2021-08-14 17:12:18 +00:00
|
|
|
use std::time::Duration;
|
|
|
|
|
|
|
|
use anyhow::{Result, anyhow};
|
|
|
|
|
2021-08-25 15:20:31 +00:00
|
|
|
use crate::config::{ConfigOpts, ConfigOptsConsul, ConfigOptsAcme, ConfigOptsFirewall, ConfigOptsIgd};
|
2021-08-14 17:12:18 +00:00
|
|
|
|
|
|
|
// This code is inspired by the Trunk crate (https://github.com/thedodd/trunk)
|
|
|
|
|
|
|
|
// In this file, we take ConfigOpts and transform them into ready-to-use RuntimeConfig.
|
|
|
|
// We apply default values and business logic.
|
|
|
|
|
2021-08-25 15:20:31 +00:00
|
|
|
// Consul config is mandatory, all the others are optional.
|
2021-08-14 17:12:18 +00:00
|
|
|
|
2021-08-16 09:19:16 +00:00
|
|
|
#[derive(Debug)]
|
2021-08-14 17:12:18 +00:00
|
|
|
pub struct RuntimeConfigConsul {
|
|
|
|
pub node_name: String,
|
|
|
|
pub url: String,
|
|
|
|
}
|
|
|
|
|
2021-08-25 15:20:31 +00:00
|
|
|
#[derive(Debug)]
|
|
|
|
pub struct RuntimeConfigAcme {
|
|
|
|
pub email: String,
|
|
|
|
}
|
|
|
|
|
2021-08-16 09:19:16 +00:00
|
|
|
#[derive(Debug)]
|
2021-08-14 17:12:18 +00:00
|
|
|
pub struct RuntimeConfigFirewall {
|
|
|
|
pub refresh_time: Duration,
|
|
|
|
}
|
|
|
|
|
2021-08-16 09:19:16 +00:00
|
|
|
#[derive(Debug)]
|
2021-08-14 17:12:18 +00:00
|
|
|
pub struct RuntimeConfigIgd {
|
|
|
|
pub private_ip: String,
|
|
|
|
pub expiration_time: Duration,
|
|
|
|
pub refresh_time: Duration,
|
|
|
|
}
|
|
|
|
|
2021-08-16 09:19:16 +00:00
|
|
|
#[derive(Debug)]
|
2021-08-14 17:12:18 +00:00
|
|
|
pub struct RuntimeConfig {
|
|
|
|
pub consul: RuntimeConfigConsul,
|
2021-08-25 15:20:31 +00:00
|
|
|
pub acme: Option<RuntimeConfigAcme>,
|
|
|
|
pub firewall: Option<RuntimeConfigFirewall>,
|
|
|
|
pub igd: Option<RuntimeConfigIgd>,
|
2021-08-14 17:12:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl RuntimeConfig {
|
|
|
|
pub fn new(opts: ConfigOpts) -> Result<Self> {
|
|
|
|
let consul = RuntimeConfigConsul::new(opts.consul.clone())?;
|
2021-08-25 15:20:31 +00:00
|
|
|
let acme = RuntimeConfigAcme::new(opts.acme.clone())?;
|
|
|
|
let firewall = RuntimeConfigFirewall::new(opts.firewall.clone())?;
|
|
|
|
let igd = RuntimeConfigIgd::new(opts.igd.clone())?;
|
2021-08-14 17:12:18 +00:00
|
|
|
|
|
|
|
Ok(Self {
|
|
|
|
acme,
|
|
|
|
consul,
|
|
|
|
firewall,
|
|
|
|
igd,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-25 15:20:31 +00:00
|
|
|
impl RuntimeConfigConsul {
|
|
|
|
pub(super) fn new(opts: ConfigOptsConsul) -> Result<Self> {
|
|
|
|
let node_name = opts.node_name.expect(
|
|
|
|
"'DIPLONAT_CONSUL_NODE_NAME' is required");
|
|
|
|
let url = opts.url.unwrap_or(super::CONSUL_URL.to_string());
|
|
|
|
|
|
|
|
Ok(Self {
|
|
|
|
node_name,
|
|
|
|
url,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-14 17:12:18 +00:00
|
|
|
impl RuntimeConfigAcme {
|
|
|
|
pub fn new(opts: ConfigOptsAcme) -> Result<Option<Self>> {
|
|
|
|
if !opts.enable {
|
|
|
|
return Ok(None);
|
|
|
|
}
|
|
|
|
|
2021-08-16 09:19:16 +00:00
|
|
|
let email = opts.email.expect(
|
2021-08-25 15:20:31 +00:00
|
|
|
"'DIPLONAT_ACME_EMAIL' is required if ACME is enabled");
|
2021-08-14 17:12:18 +00:00
|
|
|
|
|
|
|
Ok(Some(Self {
|
|
|
|
email,
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl RuntimeConfigFirewall {
|
2021-08-25 15:20:31 +00:00
|
|
|
pub(super) fn new(opts: ConfigOptsFirewall) -> Result<Option<Self>> {
|
|
|
|
if !opts.enable {
|
|
|
|
return Ok(None);
|
|
|
|
}
|
|
|
|
|
2021-08-14 17:12:18 +00:00
|
|
|
let refresh_time = Duration::from_secs(
|
|
|
|
opts.refresh_time.unwrap_or(super::REFRESH_TIME).into());
|
|
|
|
|
2021-08-25 15:20:31 +00:00
|
|
|
Ok(Some(Self {
|
2021-08-14 17:12:18 +00:00
|
|
|
refresh_time,
|
2021-08-25 15:20:31 +00:00
|
|
|
}))
|
2021-08-14 17:12:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl RuntimeConfigIgd {
|
2021-08-25 15:20:31 +00:00
|
|
|
pub(super) fn new(opts: ConfigOptsIgd) -> Result<Option<Self>> {
|
|
|
|
if !opts.enable {
|
|
|
|
return Ok(None);
|
|
|
|
}
|
|
|
|
|
2021-08-16 09:19:16 +00:00
|
|
|
let private_ip = opts.private_ip.expect(
|
2021-08-25 15:20:31 +00:00
|
|
|
"'DIPLONAT_IGD_PRIVATE_IP' is required if IGD is enabled");
|
2021-08-14 17:12:18 +00:00
|
|
|
let expiration_time = Duration::from_secs(
|
|
|
|
opts.expiration_time.unwrap_or(super::EXPIRATION_TIME).into());
|
|
|
|
let refresh_time = Duration::from_secs(
|
|
|
|
opts.refresh_time.unwrap_or(super::REFRESH_TIME).into());
|
|
|
|
|
|
|
|
if refresh_time.as_secs() * 2 > expiration_time.as_secs() {
|
|
|
|
return Err(anyhow!(
|
|
|
|
"IGD expiration time (currently: {}s) must be at least twice bigger than refresh time (currently: {}s)",
|
|
|
|
expiration_time.as_secs(),
|
|
|
|
refresh_time.as_secs()));
|
|
|
|
}
|
|
|
|
|
2021-08-25 15:20:31 +00:00
|
|
|
Ok(Some(Self {
|
2021-08-14 17:12:18 +00:00
|
|
|
private_ip,
|
|
|
|
expiration_time,
|
|
|
|
refresh_time,
|
2021-08-25 15:20:31 +00:00
|
|
|
}))
|
2021-08-14 17:12:18 +00:00
|
|
|
}
|
|
|
|
}
|