Documentation
¶
Index ¶
- Variables
- type Client
- func (c *Client) Count(key string) (int64, error)
- func (c *Client) Exists(key string) (bool, error)
- func (c *Client) Get(key string) ([]byte, error)
- func (c *Client) GetN(key string) (int64, error)
- func (c *Client) Incr(key string, timeout time.Duration) (int64, error)
- func (c *Client) IsHealthy(ctx context.Context) error
- func (c *Client) Lock(key string, timeout time.Duration) (context.CancelFunc, error)
- func (c *Client) MustGet(ctx context.Context, key string) ([]byte, error)
- func (c *Client) Prefix(key string) ([]*mvccpb.KeyValue, error)
- func (c *Client) Set(key, value string) error
- func (c *Client) SetOnce(ctx context.Context, key, value string) (bool, error)
- type Config
- type SecurityConfig
Constants ¶
This section is empty.
Variables ¶
View Source
var ErrKeyNotFound = errors.New("key not found")
Functions ¶
This section is empty.
Types ¶
type Client ¶
type Config ¶
type Config struct {
ClientURLs []string
SecurityConfig SecurityConfig
Timeout time.Duration
// NOTE: AutoSync sets client endpoints based upon the current members.
// This can cause the endpoints to become unreachable if the members are
// not directly accessible (e.g. a terminating load balancer). This is
// disabled by default and can be enabled by passed a non-zero duration.
AutoSyncInterval time.Duration
}
type SecurityConfig ¶
type SecurityConfig struct {
CertFile string
KeyFile string
CertAuth bool
TrustedCAFile string
AutoTLS bool
}
func (SecurityConfig) Enabled ¶
func (sc SecurityConfig) Enabled() bool
func (SecurityConfig) Scheme ¶
func (sc SecurityConfig) Scheme() string
func (SecurityConfig) TLSInfo ¶
func (sc SecurityConfig) TLSInfo() transport.TLSInfo
Click to show internal directories.
Click to hide internal directories.