File: tls.go

package info (click to toggle)
tiup 1.16.3-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 6,384 kB
  • sloc: sh: 1,988; makefile: 138; sql: 16
file content (69 lines) | stat: -rw-r--r-- 2,157 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
// Copyright 2021 PingCAP, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// See the License for the specific language governing permissions and
// limitations under the License.

package command

import (
	"strings"

	perrs "github.com/pingcap/errors"
	"github.com/spf13/cobra"
)

func newTLSCmd() *cobra.Command {
	var (
		reloadCertificate bool // reload certificate when the cluster enable encrypted communication
		cleanCertificate  bool // cleanup certificate when the cluster disable encrypted communication
		enableTLS         bool
	)

	cmd := &cobra.Command{
		Use:   "tls <cluster-name> <enable/disable>",
		Short: "Enable/Disable TLS between TiDB components",
		RunE: func(cmd *cobra.Command, args []string) error {
			if len(args) != 2 {
				return cmd.Help()
			}

			if err := validRoles(gOpt.Roles); err != nil {
				return err
			}
			clusterName := args[0]

			switch strings.ToLower(args[1]) {
			case "enable":
				enableTLS = true
			case "disable":
				enableTLS = false
			default:
				return perrs.New("enable or disable must be specified at least one")
			}

			if enableTLS && cleanCertificate {
				return perrs.New("clean-certificate only works when tls disable")
			}

			if !enableTLS && reloadCertificate {
				return perrs.New("reload-certificate only works when tls enable")
			}

			return cm.TLS(clusterName, gOpt, enableTLS, cleanCertificate, reloadCertificate, skipConfirm)
		},
	}

	cmd.Flags().BoolVar(&cleanCertificate, "clean-certificate", false, "Cleanup the certificate file if it already exists when tls disable")
	cmd.Flags().BoolVar(&reloadCertificate, "reload-certificate", false, "Load the certificate file whether it exists or not when tls enable")
	cmd.Flags().BoolVar(&gOpt.Force, "force", false, "Force enable/disable tls regardless of the current state")

	return cmd
}