Documentation ¶
Index ¶
- Constants
- func CheckTimeout(ctx context.Context, err error) error
- func DialSocket(ctx context.Context, socketName string) (*grpc.ClientConn, error)
- func DisplayVersion() string
- func GetExe() string
- func Retry(c context.Context, text string, f func(context.Context) error, ...) error
- func RunError(err error) error
- func Semver() semver.Version
- func SetExe(executable string)
- func SocketExists(path string) bool
- func SocketURL(socket string) string
- func Version() string
- func WaitUntilSocketAppears(name, path string, ttw time.Duration) (err error)
- func WaitUntilSocketVanishes(name, path string, ttw time.Duration) (err error)
- func WithEnsuredState(ctx context.Context, r EnsuredState, retain bool, f func() error) (err error)
- func WrapRecvErr(err error, msg string) error
- type Config
- type EnsuredState
- type Env
- type LogLevels
- type RecvEOF
- type Scout
- type ScoutMeta
- type TimeoutID
- type Timeouts
Constants ¶
const ( // ConnectorSocketName is the path used when communicating to the connector process ConnectorSocketName = "/tmp/telepresence-connector.socket" // DaemonSocketName is the path used when communicating to the daemon process DaemonSocketName = "/var/run/telepresence-daemon.socket" )
const (
// APIVersion is the API version of the daemon and connector API
APIVersion = 3
)
Variables ¶
This section is empty.
Functions ¶
func DialSocket ¶
DialSocket dials the given unix socket and returns the resulting connection
func DisplayVersion ¶
func DisplayVersion() string
DisplayVersion returns a printable version for `telepresence`
func Retry ¶
func Retry(c context.Context, text string, f func(context.Context) error, durations ...time.Duration) error
Retry will run the given function repeatedly with an increasing delay until it returns without error.
The function takes 0 to 2 durations with the following meaning
Delay - initial delay, i.e. the delay between the first and the second call. MaxDelay - maximum delay between calling the functions (delay will never grow beyond this value)
func RunError ¶
RunError checks if the given err is a *exit.ExitError, and if so, extracts Stderr and the ExitCode from it.
func SetExe ¶
func SetExe(executable string)
SetExe defines the name of the executable (for testing purposes only)
func SocketExists ¶
SocketExists returns true if a socket is found at the given path
func SocketURL ¶
SocketURL returns the URL that corresponds to the given unix socket filesystem path.
func WaitUntilSocketAppears ¶
WaitUntilSocketAppears waits until the socket at the given path comes into existence and returns when that happens. The wait will be max ttw (time to wait) long. An error is returned if that time is exceeded before the socket is removed.
func WaitUntilSocketVanishes ¶
WaitUntilSocketVanishes waits until the socket at the given path is removed and returns when that happens. The wait will be max ttw (time to wait) long. An error is returned if that time is exceeded before the socket is removed.
func WithEnsuredState ¶
WithEnsuredState ensures the given state, calls the function, and then, if the state was activated, it is deactivated unless the retain flag is true.
func WrapRecvErr ¶ added in v2.3.3
WrapRecvErr wraps an error from a Recv call. If the error is nil, nil is returned. If the error indicates that the remote end has , a RecvEOF wrapping the error will be returned. Otherwise, the original error will be wrapped as fmt.Errorf("%s: %w", msg, err)
Types ¶
type Config ¶ added in v2.1.2
type Config struct { Timeouts Timeouts `json:"timeouts,omitempty"` LogLevels LogLevels `json:"logLevels,omitempty"` }
func GetConfig ¶ added in v2.1.2
GetConfig returns the Telepresence configuration as stored in filelocation.AppUserConfigDir or filelocation.AppSystemConfigDirs
func (*Config) UnmarshalYAML ¶ added in v2.1.2
type EnsuredState ¶
type EnsuredState interface { // EnsureState will check if the state is active and activate it if that is not the case. // The boolean return value indicates if the state was activated or not. EnsureState(ctx context.Context) (bool, error) // Deactivate the state (i.e. quit, remove, disconnect) DeactivateState(ctx context.Context) error }
An EnsuredState represents some state that is needed in order for a function to execute.
type Env ¶
type Env struct { // I'd like to set TELEPRESENCE_LOGIN_DOMAIN,default=auth.datawire.io, but // sethvargo/go-envconfig doesn't support filling in the default for our later references to // it in following settings, so we have to do the hack with maybeSetDefault below. *sigh* I // guess I'm just spoiled by apro/cmd/amb-sidecar/types/internal/envconfig. LoginDomain string `env:"TELEPRESENCE_LOGIN_DOMAIN,required"` LoginAuthURL string `env:"TELEPRESENCE_LOGIN_AUTH_URL,default=https://${TELEPRESENCE_LOGIN_DOMAIN}/auth"` LoginTokenURL string `env:"TELEPRESENCE_LOGIN_TOKEN_URL,default=https://${TELEPRESENCE_LOGIN_DOMAIN}/token"` LoginCompletionURL string `env:"TELEPRESENCE_LOGIN_COMPLETION_URL,default=https://${TELEPRESENCE_LOGIN_DOMAIN}/completion"` LoginClientID string `env:"TELEPRESENCE_LOGIN_CLIENT_ID,default=telepresence-cli"` UserInfoURL string `env:"TELEPRESENCE_USER_INFO_URL,default=https://${TELEPRESENCE_LOGIN_DOMAIN}/api/userinfo"` Registry string `env:"TELEPRESENCE_REGISTRY,default=docker.io/datawire"` AgentImage string `env:"TELEPRESENCE_AGENT_IMAGE,default="` ManagerNamespace string `env:"TELEPRESENCE_MANAGER_NAMESPACE,default=ambassador"` SystemAHost string `env:"SYSTEMA_HOST,default=app.getambassador.io"` SystemAPort string `env:"SYSTEMA_PORT,default=443"` }
type LogLevels ¶ added in v2.3.0
type LogLevels struct { UserDaemon logrus.Level `json:"userDaemon,omitempty"` RootDaemon logrus.Level `json:"rootDaemon,omitempty"` }
func (*LogLevels) UnmarshalYAML ¶ added in v2.3.0
UnmarshalYAML parses the logrus log-levels
type RecvEOF ¶ added in v2.3.3
type RecvEOF struct {
// contains filtered or unexported fields
}
RecvEOF should be returned when a component has returned EOF from a stream. Do not use this if, for example, the initial dial to a stream fails.
type Scout ¶
Scout is a Metriton reported
func NewScout ¶
NewScout creates a new initialized Scout instance that can be used to send telepresence reports to Metriton
func (*Scout) Report ¶
Report constructs and sends a report. It includes the fixed (growing) set of metadata in the Scout structure and the pairs passed as arguments to this call. It also includes and increments the index, which can be used to determine the correct order of reported events for this installation attempt (correlated by the trace_id set at the start).
func (*Scout) SetMetadatum ¶
SetMetadatum associates the given key with the given value in the metadata of this instance. It's an error if the key already exists.
type ScoutMeta ¶
type ScoutMeta struct { Key string Value interface{} }
ScoutMeta is a key/value association used when reporting
type Timeouts ¶ added in v2.1.2
type Timeouts struct { // PrivateAgentInstall is how long to wait for an agent to be installed (i.e. apply of service and deploy manifests) PrivateAgentInstall time.Duration `json:"agentInstall,omitempty"` // PrivateApply is how long to wait for a k8s manifest to be applied PrivateApply time.Duration `json:"apply,omitempty"` // PrivateClusterConnect is the maximum time to wait for a connection to the cluster to be established PrivateClusterConnect time.Duration `json:"clusterConnect,omitempty"` // PrivateIntercept is the time to wait for an intercept after the agents has been installed PrivateIntercept time.Duration `json:"intercept,omitempty"` // PrivateProxyDial is how long to wait for the proxy to establish an outbound connection PrivateProxyDial time.Duration `json:"proxyDial,omitempty"` // PrivateTrafficManagerConnect is how long to wait for the traffic-manager API to connect PrivateTrafficManagerAPI time.Duration `json:"trafficManagerAPI,omitempty"` // PrivateTrafficManagerConnect is how long to wait for the initial port-forwards to the traffic-manager PrivateTrafficManagerConnect time.Duration `json:"trafficManagerConnect,omitempty"` }
func (Timeouts) TimeoutContext ¶ added in v2.3.0
func (*Timeouts) UnmarshalYAML ¶ added in v2.1.2
UnmarshalYAML caters for the unfortunate fact that time.Duration doesn't do YAML or JSON at all.