summaryrefslogblamecommitdiff
path: root/src/lib.rs
blob: 6326fa06ca52b2c014375836dd0702eda306cef8 (plain) (tree)
1
2
3
4
5
6
7
8
9




               


                  
                           
 
                              
 





                                    



                   
                            
 

                      


             












































                                                                                                
 
mod catalog;
mod kv;
mod locking;
mod with_index;

use std::fs::File;
use std::io::Read;

use anyhow::{bail, Result};

pub use with_index::WithIndex;

pub struct ConsulConfig {
    pub addr: String,
    pub ca_cert: Option<String>,
    pub tls_skip_verify: bool,
    pub client_cert: Option<String>,
    pub client_key: Option<String>,
}

#[derive(Clone)]
pub struct Consul {
    client: reqwest::Client,

    url: String,
    kv_prefix: String,
}

impl Consul {
    pub fn new(config: ConsulConfig, kv_prefix: &str) -> Result<Self> {
        let client = match (&config.client_cert, &config.client_key) {
            (Some(client_cert), Some(client_key)) => {
                let mut client_cert_buf = vec![];
                File::open(client_cert)?.read_to_end(&mut client_cert_buf)?;

                let mut client_key_buf = vec![];
                File::open(client_key)?.read_to_end(&mut client_key_buf)?;

                let identity = reqwest::Identity::from_pem(
                    &[&client_cert_buf[..], &client_key_buf[..]].concat()[..],
                )?;

                if config.tls_skip_verify {
                    reqwest::Client::builder()
                        .use_rustls_tls()
                        .danger_accept_invalid_certs(true)
                        .identity(identity)
                        .build()?
                } else if let Some(ca_cert) = &config.ca_cert {
                    let mut ca_cert_buf = vec![];
                    File::open(ca_cert)?.read_to_end(&mut ca_cert_buf)?;

                    reqwest::Client::builder()
                        .use_rustls_tls()
                        .add_root_certificate(reqwest::Certificate::from_pem(&ca_cert_buf[..])?)
                        .identity(identity)
                        .build()?
                } else {
                    reqwest::Client::builder()
                        .use_rustls_tls()
                        .identity(identity)
                        .build()?
                }
            }
            (None, None) => reqwest::Client::new(),
            _ => bail!("Incomplete Consul TLS configuration parameters"),
        };

        Ok(Self {
            client,
            url: config.addr.trim_end_matches('/').to_string(),
            kv_prefix: kv_prefix.to_string(),
        })
    }
}