mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-12-07 09:43:15 +00:00
Adding OWNERS file for vSphere cloud-provider package
also updating license file for Govmomi library
This commit is contained in:
127
vendor/github.com/vmware/govmomi/session/keep_alive.go
generated
vendored
Normal file
127
vendor/github.com/vmware/govmomi/session/keep_alive.go
generated
vendored
Normal file
@@ -0,0 +1,127 @@
|
||||
/*
|
||||
Copyright (c) 2015 VMware, Inc. All Rights Reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package session
|
||||
|
||||
import (
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"github.com/vmware/govmomi/vim25/methods"
|
||||
"github.com/vmware/govmomi/vim25/soap"
|
||||
"golang.org/x/net/context"
|
||||
)
|
||||
|
||||
type keepAlive struct {
|
||||
sync.Mutex
|
||||
|
||||
roundTripper soap.RoundTripper
|
||||
idleTime time.Duration
|
||||
notifyRequest chan struct{}
|
||||
notifyStop chan struct{}
|
||||
notifyWaitGroup sync.WaitGroup
|
||||
|
||||
// keepAlive executes a request in the background with the purpose of
|
||||
// keeping the session active. The response for this request is discarded.
|
||||
keepAlive func(soap.RoundTripper) error
|
||||
}
|
||||
|
||||
func defaultKeepAlive(roundTripper soap.RoundTripper) error {
|
||||
_, _ = methods.GetCurrentTime(context.Background(), roundTripper)
|
||||
return nil
|
||||
}
|
||||
|
||||
// KeepAlive wraps the specified soap.RoundTripper and executes a meaningless
|
||||
// API request in the background after the RoundTripper has been idle for the
|
||||
// specified amount of idle time. The keep alive process only starts once a
|
||||
// user logs in and runs until the user logs out again.
|
||||
func KeepAlive(roundTripper soap.RoundTripper, idleTime time.Duration) soap.RoundTripper {
|
||||
return KeepAliveHandler(roundTripper, idleTime, defaultKeepAlive)
|
||||
}
|
||||
|
||||
// KeepAliveHandler works as KeepAlive() does, but the handler param can decide how to handle errors.
|
||||
// For example, if connectivity to ESX/VC is down long enough for a session to expire, a handler can choose to
|
||||
// Login() on a types.NotAuthenticated error. If handler returns non-nil, the keep alive go routine will be stopped.
|
||||
func KeepAliveHandler(roundTripper soap.RoundTripper, idleTime time.Duration, handler func(soap.RoundTripper) error) soap.RoundTripper {
|
||||
k := &keepAlive{
|
||||
roundTripper: roundTripper,
|
||||
idleTime: idleTime,
|
||||
notifyRequest: make(chan struct{}),
|
||||
}
|
||||
|
||||
k.keepAlive = handler
|
||||
|
||||
return k
|
||||
}
|
||||
|
||||
func (k *keepAlive) start() {
|
||||
k.Lock()
|
||||
defer k.Unlock()
|
||||
|
||||
if k.notifyStop != nil {
|
||||
return
|
||||
}
|
||||
|
||||
// This channel must be closed to terminate idle timer.
|
||||
k.notifyStop = make(chan struct{})
|
||||
k.notifyWaitGroup.Add(1)
|
||||
|
||||
go func() {
|
||||
defer k.notifyWaitGroup.Done()
|
||||
|
||||
for t := time.NewTimer(k.idleTime); ; {
|
||||
select {
|
||||
case <-k.notifyStop:
|
||||
return
|
||||
case <-k.notifyRequest:
|
||||
t.Reset(k.idleTime)
|
||||
case <-t.C:
|
||||
if err := k.keepAlive(k.roundTripper); err != nil {
|
||||
k.stop()
|
||||
}
|
||||
t = time.NewTimer(k.idleTime)
|
||||
}
|
||||
}
|
||||
}()
|
||||
}
|
||||
|
||||
func (k *keepAlive) stop() {
|
||||
k.Lock()
|
||||
defer k.Unlock()
|
||||
|
||||
if k.notifyStop != nil {
|
||||
close(k.notifyStop)
|
||||
k.notifyWaitGroup.Wait()
|
||||
k.notifyStop = nil
|
||||
}
|
||||
}
|
||||
|
||||
func (k *keepAlive) RoundTrip(ctx context.Context, req, res soap.HasFault) error {
|
||||
err := k.roundTripper.RoundTrip(ctx, req, res)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
// Start ticker on login, stop ticker on logout.
|
||||
switch req.(type) {
|
||||
case *methods.LoginBody, *methods.LoginExtensionByCertificateBody:
|
||||
k.start()
|
||||
case *methods.LogoutBody:
|
||||
k.stop()
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
163
vendor/github.com/vmware/govmomi/session/manager.go
generated
vendored
Normal file
163
vendor/github.com/vmware/govmomi/session/manager.go
generated
vendored
Normal file
@@ -0,0 +1,163 @@
|
||||
/*
|
||||
Copyright (c) 2015 VMware, Inc. All Rights Reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package session
|
||||
|
||||
import (
|
||||
"net/url"
|
||||
|
||||
"github.com/vmware/govmomi/property"
|
||||
"github.com/vmware/govmomi/vim25"
|
||||
"github.com/vmware/govmomi/vim25/methods"
|
||||
"github.com/vmware/govmomi/vim25/mo"
|
||||
"github.com/vmware/govmomi/vim25/types"
|
||||
"golang.org/x/net/context"
|
||||
)
|
||||
|
||||
type Manager struct {
|
||||
client *vim25.Client
|
||||
userSession *types.UserSession
|
||||
}
|
||||
|
||||
func NewManager(client *vim25.Client) *Manager {
|
||||
m := Manager{
|
||||
client: client,
|
||||
}
|
||||
|
||||
return &m
|
||||
}
|
||||
|
||||
func (sm Manager) Reference() types.ManagedObjectReference {
|
||||
return *sm.client.ServiceContent.SessionManager
|
||||
}
|
||||
|
||||
func (sm *Manager) Login(ctx context.Context, u *url.Userinfo) error {
|
||||
req := types.Login{
|
||||
This: sm.Reference(),
|
||||
}
|
||||
|
||||
if u != nil {
|
||||
req.UserName = u.Username()
|
||||
if pw, ok := u.Password(); ok {
|
||||
req.Password = pw
|
||||
}
|
||||
}
|
||||
|
||||
login, err := methods.Login(ctx, sm.client, &req)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
sm.userSession = &login.Returnval
|
||||
return nil
|
||||
}
|
||||
|
||||
func (sm *Manager) LoginExtensionByCertificate(ctx context.Context, key string, locale string) error {
|
||||
req := types.LoginExtensionByCertificate{
|
||||
This: sm.Reference(),
|
||||
ExtensionKey: key,
|
||||
Locale: locale,
|
||||
}
|
||||
|
||||
login, err := methods.LoginExtensionByCertificate(ctx, sm.client, &req)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
sm.userSession = &login.Returnval
|
||||
return nil
|
||||
}
|
||||
|
||||
func (sm *Manager) Logout(ctx context.Context) error {
|
||||
req := types.Logout{
|
||||
This: sm.Reference(),
|
||||
}
|
||||
|
||||
_, err := methods.Logout(ctx, sm.client, &req)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
sm.userSession = nil
|
||||
return nil
|
||||
}
|
||||
|
||||
// UserSession retrieves and returns the SessionManager's CurrentSession field.
|
||||
// Nil is returned if the session is not authenticated.
|
||||
func (sm *Manager) UserSession(ctx context.Context) (*types.UserSession, error) {
|
||||
var mgr mo.SessionManager
|
||||
|
||||
pc := property.DefaultCollector(sm.client)
|
||||
err := pc.RetrieveOne(ctx, sm.Reference(), []string{"currentSession"}, &mgr)
|
||||
if err != nil {
|
||||
// It's OK if we can't retrieve properties because we're not authenticated
|
||||
if f, ok := err.(types.HasFault); ok {
|
||||
switch f.Fault().(type) {
|
||||
case *types.NotAuthenticated:
|
||||
return nil, nil
|
||||
}
|
||||
}
|
||||
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return mgr.CurrentSession, nil
|
||||
}
|
||||
|
||||
func (sm *Manager) TerminateSession(ctx context.Context, sessionId []string) error {
|
||||
req := types.TerminateSession{
|
||||
This: sm.Reference(),
|
||||
SessionId: sessionId,
|
||||
}
|
||||
|
||||
_, err := methods.TerminateSession(ctx, sm.client, &req)
|
||||
return err
|
||||
}
|
||||
|
||||
// SessionIsActive checks whether the session that was created at login is
|
||||
// still valid. This function only works against vCenter.
|
||||
func (sm *Manager) SessionIsActive(ctx context.Context) (bool, error) {
|
||||
if sm.userSession == nil {
|
||||
return false, nil
|
||||
}
|
||||
|
||||
req := types.SessionIsActive{
|
||||
This: sm.Reference(),
|
||||
SessionID: sm.userSession.Key,
|
||||
UserName: sm.userSession.UserName,
|
||||
}
|
||||
|
||||
active, err := methods.SessionIsActive(ctx, sm.client, &req)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
|
||||
return active.Returnval, err
|
||||
}
|
||||
|
||||
func (sm *Manager) AcquireGenericServiceTicket(ctx context.Context, spec types.BaseSessionManagerServiceRequestSpec) (*types.SessionManagerGenericServiceTicket, error) {
|
||||
req := types.AcquireGenericServiceTicket{
|
||||
This: sm.Reference(),
|
||||
Spec: spec,
|
||||
}
|
||||
|
||||
res, err := methods.AcquireGenericServiceTicket(ctx, sm.client, &req)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return &res.Returnval, nil
|
||||
}
|
||||
Reference in New Issue
Block a user