mirror of
https://github.com/Oxalide/vsphere-influxdb-go.git
synced 2023-10-10 13:36:51 +02:00
104 lines
2.8 KiB
Go
104 lines
2.8 KiB
Go
|
package subscriber
|
||
|
|
||
|
import (
|
||
|
"errors"
|
||
|
"fmt"
|
||
|
"os"
|
||
|
"path/filepath"
|
||
|
"time"
|
||
|
|
||
|
"github.com/influxdata/influxdb/monitor/diagnostics"
|
||
|
"github.com/influxdata/influxdb/toml"
|
||
|
)
|
||
|
|
||
|
const (
|
||
|
// DefaultHTTPTimeout is the default HTTP timeout for a Config.
|
||
|
DefaultHTTPTimeout = 30 * time.Second
|
||
|
|
||
|
// DefaultWriteConcurrency is the default write concurrency for a Config.
|
||
|
DefaultWriteConcurrency = 40
|
||
|
|
||
|
// DefaultWriteBufferSize is the default write buffer size for a Config.
|
||
|
DefaultWriteBufferSize = 1000
|
||
|
)
|
||
|
|
||
|
// Config represents a configuration of the subscriber service.
|
||
|
type Config struct {
|
||
|
// Whether to enable to Subscriber service
|
||
|
Enabled bool `toml:"enabled"`
|
||
|
|
||
|
HTTPTimeout toml.Duration `toml:"http-timeout"`
|
||
|
|
||
|
// InsecureSkipVerify gets passed to the http client, if true, it will
|
||
|
// skip https certificate verification. Defaults to false
|
||
|
InsecureSkipVerify bool `toml:"insecure-skip-verify"`
|
||
|
|
||
|
// configure the path to the PEM encoded CA certs file. If the
|
||
|
// empty string, the default system certs will be used
|
||
|
CaCerts string `toml:"ca-certs"`
|
||
|
|
||
|
// The number of writer goroutines processing the write channel.
|
||
|
WriteConcurrency int `toml:"write-concurrency"`
|
||
|
|
||
|
// The number of in-flight writes buffered in the write channel.
|
||
|
WriteBufferSize int `toml:"write-buffer-size"`
|
||
|
}
|
||
|
|
||
|
// NewConfig returns a new instance of a subscriber config.
|
||
|
func NewConfig() Config {
|
||
|
return Config{
|
||
|
Enabled: true,
|
||
|
HTTPTimeout: toml.Duration(DefaultHTTPTimeout),
|
||
|
InsecureSkipVerify: false,
|
||
|
CaCerts: "",
|
||
|
WriteConcurrency: DefaultWriteConcurrency,
|
||
|
WriteBufferSize: DefaultWriteBufferSize,
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// Validate returns an error if the config is invalid.
|
||
|
func (c Config) Validate() error {
|
||
|
if c.HTTPTimeout <= 0 {
|
||
|
return errors.New("http-timeout must be greater than 0")
|
||
|
}
|
||
|
|
||
|
if c.CaCerts != "" && !fileExists(c.CaCerts) {
|
||
|
abspath, err := filepath.Abs(c.CaCerts)
|
||
|
if err != nil {
|
||
|
return fmt.Errorf("ca-certs file %s does not exist. Wrapped Error: %v", c.CaCerts, err)
|
||
|
}
|
||
|
return fmt.Errorf("ca-certs file %s does not exist", abspath)
|
||
|
}
|
||
|
|
||
|
if c.WriteBufferSize <= 0 {
|
||
|
return errors.New("write-buffer-size must be greater than 0")
|
||
|
}
|
||
|
|
||
|
if c.WriteConcurrency <= 0 {
|
||
|
return errors.New("write-concurrency must be greater than 0")
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
func fileExists(fileName string) bool {
|
||
|
info, err := os.Stat(fileName)
|
||
|
return err == nil && !info.IsDir()
|
||
|
}
|
||
|
|
||
|
// Diagnostics returns a diagnostics representation of a subset of the Config.
|
||
|
func (c Config) Diagnostics() (*diagnostics.Diagnostics, error) {
|
||
|
if !c.Enabled {
|
||
|
return diagnostics.RowFromMap(map[string]interface{}{
|
||
|
"enabled": false,
|
||
|
}), nil
|
||
|
}
|
||
|
|
||
|
return diagnostics.RowFromMap(map[string]interface{}{
|
||
|
"enabled": true,
|
||
|
"http-timeout": c.HTTPTimeout,
|
||
|
"write-concurrency": c.WriteConcurrency,
|
||
|
"write-buffer-size": c.WriteBufferSize,
|
||
|
}), nil
|
||
|
}
|