-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathconfig.go
66 lines (59 loc) · 1.59 KB
/
config.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
package timestreamdriver
import (
"errors"
"fmt"
"net/url"
"strings"
"github.com/aws/aws-sdk-go/aws/credentials"
"github.com/aws/aws-sdk-go/aws/defaults"
)
var (
keyRegion = "region"
keyKeyID = "accessKeyID"
keySecret = "secretAccessKey"
keyXray = "enableXray"
)
type Config struct {
Endpoint string
Region string
CredentialProvider credentials.Provider
EnableXray bool
}
func ParseDSN(dsn string) (*Config, error) {
df := defaults.Get()
providers := defaults.CredProviders(df.Config, df.Handlers)
parsed, err := url.Parse(dsn)
if err != nil {
return nil, err
}
scheme, err := parseScheme(parsed.Scheme)
if err != nil {
return nil, err
}
qs := parsed.Query()
cfg := &Config{CredentialProvider: &credentials.ChainProvider{Providers: providers}, EnableXray: qs.Get(keyXray) == "true"}
if region := qs.Get(keyRegion); region != "" {
cfg.Region = region
}
if endpointHost := parsed.Host; endpointHost != "" {
cfg.Endpoint = fmt.Sprintf("%s://%s", scheme, endpointHost)
}
accessKeyID, secretAccessKey := qs.Get(keyKeyID), qs.Get(keySecret)
if accessKeyID != "" && secretAccessKey != "" {
cfg.CredentialProvider = &credentials.StaticProvider{Value: credentials.Value{
AccessKeyID: accessKeyID,
SecretAccessKey: secretAccessKey,
}}
}
return cfg, nil
}
func parseScheme(scheme string) (string, error) {
if !strings.Contains(scheme, DriverName) {
return "", errors.New("invalid DSN scheme")
}
if scheme == DriverName {
return "https", nil
}
customScheme := strings.Replace(scheme, DriverName+"+", "", 1)
return customScheme, nil
}