blob: eed98e1af1e83197c231c2d36cd3da5e5f1a26b2 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
|
package main
import (
"github.com/spf13/pflag"
"github.com/spf13/viper"
)
type config struct {
CA string `mapstructure:"ca"`
Keytype string `mapstructure:"key_type"`
Keysize int `mapstructure:"key_size"`
Validity string `mapstructure:"validity"`
ValidateTLSCertificate bool `mapstructure:"validate_tls_certificate"`
}
func setDefaults() {
viper.BindPFlag("ca", pflag.Lookup("ca"))
viper.BindPFlag("key_type", pflag.Lookup("key_type"))
viper.BindPFlag("key_size", pflag.Lookup("key_size"))
viper.BindPFlag("validity", pflag.Lookup("validity"))
viper.SetDefault("validateTLSCertificate", true)
}
func readConfig(path string) (*config, error) {
setDefaults()
viper.SetConfigFile(path)
viper.SetConfigType("hcl")
if err := viper.ReadInConfig(); err != nil {
return nil, err
}
c := &config{}
if err := viper.Unmarshal(c); err != nil {
return nil, err
}
return c, nil
}
|