619 lines
17 KiB
Go
619 lines
17 KiB
Go
/*
|
|
* Copyright 2020 The Dragonfly Authors
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package config
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"time"
|
|
|
|
"d7y.io/dragonfly/v2/cmd/dependency/base"
|
|
"d7y.io/dragonfly/v2/pkg/net/ip"
|
|
"d7y.io/dragonfly/v2/pkg/objectstorage"
|
|
"d7y.io/dragonfly/v2/pkg/rpc"
|
|
"d7y.io/dragonfly/v2/pkg/slices"
|
|
"d7y.io/dragonfly/v2/pkg/types"
|
|
)
|
|
|
|
type Config struct {
|
|
// Base options.
|
|
base.Options `yaml:",inline" mapstructure:",squash"`
|
|
|
|
// Server configuration.
|
|
Server ServerConfig `yaml:"server" mapstructure:"server"`
|
|
|
|
// Auth configuration.
|
|
Auth AuthConfig `yaml:"auth" mapstructure:"auth"`
|
|
|
|
// Database configuration.
|
|
Database DatabaseConfig `yaml:"database" mapstructure:"database"`
|
|
|
|
// Cache configuration.
|
|
Cache CacheConfig `yaml:"cache" mapstructure:"cache"`
|
|
|
|
// ObjectStorage configuration.
|
|
ObjectStorage ObjectStorageConfig `yaml:"objectStorage" mapstructure:"objectStorage"`
|
|
|
|
// Metrics configuration.
|
|
Metrics MetricsConfig `yaml:"metrics" mapstructure:"metrics"`
|
|
|
|
// Security configuration.
|
|
Security SecurityConfig `yaml:"security" mapstructure:"security"`
|
|
|
|
// Network configuration.
|
|
Network NetworkConfig `yaml:"network" mapstructure:"network"`
|
|
}
|
|
|
|
type ServerConfig struct {
|
|
// Server name.
|
|
Name string `yaml:"name" mapstructure:"name"`
|
|
|
|
// Server work directory.
|
|
WorkHome string `yaml:"workHome" mapstructure:"workHome"`
|
|
|
|
// Server dynamic config cache directory.
|
|
CacheDir string `yaml:"cacheDir" mapstructure:"cacheDir"`
|
|
|
|
// Server log directory.
|
|
LogDir string `yaml:"logDir" mapstructure:"logDir"`
|
|
|
|
// Server plugin directory.
|
|
PluginDir string `yaml:"pluginDir" mapstructure:"pluginDir"`
|
|
|
|
// GRPC server configuration.
|
|
GRPC GRPCConfig `yaml:"grpc" mapstructure:"grpc"`
|
|
|
|
// REST server configuration.
|
|
REST RestConfig `yaml:"rest" mapstructure:"rest"`
|
|
}
|
|
|
|
type AuthConfig struct {
|
|
// JWT configuration.
|
|
JWT JWTConfig `yaml:"jwt" mapstructure:"jwt"`
|
|
}
|
|
|
|
type JWTConfig struct {
|
|
// Realm name to display to the user, default value is Dragonfly.
|
|
Realm string `yaml:"realm" mapstructure:"realm"`
|
|
|
|
// Key is secret key used for signing. Please change the key in production
|
|
Key string `yaml:"key" mapstructure:"key"`
|
|
|
|
// Timeout is duration that a jwt token is valid, default duration is two days.
|
|
Timeout time.Duration `yaml:"timeout" mapstructure:"timeout"`
|
|
|
|
// MaxRefresh field allows clients to refresh their token until MaxRefresh has passed, default duration is two days.
|
|
MaxRefresh time.Duration `yaml:"maxRefresh" mapstructure:"maxRefresh"`
|
|
}
|
|
|
|
type DatabaseConfig struct {
|
|
// Database type.
|
|
Type string `yaml:"type" mapstructure:"type"`
|
|
|
|
// Mysql configuration.
|
|
Mysql MysqlConfig `yaml:"mysql" mapstructure:"mysql"`
|
|
|
|
// Postgres configuration.
|
|
Postgres PostgresConfig `yaml:"postgres" mapstructure:"postgres"`
|
|
|
|
// Redis configuration.
|
|
Redis RedisConfig `yaml:"redis" mapstructure:"redis"`
|
|
}
|
|
|
|
type MysqlConfig struct {
|
|
// Server username.
|
|
User string `yaml:"user" mapstructure:"user"`
|
|
|
|
// Server password.
|
|
Password string `yaml:"password" mapstructure:"password"`
|
|
|
|
// Server host.
|
|
Host string `yaml:"host" mapstructure:"host"`
|
|
|
|
// Server port.
|
|
Port int `yaml:"port" mapstructure:"port"`
|
|
|
|
// Server DB name.
|
|
DBName string `yaml:"dbname" mapstructure:"dbname"`
|
|
|
|
// TLS mode (can be one of "true", "false", "skip-verify", or "preferred").
|
|
TLSConfig string `yaml:"tlsConfig" mapstructure:"tlsConfig"`
|
|
|
|
// Custom TLS configuration (overrides "TLSConfig" setting above).
|
|
TLS *TLSConfig `yaml:"tls" mapstructure:"tls"`
|
|
|
|
// Enable migration.
|
|
Migrate bool `yaml:"migrate" mapstructure:"migrate"`
|
|
}
|
|
|
|
type TLSConfig struct {
|
|
// Client certificate file path.
|
|
Cert string `yaml:"cert" mapstructure:"cert"`
|
|
|
|
// Client key file path.
|
|
Key string `yaml:"key" mapstructure:"key"`
|
|
|
|
// CA file path.
|
|
CA string `yaml:"ca" mapstructure:"ca"`
|
|
|
|
// InsecureSkipVerify controls whether a client verifies the
|
|
// server's certificate chain and host name.
|
|
InsecureSkipVerify bool `yaml:"insecureSkipVerify" mapstructure:"insecureSkipVerify"`
|
|
}
|
|
|
|
type PostgresConfig struct {
|
|
// Server username.
|
|
User string `yaml:"user" mapstructure:"user"`
|
|
|
|
// Server password.
|
|
Password string `yaml:"password" mapstructure:"password"`
|
|
|
|
// Server host.
|
|
Host string `yaml:"host" mapstructure:"host"`
|
|
|
|
// Server port.
|
|
Port int `yaml:"port" mapstructure:"port"`
|
|
|
|
// Server DB name.
|
|
DBName string `yaml:"dbname" mapstructure:"dbname"`
|
|
|
|
// SSL mode.
|
|
SSLMode string `yaml:"sslMode" mapstructure:"sslMode"`
|
|
|
|
// Server timezone.
|
|
Timezone string `yaml:"timezone" mapstructure:"timezone"`
|
|
|
|
// Enable migration.
|
|
Migrate bool `yaml:"migrate" mapstructure:"migrate"`
|
|
}
|
|
|
|
type RedisConfig struct {
|
|
// DEPRECATED: Please use the `addrs` field instead.
|
|
Host string `yaml:"host" mapstructure:"host"`
|
|
|
|
// DEPRECATED: Please use the `addrs` field instead.
|
|
Port int `yaml:"port" mapstructure:"port"`
|
|
|
|
// Addrs is server addresses.
|
|
Addrs []string `yaml:"addrs" mapstructure:"addrs"`
|
|
|
|
// MasterName is the sentinel master name.
|
|
MasterName string `yaml:"masterName" mapstructure:"masterName"`
|
|
|
|
// Username is server username.
|
|
Username string `yaml:"username" mapstructure:"username"`
|
|
|
|
// Password is server password.
|
|
Password string `yaml:"password" mapstructure:"password"`
|
|
|
|
// DB is server cache DB name.
|
|
DB int `yaml:"db" mapstructure:"db"`
|
|
|
|
// BrokerDB is server broker DB name.
|
|
BrokerDB int `yaml:"brokerDB" mapstructure:"brokerDB"`
|
|
|
|
// BackendDB is server backend DB name.
|
|
BackendDB int `yaml:"backendDB" mapstructure:"backendDB"`
|
|
}
|
|
|
|
type CacheConfig struct {
|
|
// Redis cache configuration.
|
|
Redis RedisCacheConfig `yaml:"redis" mapstructure:"redis"`
|
|
|
|
// Local cache configuration.
|
|
Local LocalCacheConfig `yaml:"local" mapstructure:"local"`
|
|
}
|
|
|
|
type RedisCacheConfig struct {
|
|
// Cache TTL.
|
|
TTL time.Duration `yaml:"ttl" mapstructure:"ttl"`
|
|
}
|
|
|
|
type LocalCacheConfig struct {
|
|
// Size of LFU cache.
|
|
Size int `yaml:"size" mapstructure:"size"`
|
|
|
|
// Cache TTL.
|
|
TTL time.Duration `yaml:"ttl" mapstructure:"ttl"`
|
|
}
|
|
|
|
type RestConfig struct {
|
|
// REST server address.
|
|
Addr string `yaml:"addr" mapstructure:"addr"`
|
|
}
|
|
|
|
type MetricsConfig struct {
|
|
// Enable metrics service.
|
|
Enable bool `yaml:"enable" mapstructure:"enable"`
|
|
|
|
// Metrics service address.
|
|
Addr string `yaml:"addr" mapstructure:"addr"`
|
|
|
|
// Enable peer gauge metrics.
|
|
EnablePeerGauge bool `yaml:"enablePeerGauge" mapstructure:"enablePeerGauge"`
|
|
}
|
|
|
|
type GRPCConfig struct {
|
|
// AdvertiseIP is advertise ip.
|
|
AdvertiseIP net.IP `yaml:"advertiseIP" mapstructure:"advertiseIP"`
|
|
|
|
// AdvertisePort is advertise port.
|
|
AdvertisePort int `yaml:"advertisePort" mapstructure:"advertisePort"`
|
|
|
|
// ListenIP is listen ip, like: 0.0.0.0, 192.168.0.1.
|
|
ListenIP net.IP `mapstructure:"listenIP" yaml:"listenIP"`
|
|
|
|
// Port is listen port.
|
|
PortRange TCPListenPortRange `yaml:"port" mapstructure:"port"`
|
|
}
|
|
|
|
type TCPListenPortRange struct {
|
|
Start int
|
|
End int
|
|
}
|
|
|
|
type ObjectStorageConfig struct {
|
|
// Enable object storage.
|
|
Enable bool `yaml:"enable" mapstructure:"enable"`
|
|
|
|
// Name is object storage name of type, it can be s3, oss or obs.
|
|
Name string `mapstructure:"name" yaml:"name"`
|
|
|
|
// Region is storage region.
|
|
Region string `mapstructure:"region" yaml:"region"`
|
|
|
|
// Endpoint is datacenter endpoint.
|
|
Endpoint string `mapstructure:"endpoint" yaml:"endpoint"`
|
|
|
|
// AccessKey is access key ID.
|
|
AccessKey string `mapstructure:"accessKey" yaml:"accessKey"`
|
|
|
|
// SecretKey is access key secret.
|
|
SecretKey string `mapstructure:"secretKey" yaml:"secretKey"`
|
|
|
|
// S3ForcePathStyle sets force path style for s3, true by default.
|
|
// Set this to `true` to force the request to use path-style addressing,
|
|
// i.e., `http://s3.amazonaws.com/BUCKET/KEY`. By default, the S3 client
|
|
// will use virtual hosted bucket addressing when possible
|
|
// (`http://BUCKET.s3.amazonaws.com/KEY`).
|
|
// Refer to https://github.com/aws/aws-sdk-go/blob/main/aws/config.go#L118.
|
|
S3ForcePathStyle bool `mapstructure:"s3ForcePathStyle" yaml:"s3ForcePathStyle"`
|
|
}
|
|
|
|
type SecurityConfig struct {
|
|
// AutoIssueCert indicates to issue client certificates for all grpc call.
|
|
AutoIssueCert bool `yaml:"autoIssueCert" mapstructure:"autoIssueCert"`
|
|
|
|
// CACert is the CA certificate for all grpc tls handshake, it can be path or PEM format string.
|
|
CACert types.PEMContent `mapstructure:"caCert" yaml:"caCert"`
|
|
|
|
// CAKey is the CA private key, it can be path or PEM format string.
|
|
CAKey types.PEMContent `mapstructure:"caKey" yaml:"caKey"`
|
|
|
|
// TLSPolicy controls the grpc shandshake behaviors:
|
|
// force: both ClientHandshake and ServerHandshake are only support tls
|
|
// prefer: ServerHandshake supports tls and insecure (non-tls), ClientHandshake will only support tls
|
|
// default: ServerHandshake supports tls and insecure (non-tls), ClientHandshake will only support insecure (non-tls)
|
|
TLSPolicy string `mapstructure:"tlsPolicy" yaml:"tlsPolicy"`
|
|
|
|
// CertSpec is the desired state of certificate.
|
|
CertSpec CertSpec `mapstructure:"certSpec" yaml:"certSpec"`
|
|
}
|
|
|
|
type CertSpec struct {
|
|
// DNSNames is a list of dns names be set on the certificate.
|
|
DNSNames []string `mapstructure:"dnsNames" yaml:"dnsNames"`
|
|
|
|
// IPAddresses is a list of ip addresses be set on the certificate.
|
|
IPAddresses []net.IP `mapstructure:"ipAddresses" yaml:"ipAddresses"`
|
|
|
|
// ValidityPeriod is the validity period of certificate.
|
|
ValidityPeriod time.Duration `mapstructure:"validityPeriod" yaml:"validityPeriod"`
|
|
}
|
|
|
|
type NetworkConfig struct {
|
|
// EnableIPv6 enables ipv6 for server.
|
|
EnableIPv6 bool `mapstructure:"enableIPv6" yaml:"enableIPv6"`
|
|
}
|
|
|
|
// New config instance.
|
|
func New() *Config {
|
|
return &Config{
|
|
Server: ServerConfig{
|
|
Name: DefaultServerName,
|
|
GRPC: GRPCConfig{
|
|
AdvertisePort: DefaultGRPCAdvertisePort,
|
|
PortRange: TCPListenPortRange{
|
|
Start: DefaultGRPCPort,
|
|
End: DefaultGRPCPort,
|
|
},
|
|
},
|
|
REST: RestConfig{
|
|
Addr: DefaultRESTAddr,
|
|
},
|
|
},
|
|
Auth: AuthConfig{
|
|
JWT: JWTConfig{
|
|
Realm: DefaultJWTRealm,
|
|
Timeout: DefaultJWTTimeout,
|
|
MaxRefresh: DefaultJWTMaxRefresh,
|
|
},
|
|
},
|
|
Database: DatabaseConfig{
|
|
Type: DatabaseTypeMysql,
|
|
Mysql: MysqlConfig{
|
|
Port: DefaultMysqlPort,
|
|
DBName: DefaultMysqlDBName,
|
|
Migrate: true,
|
|
},
|
|
Postgres: PostgresConfig{
|
|
Port: DefaultPostgresPort,
|
|
DBName: DefaultPostgresDBName,
|
|
SSLMode: DefaultPostgresSSLMode,
|
|
Timezone: DefaultPostgresTimezone,
|
|
Migrate: true,
|
|
},
|
|
Redis: RedisConfig{
|
|
DB: DefaultRedisDB,
|
|
BrokerDB: DefaultRedisBrokerDB,
|
|
BackendDB: DefaultRedisBackendDB,
|
|
},
|
|
},
|
|
Cache: CacheConfig{
|
|
Redis: RedisCacheConfig{
|
|
TTL: DefaultRedisCacheTTL,
|
|
},
|
|
Local: LocalCacheConfig{
|
|
Size: DefaultLFUCacheSize,
|
|
TTL: DefaultLFUCacheTTL,
|
|
},
|
|
},
|
|
ObjectStorage: ObjectStorageConfig{
|
|
Enable: false,
|
|
S3ForcePathStyle: true,
|
|
},
|
|
Security: SecurityConfig{
|
|
AutoIssueCert: false,
|
|
TLSPolicy: rpc.PreferTLSPolicy,
|
|
CertSpec: CertSpec{
|
|
DNSNames: DefaultCertDNSNames,
|
|
IPAddresses: DefaultCertIPAddresses,
|
|
ValidityPeriod: DefaultCertValidityPeriod,
|
|
},
|
|
},
|
|
Metrics: MetricsConfig{
|
|
Enable: false,
|
|
Addr: DefaultMetricsAddr,
|
|
EnablePeerGauge: true,
|
|
},
|
|
Network: NetworkConfig{
|
|
EnableIPv6: DefaultNetworkEnableIPv6,
|
|
},
|
|
}
|
|
}
|
|
|
|
// Validate config values
|
|
func (cfg *Config) Validate() error {
|
|
if cfg.Server.Name == "" {
|
|
return errors.New("server requires parameter name")
|
|
}
|
|
|
|
if cfg.Server.GRPC.AdvertiseIP == nil {
|
|
return errors.New("grpc requires parameter advertiseIP")
|
|
}
|
|
|
|
if cfg.Server.GRPC.AdvertisePort <= 0 {
|
|
return errors.New("grpc requires parameter advertisePort")
|
|
}
|
|
|
|
if cfg.Server.GRPC.ListenIP == nil {
|
|
return errors.New("grpc requires parameter listenIP")
|
|
}
|
|
|
|
if cfg.Auth.JWT.Realm == "" {
|
|
return errors.New("jwt requires parameter realm")
|
|
}
|
|
|
|
if cfg.Auth.JWT.Key == "" {
|
|
return errors.New("jwt requires parameter key")
|
|
}
|
|
|
|
if cfg.Auth.JWT.Timeout == 0 {
|
|
return errors.New("jwt requires parameter timeout")
|
|
}
|
|
|
|
if cfg.Auth.JWT.MaxRefresh == 0 {
|
|
return errors.New("jwt requires parameter maxRefresh")
|
|
}
|
|
|
|
if cfg.Database.Type == "" {
|
|
return errors.New("database requires parameter type")
|
|
}
|
|
|
|
if slices.Contains([]string{DatabaseTypeMysql, DatabaseTypeMariaDB}, cfg.Database.Type) {
|
|
if cfg.Database.Mysql.User == "" {
|
|
return errors.New("mysql requires parameter user")
|
|
}
|
|
|
|
if cfg.Database.Mysql.Password == "" {
|
|
return errors.New("mysql requires parameter password")
|
|
}
|
|
|
|
if cfg.Database.Mysql.Host == "" {
|
|
return errors.New("mysql requires parameter host")
|
|
}
|
|
|
|
if cfg.Database.Mysql.Port <= 0 {
|
|
return errors.New("mysql requires parameter port")
|
|
}
|
|
|
|
if cfg.Database.Mysql.DBName == "" {
|
|
return errors.New("mysql requires parameter dbname")
|
|
}
|
|
|
|
if cfg.Database.Mysql.TLS != nil {
|
|
if cfg.Database.Mysql.TLS.Cert == "" {
|
|
return errors.New("tls requires parameter cert")
|
|
}
|
|
|
|
if cfg.Database.Mysql.TLS.Key == "" {
|
|
return errors.New("tls requires parameter key")
|
|
}
|
|
|
|
if cfg.Database.Mysql.TLS.CA == "" {
|
|
return errors.New("tls requires parameter ca")
|
|
}
|
|
}
|
|
}
|
|
|
|
if cfg.Database.Type == DatabaseTypePostgres {
|
|
if cfg.Database.Postgres.User == "" {
|
|
return errors.New("postgres requires parameter user")
|
|
}
|
|
|
|
if cfg.Database.Postgres.Password == "" {
|
|
return errors.New("postgres requires parameter password")
|
|
}
|
|
|
|
if cfg.Database.Postgres.Host == "" {
|
|
return errors.New("postgres requires parameter host")
|
|
}
|
|
|
|
if cfg.Database.Postgres.Port <= 0 {
|
|
return errors.New("postgres requires parameter port")
|
|
}
|
|
|
|
if cfg.Database.Postgres.DBName == "" {
|
|
return errors.New("postgres requires parameter dbname")
|
|
}
|
|
|
|
if cfg.Database.Postgres.SSLMode == "" {
|
|
return errors.New("postgres requires parameter sslMode")
|
|
}
|
|
|
|
if cfg.Database.Postgres.Timezone == "" {
|
|
return errors.New("postgres requires parameter timezone")
|
|
}
|
|
}
|
|
|
|
if len(cfg.Database.Redis.Addrs) == 0 {
|
|
return errors.New("redis requires parameter addrs")
|
|
}
|
|
|
|
if cfg.Database.Redis.DB < 0 {
|
|
return errors.New("redis requires parameter db")
|
|
}
|
|
|
|
if cfg.Database.Redis.BrokerDB < 0 {
|
|
return errors.New("redis requires parameter brokerDB")
|
|
}
|
|
|
|
if cfg.Database.Redis.BackendDB < 0 {
|
|
return errors.New("redis requires parameter backendDB")
|
|
}
|
|
|
|
if cfg.Cache.Redis.TTL == 0 {
|
|
return errors.New("redis requires parameter ttl")
|
|
}
|
|
|
|
if cfg.Cache.Local.Size == 0 {
|
|
return errors.New("local requires parameter size")
|
|
}
|
|
|
|
if cfg.Cache.Local.TTL == 0 {
|
|
return errors.New("local requires parameter ttl")
|
|
}
|
|
|
|
if cfg.ObjectStorage.Enable {
|
|
if cfg.ObjectStorage.Name == "" {
|
|
return errors.New("objectStorage requires parameter name")
|
|
}
|
|
|
|
if !slices.Contains([]string{objectstorage.ServiceNameS3, objectstorage.ServiceNameOSS, objectstorage.ServiceNameOBS}, cfg.ObjectStorage.Name) {
|
|
return errors.New("objectStorage requires parameter name")
|
|
}
|
|
|
|
if cfg.ObjectStorage.AccessKey == "" {
|
|
return errors.New("objectStorage requires parameter accessKey")
|
|
}
|
|
|
|
if cfg.ObjectStorage.SecretKey == "" {
|
|
return errors.New("objectStorage requires parameter secretKey")
|
|
}
|
|
}
|
|
|
|
if cfg.Metrics.Enable {
|
|
if cfg.Metrics.Addr == "" {
|
|
return errors.New("metrics requires parameter addr")
|
|
}
|
|
}
|
|
|
|
if cfg.Security.AutoIssueCert {
|
|
if cfg.Security.CACert == "" {
|
|
return errors.New("security requires parameter caCert")
|
|
}
|
|
|
|
if cfg.Security.CAKey == "" {
|
|
return errors.New("security requires parameter caKey")
|
|
}
|
|
|
|
if !slices.Contains([]string{rpc.DefaultTLSPolicy, rpc.ForceTLSPolicy, rpc.PreferTLSPolicy}, cfg.Security.TLSPolicy) {
|
|
return errors.New("security requires parameter tlsPolicy")
|
|
}
|
|
|
|
if len(cfg.Security.CertSpec.IPAddresses) == 0 {
|
|
return errors.New("certSpec requires parameter ipAddresses")
|
|
}
|
|
|
|
if len(cfg.Security.CertSpec.DNSNames) == 0 {
|
|
return errors.New("certSpec requires parameter dnsNames")
|
|
}
|
|
|
|
if cfg.Security.CertSpec.ValidityPeriod <= 0 {
|
|
return errors.New("certSpec requires parameter validityPeriod")
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (cfg *Config) Convert() error {
|
|
// TODO Compatible with deprecated fields host and port.
|
|
if len(cfg.Database.Redis.Addrs) == 0 && cfg.Database.Redis.Host != "" && cfg.Database.Redis.Port > 0 {
|
|
cfg.Database.Redis.Addrs = []string{fmt.Sprintf("%s:%d", cfg.Database.Redis.Host, cfg.Database.Redis.Port)}
|
|
}
|
|
|
|
if cfg.Server.GRPC.AdvertiseIP == nil {
|
|
if cfg.Network.EnableIPv6 {
|
|
cfg.Server.GRPC.AdvertiseIP = ip.IPv6
|
|
} else {
|
|
cfg.Server.GRPC.AdvertiseIP = ip.IPv4
|
|
}
|
|
}
|
|
|
|
if cfg.Server.GRPC.ListenIP == nil {
|
|
if cfg.Network.EnableIPv6 {
|
|
cfg.Server.GRPC.ListenIP = net.IPv6zero
|
|
} else {
|
|
cfg.Server.GRPC.ListenIP = net.IPv4zero
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|