All checks were successful
Vulncheck / Vulncheck (push) Successful in 1m3s
Pre-commit hooks / Pre-commit (push) Successful in 1m29s
Build / Build Components (push) Successful in 2m2s
Tests and linters / Run gofumpt (push) Successful in 3m19s
Tests and linters / Lint (push) Successful in 3m32s
Tests and linters / gopls check (push) Successful in 3m29s
Tests and linters / Staticcheck (push) Successful in 3m50s
Tests and linters / Tests (push) Successful in 4m3s
Tests and linters / Tests with -race (push) Successful in 4m15s
OCI image / Build container images (push) Successful in 4m43s
There should be no `grpcs://` prefix in address and credentials should be picked. Change-Id: I58cdc98b079eac2c7db7dc088f4f131794a91b9f Signed-off-by: Evgenii Stratonikov <e.stratonikov@yadro.com>
68 lines
1.9 KiB
Go
68 lines
1.9 KiB
Go
package tree
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"fmt"
|
|
|
|
"git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-cli/internal/common"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-node/cmd/frostfs-cli/internal/commonflags"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-node/pkg/network"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-node/pkg/services/tree"
|
|
tracing "git.frostfs.info/TrueCloudLab/frostfs-observability/tracing/grpc"
|
|
"git.frostfs.info/TrueCloudLab/frostfs-sdk-go/api/rpc/client"
|
|
"github.com/spf13/cobra"
|
|
"github.com/spf13/viper"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/credentials"
|
|
"google.golang.org/grpc/credentials/insecure"
|
|
)
|
|
|
|
// _client returns grpc Tree service client. Should be removed
|
|
// after making Tree API public.
|
|
func _client() (tree.TreeServiceClient, error) {
|
|
var netAddr network.Address
|
|
|
|
rpcEndpoint := viper.GetString(commonflags.RPC)
|
|
if rpcEndpoint == "" {
|
|
return nil, fmt.Errorf("%s is not defined", commonflags.RPC)
|
|
}
|
|
|
|
err := netAddr.FromString(rpcEndpoint)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
host, isTLS, err := client.ParseURI(netAddr.URIAddr())
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
creds := insecure.NewCredentials()
|
|
if isTLS {
|
|
creds = credentials.NewTLS(&tls.Config{})
|
|
}
|
|
|
|
opts := []grpc.DialOption{
|
|
grpc.WithChainUnaryInterceptor(
|
|
tracing.NewUnaryClientInterceptor(),
|
|
),
|
|
grpc.WithChainStreamInterceptor(
|
|
tracing.NewStreamClientInterceptor(),
|
|
),
|
|
grpc.WithDefaultCallOptions(grpc.WaitForReady(true)),
|
|
grpc.WithDisableServiceConfig(),
|
|
grpc.WithTransportCredentials(creds),
|
|
}
|
|
|
|
cc, err := grpc.NewClient(host, opts...)
|
|
return tree.NewTreeServiceClient(cc), err
|
|
}
|
|
|
|
func contextWithTimeout(cmd *cobra.Command) (context.Context, context.CancelFunc) {
|
|
if timeout := viper.GetDuration(commonflags.Timeout); timeout > 0 {
|
|
common.PrintVerbose(cmd, "Set request timeout to %s.", timeout)
|
|
return context.WithTimeout(cmd.Context(), timeout)
|
|
}
|
|
return context.WithTimeout(cmd.Context(), commonflags.TimeoutDefault)
|
|
}
|