Remove clientName everywhere. (#2862)

This used to be used for AMQP queue names. Now that AMQP is gone, these consts
were only used when printing a version string at startup. This changes
VersionString to just use the name of the current program, and removes
`const clientName = ` from many of our main.go's.
This commit is contained in:
Jacob Hoffman-Andrews 2017-07-12 10:28:54 -07:00 committed by Roland Bracewell Shoemaker
parent 03dba10ca6
commit 63a25bf913
14 changed files with 16 additions and 37 deletions

View File

@ -27,8 +27,6 @@ import (
sapb "github.com/letsencrypt/boulder/sa/proto" sapb "github.com/letsencrypt/boulder/sa/proto"
) )
const clientName = "AdminRevoker"
const usageString = ` const usageString = `
usage: usage:
admin-revoker serial-revoke --config <path> <serial> <reason-code> admin-revoker serial-revoke --config <path> <serial> <reason-code>

View File

@ -26,8 +26,6 @@ import (
sapb "github.com/letsencrypt/boulder/sa/proto" sapb "github.com/letsencrypt/boulder/sa/proto"
) )
const clientName = "CA"
type config struct { type config struct {
CA cmd.CAConfig CA cmd.CAConfig
@ -139,7 +137,7 @@ func main() {
scope, logger := cmd.StatsAndLogging(c.Syslog) scope, logger := cmd.StatsAndLogging(c.Syslog)
defer logger.AuditPanic() defer logger.AuditPanic()
logger.Info(cmd.VersionString(clientName)) logger.Info(cmd.VersionString())
cmd.FailOnError(c.PA.CheckChallenges(), "Invalid PA configuration") cmd.FailOnError(c.PA.CheckChallenges(), "Invalid PA configuration")

View File

@ -17,8 +17,6 @@ import (
sapb "github.com/letsencrypt/boulder/sa/proto" sapb "github.com/letsencrypt/boulder/sa/proto"
) )
const clientName = "Publisher"
type config struct { type config struct {
Publisher struct { Publisher struct {
cmd.ServiceConfig cmd.ServiceConfig
@ -53,7 +51,7 @@ func main() {
scope, logger := cmd.StatsAndLogging(c.Syslog) scope, logger := cmd.StatsAndLogging(c.Syslog)
defer logger.AuditPanic() defer logger.AuditPanic()
logger.Info(cmd.VersionString(clientName)) logger.Info(cmd.VersionString())
logs := make([]*publisher.Log, len(c.Common.CT.Logs)) logs := make([]*publisher.Log, len(c.Common.CT.Logs))
for i, ld := range c.Common.CT.Logs { for i, ld := range c.Common.CT.Logs {

View File

@ -25,8 +25,6 @@ import (
sapb "github.com/letsencrypt/boulder/sa/proto" sapb "github.com/letsencrypt/boulder/sa/proto"
) )
const clientName = "RA"
type config struct { type config struct {
RA struct { RA struct {
cmd.ServiceConfig cmd.ServiceConfig
@ -105,7 +103,7 @@ func main() {
scope, logger := cmd.StatsAndLogging(c.Syslog) scope, logger := cmd.StatsAndLogging(c.Syslog)
defer logger.AuditPanic() defer logger.AuditPanic()
logger.Info(cmd.VersionString(clientName)) logger.Info(cmd.VersionString())
// Validate PA config and set defaults if needed // Validate PA config and set defaults if needed
cmd.FailOnError(c.PA.CheckChallenges(), "Invalid PA configuration") cmd.FailOnError(c.PA.CheckChallenges(), "Invalid PA configuration")

View File

@ -15,8 +15,6 @@ import (
sapb "github.com/letsencrypt/boulder/sa/proto" sapb "github.com/letsencrypt/boulder/sa/proto"
) )
const clientName = "SA"
type config struct { type config struct {
SA struct { SA struct {
cmd.ServiceConfig cmd.ServiceConfig
@ -45,7 +43,7 @@ func main() {
scope, logger := cmd.StatsAndLogging(c.Syslog) scope, logger := cmd.StatsAndLogging(c.Syslog)
defer logger.AuditPanic() defer logger.AuditPanic()
logger.Info(cmd.VersionString(clientName)) logger.Info(cmd.VersionString())
saConf := c.SA saConf := c.SA

View File

@ -15,8 +15,6 @@ import (
"github.com/letsencrypt/boulder/va" "github.com/letsencrypt/boulder/va"
) )
const clientName = "VA"
type config struct { type config struct {
VA struct { VA struct {
cmd.ServiceConfig cmd.ServiceConfig
@ -71,7 +69,7 @@ func main() {
scope, logger := cmd.StatsAndLogging(c.Syslog) scope, logger := cmd.StatsAndLogging(c.Syslog)
defer logger.AuditPanic() defer logger.AuditPanic()
logger.Info(cmd.VersionString(clientName)) logger.Info(cmd.VersionString())
pc := &cmd.PortConfig{ pc := &cmd.PortConfig{
HTTPPort: 80, HTTPPort: 80,

View File

@ -22,8 +22,6 @@ import (
"github.com/letsencrypt/boulder/wfe" "github.com/letsencrypt/boulder/wfe"
) )
const clientName = "WFE"
type config struct { type config struct {
WFE struct { WFE struct {
cmd.ServiceConfig cmd.ServiceConfig
@ -103,7 +101,7 @@ func main() {
scope, logger := cmd.StatsAndLogging(c.Syslog) scope, logger := cmd.StatsAndLogging(c.Syslog)
defer logger.AuditPanic() defer logger.AuditPanic()
logger.Info(cmd.VersionString(clientName)) logger.Info(cmd.VersionString())
kp, err := goodkey.NewKeyPolicy("") // don't load any weak keys kp, err := goodkey.NewKeyPolicy("") // don't load any weak keys
cmd.FailOnError(err, "Unable to create key policy") cmd.FailOnError(err, "Unable to create key policy")

View File

@ -22,8 +22,6 @@ import (
"github.com/letsencrypt/boulder/wfe2" "github.com/letsencrypt/boulder/wfe2"
) )
const clientName = "WFE2"
type config struct { type config struct {
WFE struct { WFE struct {
cmd.ServiceConfig cmd.ServiceConfig
@ -103,7 +101,7 @@ func main() {
scope, logger := cmd.StatsAndLogging(c.Syslog) scope, logger := cmd.StatsAndLogging(c.Syslog)
defer logger.AuditPanic() defer logger.AuditPanic()
logger.Info(cmd.VersionString(clientName)) logger.Info(cmd.VersionString())
kp, err := goodkey.NewKeyPolicy("") // don't load any weak keys kp, err := goodkey.NewKeyPolicy("") // don't load any weak keys
cmd.FailOnError(err, "Unable to create key policy") cmd.FailOnError(err, "Unable to create key policy")

View File

@ -356,8 +356,6 @@ func (ds durationSlice) Swap(a, b int) {
ds[a], ds[b] = ds[b], ds[a] ds[a], ds[b] = ds[b], ds[a]
} }
const clientName = "ExpirationMailer"
type config struct { type config struct {
Mailer struct { Mailer struct {
cmd.ServiceConfig cmd.ServiceConfig
@ -409,7 +407,7 @@ func main() {
scope, logger := cmd.StatsAndLogging(c.Syslog) scope, logger := cmd.StatsAndLogging(c.Syslog)
defer logger.AuditPanic() defer logger.AuditPanic()
logger.Info(cmd.VersionString(clientName)) logger.Info(cmd.VersionString())
if *certLimit > 0 { if *certLimit > 0 {
c.Mailer.CertLimit = *certLimit c.Mailer.CertLimit = *certLimit

View File

@ -21,8 +21,6 @@ import (
"github.com/letsencrypt/boulder/sa" "github.com/letsencrypt/boulder/sa"
) )
const clientName = "ExpiredAuthzPurger"
type eapConfig struct { type eapConfig struct {
ExpiredAuthzPurger struct { ExpiredAuthzPurger struct {
cmd.DBConfig cmd.DBConfig
@ -151,7 +149,7 @@ func main() {
// Set up logging // Set up logging
scope, auditlogger := cmd.StatsAndLogging(config.ExpiredAuthzPurger.Syslog) scope, auditlogger := cmd.StatsAndLogging(config.ExpiredAuthzPurger.Syslog)
auditlogger.Info(cmd.VersionString(clientName)) auditlogger.Info(cmd.VersionString())
defer auditlogger.AuditPanic() defer auditlogger.AuditPanic()

View File

@ -173,7 +173,7 @@ as generated by Boulder's single-ocsp command.
scope, logger := cmd.StatsAndLogging(c.Syslog) scope, logger := cmd.StatsAndLogging(c.Syslog)
defer logger.AuditPanic() defer logger.AuditPanic()
logger.Info(cmd.VersionString("ocsp-responder")) logger.Info(cmd.VersionString())
config := c.OCSPResponder config := c.OCSPResponder
var source cfocsp.Source var source cfocsp.Source

View File

@ -707,8 +707,6 @@ func newLog(logConfig cmd.LogDescription) (*ctLog, error) {
return &ctLog{logID: logID, key: logConfig.Key, uri: logConfig.URI}, nil return &ctLog{logID: logID, key: logConfig.Key, uri: logConfig.URI}, nil
} }
const clientName = "OCSP"
type config struct { type config struct {
OCSPUpdater cmd.OCSPUpdaterConfig OCSPUpdater cmd.OCSPUpdaterConfig
@ -771,7 +769,7 @@ func main() {
scope, auditlogger := cmd.StatsAndLogging(c.Syslog) scope, auditlogger := cmd.StatsAndLogging(c.Syslog)
defer auditlogger.AuditPanic() defer auditlogger.AuditPanic()
auditlogger.Info(cmd.VersionString(clientName)) auditlogger.Info(cmd.VersionString())
// Configure DB // Configure DB
dbURL, err := conf.DBConfig.URL() dbURL, err := conf.DBConfig.URL()

View File

@ -54,7 +54,7 @@ import (
func init() { func init() {
for _, v := range os.Args { for _, v := range os.Args {
if v == "--version" || v == "-version" { if v == "--version" || v == "-version" {
fmt.Println(VersionString(os.Args[0])) fmt.Println(VersionString())
os.Exit(0) os.Exit(0)
} }
} }
@ -251,7 +251,8 @@ func ReadConfigFile(filename string, out interface{}) error {
} }
// VersionString produces a friendly Application version string. // VersionString produces a friendly Application version string.
func VersionString(name string) string { func VersionString() string {
name := path.Base(os.Args[0])
return fmt.Sprintf("Versions: %s=(%s %s) Golang=(%s) BuildHost=(%s)", name, core.GetBuildID(), core.GetBuildTime(), runtime.Version(), core.GetBuildHost()) return fmt.Sprintf("Versions: %s=(%s %s) Golang=(%s) BuildHost=(%s)", name, core.GetBuildID(), core.GetBuildTime(), runtime.Version(), core.GetBuildHost())
} }

View File

@ -126,8 +126,8 @@ func TestVersionString(t *testing.T) {
core.BuildTime = "RightNow!" core.BuildTime = "RightNow!"
core.BuildHost = "Localhost" core.BuildHost = "Localhost"
versionStr := VersionString("test") versionStr := VersionString()
expected := fmt.Sprintf("Versions: test=(TestBuildID RightNow!) Golang=(%s) BuildHost=(Localhost)", runtime.Version()) expected := fmt.Sprintf("Versions: cmd.test=(TestBuildID RightNow!) Golang=(%s) BuildHost=(Localhost)", runtime.Version())
test.AssertEquals(t, versionStr, expected) test.AssertEquals(t, versionStr, expected)
} }