Documentation ¶
Index ¶
- Variables
- type Client
- func (c *Client) Count(key string) (int64, error)
- func (c *Client) Exists(key string) (bool, error)
- func (c *Client) Get(key string) ([]byte, error)
- func (c *Client) GetN(key string) (int64, error)
- func (c *Client) Incr(key string, timeout time.Duration) (int64, error)
- func (c *Client) IsHealthy(ctx context.Context) error
- func (c *Client) Lock(key string, timeout time.Duration) (context.CancelFunc, error)
- func (c *Client) MustGet(ctx context.Context, key string) ([]byte, error)
- func (c *Client) Prefix(key string) ([]*mvccpb.KeyValue, error)
- func (c *Client) Set(key, value string) error
- func (c *Client) SetOnce(ctx context.Context, key, value string) (bool, error)
- type Config
- type SecurityConfig
Constants ¶
This section is empty.
Variables ¶
View Source
var ErrKeyNotFound = errors.New("key not found")
Functions ¶
This section is empty.
Types ¶
type Client ¶
type Config ¶
type Config struct { ClientURLs []string SecurityConfig SecurityConfig Timeout time.Duration // NOTE: AutoSync sets client endpoints based upon the current members. // This can cause the endpoints to become unreachable if the members are // not directly accessible (e.g. a terminating load balancer). This is // disabled by default and can be enabled by passed a non-zero duration. AutoSyncInterval time.Duration }
type SecurityConfig ¶
type SecurityConfig struct { CertFile string KeyFile string CertAuth bool TrustedCAFile string AutoTLS bool }
func (SecurityConfig) Enabled ¶
func (sc SecurityConfig) Enabled() bool
func (SecurityConfig) Scheme ¶
func (sc SecurityConfig) Scheme() string
func (SecurityConfig) TLSInfo ¶
func (sc SecurityConfig) TLSInfo() transport.TLSInfo
Click to show internal directories.
Click to hide internal directories.