Compare commits

...

14 Commits

Author SHA1 Message Date
faace02cb4 added tls support... 2022-12-04 06:05:27 +01:00
7c69590a1d revert: disabled tls on backends 2022-12-04 05:15:46 +01:00
d5f0314b58 disabled tls on backends 2022-12-04 02:05:59 +01:00
4f183541e6 route rule fix 2022-12-03 03:12:07 +01:00
003bf2bb88 route rule change 2022-12-03 02:10:12 +01:00
03ec5a0a5a consul ttl fix 2022-12-02 19:02:21 +01:00
fb251e3648 consul ttl fix 2022-12-02 18:55:40 +01:00
32a89d9747 consul ttl fix 2022-12-02 18:48:12 +01:00
3b6acdc195 consul ttl fix 2022-12-02 17:42:39 +01:00
128e3db0b6 register fix 2022-12-02 16:18:00 +01:00
e0a18538d4 register fix 2022-12-02 14:24:27 +01:00
d99436d2d6 register fix 2022-12-02 14:21:33 +01:00
bc27da0be3 register fix 2022-12-02 03:28:38 +01:00
b8cfbf6b99 register fix 2022-12-02 03:22:36 +01:00

View File

@@ -2,7 +2,6 @@ package consul
import (
"fmt"
"log"
"net/http"
"strconv"
"time"
@@ -62,7 +61,6 @@ func (s *Service) Register() error {
Address: s.Address,
Port: s.Port,
Tags: s.getTags(),
// Meta: s.getMetadata(),
Check: &consul.AgentServiceCheck{
TTL: s.TTL.String(),
},
@@ -71,7 +69,27 @@ func (s *Service) Register() error {
if err := s.ConsulAgent.ServiceRegister(def); err != nil {
return err
}
go s.UpdateTTL(def)
go func() { // startup register
ticker := time.NewTicker(time.Millisecond * 100)
for range ticker.C {
ok, _ := s.healthCheck()
if ok {
ticker.Stop()
}
}
}()
go func() { // TTL
interval := s.TTL - time.Second*2
ticker := time.NewTicker(interval)
for range ticker.C {
_, err := s.healthCheck()
if err != nil {
fmt.Printf("TTL Error: %v\n", err)
}
}
}()
return nil
}
@@ -79,66 +97,53 @@ func (s *Service) Unregister() error {
return s.ConsulAgent.ServiceDeregister(s.GetID())
}
func (s *Service) UpdateTTL(service *consul.AgentServiceRegistration) {
ticker := time.NewTicker(s.TTL / 2)
for range ticker.C {
ok, err := s.check()
if !ok {
if err := s.ConsulAgent.FailTTL("service:"+s.GetID(), err.Error()); err != nil {
log.Println(err)
fmt.Println(err)
}
} else {
if err := s.ConsulAgent.PassTTL("service:"+s.GetID(), "OK"); err != nil {
log.Println(err)
fmt.Println(err)
}
func (s *Service) healthCheck() (bool, error) {
alive := func() bool {
client := &http.Client{}
healthUrl := s.GetFullAddr() + "health"
req, err := http.NewRequest(http.MethodGet, healthUrl, nil)
if err != nil {
return false
}
}
}
req.Header.Set("User-Agent", "Health Check")
func (s *Service) check() (bool, error) {
client := &http.Client{}
healthUrl := fmt.Sprintf("%shealth", s.GetFullAddr())
fmt.Println("HCheck: " + healthUrl)
req, err := http.NewRequest(http.MethodGet, healthUrl, nil)
if err != nil {
return false, ErrServiceUnavailable
}
req.Header.Set("User-Agent", "Health Check")
resp, err := client.Do(req)
if err != nil {
return false
}
defer resp.Body.Close()
resp, err := client.Do(req)
if err != nil {
return false, ErrServiceUnavailable
}
defer resp.Body.Close()
return resp.StatusCode == http.StatusOK
}()
if resp.StatusCode == http.StatusOK {
if alive {
if err := s.ConsulAgent.PassTTL("service:"+s.GetID(), "OK"); err != nil {
return false, err
}
return true, nil
}
if err := s.ConsulAgent.FailTTL("service:"+s.GetID(), ErrServiceUnavailable.Error()); err != nil {
return false, err
}
return false, ErrServiceUnavailable
}
func (s *Service) getMetadata() map[string]string {
m := map[string]string{}
return m
}
func (s *Service) getTags() []string {
tags := []string{
"traefik.enable=true",
"traefik.http.routers." + s.Name + ".rule=Host(`" + s.Domain + "`)",
"traefik.http.routers." + s.Name + ".rule=Headers(`X-API-SERVICE`, `" + s.Name + "`)",
"traefik.http.routers." + s.Name + ".entryPoints=https",
"traefik.http.routers." + s.Name + ".tls=true",
"traefik.http.routers." + s.Name + ".service=" + s.Name,
"traefik.http.routers." + s.Name + ".middlewares=compress,requestid",
"traefik.http.services." + s.Name + ".loadbalancer.passhostheader=false",
"traefik.http.services." + s.Name + ".loadbalancer.server.scheme=http",
"traefik.http.services." + s.Name + ".loadbalancer.server.port=" + strconv.Itoa(s.Port),
"traefik.http.middlewares.compress.compress=true",
"traefik.http.middlewares.requestid.plugin.requestid.headerName=X-Request-ID",
"traefik.tls.certificates.certfile=/certs/client.cert",
"traefik.tls.certificates.keyfile=/certs/client.key",
// "traefik.http.services." + s.Name + ".loadbalancer.passhostheader=false",
// "traefik.http.services." + s.Name + ".loadbalancer.servers." + fullName + "=" + bFullAddr,
// "traefik.http.services." + s.Name + ".loadbalancer.servers." + fullName + ".url=" + bFullAddr,
// "traefik.http.services." + s.Name + ".loadbalancer.healthcheck.path=/health",