mirror of https://github.com/hashicorp/consul
203 lines
5.7 KiB
Go
203 lines
5.7 KiB
Go
package pbpeering
|
|
|
|
import "time"
|
|
|
|
// TODO(peering): These are byproducts of not embedding
|
|
// types in our protobuf definitions and are temporary;
|
|
// Hoping to replace them with 1 or 2 methods per request
|
|
// using https://github.com/hashicorp/consul/pull/12507
|
|
|
|
func (msg *PeeringReadRequest) RequestDatacenter() string {
|
|
return msg.Datacenter
|
|
}
|
|
|
|
func (msg *PeeringReadRequest) IsRead() bool {
|
|
return true
|
|
}
|
|
|
|
func (msg *PeeringReadRequest) AllowStaleRead() bool {
|
|
return false
|
|
}
|
|
|
|
func (msg *PeeringReadRequest) TokenSecret() string {
|
|
return ""
|
|
}
|
|
|
|
func (msg *PeeringReadRequest) SetTokenSecret(s string) {
|
|
return
|
|
}
|
|
|
|
func (msg *PeeringReadRequest) HasTimedOut(start time.Time, rpcHoldTimeout, maxQueryTime, defaultQueryTime time.Duration) (bool, error) {
|
|
return time.Since(start) > rpcHoldTimeout, nil
|
|
}
|
|
|
|
// Timeout implements structs.RPCInfo
|
|
func (msg *PeeringReadRequest) Timeout(rpcHoldTimeout time.Duration, maxQueryTime time.Duration, defaultQueryTime time.Duration) time.Duration {
|
|
return rpcHoldTimeout
|
|
}
|
|
|
|
func (msg *PeeringListRequest) RequestDatacenter() string {
|
|
return msg.Datacenter
|
|
}
|
|
|
|
func (msg *PeeringListRequest) IsRead() bool {
|
|
return true
|
|
}
|
|
|
|
func (msg *PeeringListRequest) AllowStaleRead() bool {
|
|
return false
|
|
}
|
|
|
|
func (msg *PeeringListRequest) TokenSecret() string {
|
|
return ""
|
|
}
|
|
|
|
func (msg *PeeringListRequest) SetTokenSecret(s string) {
|
|
return
|
|
}
|
|
|
|
func (msg *PeeringListRequest) HasTimedOut(start time.Time, rpcHoldTimeout, maxQueryTime, defaultQueryTime time.Duration) (bool, error) {
|
|
return time.Since(start) > rpcHoldTimeout, nil
|
|
}
|
|
|
|
// Timeout implements structs.RPCInfo
|
|
func (msg *PeeringListRequest) Timeout(rpcHoldTimeout time.Duration, maxQueryTime time.Duration, defaultQueryTime time.Duration) time.Duration {
|
|
return rpcHoldTimeout
|
|
}
|
|
|
|
func (msg *PeeringWriteRequest) RequestDatacenter() string {
|
|
return msg.Datacenter
|
|
}
|
|
|
|
func (msg *PeeringWriteRequest) IsRead() bool {
|
|
return false
|
|
}
|
|
|
|
func (msg *PeeringWriteRequest) AllowStaleRead() bool {
|
|
return false
|
|
}
|
|
|
|
func (msg *PeeringWriteRequest) TokenSecret() string {
|
|
return ""
|
|
}
|
|
|
|
func (msg *PeeringWriteRequest) SetTokenSecret(s string) {
|
|
return
|
|
}
|
|
|
|
func (msg *PeeringWriteRequest) HasTimedOut(start time.Time, rpcHoldTimeout, maxQueryTime, defaultQueryTime time.Duration) (bool, error) {
|
|
return time.Since(start) > rpcHoldTimeout, nil
|
|
}
|
|
|
|
// Timeout implements structs.RPCInfo
|
|
func (msg *PeeringWriteRequest) Timeout(rpcHoldTimeout time.Duration, maxQueryTime time.Duration, defaultQueryTime time.Duration) time.Duration {
|
|
return rpcHoldTimeout
|
|
}
|
|
|
|
func (msg *PeeringDeleteRequest) RequestDatacenter() string {
|
|
return msg.Datacenter
|
|
}
|
|
|
|
func (msg *PeeringDeleteRequest) IsRead() bool {
|
|
return false
|
|
}
|
|
|
|
func (msg *PeeringDeleteRequest) AllowStaleRead() bool {
|
|
return false
|
|
}
|
|
|
|
func (msg *PeeringDeleteRequest) TokenSecret() string {
|
|
return ""
|
|
}
|
|
|
|
func (msg *PeeringDeleteRequest) SetTokenSecret(s string) {
|
|
return
|
|
}
|
|
|
|
func (msg *PeeringDeleteRequest) HasTimedOut(start time.Time, rpcHoldTimeout, maxQueryTime, defaultQueryTime time.Duration) (bool, error) {
|
|
return time.Since(start) > rpcHoldTimeout, nil
|
|
}
|
|
|
|
// Timeout implements structs.RPCInfo
|
|
func (msg *PeeringDeleteRequest) Timeout(rpcHoldTimeout time.Duration, maxQueryTime time.Duration, defaultQueryTime time.Duration) time.Duration {
|
|
return rpcHoldTimeout
|
|
}
|
|
|
|
// RequestDatacenter implements structs.RPCInfo
|
|
func (req *GenerateTokenRequest) RequestDatacenter() string {
|
|
return req.Datacenter
|
|
}
|
|
|
|
// IsRead implements structs.RPCInfo
|
|
func (req *GenerateTokenRequest) IsRead() bool {
|
|
return false
|
|
}
|
|
|
|
// AllowStaleRead implements structs.RPCInfo
|
|
func (req *GenerateTokenRequest) AllowStaleRead() bool {
|
|
return false
|
|
}
|
|
|
|
// TokenSecret implements structs.RPCInfo
|
|
func (req *GenerateTokenRequest) TokenSecret() string {
|
|
return req.Token
|
|
}
|
|
|
|
// SetTokenSecret implements structs.RPCInfo
|
|
func (req *GenerateTokenRequest) SetTokenSecret(token string) {
|
|
req.Token = token
|
|
}
|
|
|
|
// HasTimedOut implements structs.RPCInfo
|
|
func (req *GenerateTokenRequest) HasTimedOut(start time.Time, rpcHoldTimeout, _, _ time.Duration) (bool, error) {
|
|
return time.Since(start) > rpcHoldTimeout, nil
|
|
}
|
|
|
|
// Timeout implements structs.RPCInfo
|
|
func (msg *GenerateTokenRequest) Timeout(rpcHoldTimeout time.Duration, maxQueryTime time.Duration, defaultQueryTime time.Duration) time.Duration {
|
|
return rpcHoldTimeout
|
|
}
|
|
|
|
// RequestDatacenter implements structs.RPCInfo
|
|
func (req *InitiateRequest) RequestDatacenter() string {
|
|
return req.Datacenter
|
|
}
|
|
|
|
// IsRead implements structs.RPCInfo
|
|
func (req *InitiateRequest) IsRead() bool {
|
|
return false
|
|
}
|
|
|
|
// AllowStaleRead implements structs.RPCInfo
|
|
func (req *InitiateRequest) AllowStaleRead() bool {
|
|
return false
|
|
}
|
|
|
|
// TokenSecret implements structs.RPCInfo
|
|
func (req *InitiateRequest) TokenSecret() string {
|
|
return req.Token
|
|
}
|
|
|
|
// SetTokenSecret implements structs.RPCInfo
|
|
func (req *InitiateRequest) SetTokenSecret(token string) {
|
|
req.Token = token
|
|
}
|
|
|
|
// HasTimedOut implements structs.RPCInfo
|
|
func (req *InitiateRequest) HasTimedOut(start time.Time, rpcHoldTimeout, _, _ time.Duration) (bool, error) {
|
|
return time.Since(start) > rpcHoldTimeout, nil
|
|
}
|
|
|
|
// Timeout implements structs.RPCInfo
|
|
func (msg *InitiateRequest) Timeout(rpcHoldTimeout time.Duration, maxQueryTime time.Duration, defaultQueryTime time.Duration) time.Duration {
|
|
return rpcHoldTimeout
|
|
}
|
|
|
|
// ShouldDial returns true when the peering was stored via the peering initiation endpoint,
|
|
// AND the peering is not marked as terminated by our peer.
|
|
// If we generated a token for this peer we did not store our server addresses under PeerServerAddresses.
|
|
// These server addresses are for dialing, and only the peer initiating the peering will do the dialing.
|
|
func (p *Peering) ShouldDial() bool {
|
|
return len(p.PeerServerAddresses) > 0 && p.State != PeeringState_TERMINATED
|
|
}
|