Compare commits
7 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| b8d0dafa04 | |||
| 3685269236 | |||
| 2a6671654a | |||
| 3a42715b5d | |||
| 222300d8e3 | |||
| 6c00fc98f5 | |||
| effc7a6039 |
@@ -80,19 +80,17 @@ func (s *Service) Register() error {
|
|||||||
go func(s *Service) { // startup register
|
go func(s *Service) { // startup register
|
||||||
ticker := time.NewTicker(time.Millisecond * 100)
|
ticker := time.NewTicker(time.Millisecond * 100)
|
||||||
for range ticker.C {
|
for range ticker.C {
|
||||||
ok, _ := s.healthCheck()
|
if ok, _ := s.healthCheck(); ok {
|
||||||
if ok {
|
|
||||||
ticker.Stop()
|
ticker.Stop()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}(s)
|
}(s)
|
||||||
|
|
||||||
go func(s *Service) { // TTL
|
go func(s *Service) { // TTL
|
||||||
interval := s.ttl - time.Second*2
|
interval := s.ttl - time.Second*2 // 2 seconds overhead
|
||||||
ticker := time.NewTicker(interval)
|
ticker := time.NewTicker(interval)
|
||||||
for range ticker.C {
|
for range ticker.C {
|
||||||
_, err := s.healthCheck()
|
if _, err := s.healthCheck(); err != nil {
|
||||||
if err != nil {
|
|
||||||
fmt.Printf("TTL Error: %v\n", err)
|
fmt.Printf("TTL Error: %v\n", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -151,14 +149,15 @@ func (s *Service) getTags() []string {
|
|||||||
"traefik.http.routers." + s.Name + ".entryPoints=https",
|
"traefik.http.routers." + s.Name + ".entryPoints=https",
|
||||||
"traefik.http.routers." + s.Name + ".tls=true",
|
"traefik.http.routers." + s.Name + ".tls=true",
|
||||||
"traefik.http.routers." + s.Name + ".service=" + s.Name,
|
"traefik.http.routers." + s.Name + ".service=" + s.Name,
|
||||||
"traefik.http.routers." + s.Name + ".middlewares=auth,requestid,stripprefix_" + s.Name,
|
"traefik.http.routers." + s.Name + ".middlewares=auth_" + s.Name + ",requestid_" + s.Name + ",stripprefix_" + s.Name,
|
||||||
"traefik.http.services." + s.Name + ".loadbalancer.server.scheme=http",
|
"traefik.http.services." + s.Name + ".loadbalancer.server.scheme=http",
|
||||||
"traefik.http.services." + s.Name + ".loadbalancer.server.port=" + strconv.Itoa(s.port),
|
"traefik.http.services." + s.Name + ".loadbalancer.server.port=" + strconv.Itoa(s.port),
|
||||||
"traefik.http.services." + s.Name + ".loadbalancer.passhostheader=false",
|
"traefik.http.services." + s.Name + ".loadbalancer.passhostheader=false",
|
||||||
"traefik.http.middlewares.auth.forwardauth.address=http://identity-svc/api/v1/traefik",
|
// "traefik.http.middlewares.auth_" + s.Name + ".plugin.auth.handlerURL=http://identity-svc/api/v1/traefik",
|
||||||
"traefik.http.middlewares.auth.forwardauth.authResponseHeaders=Set-Cookie, Server",
|
// "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.authRequestHeaders=Cookie",
|
||||||
"traefik.http.middlewares.auth.forwardauth.trustForwardHeader=true",
|
// "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.authResponseHeaders=Set-Cookie, Server",
|
||||||
"traefik.http.middlewares.requestid.plugin.requestid.headerName=X-Request-ID",
|
// "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.trustForwardHeader=true",
|
||||||
|
"traefik.http.middlewares.requestid_" + s.Name + ".plugin.requestid.headerName=X-Request-ID",
|
||||||
"traefik.http.middlewares.stripprefix_" + s.Name + ".stripprefix.prefixes=" + s.pathPrefix,
|
"traefik.http.middlewares.stripprefix_" + s.Name + ".stripprefix.prefixes=" + s.pathPrefix,
|
||||||
"traefik.tls.certificates.certfile=/certs/client.cert",
|
"traefik.tls.certificates.certfile=/certs/client.cert",
|
||||||
"traefik.tls.certificates.keyfile=/certs/client.key",
|
"traefik.tls.certificates.keyfile=/certs/client.key",
|
||||||
|
|||||||
Reference in New Issue
Block a user