted to CIDR: %s", ipNetStr)
|
||||||
|
}
|
||||||
|
out = append(out, *n)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !s.changed {
|
||||||
|
*s.value = out
|
||||||
|
} else {
|
||||||
|
*s.value = append(*s.value, out...)
|
||||||
|
}
|
||||||
|
|
||||||
|
s.changed = true
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Type returns a string that uniquely represents this flag's type.
|
||||||
|
func (s *ipNetSliceValue) Type() string {
|
||||||
|
return "ipNetSlice"
|
||||||
|
}
|
||||||
|
|
||||||
|
// String defines a "native" format for this net.IPNet slice flag value.
|
||||||
|
func (s *ipNetSliceValue) String() string {
|
||||||
|
|
||||||
|
ipNetStrSlice := make([]string, len(*s.value))
|
||||||
|
for i, n := range *s.value {
|
||||||
|
ipNetStrSlice[i] = n.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
out, _ := writeAsCSV(ipNetStrSlice)
|
||||||
|
return "[" + out + "]"
|
||||||
|
}
|
||||||
|
|
||||||
|
func readAsCSV(val string) ([]string, error) {
|
||||||
|
if val == "" {
|
||||||
|
return []string{}, nil
|
||||||
|
}
|
||||||
|
stringReader := strings.NewReader(val)
|
||||||
|
csvReader := csv.NewReader(stringReader)
|
||||||
|
return csvReader.Read()
|
||||||
|
}
|
||||||
|
|
||||||
|
func writeAsCSV(vals []string) (string, error) {
|
||||||
|
b := &bytes.Buffer{}
|
||||||
|
w := csv.NewWriter(b)
|
||||||
|
err := w.Write(vals)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
w.Flush()
|
||||||
|
return strings.TrimSuffix(b.String(), "\n"), nil
|
||||||
|
}
|
|
@ -0,0 +1,149 @@
|
||||||
|
package swarm
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/spf13/pflag"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Helper function to set static slices
|
||||||
|
func getCIDR(ip net.IP, cidr *net.IPNet, err error) net.IPNet {
|
||||||
|
return *cidr
|
||||||
|
}
|
||||||
|
|
||||||
|
func equalCIDR(c1 net.IPNet, c2 net.IPNet) bool {
|
||||||
|
return c1.String() == c2.String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func setUpIPNetFlagSet(ipsp *[]net.IPNet) *pflag.FlagSet {
|
||||||
|
f := pflag.NewFlagSet("test", pflag.ContinueOnError)
|
||||||
|
f.VarP(newIPNetSliceValue([]net.IPNet{}, ipsp), "cidrs", "", "Command separated list!")
|
||||||
|
return f
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIPNets(t *testing.T) {
|
||||||
|
var ips []net.IPNet
|
||||||
|
f := setUpIPNetFlagSet(&ips)
|
||||||
|
|
||||||
|
vals := []string{"192.168.1.1/24", "10.0.0.1/16", "fd00:0:0:0:0:0:0:2/64"}
|
||||||
|
arg := fmt.Sprintf("--cidrs=%s", strings.Join(vals, ","))
|
||||||
|
err := f.Parse([]string{arg})
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal("expected no error; got", err)
|
||||||
|
}
|
||||||
|
for i, v := range ips {
|
||||||
|
if _, cidr, _ := net.ParseCIDR(vals[i]); cidr == nil {
|
||||||
|
t.Fatalf("invalid string being converted to CIDR: %s", vals[i])
|
||||||
|
} else if !equalCIDR(*cidr, v) {
|
||||||
|
t.Fatalf("expected ips[%d] to be %s but got: %s from GetIPSlice", i, vals[i], v)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIPNetCalledTwice(t *testing.T) {
|
||||||
|
var cidrs []net.IPNet
|
||||||
|
f := setUpIPNetFlagSet(&cidrs)
|
||||||
|
|
||||||
|
in := []string{"192.168.1.2/16,fd00::/64", "10.0.0.1/24"}
|
||||||
|
|
||||||
|
expected := []net.IPNet{
|
||||||
|
getCIDR(net.ParseCIDR("192.168.1.2/16")),
|
||||||
|
getCIDR(net.ParseCIDR("fd00::/64")),
|
||||||
|
getCIDR(net.ParseCIDR("10.0.0.1/24")),
|
||||||
|
}
|
||||||
|
argfmt := "--cidrs=%s"
|
||||||
|
arg1 := fmt.Sprintf(argfmt, in[0])
|
||||||
|
arg2 := fmt.Sprintf(argfmt, in[1])
|
||||||
|
err := f.Parse([]string{arg1, arg2})
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal("expected no error; got", err)
|
||||||
|
}
|
||||||
|
for i, v := range cidrs {
|
||||||
|
if !equalCIDR(expected[i], v) {
|
||||||
|
t.Fatalf("expected cidrs[%d] to be %s but got: %s", i, expected[i], v)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIPNetBadQuoting(t *testing.T) {
|
||||||
|
|
||||||
|
tests := []struct {
|
||||||
|
Want []net.IPNet
|
||||||
|
FlagArg []string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
Want: []net.IPNet{
|
||||||
|
getCIDR(net.ParseCIDR("a4ab:61d:f03e:5d7d:fad7:d4c2:a1a5:568/128")),
|
||||||
|
getCIDR(net.ParseCIDR("203.107.49.208/32")),
|
||||||
|
getCIDR(net.ParseCIDR("14.57.204.90/32")),
|
||||||
|
},
|
||||||
|
FlagArg: []string{
|
||||||
|
"a4ab:61d:f03e:5d7d:fad7:d4c2:a1a5:568/128",
|
||||||
|
"203.107.49.208/32",
|
||||||
|
"14.57.204.90/32",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Want: []net.IPNet{
|
||||||
|
getCIDR(net.ParseCIDR("204.228.73.195/32")),
|
||||||
|
getCIDR(net.ParseCIDR("86.141.15.94/32")),
|
||||||
|
},
|
||||||
|
FlagArg: []string{
|
||||||
|
"204.228.73.195/32",
|
||||||
|
"86.141.15.94/32",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Want: []net.IPNet{
|
||||||
|
getCIDR(net.ParseCIDR("c70c:db36:3001:890f:c6ea:3f9b:7a39:cc3f/128")),
|
||||||
|
getCIDR(net.ParseCIDR("4d17:1d6e:e699:bd7a:88c5:5e7e:ac6a:4472/128")),
|
||||||
|
},
|
||||||
|
FlagArg: []string{
|
||||||
|
"c70c:db36:3001:890f:c6ea:3f9b:7a39:cc3f/128",
|
||||||
|
"4d17:1d6e:e699:bd7a:88c5:5e7e:ac6a:4472/128",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Want: []net.IPNet{
|
||||||
|
getCIDR(net.ParseCIDR("5170:f971:cfac:7be3:512a:af37:952c:bc33/128")),
|
||||||
|
getCIDR(net.ParseCIDR("93.21.145.140/32")),
|
||||||
|
getCIDR(net.ParseCIDR("2cac:61d3:c5ff:6caf:73e0:1b1a:c336:c1ca/128")),
|
||||||
|
},
|
||||||
|
FlagArg: []string{
|
||||||
|
" 5170:f971:cfac:7be3:512a:af37:952c:bc33/128 , 93.21.145.140/32 ",
|
||||||
|
"2cac:61d3:c5ff:6caf:73e0:1b1a:c336:c1ca/128",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Want: []net.IPNet{
|
||||||
|
getCIDR(net.ParseCIDR("2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128")),
|
||||||
|
getCIDR(net.ParseCIDR("2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128")),
|
||||||
|
getCIDR(net.ParseCIDR("2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128")),
|
||||||
|
getCIDR(net.ParseCIDR("2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128")),
|
||||||
|
},
|
||||||
|
FlagArg: []string{
|
||||||
|
`"2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128, 2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128,2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128 "`,
|
||||||
|
" 2e5e:66b2:6441:848:5b74:76ea:574c:3a7b/128"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, test := range tests {
|
||||||
|
|
||||||
|
var cidrs []net.IPNet
|
||||||
|
f := setUpIPNetFlagSet(&cidrs)
|
||||||
|
|
||||||
|
if err := f.Parse([]string{fmt.Sprintf("--cidrs=%s", strings.Join(test.FlagArg, ","))}); err != nil {
|
||||||
|
t.Fatalf("flag parsing failed with error: %s\nparsing:\t%#v\nwant:\t\t%s",
|
||||||
|
err, test.FlagArg, test.Want[i])
|
||||||
|
}
|
||||||
|
|
||||||
|
for j, b := range cidrs {
|
||||||
|
if !equalCIDR(b, test.Want[j]) {
|
||||||
|
t.Fatalf("bad value parsed for test %d on net.IP %d:\nwant:\t%s\ngot:\t%s", i, j, test.Want[j], b)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue