package config import ( "log" "os" "strings" "time" "github.com/go-playground/validator/v10" "github.com/spf13/viper" ) type Config struct { Port string `validate:"required"` RootUrl string `validate:"required,url"` DatabasePath string `validate:"required"` SessionSecret string `validate:"required"` OAuth2 OAuth2 `validate:"required"` Temporal Temporal `validate:"required"` HealthChecks []Healthcheck CronJobs []CronJob } type OAuth2 struct { ClientID string `validate:"required"` ClientSecret string `validate:"required"` Scopes []string `validate:"required"` EndpointTokenURL string `validate:"required"` EndpointAuthURL string `validate:"required"` EndpointUserInfoURL string `validate:"required"` EndpointLogoutURL string // Optional as not all SSO support this. } type Temporal struct { DatabasePath string `validate:"required"` ListenAddress string `validate:"required"` UIHost string `validate:"required"` ServerHost string `validate:"required"` } type HealthCheckHTTP struct { URL string `validate:"required,url"` Method string `validate:"required,oneof=GET POST PUT"` } type HealthCheckTCP struct { Host string `validate:"required,hostname"` Port int `validate:"required,gte=1,lte=65535"` } type Healthcheck struct { Name string `validate:"required"` Retries int `validate:"optional,gte=0"` Schedule string `validate:"required,cron"` Timeout time.Duration `validate:"required"` HTTP HealthCheckHTTP `validate:"required"` TCP HealthCheckTCP `validate:"required"` } type CronJob struct { Name string `validate:"required"` Schedule string `validate:"required,cron"` Buffer time.Duration `validate:"required"` } func GetEnvOrDefault(key, def string) string { value := os.Getenv(key) if value == "" { return def } return value } func NewConfig() *Config { viper.SetConfigName("zdravko") viper.SetConfigType("yaml") viper.AddConfigPath("/etc/zdravko/") viper.AddConfigPath("$HOME/.zdravko") viper.AddConfigPath("$HOME/.config/zdravko") viper.AddConfigPath("$XDG_CONFIG_HOME/zdravko") viper.AddConfigPath(".") // Set defaults viper.SetDefault("port", GetEnvOrDefault("PORT", "8000")) viper.SetDefault("rooturl", GetEnvOrDefault("ROOT_URL", "http://localhost:8000")) viper.SetDefault("databasepath", GetEnvOrDefault("DATABASE_PATH", "zdravko.db")) viper.SetDefault("sessionsecret", os.Getenv("SESSION_SECRET")) viper.SetDefault("temporal.databasepath", GetEnvOrDefault("TEMPORAL_DATABASE_PATH", "temporal.db")) viper.SetDefault("temporal.listenaddress", GetEnvOrDefault("TEMPORAL_LISTEN_ADDRESS", "0.0.0.0")) viper.SetDefault("temporal.uihost", GetEnvOrDefault("TEMPORAL_UI_HOST", "127.0.0.1:8223")) viper.SetDefault("temporal.serverhost", GetEnvOrDefault("TEMPORAL_SERVER_HOST", "127.0.0.1:7233")) viper.SetDefault("oauth2.clientid", os.Getenv("OAUTH2_CLIENT_ID")) viper.SetDefault("oauth2.clientsecret", os.Getenv("OAUTH2_CLIENT_SECRET")) viper.SetDefault("oauth2.scopes", GetEnvOrDefault("OAUTH2_ENDPOINT_SCOPES", "openid profile email")) viper.SetDefault("oauth2.endpointtokenurl", os.Getenv("OAUTH2_ENDPOINT_TOKEN_URL")) viper.SetDefault("oauth2.endpointauthurl", os.Getenv("OAUTH2_ENDPOINT_AUTH_URL")) viper.SetDefault("oauth2.endpointuserinfourl", os.Getenv("OAUTH2_ENDPOINT_USER_INFO_URL")) viper.SetDefault("oauth2.endpointlogouturl", GetEnvOrDefault("OAUTH2_ENDPOINT_LOGOUT_URL", "")) err := viper.ReadInConfig() if err != nil { if _, ok := err.(viper.ConfigFileNotFoundError); ok { // ignore } else { log.Fatalf("Error reading config file, %s", err) } } log.Println("Config file used: ", viper.ConfigFileUsed()) config := &Config{} err = viper.Unmarshal(config) if err != nil { log.Fatalf("Error unmarshalling config, %s", err) } // OAuth2 scopes are space separated config.OAuth2.Scopes = strings.Split(viper.GetString("oauth2.scopes"), " ") // Validate config validate := validator.New(validator.WithRequiredStructEnabled()) err = validate.Struct(config) if err != nil { log.Fatalf("Error validating config, %s", err) } return config }