forked from criteo/blackbox-prober
-
Notifications
You must be signed in to change notification settings - Fork 0
/
discovery.go
75 lines (66 loc) · 2.58 KB
/
discovery.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
package main
import (
"fmt"
"os"
as "github.com/aerospike/aerospike-client-go"
"github.com/criteo/blackbox-prober/pkg/discovery"
"github.com/criteo/blackbox-prober/pkg/topology"
"github.com/criteo/blackbox-prober/pkg/utils"
"github.com/go-kit/log"
)
func (conf AerospikeProbeConfig) generateAerospikeEndpointFromEntry(logger log.Logger, entry discovery.ServiceEntry) (*AerospikeEndpoint, error) {
authEnabled := conf.AerospikeEndpointConfig.AuthEnabled
var (
username string
password string
tlsHostname string
ok bool
)
if authEnabled {
username, ok = os.LookupEnv(conf.AerospikeEndpointConfig.UsernameEnv)
if !ok {
return nil, fmt.Errorf("error: username not found in env (%s)", conf.AerospikeEndpointConfig.UsernameEnv)
}
password, ok = os.LookupEnv(conf.AerospikeEndpointConfig.PasswordEnv)
if !ok {
return nil, fmt.Errorf("error: password not found in env (%s)", conf.AerospikeEndpointConfig.PasswordEnv)
}
}
tlsEnabled := utils.Contains(entry.Tags, conf.AerospikeEndpointConfig.TLSTag)
if tlsEnabled {
hostname, ok := entry.Meta[conf.AerospikeEndpointConfig.TLSHostnameMetaKey]
if ok {
tlsHostname = hostname
}
}
return &AerospikeEndpoint{Name: entry.Address, Config: AerospikeClientConfig{
// auth
authEnabled: authEnabled,
authExternal: conf.AerospikeEndpointConfig.AuthExternal,
username: username,
password: password,
// tls
tlsEnabled: tlsEnabled,
tlsHostname: tlsHostname,
tlsSkipVerify: conf.AerospikeEndpointConfig.TLSSkipVerify,
// Contact point
host: as.Host{Name: entry.Address, TLSName: tlsHostname, Port: entry.Port}},
Logger: log.With(logger, "endpoint_name", entry.Address),
}, nil
}
func (conf AerospikeProbeConfig) generateNodeFromEntry(logger log.Logger, entry discovery.ServiceEntry) (topology.ProbeableEndpoint, error) {
return conf.generateAerospikeEndpointFromEntry(logger, entry)
}
func (conf AerospikeProbeConfig) generateClusterFromEntries(logger log.Logger, entries []discovery.ServiceEntry) (topology.ProbeableEndpoint, error) {
endpoint, err := conf.generateAerospikeEndpointFromEntry(logger, entries[0])
if err != nil {
return endpoint, err
}
endpoint.Name = entries[0].Meta[conf.DiscoveryConfig.MetaClusterKey]
endpoint.Logger = log.With(logger, "endpoint_name", endpoint.Name)
endpoint.clusterLevel = true
return endpoint, nil
}
func (conf AerospikeProbeConfig) generateTopologyBuilder() func(log.Logger, []discovery.ServiceEntry) (topology.ClusterMap, error) {
return conf.DiscoveryConfig.GetGenericTopologyBuilder(conf.generateClusterFromEntries, conf.generateNodeFromEntry)
}