mygithub.libinneed.workers.dev/stackitcloud/stackit-cli
Advanced tools
@@ -11,3 +11,3 @@ # Authentication Guide | ||
| ```bash | ||
| $ ./bin/stackit auth activate-service-account | ||
| $ stackit auth activate-service-account | ||
| ``` | ||
@@ -19,3 +19,3 @@ | ||
| If you dont have a service account, create one in the STACKIT Portal an assign it the necessary permissions, e.g. `project.owner`. There are two ways to authenticate: | ||
| If you dont have a service account, create one in the STACKIT Portal an assign it the necessary permissions, e.g. `owner`. There are two ways to authenticate: | ||
@@ -44,3 +44,3 @@ - Key flow (recommended) | ||
| The following instructions assume that you have created a service account and assigned it the necessary permissions, e.g. `project.owner`. | ||
| The following instructions assume that you have created a service account and assigned it the necessary permissions, e.g. `owner`. | ||
@@ -47,0 +47,0 @@ To use the key flow, you need to have a service account key, which must have an RSA key-pair attached to it. |
@@ -39,3 +39,2 @@ ## stackit logme instance create | ||
| --plan-name string Plan name | ||
| --plugin strings Plugin | ||
| --syslog strings Syslog | ||
@@ -42,0 +41,0 @@ --version string Instance LogMe version |
@@ -35,3 +35,2 @@ ## stackit logme instance update | ||
| --plan-name string Plan name | ||
| --plugin strings Plugin | ||
| --syslog strings Syslog | ||
@@ -38,0 +37,0 @@ --version string Instance LogMe version |
@@ -39,3 +39,2 @@ ## stackit mariadb instance create | ||
| --plan-name string Plan name | ||
| --plugin strings Plugin | ||
| --syslog strings Syslog | ||
@@ -42,0 +41,0 @@ --version string Instance MariaDB version |
@@ -35,3 +35,2 @@ ## stackit mariadb instance update | ||
| --plan-name string Plan name | ||
| --plugin strings Plugin | ||
| --syslog strings Syslog | ||
@@ -38,0 +37,0 @@ --version string Instance MariaDB version |
@@ -39,3 +39,2 @@ ## stackit redis instance create | ||
| --plan-name string Plan name | ||
| --plugin strings Plugin | ||
| --syslog strings Syslog | ||
@@ -42,0 +41,0 @@ --version string Instance Redis version |
@@ -35,3 +35,2 @@ ## stackit redis instance update | ||
| --plan-name string Plan name | ||
| --plugin strings Plugin | ||
| --syslog strings Syslog | ||
@@ -38,0 +37,0 @@ --version string Instance Redis version |
+16
-16
@@ -13,12 +13,12 @@ module github.com/stackitcloud/stackit-cli | ||
| github.com/spf13/viper v1.18.2 | ||
| github.com/stackitcloud/stackit-sdk-go/core v0.10.1 | ||
| github.com/stackitcloud/stackit-sdk-go/services/authorization v0.1.1 | ||
| github.com/stackitcloud/stackit-sdk-go/services/dns v0.8.4 | ||
| github.com/stackitcloud/stackit-sdk-go/services/mongodbflex v0.11.1 | ||
| github.com/stackitcloud/stackit-sdk-go/services/opensearch v0.10.1 | ||
| github.com/stackitcloud/stackit-sdk-go/services/postgresflex v0.12.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.7.7 | ||
| github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.6.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/serviceaccount v0.3.6 | ||
| github.com/stackitcloud/stackit-sdk-go/services/ske v0.11.0 | ||
| github.com/stackitcloud/stackit-sdk-go/core v0.12.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/authorization v0.2.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/dns v0.9.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/mongodbflex v0.12.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/opensearch v0.13.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/postgresflex v0.13.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.8.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.7.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/serviceaccount v0.4.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/ske v0.12.0 | ||
| github.com/zalando/go-keyring v0.2.4 | ||
@@ -51,8 +51,8 @@ golang.org/x/mod v0.17.0 | ||
| github.com/spf13/cast v1.6.0 // indirect | ||
| github.com/stackitcloud/stackit-sdk-go/services/argus v0.9.5 | ||
| github.com/stackitcloud/stackit-sdk-go/services/logme v0.10.1 | ||
| github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.10.1 | ||
| github.com/stackitcloud/stackit-sdk-go/services/objectstorage v0.8.6 | ||
| github.com/stackitcloud/stackit-sdk-go/services/rabbitmq v0.10.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/redis v0.10.1 | ||
| github.com/stackitcloud/stackit-sdk-go/services/argus v0.10.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/logme v0.13.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.13.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/objectstorage v0.9.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/rabbitmq v0.13.0 | ||
| github.com/stackitcloud/stackit-sdk-go/services/redis v0.13.0 | ||
| github.com/subosito/gotenv v1.6.0 // indirect | ||
@@ -59,0 +59,0 @@ go.uber.org/multierr v1.11.0 // indirect |
+32
-32
@@ -71,34 +71,34 @@ github.com/alessio/shellescape v1.4.2 h1:MHPfaU+ddJ0/bYWpgIeUnQUqKrlJ1S7BfEYPM4uEoM0= | ||
| github.com/spf13/viper v1.18.2/go.mod h1:EKmWIqdnk5lOcmR72yw6hS+8OPYcwD0jteitLMVB+yk= | ||
| github.com/stackitcloud/stackit-sdk-go/core v0.10.1 h1:lzyualywD/2xIsYUHwlqCurG1OwlqCJVtJbOcPO6OzE= | ||
| github.com/stackitcloud/stackit-sdk-go/core v0.10.1/go.mod h1:mDX1mSTsB3mP+tNBGcFNx6gH1mGBN4T+dVt+lcw7nlw= | ||
| github.com/stackitcloud/stackit-sdk-go/services/argus v0.9.5 h1:RLsA2jO9sMNpn7NYdtFyumY5Vj4n4WtBm2J2NBKlsnw= | ||
| github.com/stackitcloud/stackit-sdk-go/services/argus v0.9.5/go.mod h1:lzGbqwV0hqeX/kUvaaFTgjOJRxUlsZ911TX1YAcKwqc= | ||
| github.com/stackitcloud/stackit-sdk-go/services/authorization v0.1.1 h1:h7dCaBlbU34WSGuEXREmCdCzQafZgdXDZuairAzeuo8= | ||
| github.com/stackitcloud/stackit-sdk-go/services/authorization v0.1.1/go.mod h1:V+wTIfuJRV8PiSOfMX6GCTaHWltGaLCz8ImOKeHIaIA= | ||
| github.com/stackitcloud/stackit-sdk-go/services/dns v0.8.4 h1:n/X2pVdETDXGHk+vCsg0p3b2zGxSRMJ065to/aAoncg= | ||
| github.com/stackitcloud/stackit-sdk-go/services/dns v0.8.4/go.mod h1:PvgUVFLgELRADWk2epZdCryk0fs8b4DN47ghEJjNWhk= | ||
| github.com/stackitcloud/stackit-sdk-go/services/logme v0.10.1 h1:/yEAySr1P+52l82g93EBEBHLcu74UNZxBg/32EwOzDo= | ||
| github.com/stackitcloud/stackit-sdk-go/services/logme v0.10.1/go.mod h1:HSMbEONG7BoixaR7McsYgYmt/lKRc5GMzn2eIj3HFKs= | ||
| github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.10.1 h1:Y0BwYv2+B3Dg8Wo9GkaWYf+CcNww9Xm38FB/chj6OiM= | ||
| github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.10.1/go.mod h1:2KR68oxSpkiuBGYTYlESMP37oNlSMZXVgyQbSC4PZ+8= | ||
| github.com/stackitcloud/stackit-sdk-go/services/mongodbflex v0.11.1 h1:SDeQf60BgAwsnB3366yz58ElvVwlyd7M/lPZIEqv9gU= | ||
| github.com/stackitcloud/stackit-sdk-go/services/mongodbflex v0.11.1/go.mod h1:/hQ7GW2hAqcKjKlNCcVJA9zNu3vGFzRaPdhMjfoIKFo= | ||
| github.com/stackitcloud/stackit-sdk-go/services/objectstorage v0.8.6 h1:+mcoBKs6ae4eJM0Whuf6lcGuwU341vaBQjr7W/WEGZg= | ||
| github.com/stackitcloud/stackit-sdk-go/services/objectstorage v0.8.6/go.mod h1:W9BML8bqZb2dOZe1K+M+qBBs8/QNirr3jA0xxy9tNRY= | ||
| github.com/stackitcloud/stackit-sdk-go/services/opensearch v0.10.1 h1:LKic8dXtXKsRst2+wY9dNjjkMyJ05QIDpOJuRmVb410= | ||
| github.com/stackitcloud/stackit-sdk-go/services/opensearch v0.10.1/go.mod h1:g1o1bmqtTliy9UkFlRV/6bn6GQk+hkvnny3UjMI69S0= | ||
| github.com/stackitcloud/stackit-sdk-go/services/postgresflex v0.12.0 h1:W2WSYUyhKaHQ+BZfmyRw9PKv5q7ihGRyNhNgIlyM+Y8= | ||
| github.com/stackitcloud/stackit-sdk-go/services/postgresflex v0.12.0/go.mod h1:P0YyvgwIsVKJijdWGVJVOp/ac7PVX99Oj+dr4v1zECc= | ||
| github.com/stackitcloud/stackit-sdk-go/services/rabbitmq v0.10.0 h1:Fle394socpyf662g3jMrtZpZaWVgBMBIEFnh4fnGock= | ||
| github.com/stackitcloud/stackit-sdk-go/services/rabbitmq v0.10.0/go.mod h1:JvqOSrTCiynS0x6Y9OsK54yvdB6AtIWLwXDEjoCkAIg= | ||
| github.com/stackitcloud/stackit-sdk-go/services/redis v0.10.1 h1:/tRad17HUcGRm448l8XyX6uhnnHVfj3VdUQquIwNq2Q= | ||
| github.com/stackitcloud/stackit-sdk-go/services/redis v0.10.1/go.mod h1:vR/0cYTcVrPTTAHJGH2VT0H2g1D+wlx1n2WiAo6r5LI= | ||
| github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.7.7 h1:yFxTdMj5al2pR4ZIOKKxoN8CHo2kTylurArt+jJMzxI= | ||
| github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.7.7/go.mod h1:GvNV2GR0x0VGHzixGNgAJibqjwiVFwbxakpyu+qdijc= | ||
| github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.6.0 h1:VC7VWadRo8r0eQUXMrYv6vEyS/5acW8faMSv9lxQMgw= | ||
| github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.6.0/go.mod h1:KRoLXZdH8yuO6FBu2Grl5VGqW9arH03qYAC0P6H8h9o= | ||
| github.com/stackitcloud/stackit-sdk-go/services/serviceaccount v0.3.6 h1:3kkNh2kHi55w9dgh0MC1Zbn8fDpYxcXl3tvYjH8t9xo= | ||
| github.com/stackitcloud/stackit-sdk-go/services/serviceaccount v0.3.6/go.mod h1:OOciROyQxPOYLo8OM/DE5ESH11+DvAyRt6wg7R+HVkg= | ||
| github.com/stackitcloud/stackit-sdk-go/services/ske v0.11.0 h1:BJ1Op7f3KJPNROkEXzqAREl55JCqyIAyQJ+Gfu4LYCM= | ||
| github.com/stackitcloud/stackit-sdk-go/services/ske v0.11.0/go.mod h1:yFLjTx58pjHCp0KZTaqHlW9Qk60CY5HpnBWR/zztv8Y= | ||
| github.com/stackitcloud/stackit-sdk-go/core v0.12.0 h1:auIzUUNRuydKOScvpICP4MifGgvOajiDQd+ncGmBL0U= | ||
| github.com/stackitcloud/stackit-sdk-go/core v0.12.0/go.mod h1:mDX1mSTsB3mP+tNBGcFNx6gH1mGBN4T+dVt+lcw7nlw= | ||
| github.com/stackitcloud/stackit-sdk-go/services/argus v0.10.0 h1:FAYOt6UBy/F2jPH2C/NnZnbjLZryJBjtM3afLVgGc4w= | ||
| github.com/stackitcloud/stackit-sdk-go/services/argus v0.10.0/go.mod h1:nVllQfYODhX1q3bgwVTLO7wHOp+8NMLiKbn3u/Dg5nU= | ||
| github.com/stackitcloud/stackit-sdk-go/services/authorization v0.2.0 h1:vdv8DiG9KN6r0UilBeNbwEWItX/HqUMm6kab3t71kpY= | ||
| github.com/stackitcloud/stackit-sdk-go/services/authorization v0.2.0/go.mod h1:1sLuXa7Qvp9f+wKWdRjyNe8B2F8JX7nSTd8fBKadri4= | ||
| github.com/stackitcloud/stackit-sdk-go/services/dns v0.9.0 h1:sxvlcey7EcBc52rU6vYJEFguWkz9dNbSv2xJ3+c+97M= | ||
| github.com/stackitcloud/stackit-sdk-go/services/dns v0.9.0/go.mod h1:MdZcRbs19s2NLeJmSLSoqTzm9IPIQhE1ZEMpo9gePq0= | ||
| github.com/stackitcloud/stackit-sdk-go/services/logme v0.13.0 h1:/wqs+pfHSjFWTakJVQGD/KwArxmFN8qdYrJDUgA1Gxw= | ||
| github.com/stackitcloud/stackit-sdk-go/services/logme v0.13.0/go.mod h1:bj9cn1treNSxKTRCEmESwqfENN8vCYn60HUnEA0P83c= | ||
| github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.13.0 h1:qioXHNeQ2xdwT5iGOk0c3hQIpct7zlAYzLRqXvsJ7CA= | ||
| github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.13.0/go.mod h1:kPetkX9hNm9HkRyiKQL/tlgdi8frZdMP8afg0mEvQ9s= | ||
| github.com/stackitcloud/stackit-sdk-go/services/mongodbflex v0.12.0 h1:/m6N/CdsFxomexsowU7PwT1S4UTmI39PnEvvWGsDh1s= | ||
| github.com/stackitcloud/stackit-sdk-go/services/mongodbflex v0.12.0/go.mod h1:iFerEzGmkg6R13ldFUyHUWHm0ac9cS4ftTDLhP0k/dU= | ||
| github.com/stackitcloud/stackit-sdk-go/services/objectstorage v0.9.0 h1:rWgy4/eCIgyA2dUuc4a30pldmS6taQDwiLqoeZmyeP8= | ||
| github.com/stackitcloud/stackit-sdk-go/services/objectstorage v0.9.0/go.mod h1:dkVMJI88eJ3Xs0ZV15r4tUpgitUGJXcvrX3RL4Zq2bQ= | ||
| github.com/stackitcloud/stackit-sdk-go/services/opensearch v0.13.0 h1:dzt2wd1QkFVctKPQDBlyMCsHEJV4Bf2bRkZTUFFCZhs= | ||
| github.com/stackitcloud/stackit-sdk-go/services/opensearch v0.13.0/go.mod h1:ZecMIf9oYj2DGZqWh93l97WdVaRdLl+tW5Fq3YKGwBM= | ||
| github.com/stackitcloud/stackit-sdk-go/services/postgresflex v0.13.0 h1:PGLjBZxWM7NIrH1+W1+f+/4kZEgwv9DGnXcUzOqM0M8= | ||
| github.com/stackitcloud/stackit-sdk-go/services/postgresflex v0.13.0/go.mod h1:SdrqGLCkilL6wl1+jcxmLtks2IocgIg+bsyeyYUIzR4= | ||
| github.com/stackitcloud/stackit-sdk-go/services/rabbitmq v0.13.0 h1:bdmZhVAuyPiaAeJnBRLMVtVix6DYzNYbpdPiq/Z3XCI= | ||
| github.com/stackitcloud/stackit-sdk-go/services/rabbitmq v0.13.0/go.mod h1:eSgnPBknTJh7t+jVKN+xzeAh+Cg1USOlH3QCyfvG20g= | ||
| github.com/stackitcloud/stackit-sdk-go/services/redis v0.13.0 h1:MlREN/9zDntk90kahS0aJa/gPGAoUV4NLNnrTLs9CLc= | ||
| github.com/stackitcloud/stackit-sdk-go/services/redis v0.13.0/go.mod h1:3LhiTR/DMbKR2HuleTzlFHltR1MT1KD0DeW46X6K2GE= | ||
| github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.8.0 h1:7AIvLkB7JZ5lYKtYLwI0rgJ0185hwQC1PFiUrjcinDM= | ||
| github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.8.0/go.mod h1:p16qz/pAW8b1gEhqMpIgJfutRPeDPqQLlbVGyCo3f8o= | ||
| github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.7.0 h1:1Ho+M4DyZHrwbDe1peW//x+/hegIuaUdZqbQEbPlr4k= | ||
| github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.7.0/go.mod h1:LX0Mcyr7/QP77zf7e05fHCJO38RMuTxr7nEDUDZ3oPQ= | ||
| github.com/stackitcloud/stackit-sdk-go/services/serviceaccount v0.4.0 h1:JB1O0E9+L50ZaO36uz7azurvUuB5JdX5s2ZXuIdb9t8= | ||
| github.com/stackitcloud/stackit-sdk-go/services/serviceaccount v0.4.0/go.mod h1:Ni9RBJvcaXRIrDIuQBpJcuQvCQSj27crQSyc+WM4p0c= | ||
| github.com/stackitcloud/stackit-sdk-go/services/ske v0.12.0 h1:sG45CkR+v8BUQBREROjTbJV/ZK5Xg+Rd6ulzM25UoGw= | ||
| github.com/stackitcloud/stackit-sdk-go/services/ske v0.12.0/go.mod h1:0fFs4R7kg+gU7FNAIzzFvlCZJz6gyZ8CFhbK3eSrAwQ= | ||
| github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME= | ||
@@ -105,0 +105,0 @@ github.com/stretchr/objx v0.4.0/go.mod h1:YvHI0jy2hoMjB+UWwv71VJQ9isScKT/TqJzVSSt89Yw= |
@@ -53,3 +53,2 @@ package create | ||
| monitoringInstanceIdFlag: testMonitoringInstanceId, | ||
| pluginFlag: "example-plugin", | ||
| sgwAclFlag: "198.51.100.14/24", | ||
@@ -77,3 +76,2 @@ syslogFlag: "example-syslog", | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugin: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr([]string{"198.51.100.14/24"}), | ||
@@ -99,3 +97,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugins: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr("198.51.100.14/24"), | ||
@@ -117,3 +114,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| sgwAclValues []string | ||
| pluginValues []string | ||
| syslogValues []string | ||
@@ -257,13 +253,2 @@ isValid bool | ||
| { | ||
| description: "repeated plugin flags", | ||
| flagValues: fixtureFlagValues(), | ||
| pluginValues: []string{"example-plugin-1", "example-plugin-2"}, | ||
| isValid: true, | ||
| expectedModel: fixtureInputModel(func(model *inputModel) { | ||
| model.Plugin = utils.Ptr( | ||
| append(*model.Plugin, "example-plugin-1", "example-plugin-2"), | ||
| ) | ||
| }), | ||
| }, | ||
| { | ||
| description: "repeated syslog flags", | ||
@@ -309,12 +294,2 @@ flagValues: fixtureFlagValues(), | ||
| for _, value := range tt.pluginValues { | ||
| err := cmd.Flags().Set(pluginFlag, value) | ||
| if err != nil { | ||
| if !tt.isValid { | ||
| return | ||
| } | ||
| t.Fatalf("setting flag --%s=%s: %v", pluginFlag, value, err) | ||
| } | ||
| } | ||
| for _, value := range tt.syslogValues { | ||
@@ -321,0 +296,0 @@ err := cmd.Flags().Set(syslogFlag, value) |
@@ -33,3 +33,2 @@ package create | ||
| monitoringInstanceIdFlag = "monitoring-instance-id" | ||
| pluginFlag = "plugin" | ||
| sgwAclFlag = "acl" | ||
@@ -53,3 +52,2 @@ syslogFlag = "syslog" | ||
| MonitoringInstanceId *string | ||
| Plugin *[]string | ||
| SgwAcl *[]string | ||
@@ -148,3 +146,2 @@ Syslog *[]string | ||
| cmd.Flags().Var(flags.UUIDFlag(), monitoringInstanceIdFlag, "Monitoring instance ID") | ||
| cmd.Flags().StringSlice(pluginFlag, []string{}, "Plugin") | ||
| cmd.Flags().Var(flags.CIDRSliceFlag(), sgwAclFlag, "List of IP networks in CIDR notation which are allowed to access this instance") | ||
@@ -189,3 +186,2 @@ cmd.Flags().StringSlice(syslogFlag, []string{}, "Syslog") | ||
| MetricsPrefix: flags.FlagToStringPointer(cmd, metricsPrefixFlag), | ||
| Plugin: flags.FlagToStringSlicePointer(cmd, pluginFlag), | ||
| SgwAcl: flags.FlagToStringSlicePointer(cmd, sgwAclFlag), | ||
@@ -245,3 +241,2 @@ Syslog: flags.FlagToStringSlicePointer(cmd, syslogFlag), | ||
| MetricsPrefix: model.MetricsPrefix, | ||
| Plugins: model.Plugin, | ||
| SgwAcl: sgwAcl, | ||
@@ -248,0 +243,0 @@ Syslog: model.Syslog, |
@@ -65,3 +65,2 @@ package update | ||
| monitoringInstanceIdFlag: testMonitoringInstanceId, | ||
| pluginFlag: "example-plugin", | ||
| sgwAclFlag: "198.51.100.14/24", | ||
@@ -89,3 +88,2 @@ syslogFlag: "example-syslog", | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugin: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr([]string{"198.51.100.14/24"}), | ||
@@ -110,3 +108,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugins: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr("198.51.100.14/24"), | ||
@@ -129,3 +126,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| sgwAclValues []string | ||
| pluginValues []string | ||
| syslogValues []string | ||
@@ -261,14 +257,2 @@ isValid bool | ||
| { | ||
| description: "repeated plugin flags", | ||
| argValues: fixtureArgValues(), | ||
| flagValues: fixtureFlagValues(), | ||
| pluginValues: []string{"example-plugin-1", "example-plugin-2"}, | ||
| isValid: true, | ||
| expectedModel: fixtureInputModel(func(model *inputModel) { | ||
| model.Plugin = utils.Ptr( | ||
| append(*model.Plugin, "example-plugin-1", "example-plugin-2"), | ||
| ) | ||
| }), | ||
| }, | ||
| { | ||
| description: "repeated syslog flags", | ||
@@ -315,12 +299,2 @@ argValues: fixtureArgValues(), | ||
| for _, value := range tt.pluginValues { | ||
| err := cmd.Flags().Set(pluginFlag, value) | ||
| if err != nil { | ||
| if !tt.isValid { | ||
| return | ||
| } | ||
| t.Fatalf("setting flag --%s=%s: %v", pluginFlag, value, err) | ||
| } | ||
| } | ||
| for _, value := range tt.syslogValues { | ||
@@ -327,0 +301,0 @@ err := cmd.Flags().Set(syslogFlag, value) |
@@ -53,3 +53,2 @@ package update | ||
| MonitoringInstanceId *string | ||
| Plugin *[]string | ||
| SgwAcl *[]string | ||
@@ -144,3 +143,2 @@ Syslog *[]string | ||
| cmd.Flags().Var(flags.UUIDFlag(), monitoringInstanceIdFlag, "Monitoring instance ID") | ||
| cmd.Flags().StringSlice(pluginFlag, []string{}, "Plugin") | ||
| cmd.Flags().Var(flags.CIDRSliceFlag(), sgwAclFlag, "List of IP networks in CIDR notation which are allowed to access this instance") | ||
@@ -166,3 +164,2 @@ cmd.Flags().StringSlice(syslogFlag, []string{}, "Syslog") | ||
| metricsPrefix := flags.FlagToStringPointer(cmd, metricsPrefixFlag) | ||
| plugin := flags.FlagToStringSlicePointer(cmd, pluginFlag) | ||
| sgwAcl := flags.FlagToStringSlicePointer(cmd, sgwAclFlag) | ||
@@ -182,3 +179,3 @@ syslog := flags.FlagToStringSlicePointer(cmd, syslogFlag) | ||
| if enableMonitoring == nil && monitoringInstanceId == nil && graphite == nil && | ||
| metricsFrequency == nil && metricsPrefix == nil && plugin == nil && | ||
| metricsFrequency == nil && metricsPrefix == nil && | ||
| sgwAcl == nil && syslog == nil && planId == nil && | ||
@@ -197,3 +194,2 @@ planName == "" && version == "" { | ||
| MetricsPrefix: metricsPrefix, | ||
| Plugin: plugin, | ||
| SgwAcl: sgwAcl, | ||
@@ -255,3 +251,2 @@ Syslog: syslog, | ||
| MetricsPrefix: model.MetricsPrefix, | ||
| Plugins: model.Plugin, | ||
| SgwAcl: sgwAcl, | ||
@@ -258,0 +253,0 @@ Syslog: model.Syslog, |
@@ -53,3 +53,2 @@ package create | ||
| monitoringInstanceIdFlag: testMonitoringInstanceId, | ||
| pluginFlag: "example-plugin", | ||
| sgwAclFlag: "198.51.100.14/24", | ||
@@ -77,3 +76,2 @@ syslogFlag: "example-syslog", | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugin: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr([]string{"198.51.100.14/24"}), | ||
@@ -99,3 +97,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugins: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr("198.51.100.14/24"), | ||
@@ -117,3 +114,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| sgwAclValues []string | ||
| pluginValues []string | ||
| syslogValues []string | ||
@@ -257,13 +253,2 @@ isValid bool | ||
| { | ||
| description: "repeated plugin flags", | ||
| flagValues: fixtureFlagValues(), | ||
| pluginValues: []string{"example-plugin-1", "example-plugin-2"}, | ||
| isValid: true, | ||
| expectedModel: fixtureInputModel(func(model *inputModel) { | ||
| model.Plugin = utils.Ptr( | ||
| append(*model.Plugin, "example-plugin-1", "example-plugin-2"), | ||
| ) | ||
| }), | ||
| }, | ||
| { | ||
| description: "repeated syslog flags", | ||
@@ -309,12 +294,2 @@ flagValues: fixtureFlagValues(), | ||
| for _, value := range tt.pluginValues { | ||
| err := cmd.Flags().Set(pluginFlag, value) | ||
| if err != nil { | ||
| if !tt.isValid { | ||
| return | ||
| } | ||
| t.Fatalf("setting flag --%s=%s: %v", pluginFlag, value, err) | ||
| } | ||
| } | ||
| for _, value := range tt.syslogValues { | ||
@@ -321,0 +296,0 @@ err := cmd.Flags().Set(syslogFlag, value) |
@@ -33,3 +33,2 @@ package create | ||
| monitoringInstanceIdFlag = "monitoring-instance-id" | ||
| pluginFlag = "plugin" | ||
| sgwAclFlag = "acl" | ||
@@ -53,3 +52,2 @@ syslogFlag = "syslog" | ||
| MonitoringInstanceId *string | ||
| Plugin *[]string | ||
| SgwAcl *[]string | ||
@@ -148,3 +146,2 @@ Syslog *[]string | ||
| cmd.Flags().Var(flags.UUIDFlag(), monitoringInstanceIdFlag, "Monitoring instance ID") | ||
| cmd.Flags().StringSlice(pluginFlag, []string{}, "Plugin") | ||
| cmd.Flags().Var(flags.CIDRSliceFlag(), sgwAclFlag, "List of IP networks in CIDR notation which are allowed to access this instance") | ||
@@ -189,3 +186,2 @@ cmd.Flags().StringSlice(syslogFlag, []string{}, "Syslog") | ||
| MetricsPrefix: flags.FlagToStringPointer(cmd, metricsPrefixFlag), | ||
| Plugin: flags.FlagToStringSlicePointer(cmd, pluginFlag), | ||
| SgwAcl: flags.FlagToStringSlicePointer(cmd, sgwAclFlag), | ||
@@ -245,3 +241,2 @@ Syslog: flags.FlagToStringSlicePointer(cmd, syslogFlag), | ||
| MetricsPrefix: model.MetricsPrefix, | ||
| Plugins: model.Plugin, | ||
| SgwAcl: sgwAcl, | ||
@@ -248,0 +243,0 @@ Syslog: model.Syslog, |
@@ -65,3 +65,2 @@ package update | ||
| monitoringInstanceIdFlag: testMonitoringInstanceId, | ||
| pluginFlag: "example-plugin", | ||
| sgwAclFlag: "198.51.100.14/24", | ||
@@ -89,3 +88,2 @@ syslogFlag: "example-syslog", | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugin: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr([]string{"198.51.100.14/24"}), | ||
@@ -110,3 +108,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugins: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr("198.51.100.14/24"), | ||
@@ -129,3 +126,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| sgwAclValues []string | ||
| pluginValues []string | ||
| syslogValues []string | ||
@@ -272,14 +268,2 @@ isValid bool | ||
| { | ||
| description: "repeated plugin flags", | ||
| argValues: fixtureArgValues(), | ||
| flagValues: fixtureFlagValues(), | ||
| pluginValues: []string{"example-plugin-1", "example-plugin-2"}, | ||
| isValid: true, | ||
| expectedModel: fixtureInputModel(func(model *inputModel) { | ||
| model.Plugin = utils.Ptr( | ||
| append(*model.Plugin, "example-plugin-1", "example-plugin-2"), | ||
| ) | ||
| }), | ||
| }, | ||
| { | ||
| description: "repeated syslog flags", | ||
@@ -326,12 +310,2 @@ argValues: fixtureArgValues(), | ||
| for _, value := range tt.pluginValues { | ||
| err := cmd.Flags().Set(pluginFlag, value) | ||
| if err != nil { | ||
| if !tt.isValid { | ||
| return | ||
| } | ||
| t.Fatalf("setting flag --%s=%s: %v", pluginFlag, value, err) | ||
| } | ||
| } | ||
| for _, value := range tt.syslogValues { | ||
@@ -338,0 +312,0 @@ err := cmd.Flags().Set(syslogFlag, value) |
@@ -34,3 +34,2 @@ package update | ||
| monitoringInstanceIdFlag = "monitoring-instance-id" | ||
| pluginFlag = "plugin" | ||
| sgwAclFlag = "acl" | ||
@@ -54,3 +53,2 @@ syslogFlag = "syslog" | ||
| MonitoringInstanceId *string | ||
| Plugin *[]string | ||
| SgwAcl *[]string | ||
@@ -145,3 +143,2 @@ Syslog *[]string | ||
| cmd.Flags().Var(flags.UUIDFlag(), monitoringInstanceIdFlag, "Monitoring instance ID") | ||
| cmd.Flags().StringSlice(pluginFlag, []string{}, "Plugin") | ||
| cmd.Flags().Var(flags.CIDRSliceFlag(), sgwAclFlag, "List of IP networks in CIDR notation which are allowed to access this instance") | ||
@@ -167,3 +164,2 @@ cmd.Flags().StringSlice(syslogFlag, []string{}, "Syslog") | ||
| metricsPrefix := flags.FlagToStringPointer(cmd, metricsPrefixFlag) | ||
| plugin := flags.FlagToStringSlicePointer(cmd, pluginFlag) | ||
| sgwAcl := flags.FlagToStringSlicePointer(cmd, sgwAclFlag) | ||
@@ -183,3 +179,3 @@ syslog := flags.FlagToStringSlicePointer(cmd, syslogFlag) | ||
| if enableMonitoring == nil && monitoringInstanceId == nil && graphite == nil && | ||
| metricsFrequency == nil && metricsPrefix == nil && plugin == nil && | ||
| metricsFrequency == nil && metricsPrefix == nil && | ||
| sgwAcl == nil && syslog == nil && planId == nil && | ||
@@ -198,3 +194,2 @@ planName == "" && version == "" { | ||
| MetricsPrefix: metricsPrefix, | ||
| Plugin: plugin, | ||
| SgwAcl: sgwAcl, | ||
@@ -256,3 +251,2 @@ Syslog: syslog, | ||
| MetricsPrefix: model.MetricsPrefix, | ||
| Plugins: model.Plugin, | ||
| SgwAcl: sgwAcl, | ||
@@ -259,0 +253,0 @@ Syslog: model.Syslog, |
@@ -53,3 +53,2 @@ package create | ||
| monitoringInstanceIdFlag: testMonitoringInstanceId, | ||
| pluginFlag: "example-plugin", | ||
| sgwAclFlag: "198.51.100.14/24", | ||
@@ -77,3 +76,2 @@ syslogFlag: "example-syslog", | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugin: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr([]string{"198.51.100.14/24"}), | ||
@@ -99,3 +97,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugins: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr("198.51.100.14/24"), | ||
@@ -117,3 +114,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| sgwAclValues []string | ||
| pluginValues []string | ||
| syslogValues []string | ||
@@ -257,13 +253,2 @@ isValid bool | ||
| { | ||
| description: "repeated plugin flags", | ||
| flagValues: fixtureFlagValues(), | ||
| pluginValues: []string{"example-plugin-1", "example-plugin-2"}, | ||
| isValid: true, | ||
| expectedModel: fixtureInputModel(func(model *inputModel) { | ||
| model.Plugin = utils.Ptr( | ||
| append(*model.Plugin, "example-plugin-1", "example-plugin-2"), | ||
| ) | ||
| }), | ||
| }, | ||
| { | ||
| description: "repeated syslog flags", | ||
@@ -309,12 +294,2 @@ flagValues: fixtureFlagValues(), | ||
| for _, value := range tt.pluginValues { | ||
| err := cmd.Flags().Set(pluginFlag, value) | ||
| if err != nil { | ||
| if !tt.isValid { | ||
| return | ||
| } | ||
| t.Fatalf("setting flag --%s=%s: %v", pluginFlag, value, err) | ||
| } | ||
| } | ||
| for _, value := range tt.syslogValues { | ||
@@ -321,0 +296,0 @@ err := cmd.Flags().Set(syslogFlag, value) |
@@ -33,3 +33,2 @@ package create | ||
| monitoringInstanceIdFlag = "monitoring-instance-id" | ||
| pluginFlag = "plugin" | ||
| sgwAclFlag = "acl" | ||
@@ -53,3 +52,2 @@ syslogFlag = "syslog" | ||
| MonitoringInstanceId *string | ||
| Plugin *[]string | ||
| SgwAcl *[]string | ||
@@ -148,3 +146,2 @@ Syslog *[]string | ||
| cmd.Flags().Var(flags.UUIDFlag(), monitoringInstanceIdFlag, "Monitoring instance ID") | ||
| cmd.Flags().StringSlice(pluginFlag, []string{}, "Plugin") | ||
| cmd.Flags().Var(flags.CIDRSliceFlag(), sgwAclFlag, "List of IP networks in CIDR notation which are allowed to access this instance") | ||
@@ -189,3 +186,2 @@ cmd.Flags().StringSlice(syslogFlag, []string{}, "Syslog") | ||
| MetricsPrefix: flags.FlagToStringPointer(cmd, metricsPrefixFlag), | ||
| Plugin: flags.FlagToStringSlicePointer(cmd, pluginFlag), | ||
| SgwAcl: flags.FlagToStringSlicePointer(cmd, sgwAclFlag), | ||
@@ -245,3 +241,2 @@ Syslog: flags.FlagToStringSlicePointer(cmd, syslogFlag), | ||
| MetricsPrefix: model.MetricsPrefix, | ||
| Plugins: model.Plugin, | ||
| SgwAcl: sgwAcl, | ||
@@ -248,0 +243,0 @@ Syslog: model.Syslog, |
@@ -65,3 +65,2 @@ package update | ||
| monitoringInstanceIdFlag: testMonitoringInstanceId, | ||
| pluginFlag: "example-plugin", | ||
| sgwAclFlag: "198.51.100.14/24", | ||
@@ -89,3 +88,2 @@ syslogFlag: "example-syslog", | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugin: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr([]string{"198.51.100.14/24"}), | ||
@@ -110,3 +108,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| MonitoringInstanceId: utils.Ptr(testMonitoringInstanceId), | ||
| Plugins: utils.Ptr([]string{"example-plugin"}), | ||
| SgwAcl: utils.Ptr("198.51.100.14/24"), | ||
@@ -129,3 +126,2 @@ Syslog: utils.Ptr([]string{"example-syslog"}), | ||
| sgwAclValues []string | ||
| pluginValues []string | ||
| syslogValues []string | ||
@@ -272,14 +268,2 @@ isValid bool | ||
| { | ||
| description: "repeated plugin flags", | ||
| argValues: fixtureArgValues(), | ||
| flagValues: fixtureFlagValues(), | ||
| pluginValues: []string{"example-plugin-1", "example-plugin-2"}, | ||
| isValid: true, | ||
| expectedModel: fixtureInputModel(func(model *inputModel) { | ||
| model.Plugin = utils.Ptr( | ||
| append(*model.Plugin, "example-plugin-1", "example-plugin-2"), | ||
| ) | ||
| }), | ||
| }, | ||
| { | ||
| description: "repeated syslog flags", | ||
@@ -326,12 +310,2 @@ argValues: fixtureArgValues(), | ||
| for _, value := range tt.pluginValues { | ||
| err := cmd.Flags().Set(pluginFlag, value) | ||
| if err != nil { | ||
| if !tt.isValid { | ||
| return | ||
| } | ||
| t.Fatalf("setting flag --%s=%s: %v", pluginFlag, value, err) | ||
| } | ||
| } | ||
| for _, value := range tt.syslogValues { | ||
@@ -338,0 +312,0 @@ err := cmd.Flags().Set(syslogFlag, value) |
@@ -28,3 +28,2 @@ package update | ||
| instanceNameFlag = "name" | ||
| enableMonitoringFlag = "enable-monitoring" | ||
@@ -35,3 +34,2 @@ graphiteFlag = "graphite" | ||
| monitoringInstanceIdFlag = "monitoring-instance-id" | ||
| pluginFlag = "plugin" | ||
| sgwAclFlag = "acl" | ||
@@ -55,3 +53,2 @@ syslogFlag = "syslog" | ||
| MonitoringInstanceId *string | ||
| Plugin *[]string | ||
| SgwAcl *[]string | ||
@@ -146,3 +143,2 @@ Syslog *[]string | ||
| cmd.Flags().Var(flags.UUIDFlag(), monitoringInstanceIdFlag, "Monitoring instance ID") | ||
| cmd.Flags().StringSlice(pluginFlag, []string{}, "Plugin") | ||
| cmd.Flags().Var(flags.CIDRSliceFlag(), sgwAclFlag, "List of IP networks in CIDR notation which are allowed to access this instance") | ||
@@ -168,3 +164,2 @@ cmd.Flags().StringSlice(syslogFlag, []string{}, "Syslog") | ||
| metricsPrefix := flags.FlagToStringPointer(cmd, metricsPrefixFlag) | ||
| plugin := flags.FlagToStringSlicePointer(cmd, pluginFlag) | ||
| sgwAcl := flags.FlagToStringSlicePointer(cmd, sgwAclFlag) | ||
@@ -184,3 +179,3 @@ syslog := flags.FlagToStringSlicePointer(cmd, syslogFlag) | ||
| if enableMonitoring == nil && monitoringInstanceId == nil && graphite == nil && | ||
| metricsFrequency == nil && metricsPrefix == nil && plugin == nil && | ||
| metricsFrequency == nil && metricsPrefix == nil && | ||
| sgwAcl == nil && syslog == nil && planId == nil && | ||
@@ -199,3 +194,2 @@ planName == "" && version == "" { | ||
| MetricsPrefix: metricsPrefix, | ||
| Plugin: plugin, | ||
| SgwAcl: sgwAcl, | ||
@@ -257,3 +251,2 @@ Syslog: syslog, | ||
| MetricsPrefix: model.MetricsPrefix, | ||
| Plugins: model.Plugin, | ||
| SgwAcl: sgwAcl, | ||
@@ -260,0 +253,0 @@ Syslog: model.Syslog, |