Skip to content

Commit 44523e0

Browse files
btaaniJoaoBraveCodingashwanthgoli
authored
feat: Add objstore support for Swift using thanos.io/objstore (#11672)
Co-authored-by: Joao Marcal <jmarcal@redhat.com> Co-authored-by: Ashwanth Goli <iamashwanth@gmail.com>
1 parent 5d5affa commit 44523e0

File tree

10 files changed

+241
-157
lines changed

10 files changed

+241
-157
lines changed

‎docs/sources/shared/configuration.md

+6
Original file line numberDiff line numberDiff line change
@@ -5976,6 +5976,12 @@ The `swift_storage_config` block configures the connection to OpenStack Object S
59765976
# is received on a request.
59775977
# CLI flag: -<prefix>.swift.request-timeout
59785978
[request_timeout: <duration> | default = 5s]
5979+
5980+
http:
5981+
# Path to the CA certificates to validate server certificate against. If not
5982+
# set, the host's root CA certificates are used.
5983+
# CLI flag: -<prefix>.swift.http.tls-ca-path
5984+
[tls_ca_path: <string> | default = ""]
59795985
```
59805986

59815987
### table_manager

‎pkg/logqlmodel/stats/context.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ func (c *Context) Index() Index {
108108
return c.index
109109
}
110110

111-
// Merge index stats from multiple respones in a concurrency-safe manner
111+
// Merge index stats from multiple response in a concurrency-safe manner
112112
func (c *Context) MergeIndex(i Index) {
113113
c.mtx.Lock()
114114
defer c.mtx.Unlock()

‎pkg/loki/config_wrapper_test.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -547,17 +547,17 @@ memberlist:
547547

548548
assert.Equal(t, "swift", config.Ruler.StoreConfig.Type)
549549

550-
for _, actual := range []swift.Config{
551-
config.Ruler.StoreConfig.Swift.Config,
552-
config.StorageConfig.Swift.Config,
550+
for _, actual := range []openstack.SwiftConfig{
551+
config.Ruler.StoreConfig.Swift,
552+
config.StorageConfig.Swift,
553553
} {
554554
assert.Equal(t, 3, actual.AuthVersion)
555555
assert.Equal(t, "http://example.com", actual.AuthURL)
556556
assert.Equal(t, "steve", actual.Username)
557557
assert.Equal(t, "example.com", actual.UserDomainName)
558558
assert.Equal(t, "1", actual.UserDomainID)
559559
assert.Equal(t, "27", actual.UserID)
560-
assert.Equal(t, "supersecret", actual.Password)
560+
assert.Equal(t, flagext.SecretWithValue("supersecret"), actual.Password)
561561
assert.Equal(t, "2", actual.DomainID)
562562
assert.Equal(t, "test.com", actual.DomainName)
563563
assert.Equal(t, "13", actual.ProjectID)

‎pkg/storage/bucket/client.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ func (cfg *Config) configureTransport(backend string, rt http.RoundTripper) erro
176176
case Azure:
177177
cfg.Azure.Transport = rt
178178
case Swift:
179-
cfg.Swift.Transport = rt
179+
cfg.Swift.HTTP.Transport = rt
180180
case Filesystem, Alibaba, BOS:
181181
// do nothing
182182
default:

‎pkg/storage/bucket/http/config.go

+26-5
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ package http
22

33
import (
44
"flag"
5+
"net/http"
56
"time"
67
)
78

@@ -15,7 +16,19 @@ type Config struct {
1516
MaxIdleConns int `yaml:"max_idle_connections"`
1617
MaxIdleConnsPerHost int `yaml:"max_idle_connections_per_host"`
1718
MaxConnsPerHost int `yaml:"max_connections_per_host"`
18-
CAFile string `yaml:"ca_file"`
19+
20+
// Allow upstream callers to inject a round tripper
21+
Transport http.RoundTripper `yaml:"-"`
22+
23+
TLSConfig TLSConfig `yaml:",inline"`
24+
}
25+
26+
// TLSConfig configures the options for TLS connections.
27+
type TLSConfig struct {
28+
CAPath string `yaml:"tls_ca_path" category:"advanced"`
29+
CertPath string `yaml:"tls_cert_path" category:"advanced"`
30+
KeyPath string `yaml:"tls_key_path" category:"advanced"`
31+
ServerName string `yaml:"tls_server_name" category:"advanced"`
1932
}
2033

2134
// RegisterFlags registers the flags for the storage HTTP client.
@@ -25,13 +38,21 @@ func (cfg *Config) RegisterFlags(f *flag.FlagSet) {
2538

2639
// RegisterFlagsWithPrefix registers the flags for the storage HTTP client with the provided prefix.
2740
func (cfg *Config) RegisterFlagsWithPrefix(prefix string, f *flag.FlagSet) {
28-
f.DurationVar(&cfg.IdleConnTimeout, prefix+"idle-conn-timeout", 90*time.Second, "The time an idle connection will remain idle before closing.")
29-
f.DurationVar(&cfg.ResponseHeaderTimeout, prefix+"response-header-timeout", 2*time.Minute, "The amount of time the client will wait for a servers response headers.")
30-
f.BoolVar(&cfg.InsecureSkipVerify, prefix+"insecure-skip-verify", false, "If the client connects via HTTPS and this option is enabled, the client will accept any certificate and hostname.")
41+
f.DurationVar(&cfg.IdleConnTimeout, prefix+"http.idle-conn-timeout", 90*time.Second, "The time an idle connection will remain idle before closing.")
42+
f.DurationVar(&cfg.ResponseHeaderTimeout, prefix+"http.response-header-timeout", 2*time.Minute, "The amount of time the client will wait for a servers response headers.")
43+
f.BoolVar(&cfg.InsecureSkipVerify, prefix+"http.insecure-skip-verify", false, "If the client connects via HTTPS and this option is enabled, the client will accept any certificate and hostname.")
3144
f.DurationVar(&cfg.TLSHandshakeTimeout, prefix+"tls-handshake-timeout", 10*time.Second, "Maximum time to wait for a TLS handshake. 0 means no limit.")
3245
f.DurationVar(&cfg.ExpectContinueTimeout, prefix+"expect-continue-timeout", 1*time.Second, "The time to wait for a server's first response headers after fully writing the request headers if the request has an Expect header. 0 to send the request body immediately.")
3346
f.IntVar(&cfg.MaxIdleConns, prefix+"max-idle-connections", 100, "Maximum number of idle (keep-alive) connections across all hosts. 0 means no limit.")
3447
f.IntVar(&cfg.MaxIdleConnsPerHost, prefix+"max-idle-connections-per-host", 100, "Maximum number of idle (keep-alive) connections to keep per-host. If 0, a built-in default value is used.")
3548
f.IntVar(&cfg.MaxConnsPerHost, prefix+"max-connections-per-host", 0, "Maximum number of connections per host. 0 means no limit.")
36-
f.StringVar(&cfg.CAFile, prefix+"ca-file", "", "Path to the trusted CA file that signed the SSL certificate of the object storage endpoint.")
49+
cfg.TLSConfig.RegisterFlagsWithPrefix(prefix, f)
50+
}
51+
52+
// RegisterFlagsWithPrefix registers the flags for s3 storage with the provided prefix.
53+
func (cfg *TLSConfig) RegisterFlagsWithPrefix(prefix string, f *flag.FlagSet) {
54+
f.StringVar(&cfg.CAPath, prefix+"http.tls-ca-path", "", "Path to the CA certificates to validate server certificate against. If not set, the host's root CA certificates are used.")
55+
f.StringVar(&cfg.CertPath, prefix+"http.tls-cert-path", "", "Path to the client certificate, which will be used for authenticating with the server. Also requires the key path to be configured.")
56+
f.StringVar(&cfg.KeyPath, prefix+"http.tls-key-path", "", "Path to the key for the client certificate. Also requires the client certificate to be configured.")
57+
f.StringVar(&cfg.ServerName, prefix+"http.tls-server-name", "", "Override the expected name on the server certificate.")
3758
}

‎pkg/storage/bucket/s3/config.go

+3-50
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,16 @@ import (
44
"encoding/json"
55
"flag"
66
"fmt"
7-
"net/http"
87
"slices"
98
"strings"
10-
"time"
119

1210
s3_service "github.com/aws/aws-sdk-go/service/s3"
1311
"github.com/grafana/dskit/flagext"
1412
"github.com/minio/minio-go/v7/pkg/encrypt"
1513
"github.com/pkg/errors"
1614
"github.com/thanos-io/objstore/providers/s3"
1715

16+
"github.com/grafana/loki/v3/pkg/storage/bucket/http"
1817
"github.com/grafana/loki/v3/pkg/util"
1918
)
2019

@@ -55,52 +54,6 @@ func thanosS3BucketLookupTypesValues() (list []string) {
5554
return list
5655
}
5756

58-
// HTTPConfig stores the http.Transport configuration for the s3 minio client.
59-
type HTTPConfig struct {
60-
IdleConnTimeout time.Duration `yaml:"idle_conn_timeout" category:"advanced"`
61-
ResponseHeaderTimeout time.Duration `yaml:"response_header_timeout" category:"advanced"`
62-
InsecureSkipVerify bool `yaml:"insecure_skip_verify" category:"advanced"`
63-
TLSHandshakeTimeout time.Duration `yaml:"tls_handshake_timeout" category:"advanced"`
64-
ExpectContinueTimeout time.Duration `yaml:"expect_continue_timeout" category:"advanced"`
65-
MaxIdleConns int `yaml:"max_idle_connections" category:"advanced"`
66-
MaxIdleConnsPerHost int `yaml:"max_idle_connections_per_host" category:"advanced"`
67-
MaxConnsPerHost int `yaml:"max_connections_per_host" category:"advanced"`
68-
69-
// Allow upstream callers to inject a round tripper
70-
Transport http.RoundTripper `yaml:"-"`
71-
72-
TLSConfig TLSConfig `yaml:",inline"`
73-
}
74-
75-
// TLSConfig configures the options for TLS connections.
76-
type TLSConfig struct {
77-
CAPath string `yaml:"tls_ca_path" category:"advanced"`
78-
CertPath string `yaml:"tls_cert_path" category:"advanced"`
79-
KeyPath string `yaml:"tls_key_path" category:"advanced"`
80-
ServerName string `yaml:"tls_server_name" category:"advanced"`
81-
}
82-
83-
// RegisterFlagsWithPrefix registers the flags for s3 storage with the provided prefix
84-
func (cfg *HTTPConfig) RegisterFlagsWithPrefix(prefix string, f *flag.FlagSet) {
85-
f.DurationVar(&cfg.IdleConnTimeout, prefix+"s3.http.idle-conn-timeout", 90*time.Second, "The time an idle connection will remain idle before closing.")
86-
f.DurationVar(&cfg.ResponseHeaderTimeout, prefix+"s3.http.response-header-timeout", 2*time.Minute, "The amount of time the client will wait for a servers response headers.")
87-
f.BoolVar(&cfg.InsecureSkipVerify, prefix+"s3.http.insecure-skip-verify", false, "If the client connects to S3 via HTTPS and this option is enabled, the client will accept any certificate and hostname.")
88-
f.DurationVar(&cfg.TLSHandshakeTimeout, prefix+"s3.tls-handshake-timeout", 10*time.Second, "Maximum time to wait for a TLS handshake. 0 means no limit.")
89-
f.DurationVar(&cfg.ExpectContinueTimeout, prefix+"s3.expect-continue-timeout", 1*time.Second, "The time to wait for a server's first response headers after fully writing the request headers if the request has an Expect header. 0 to send the request body immediately.")
90-
f.IntVar(&cfg.MaxIdleConns, prefix+"s3.max-idle-connections", 100, "Maximum number of idle (keep-alive) connections across all hosts. 0 means no limit.")
91-
f.IntVar(&cfg.MaxIdleConnsPerHost, prefix+"s3.max-idle-connections-per-host", 100, "Maximum number of idle (keep-alive) connections to keep per-host. If 0, a built-in default value is used.")
92-
f.IntVar(&cfg.MaxConnsPerHost, prefix+"s3.max-connections-per-host", 0, "Maximum number of connections per host. 0 means no limit.")
93-
cfg.TLSConfig.RegisterFlagsWithPrefix(prefix, f)
94-
}
95-
96-
// RegisterFlagsWithPrefix registers the flags for s3 storage with the provided prefix.
97-
func (cfg *TLSConfig) RegisterFlagsWithPrefix(prefix string, f *flag.FlagSet) {
98-
f.StringVar(&cfg.CAPath, prefix+"s3.http.tls-ca-path", "", "Path to the CA certificates to validate server certificate against. If not set, the host's root CA certificates are used.")
99-
f.StringVar(&cfg.CertPath, prefix+"s3.http.tls-cert-path", "", "Path to the client certificate, which will be used for authenticating with the server. Also requires the key path to be configured.")
100-
f.StringVar(&cfg.KeyPath, prefix+"s3.http.tls-key-path", "", "Path to the key for the client certificate. Also requires the client certificate to be configured.")
101-
f.StringVar(&cfg.ServerName, prefix+"s3.http.tls-server-name", "", "Override the expected name on the server certificate.")
102-
}
103-
10457
// Config holds the config options for an S3 backend
10558
type Config struct {
10659
Endpoint string `yaml:"endpoint"`
@@ -121,7 +74,7 @@ type Config struct {
12174
MaxRetries int `yaml:"max_retries"`
12275

12376
SSE SSEConfig `yaml:"sse"`
124-
HTTP HTTPConfig `yaml:"http"`
77+
HTTP http.Config `yaml:"http"`
12578
TraceConfig TraceConfig `yaml:"trace"`
12679
}
12780

@@ -149,7 +102,7 @@ func (cfg *Config) RegisterFlagsWithPrefix(prefix string, f *flag.FlagSet) {
149102
f.StringVar(&cfg.STSEndpoint, prefix+"s3.sts-endpoint", "", "Accessing S3 resources using temporary, secure credentials provided by AWS Security Token Service.")
150103
f.IntVar(&cfg.MaxRetries, prefix+"s3.max-retries", 10, "The maximum number of retries for S3 requests that are retryable. Default is 10, set this to 1 to disable retries.")
151104
cfg.SSE.RegisterFlagsWithPrefix(prefix+"s3.sse.", f)
152-
cfg.HTTP.RegisterFlagsWithPrefix(prefix, f)
105+
cfg.HTTP.RegisterFlagsWithPrefix(prefix+"s3.", f)
153106
cfg.TraceConfig.RegisterFlagsWithPrefix(prefix+"s3.trace.", f)
154107
}
155108

‎pkg/storage/bucket/swift/bucket_client.go

+38-20
Original file line numberDiff line numberDiff line change
@@ -13,31 +13,49 @@ import (
1313
// NewBucketClient creates a new Swift bucket client
1414
func NewBucketClient(cfg Config, _ string, logger log.Logger, wrapper func(http.RoundTripper) http.RoundTripper) (objstore.Bucket, error) {
1515
bucketConfig := swift.Config{
16-
AuthVersion: cfg.AuthVersion,
17-
AuthUrl: cfg.AuthURL,
18-
Username: cfg.Username,
19-
UserDomainName: cfg.UserDomainName,
20-
UserDomainID: cfg.UserDomainID,
21-
UserId: cfg.UserID,
22-
Password: cfg.Password,
23-
DomainId: cfg.DomainID,
24-
DomainName: cfg.DomainName,
25-
ProjectID: cfg.ProjectID,
26-
ProjectName: cfg.ProjectName,
27-
ProjectDomainID: cfg.ProjectDomainID,
28-
ProjectDomainName: cfg.ProjectDomainName,
29-
RegionName: cfg.RegionName,
30-
ContainerName: cfg.ContainerName,
31-
Retries: cfg.MaxRetries,
32-
ConnectTimeout: model.Duration(cfg.ConnectTimeout),
33-
Timeout: model.Duration(cfg.RequestTimeout),
16+
ApplicationCredentialID: cfg.ApplicationCredentialID,
17+
ApplicationCredentialName: cfg.ApplicationCredentialName,
18+
ApplicationCredentialSecret: cfg.ApplicationCredentialSecret.String(),
19+
AuthVersion: cfg.AuthVersion,
20+
AuthUrl: cfg.AuthURL,
21+
Username: cfg.Username,
22+
UserDomainName: cfg.UserDomainName,
23+
UserDomainID: cfg.UserDomainID,
24+
UserId: cfg.UserID,
25+
Password: cfg.Password.String(),
26+
DomainId: cfg.DomainID,
27+
DomainName: cfg.DomainName,
28+
ProjectID: cfg.ProjectID,
29+
ProjectName: cfg.ProjectName,
30+
ProjectDomainID: cfg.ProjectDomainID,
31+
ProjectDomainName: cfg.ProjectDomainName,
32+
RegionName: cfg.RegionName,
33+
ContainerName: cfg.ContainerName,
34+
Retries: cfg.MaxRetries,
35+
ConnectTimeout: model.Duration(cfg.ConnectTimeout),
36+
Timeout: model.Duration(cfg.RequestTimeout),
37+
HTTPConfig: exthttp.HTTPConfig{
38+
IdleConnTimeout: model.Duration(cfg.HTTP.IdleConnTimeout),
39+
ResponseHeaderTimeout: model.Duration(cfg.HTTP.ResponseHeaderTimeout),
40+
InsecureSkipVerify: cfg.HTTP.InsecureSkipVerify,
41+
TLSHandshakeTimeout: model.Duration(cfg.HTTP.TLSHandshakeTimeout),
42+
ExpectContinueTimeout: model.Duration(cfg.HTTP.ExpectContinueTimeout),
43+
MaxIdleConns: cfg.HTTP.MaxIdleConns,
44+
MaxIdleConnsPerHost: cfg.HTTP.MaxIdleConnsPerHost,
45+
MaxConnsPerHost: cfg.HTTP.MaxConnsPerHost,
46+
Transport: cfg.HTTP.Transport,
47+
TLSConfig: exthttp.TLSConfig{
48+
CAFile: cfg.HTTP.TLSConfig.CAPath,
49+
CertFile: cfg.HTTP.TLSConfig.CertPath,
50+
KeyFile: cfg.HTTP.TLSConfig.KeyPath,
51+
ServerName: cfg.HTTP.TLSConfig.ServerName,
52+
},
53+
},
3454

3555
// Hard-coded defaults.
3656
ChunkSize: swift.DefaultConfig.ChunkSize,
3757
UseDynamicLargeObjects: false,
38-
HTTPConfig: exthttp.DefaultHTTPConfig,
3958
}
40-
bucketConfig.HTTPConfig.Transport = cfg.Transport
4159

4260
return swift.NewContainerFromConfig(logger, &bucketConfig, false, wrapper)
4361
}

‎pkg/storage/bucket/swift/config.go

+31-29
Original file line numberDiff line numberDiff line change
@@ -2,34 +2,37 @@ package swift
22

33
import (
44
"flag"
5-
"net/http"
65
"time"
6+
7+
"github.com/grafana/dskit/flagext"
8+
9+
"github.com/grafana/loki/v3/pkg/storage/bucket/http"
710
)
811

912
// Config holds the config options for Swift backend
1013
type Config struct {
11-
AuthVersion int `yaml:"auth_version"`
12-
AuthURL string `yaml:"auth_url"`
13-
Internal bool `yaml:"internal"`
14-
Username string `yaml:"username"`
15-
UserDomainName string `yaml:"user_domain_name"`
16-
UserDomainID string `yaml:"user_domain_id"`
17-
UserID string `yaml:"user_id"`
18-
Password string `yaml:"password"`
19-
DomainID string `yaml:"domain_id"`
20-
DomainName string `yaml:"domain_name"`
21-
ProjectID string `yaml:"project_id"`
22-
ProjectName string `yaml:"project_name"`
23-
ProjectDomainID string `yaml:"project_domain_id"`
24-
ProjectDomainName string `yaml:"project_domain_name"`
25-
RegionName string `yaml:"region_name"`
26-
ContainerName string `yaml:"container_name"`
27-
MaxRetries int `yaml:"max_retries"`
28-
ConnectTimeout time.Duration `yaml:"connect_timeout"`
29-
RequestTimeout time.Duration `yaml:"request_timeout"`
30-
31-
// Allow upstream callers to inject a round tripper
32-
Transport http.RoundTripper `yaml:"-"`
14+
ApplicationCredentialID string `yaml:"application_credential_id"`
15+
ApplicationCredentialName string `yaml:"application_credential_name"`
16+
ApplicationCredentialSecret flagext.Secret `yaml:"application_credential_secret"`
17+
AuthVersion int `yaml:"auth_version"`
18+
AuthURL string `yaml:"auth_url"`
19+
Username string `yaml:"username"`
20+
UserDomainName string `yaml:"user_domain_name"`
21+
UserDomainID string `yaml:"user_domain_id"`
22+
UserID string `yaml:"user_id"`
23+
Password flagext.Secret `yaml:"password"`
24+
DomainID string `yaml:"domain_id"`
25+
DomainName string `yaml:"domain_name"`
26+
ProjectID string `yaml:"project_id"`
27+
ProjectName string `yaml:"project_name"`
28+
ProjectDomainID string `yaml:"project_domain_id"`
29+
ProjectDomainName string `yaml:"project_domain_name"`
30+
RegionName string `yaml:"region_name"`
31+
ContainerName string `yaml:"container_name"`
32+
MaxRetries int `yaml:"max_retries" category:"advanced"`
33+
ConnectTimeout time.Duration `yaml:"connect_timeout" category:"advanced"`
34+
RequestTimeout time.Duration `yaml:"request_timeout" category:"advanced"`
35+
HTTP http.Config `yaml:"http"`
3336
}
3437

3538
// RegisterFlags registers the flags for Swift storage
@@ -39,14 +42,16 @@ func (cfg *Config) RegisterFlags(f *flag.FlagSet) {
3942

4043
// RegisterFlagsWithPrefix registers the flags for Swift storage with the provided prefix
4144
func (cfg *Config) RegisterFlagsWithPrefix(prefix string, f *flag.FlagSet) {
45+
f.StringVar(&cfg.ApplicationCredentialID, prefix+"swift.application-credential-id", "", "OpenStack Swift application credential id")
46+
f.StringVar(&cfg.ApplicationCredentialName, prefix+"swift.application-credential-name", "", "OpenStack Swift application credential name")
47+
f.Var(&cfg.ApplicationCredentialSecret, prefix+"swift.application-credential-secret", "OpenStack Swift application credential secret")
4248
f.IntVar(&cfg.AuthVersion, prefix+"swift.auth-version", 0, "OpenStack Swift authentication API version. 0 to autodetect.")
4349
f.StringVar(&cfg.AuthURL, prefix+"swift.auth-url", "", "OpenStack Swift authentication URL")
44-
f.BoolVar(&cfg.Internal, prefix+"swift.internal", false, "Set this to true to use the internal OpenStack Swift endpoint URL")
4550
f.StringVar(&cfg.Username, prefix+"swift.username", "", "OpenStack Swift username.")
4651
f.StringVar(&cfg.UserDomainName, prefix+"swift.user-domain-name", "", "OpenStack Swift user's domain name.")
4752
f.StringVar(&cfg.UserDomainID, prefix+"swift.user-domain-id", "", "OpenStack Swift user's domain ID.")
4853
f.StringVar(&cfg.UserID, prefix+"swift.user-id", "", "OpenStack Swift user ID.")
49-
f.StringVar(&cfg.Password, prefix+"swift.password", "", "OpenStack Swift API key.")
54+
f.Var(&cfg.Password, prefix+"swift.password", "OpenStack Swift API key.")
5055
f.StringVar(&cfg.DomainID, prefix+"swift.domain-id", "", "OpenStack Swift user's domain ID.")
5156
f.StringVar(&cfg.DomainName, prefix+"swift.domain-name", "", "OpenStack Swift user's domain name.")
5257
f.StringVar(&cfg.ProjectID, prefix+"swift.project-id", "", "OpenStack Swift project ID (v2,v3 auth only).")
@@ -58,8 +63,5 @@ func (cfg *Config) RegisterFlagsWithPrefix(prefix string, f *flag.FlagSet) {
5863
f.IntVar(&cfg.MaxRetries, prefix+"swift.max-retries", 3, "Max retries on requests error.")
5964
f.DurationVar(&cfg.ConnectTimeout, prefix+"swift.connect-timeout", 10*time.Second, "Time after which a connection attempt is aborted.")
6065
f.DurationVar(&cfg.RequestTimeout, prefix+"swift.request-timeout", 5*time.Second, "Time after which an idle request is aborted. The timeout watchdog is reset each time some data is received, so the timeout triggers after X time no data is received on a request.")
61-
}
62-
63-
func (cfg *Config) Validate() error {
64-
return nil
66+
cfg.HTTP.RegisterFlagsWithPrefix(prefix+"swift.", f)
6567
}

0 commit comments

Comments
 (0)