in internal/pkg/agent/cmd/enroll.go [172:364]
func buildEnrollmentFlags(cmd *cobra.Command, url string, token string) []string {
if url == "" {
url, _ = cmd.Flags().GetString("url")
}
if token == "" {
token, _ = cmd.Flags().GetString("enrollment-token")
}
id, _ := cmd.Flags().GetString("id")
replaceToken, _ := cmd.Flags().GetString("replace-token")
fServer, _ := cmd.Flags().GetString("fleet-server-es")
fElasticSearchCA, _ := cmd.Flags().GetString("fleet-server-es-ca")
fElasticSearchCASHA256, _ := cmd.Flags().GetString("fleet-server-es-ca-trusted-fingerprint")
fElasticSearchInsecure, _ := cmd.Flags().GetBool("fleet-server-es-insecure")
fElasticSearchClientCert, _ := cmd.Flags().GetString("fleet-server-es-cert")
fElasticSearchClientCertKey, _ := cmd.Flags().GetString("fleet-server-es-cert-key")
fServiceToken, _ := cmd.Flags().GetString("fleet-server-service-token")
fServiceTokenPath, _ := cmd.Flags().GetString("fleet-server-service-token-path")
fPolicy, _ := cmd.Flags().GetString("fleet-server-policy")
fHost, _ := cmd.Flags().GetString("fleet-server-host")
fPort, _ := cmd.Flags().GetUint16("fleet-server-port")
fCert, _ := cmd.Flags().GetString("fleet-server-cert")
fCertKey, _ := cmd.Flags().GetString("fleet-server-cert-key")
fPassphrase, _ := cmd.Flags().GetString("fleet-server-cert-key-passphrase")
fClientAuth, _ := cmd.Flags().GetString("fleet-server-client-auth")
fHeaders, _ := cmd.Flags().GetStringSlice("header")
fInsecure, _ := cmd.Flags().GetBool("fleet-server-insecure-http")
ca, _ := cmd.Flags().GetString("certificate-authorities")
cert, _ := cmd.Flags().GetString("elastic-agent-cert")
key, _ := cmd.Flags().GetString("elastic-agent-cert-key")
keyPassphrase, _ := cmd.Flags().GetString("elastic-agent-cert-key-passphrase")
sha256, _ := cmd.Flags().GetString("ca-sha256")
insecure, _ := cmd.Flags().GetBool("insecure")
staging, _ := cmd.Flags().GetString("staging")
fProxyURL, _ := cmd.Flags().GetString("proxy-url")
fProxyDisabled, _ := cmd.Flags().GetBool("proxy-disabled")
fProxyHeaders, _ := cmd.Flags().GetStringSlice("proxy-header")
delayEnroll, _ := cmd.Flags().GetBool("delay-enroll")
daemonTimeout, _ := cmd.Flags().GetDuration("daemon-timeout")
enrollTimeout, _ := cmd.Flags().GetDuration("enroll-timeout")
fTimeout, _ := cmd.Flags().GetDuration("fleet-server-timeout")
skipDaemonReload, _ := cmd.Flags().GetBool("skip-daemon-reload")
fTags, _ := cmd.Flags().GetStringSlice("tag")
args := []string{}
if url != "" {
args = append(args, "--url")
args = append(args, url)
}
if token != "" {
args = append(args, "--enrollment-token")
args = append(args, token)
}
if id != "" {
args = append(args, "--id")
args = append(args, id)
}
if replaceToken != "" {
args = append(args, "--replace-token")
args = append(args, replaceToken)
}
if fServer != "" {
args = append(args, "--fleet-server-es")
args = append(args, fServer)
}
if fElasticSearchCA != "" {
args = append(args, "--fleet-server-es-ca")
args = append(args, fElasticSearchCA)
}
if fElasticSearchCASHA256 != "" {
args = append(args, "--fleet-server-es-ca-trusted-fingerprint")
args = append(args, fElasticSearchCASHA256)
}
if fElasticSearchClientCert != "" {
args = append(args, "--fleet-server-es-cert")
args = append(args, fElasticSearchClientCert)
}
if fElasticSearchClientCertKey != "" {
args = append(args, "--fleet-server-es-cert-key")
args = append(args, fElasticSearchClientCertKey)
}
if fServiceToken != "" {
args = append(args, "--fleet-server-service-token")
args = append(args, fServiceToken)
}
if fServiceTokenPath != "" {
args = append(args, "--fleet-server-service-token-path")
args = append(args, fServiceTokenPath)
}
if fPolicy != "" {
args = append(args, "--fleet-server-policy")
args = append(args, fPolicy)
}
if fHost != "" {
args = append(args, "--fleet-server-host")
args = append(args, fHost)
}
if fPort > 0 {
args = append(args, "--fleet-server-port")
args = append(args, strconv.Itoa(int(fPort)))
}
if fCert != "" {
args = append(args, "--fleet-server-cert")
args = append(args, fCert)
}
if fCertKey != "" {
args = append(args, "--fleet-server-cert-key")
args = append(args, fCertKey)
}
if fPassphrase != "" {
args = append(args, "--fleet-server-cert-key-passphrase")
args = append(args, fPassphrase)
}
if fClientAuth != "" {
args = append(args, "--fleet-server-client-auth")
args = append(args, fClientAuth)
}
if daemonTimeout != 0 {
args = append(args, "--daemon-timeout")
args = append(args, daemonTimeout.String())
}
if enrollTimeout != 0 {
args = append(args, "--enroll-timeout")
args = append(args, enrollTimeout.String())
}
if fTimeout != 0 {
args = append(args, "--fleet-server-timeout")
args = append(args, fTimeout.String())
}
for k, v := range mapFromEnvList(fHeaders) {
args = append(args, "--header")
args = append(args, k+"="+v)
}
if fInsecure {
args = append(args, "--fleet-server-insecure-http")
}
if ca != "" {
args = append(args, "--certificate-authorities")
args = append(args, ca)
}
if cert != "" {
args = append(args, "--elastic-agent-cert")
args = append(args, cert)
}
if key != "" {
args = append(args, "--elastic-agent-cert-key")
args = append(args, key)
}
if keyPassphrase != "" {
args = append(args, "--elastic-agent-cert-key-passphrase")
args = append(args, keyPassphrase)
}
if sha256 != "" {
args = append(args, "--ca-sha256")
args = append(args, sha256)
}
if insecure {
args = append(args, "--insecure")
}
if staging != "" {
args = append(args, "--staging")
args = append(args, staging)
}
if fProxyURL != "" {
args = append(args, "--proxy-url")
args = append(args, fProxyURL)
}
if fProxyDisabled {
args = append(args, "--proxy-disabled")
args = append(args, "true")
}
for k, v := range mapFromEnvList(fProxyHeaders) {
args = append(args, "--proxy-header")
args = append(args, k+"="+v)
}
if delayEnroll {
args = append(args, "--delay-enroll")
}
if fElasticSearchInsecure {
args = append(args, "--fleet-server-es-insecure")
}
if skipDaemonReload {
args = append(args, "--skip-daemon-reload")
}
for _, v := range fTags {
args = append(args, "--tag", v)
}
return args
}