Skip to content

Commit 77aa696

Browse files
withlinpepov
authored andcommitted
fix: some nits
Signed-off-by: withlin <withlin@apache.org> Signed-off-by: withlin <withlin@apache.org>
1 parent c6a154d commit 77aa696

File tree

1 file changed

+21
-21
lines changed

1 file changed

+21
-21
lines changed

pkg/sdk/logging/model/output/kafka.go

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ type KafkaOutputConfig struct {
148148
SlowFlushLogThreshold string `json:"slow_flush_log_threshold,omitempty"`
149149
}
150150

151-
// GlobalConfig represents the global configuration properties for librdkafka.
151+
// RdkafkaOptions represents the global configuration properties for librdkafka.
152152
type RdkafkaOptions struct {
153153
// Indicates the builtin features for this build of librdkafka. An application can either query this value or attempt to set it with its list of required features to check for library support.
154154
BuiltinFeatures string `json:"builtin.features,omitempty"`
@@ -197,7 +197,7 @@ type RdkafkaOptions struct {
197197
// Disconnect from broker when this number of send failures (e.g., timed out requests) is reached. Disable with 0. WARNING: It is highly recommended to leave this setting at its default value of 1 to avoid the client and broker to become desynchronized in case of request timeouts. NOTE: The connection is automatically re-established.
198198
SocketMaxFails int `json:"socket.max.fails,omitempty"`
199199
// How long to cache the broker address resolving results (milliseconds).
200-
BrokerAddressTtl int `json:"broker.address.ttl,omitempty"`
200+
BrokerAddressTTl int `json:"broker.address.ttl,omitempty"`
201201
// Allowed broker IP address families: any, v4, v6
202202
BrokerAddressFamily string `json:"broker.address.family,omitempty"`
203203
// Maximum time allowed for broker connection setup (TCP connection setup as well SSL and SASL handshake). If the connection to the broker is not fully functional after this the connection will be closed and retried.
@@ -237,7 +237,7 @@ type RdkafkaOptions struct {
237237
// Socket connect callback
238238
ConnectCb string `json:"connect_cb,omitempty"`
239239
// Socket close callback
240-
ClosesocketCb string `json:"closesocket_cb,omitempty"`
240+
CloseSocketCb string `json:"closesocket_cb,omitempty"`
241241
// File open callback to provide race-free CLOEXEC
242242
OpenCb string `json:"open_cb,omitempty"`
243243
// Address resolution callback (set with rd_kafka_conf_set_resolve_cb())
@@ -261,41 +261,41 @@ type RdkafkaOptions struct {
261261
// Protocol used to communicate with brokers.
262262
SecurityProtocol string `json:"security.protocol,omitempty"`
263263
// A cipher suite is a named combination of authentication, encryption, MAC and key exchange algorithm used to negotiate the security settings for a network connection using TLS or SSL network protocol. See manual page for `ciphers(1)` and `SSL_CTX_set_cipher_list(3).
264-
SslCipherSuites string `json:"ssl.cipher.suites,omitempty"`
264+
SSLCipherSuites string `json:"ssl.cipher.suites,omitempty"`
265265
// The supported-curves extension in the TLS ClientHello message specifies the curves (standard/named, or 'explicit' GF(2^k) or GF(p)) the client is willing to have the server use. See manual page for `SSL_CTX_set1_curves_list(3)`. OpenSSL >= 1.0.2 required.
266-
SslCurvesList string `json:"ssl.curves.list,omitempty"`
266+
SSLCurvesList string `json:"ssl.curves.list,omitempty"`
267267
// The client uses the TLS ClientHello signature_algorithms extension to indicate to the server which signature/hash algorithm pairs may be used in digital signatures. See manual page for `SSL_CTX_set1_sigalgs_list(3)`. OpenSSL >= 1.0.2 required.
268-
SslSigalgsList string `json:"ssl.sigalgs.list,omitempty"`
268+
SSLSigalgsList string `json:"ssl.sigalgs.list,omitempty"`
269269
// Path to client's private key (PEM) used for authentication.
270-
SslKeyLocation string `json:"ssl.key.location,omitempty"`
270+
SSLKeyLocation string `json:"ssl.key.location,omitempty"`
271271
// Private key passphrase (for use with `ssl.key.location` and `set_ssl_cert()`).
272-
SslKeyPassword string `json:"ssl.key.password,omitempty"`
272+
SSLKeyPassword string `json:"ssl.key.password,omitempty"`
273273
// Client's private key string (PEM format) used for authentication.
274-
SslKeyPem string `json:"ssl.key.pem,omitempty"`
274+
SSLKeyPem string `json:"ssl.key.pem,omitempty"`
275275
// Path to client's public key (PEM) used for authentication.
276-
SslCertificateLocation string `json:"ssl.certificate.location,omitempty"`
276+
SSLCertificateLocation string `json:"ssl.certificate.location,omitempty"`
277277
// Client's public key string (PEM format) used for authentication.
278-
SslCertificatePem string `json:"ssl.certificate.pem,omitempty"`
278+
SSLCertificatePem string `json:"ssl.certificate.pem,omitempty"`
279279
// File or directory path to CA certificate(s) for verifying the broker's key. Defaults: On Windows the system's CA certificates are automatically looked up in the Windows Root certificate store. On Mac OSX this configuration defaults to `probe`. It is recommended to install openssl using Homebrew, to provide CA certificates. On Linux install the distribution's ca-certificates package. If OpenSSL is statically linked or `ssl.ca.location` is set to `probe` a list of standard paths will be probed and the first one found will be used as the default CA certificate location path. If OpenSSL is dynamically linked the OpenSSL library's default path will be used (see `OPENSSLDIR` in `openssl version -a`).
280-
SslCaLocation string `json:"ssl.ca.location,omitempty"`
280+
SSLCaLocation string `json:"ssl.ca.location,omitempty"`
281281
// CA certificate string (PEM format) for verifying the broker's key.
282-
SslCaPem string `json:"ssl.ca.pem,omitempty"`
282+
SSLCaPem string `json:"ssl.ca.pem,omitempty"`
283283
// Path to CRL for verifying broker's certificate validity.
284-
SslCrlLocation string `json:"ssl.crl.location,omitempty"`
284+
SSLCrlLocation string `json:"ssl.crl.location,omitempty"`
285285
// Path to client's keystore (PKCS#12) used for authentication.
286-
SslKeystoreLocation string `json:"ssl.keystore.location,omitempty"`
286+
SSLKeystoreLocation string `json:"ssl.keystore.location,omitempty"`
287287
// Client's keystore (PKCS#12) password.
288-
SslKeystorePassword string `json:"ssl.keystore.password,omitempty"`
288+
SSLKeystorePassword string `json:"ssl.keystore.password,omitempty"`
289289
// Comma-separated list of OpenSSL 3.0.x implementation providers. E.g., "default,legacy".
290-
SslProviders string `json:"ssl.providers,omitempty"`
290+
SSLProviders string `json:"ssl.providers,omitempty"`
291291
// **DEPRECATED** Path to OpenSSL engine library. OpenSSL >= 1.1.x required. DEPRECATED: OpenSSL engine support is deprecated and should be replaced by OpenSSL 3 providers.
292-
SslEngineLocation string `json:"ssl.engine.location,omitempty"`
292+
SSLEngineLocation string `json:"ssl.engine.location,omitempty"`
293293
// OpenSSL engine id is the name used for loading engine.
294-
SslEngineId string `json:"ssl.engine.id,omitempty"`
294+
SSLEngineId string `json:"ssl.engine.id,omitempty"`
295295
// Enable OpenSSL's builtin broker (server) certificate verification. This verification can be extended by the application by implementing a certificate_verify_cb.
296-
EnableSslCertificateVerification bool `json:"enable.ssl.certificate.verification,omitempty"`
296+
EnableSSLCertificateVerification bool `json:"enable.ssl.certificate.verification,omitempty"`
297297
// Endpoint identification algorithm to validate broker hostname using broker certificate. https - Server (broker) hostname verification as specified in RFC2818. none - No endpoint verification. OpenSSL >= 1.0.2 required.
298-
SslEndpointIdentificationAlgorithm string `json:"ssl.endpoint.identification.algorithm,omitempty"`
298+
SSLEndpointIdentificationAlgorithm string `json:"ssl.endpoint.identification.algorithm,omitempty"`
299299
// SASL mechanism to use for authentication. Supported: GSSAPI, PLAIN, SCRAM-SHA-256, SCRAM-SHA-512, OAUTHBEARER. NOTE: Despite the name only one mechanism must be configured.
300300
SaslMechanisms string `json:"sasl.mechanisms,omitempty" `
301301
// Kerberos principal name that Kafka runs as, not including /hostname@REALM.

0 commit comments

Comments
 (0)