@@ -409,14 +409,14 @@ impl DevTunnels {
409
409
}
410
410
} ?;
411
411
412
- let desired_tags = self . get_tags ( & name) ;
413
- if is_new || vec_eq_as_set ( & full_tunnel. tags , & desired_tags) {
412
+ let desired_tags = self . get_labels ( & name) ;
413
+ if is_new || vec_eq_as_set ( & full_tunnel. labels , & desired_tags) {
414
414
return Ok ( ( full_tunnel, persisted) ) ;
415
415
}
416
416
417
417
debug ! ( self . log, "Tunnel name changed, applying updates..." ) ;
418
418
419
- full_tunnel. tags = desired_tags;
419
+ full_tunnel. labels = desired_tags;
420
420
421
421
let updated_tunnel = spanf ! (
422
422
self . log,
@@ -531,7 +531,6 @@ impl DevTunnels {
531
531
let fut = self . client . delete_tunnel_endpoints (
532
532
& locator,
533
533
& endpoint. host_id ,
534
- None ,
535
534
NO_REQUEST_OPTIONS ,
536
535
) ;
537
536
@@ -572,52 +571,51 @@ impl DevTunnels {
572
571
)
573
572
. map_err ( |e| wrap ( e, "failed to lookup tunnel" ) ) ?
574
573
}
575
- None => {
576
- let new_tunnel = Tunnel {
577
- tags : self . get_tags ( name) ,
578
- ..Default :: default ( )
579
- } ;
580
-
581
- loop {
582
- let result = spanf ! (
583
- self . log,
584
- self . log. span( "dev-tunnel.create" ) ,
585
- self . client. create_tunnel( & new_tunnel, options)
586
- ) ;
587
-
588
- match result {
589
- Err ( HttpError :: ResponseError ( e) )
590
- if e. status_code == StatusCode :: TOO_MANY_REQUESTS =>
591
- {
592
- if let Some ( d) = e. get_details ( ) {
593
- let detail = d. detail . unwrap_or_else ( || "unknown" . to_string ( ) ) ;
594
- if detail. contains ( TUNNEL_COUNT_LIMIT_NAME )
595
- && self . try_recycle_tunnel ( ) . await ?
596
- {
597
- continue ;
598
- }
599
-
600
- return Err ( AnyError :: from ( TunnelCreationFailed (
601
- name. to_string ( ) ,
602
- detail,
603
- ) ) ) ;
574
+ None => loop {
575
+ let result = spanf ! (
576
+ self . log,
577
+ self . log. span( "dev-tunnel.create" ) ,
578
+ self . client. create_tunnel(
579
+ Tunnel {
580
+ labels: self . get_labels( name) ,
581
+ ..Default :: default ( )
582
+ } ,
583
+ options
584
+ )
585
+ ) ;
586
+
587
+ match result {
588
+ Err ( HttpError :: ResponseError ( e) )
589
+ if e. status_code == StatusCode :: TOO_MANY_REQUESTS =>
590
+ {
591
+ if let Some ( d) = e. get_details ( ) {
592
+ let detail = d. detail . unwrap_or_else ( || "unknown" . to_string ( ) ) ;
593
+ if detail. contains ( TUNNEL_COUNT_LIMIT_NAME )
594
+ && self . try_recycle_tunnel ( ) . await ?
595
+ {
596
+ continue ;
604
597
}
605
598
606
599
return Err ( AnyError :: from ( TunnelCreationFailed (
607
600
name. to_string ( ) ,
608
- "You have exceeded a limit for the port fowarding service. Please remove other machines before trying to add this machine." . to_string ( ) ,
601
+ detail ,
609
602
) ) ) ;
610
603
}
611
- Err ( e ) => {
612
- return Err ( AnyError :: from ( TunnelCreationFailed (
604
+
605
+ return Err ( AnyError :: from ( TunnelCreationFailed (
613
606
name. to_string ( ) ,
614
- format ! ( "{:?}" , e) ,
615
- ) ) )
616
- }
617
- Ok ( t) => break t,
607
+ "You have exceeded a limit for the port fowarding service. Please remove other machines before trying to add this machine." . to_string ( ) ,
608
+ ) ) ) ;
618
609
}
610
+ Err ( e) => {
611
+ return Err ( AnyError :: from ( TunnelCreationFailed (
612
+ name. to_string ( ) ,
613
+ format ! ( "{:?}" , e) ,
614
+ ) ) )
615
+ }
616
+ Ok ( t) => break t,
619
617
}
620
- }
618
+ } ,
621
619
} ;
622
620
623
621
let pt = PersistedTunnel {
@@ -631,7 +629,7 @@ impl DevTunnels {
631
629
}
632
630
633
631
/// Gets the expected tunnel tags
634
- fn get_tags ( & self , name : & str ) -> Vec < String > {
632
+ fn get_labels ( & self , name : & str ) -> Vec < String > {
635
633
vec ! [
636
634
name. to_string( ) ,
637
635
PROTOCOL_VERSION_TAG . to_string( ) ,
@@ -649,20 +647,20 @@ impl DevTunnels {
649
647
tunnel : Tunnel ,
650
648
options : & TunnelRequestOptions ,
651
649
) -> Result < Tunnel , AnyError > {
652
- let new_tags = self . get_tags ( name) ;
653
- if vec_eq_as_set ( & tunnel. tags , & new_tags ) {
650
+ let new_labels = self . get_labels ( name) ;
651
+ if vec_eq_as_set ( & tunnel. labels , & new_labels ) {
654
652
return Ok ( tunnel) ;
655
653
}
656
654
657
655
debug ! (
658
656
self . log,
659
657
"Updating tunnel tags {} -> {}" ,
660
- tunnel. tags . join( ", " ) ,
661
- new_tags . join( ", " )
658
+ tunnel. labels . join( ", " ) ,
659
+ new_labels . join( ", " )
662
660
) ;
663
661
664
662
let tunnel_update = Tunnel {
665
- tags : new_tags ,
663
+ labels : new_labels ,
666
664
tunnel_id : tunnel. tunnel_id . clone ( ) ,
667
665
cluster_id : tunnel. cluster_id . clone ( ) ,
668
666
..Default :: default ( )
@@ -725,7 +723,7 @@ impl DevTunnels {
725
723
self . log,
726
724
self . log. span( "dev-tunnel.listall" ) ,
727
725
self . client. list_all_tunnels( & TunnelRequestOptions {
728
- tags : tags. iter( ) . map( |t| t. to_string( ) ) . collect( ) ,
726
+ labels : tags. iter( ) . map( |t| t. to_string( ) ) . collect( ) ,
729
727
..Default :: default ( )
730
728
} )
731
729
)
@@ -739,8 +737,8 @@ impl DevTunnels {
739
737
self . log,
740
738
self . log. span( "dev-tunnel.rename.search" ) ,
741
739
self . client. list_all_tunnels( & TunnelRequestOptions {
742
- tags : vec![ self . tag. to_string( ) , name. to_string( ) ] ,
743
- require_all_tags : true ,
740
+ labels : vec![ self . tag. to_string( ) , name. to_string( ) ] ,
741
+ require_all_labels : true ,
744
742
limit: 1 ,
745
743
include_ports: true ,
746
744
token_scopes: vec![ "host" . to_string( ) ] ,
@@ -770,7 +768,7 @@ impl DevTunnels {
770
768
v. status
771
769
. as_ref ( )
772
770
. and_then ( |s| s. host_connection_count . as_ref ( ) . map ( |c| c. get_count ( ) ) )
773
- . unwrap_or ( 0 ) > 0 && v. tags . iter ( ) . any ( |t| t == n)
771
+ . unwrap_or ( 0 ) > 0 && v. labels . iter ( ) . any ( |t| t == n)
774
772
} )
775
773
} ;
776
774
0 commit comments