func New(cfg config.Config) *Server { m := machine.New(cfg.BootId, cfg.PublicIP, cfg.Metadata()) m.RefreshState() regClient := etcd.NewClient(cfg.EtcdServers) regClient.SetConsistency(etcd.STRONG_CONSISTENCY) r := registry.New(regClient) eb := event.NewEventBus() eb.Listen() eventClient := etcd.NewClient(cfg.EtcdServers) eventClient.SetConsistency(etcd.STRONG_CONSISTENCY) es := registry.NewEventStream(eventClient, r) var verifier *sign.SignatureVerifier if cfg.VerifyUnits { var err error verifier, err = sign.NewSignatureVerifierFromAuthorizedKeysFile(cfg.AuthorizedKeysFile) if err != nil { log.Errorln("Failed to get any key from authorized key file in verify_units mode:", err) verifier = sign.NewSignatureVerifier() } } a, err := agent.New(r, eb, m, cfg.AgentTTL, cfg.UnitPrefix, verifier) if err != nil { //TODO: return this as an error object rather than panicking panic(err) } e := engine.New(r, eb, m) return &Server{a, e, m, r, eb, es} }
func New(cfg config.Config) *Server { m := machine.New(cfg.BootId, cfg.PublicIP, cfg.Metadata()) m.RefreshState() regClient := etcd.NewClient(cfg.EtcdServers) regClient.SetConsistency(etcd.STRONG_CONSISTENCY) r := registry.New(regClient) eb := event.NewEventBus() eb.Listen() eventClient := etcd.NewClient(cfg.EtcdServers) eventClient.SetConsistency(etcd.STRONG_CONSISTENCY) es := registry.NewEventStream(eventClient) a, err := agent.New(r, eb, m, cfg.AgentTTL, cfg.UnitPrefix) if err != nil { //TODO: return this as an error object rather than panicking panic(err) } e := engine.New(r, eb, m) return &Server{a, e, m, r, eb, es} }
func newEngineFromConfig(mach *machine.Machine, cfg config.Config) (*engine.Engine, error) { regClient := etcd.NewClient(cfg.EtcdServers) regClient.SetConsistency(etcd.STRONG_CONSISTENCY) reg := registry.New(regClient, cfg.EtcdKeyPrefix) eClient := etcd.NewClient(cfg.EtcdServers) eClient.SetConsistency(etcd.STRONG_CONSISTENCY) eStream, err := registry.NewEventStream(eClient, reg) if err != nil { return nil, err } return engine.New(reg, eStream, mach), nil }
func getRegistry() *registry.Registry { tun := getTunnelFlag() endpoint := getEndpointFlag() machines := []string{endpoint} client := etcd.NewClient(machines) if tun != "" { sshClient, err := ssh.NewSSHClient("core", tun, getChecker(), false) if err != nil { log.Fatalf("Failed initializing SSH client: %v", err) } dial := func(network, addr string) (net.Conn, error) { tcpaddr, err := net.ResolveTCPAddr(network, addr) if err != nil { return nil, err } return sshClient.DialTCP(network, nil, tcpaddr) } tr := http.Transport{ Dial: dial, TLSClientConfig: &tls.Config{ InsecureSkipVerify: true, }, } client.SetTransport(&tr) } return registry.New(client) }
// getRegistry initializes a connection to the Registry func getRegistry() registry.Registry { tun := getTunnelFlag() machines := []string{globalFlags.Endpoint} client := etcd.NewClient(machines) if tun != "" { sshClient, err := ssh.NewSSHClient("core", tun, getChecker(), false) if err != nil { fmt.Fprintf(os.Stderr, "Failed initializing SSH client: %v\n", err) os.Exit(1) } dial := func(network, addr string) (net.Conn, error) { tcpaddr, err := net.ResolveTCPAddr(network, addr) if err != nil { return nil, err } return sshClient.DialTCP(network, nil, tcpaddr) } tr := http.Transport{ Dial: dial, TLSClientConfig: &tls.Config{ InsecureSkipVerify: true, }, } client.SetTransport(&tr) } return registry.New(client, globalFlags.EtcdKeyPrefix) }
func getRegistry(context *cli.Context) *registry.Registry { tun := getTunnelFlag(context) endpoint := context.GlobalString("endpoint") machines := []string{endpoint} client := etcd.NewClient(machines) if tun != "" { sshClient, err := ssh.NewSSHClient("core", tun) if err != nil { panic(err) } dial := func(network, addr string) (net.Conn, error) { tcpaddr, err := net.ResolveTCPAddr(network, addr) if err != nil { return nil, err } return sshClient.DialTCP(network, nil, tcpaddr) } tr := http.Transport{ Dial: dial, TLSClientConfig: &tls.Config{ InsecureSkipVerify: true, }, } client.SetTransport(&tr) } return registry.New(client) }
func newAgentFromConfig(mach *machine.Machine, cfg config.Config) (*agent.Agent, error) { regClient := etcd.NewClient(cfg.EtcdServers) regClient.SetConsistency(etcd.STRONG_CONSISTENCY) reg := registry.New(regClient, cfg.EtcdKeyPrefix) eClient := etcd.NewClient(cfg.EtcdServers) eClient.SetConsistency(etcd.STRONG_CONSISTENCY) eStream, err := registry.NewEventStream(eClient, reg) if err != nil { return nil, err } var verifier *sign.SignatureVerifier if cfg.VerifyUnits { var err error verifier, err = sign.NewSignatureVerifierFromAuthorizedKeysFile(cfg.AuthorizedKeysFile) if err != nil { log.Errorln("Failed to get any key from authorized key file in verify_units mode:", err) verifier = sign.NewSignatureVerifier() } } return agent.New(reg, eStream, mach, cfg.AgentTTL, verifier) }
func newEtcdClientFromConfig(cfg config.Config) *etcd.Client { c := etcd.NewClient(cfg.EtcdServers) c.SetConsistency(etcd.STRONG_CONSISTENCY) return c }
func NewClient(servers []string) Client { c := goetcd.NewClient(servers) c.SetConsistency(goetcd.STRONG_CONSISTENCY) return c }