@@ -16,13 +16,6 @@ package client
16
16
17
17
import (
18
18
"context"
19
- "crypto/tls"
20
- "crypto/x509"
21
- "io/ioutil"
22
- "net"
23
- "net/http"
24
- "net/url"
25
- "os"
26
19
"time"
27
20
28
21
"github.com/oracle/oci-go-sdk/v65/common"
@@ -170,6 +163,7 @@ type client struct {
170
163
171
164
// New constructs an OCI API client.
172
165
func New (logger * zap.SugaredLogger , cp common.ConfigurationProvider , opRateLimiter * RateLimiter ) (Interface , error ) {
166
+
173
167
compute , err := core .NewComputeClientWithConfigurationProvider (cp )
174
168
if err != nil {
175
169
return nil , errors .Wrap (err , "NewComputeClientWithConfigurationProvider" )
@@ -361,51 +355,5 @@ func (c *client) FSS() FileStorageInterface {
361
355
}
362
356
363
357
func configureCustomTransport (logger * zap.SugaredLogger , baseClient * common.BaseClient ) error {
364
- httpClient := baseClient .HTTPClient .(* http.Client )
365
-
366
- var transport * http.Transport
367
- if httpClient .Transport == nil {
368
- transport = & http.Transport {
369
- DialContext : (& net.Dialer {
370
- Timeout : 30 * time .Second ,
371
- KeepAlive : 30 * time .Second ,
372
- DualStack : true ,
373
- }).DialContext ,
374
- MaxIdleConns : 100 ,
375
- IdleConnTimeout : 90 * time .Second ,
376
- TLSHandshakeTimeout : 10 * time .Second ,
377
- ExpectContinueTimeout : 1 * time .Second ,
378
- }
379
- } else {
380
- transport = httpClient .Transport .(* http.Transport )
381
- }
382
-
383
- ociProxy := os .Getenv ("OCI_PROXY" )
384
- if ociProxy != "" {
385
- proxyURL , err := url .Parse (ociProxy )
386
- if err != nil {
387
- return errors .Wrapf (err , "failed to parse OCI proxy url: %s" , ociProxy )
388
- }
389
- transport .Proxy = func (req * http.Request ) (* url.URL , error ) {
390
- return proxyURL , nil
391
- }
392
- }
393
-
394
- trustedCACertPath := os .Getenv ("TRUSTED_CA_CERT_PATH" )
395
- if trustedCACertPath != "" {
396
- logger .With ("path" , trustedCACertPath ).Infof ("Configuring OCI client with a new trusted ca" )
397
- trustedCACert , err := ioutil .ReadFile (trustedCACertPath )
398
- if err != nil {
399
- return errors .Wrapf (err , "failed to read root certificate: %s" , trustedCACertPath )
400
- }
401
- caCertPool := x509 .NewCertPool ()
402
- ok := caCertPool .AppendCertsFromPEM (trustedCACert )
403
- if ! ok {
404
- return errors .Wrapf (err , "failed to parse root certificate: %s" , trustedCACertPath )
405
- }
406
- transport .TLSClientConfig = & tls.Config {RootCAs : caCertPool }
407
- }
408
-
409
- httpClient .Transport = transport
410
358
return nil
411
359
}
0 commit comments