Compare commits

..

13 Commits

Author SHA1 Message Date
6dd11c6441 Consul debug 2023-06-29 00:11:56 +02:00
045dd23a76 Consul debug 2023-06-29 00:03:06 +02:00
90e832af61 Consul debug 2023-06-28 23:52:34 +02:00
3d8c706835 Consul debug 2023-06-28 23:40:33 +02:00
a37f6209ff Consul debug 2023-06-28 23:34:45 +02:00
fc88125fe4 Consul debug 2023-06-28 23:22:15 +02:00
0aa79c7d35 Consul debug and clean 2023-06-28 23:07:10 +02:00
d484c0e3b0 Consul debug 2023-06-28 22:59:31 +02:00
7a35d1f44a Consul debug 2023-06-28 22:54:58 +02:00
7bfd048051 Consul debug 2023-06-28 22:50:16 +02:00
1433b69abe Moar HR 2023-06-28 16:37:18 +02:00
c49ec85b3b update config lib 2023-06-21 20:48:32 +02:00
bdac1d5bc9 update configl lib 2023-06-21 20:45:46 +02:00

View File

@@ -6,6 +6,7 @@ import (
"strconv" "strconv"
"time" "time"
"git.pbiernat.dev/egommerce/go-api-pkg/config"
consul "github.com/hashicorp/consul/api" consul "github.com/hashicorp/consul/api"
) )
@@ -32,7 +33,7 @@ func NewService(servAddr, id, name, hostname, domain, pathPrefix string, appPort
s.domain = domain s.domain = domain
s.pathPrefix = pathPrefix s.pathPrefix = pathPrefix
s.port = appPort s.port = appPort
s.ttl = time.Second * 15 s.ttl = time.Second * 10
client, err := consul.NewClient(newClientConfig(servAddr)) client, err := consul.NewClient(newClientConfig(servAddr))
if err != nil { if err != nil {
@@ -53,7 +54,7 @@ func newClientConfig(serverAddr string) *consul.Config {
} }
func (s *Service) GetID() string { func (s *Service) GetID() string {
return fmt.Sprintf("%s_%s", s.Name, s.appID) return fmt.Sprintf("%s:%s", s.Name, s.appID)
} }
func (s *Service) GetFullAddr() string { func (s *Service) GetFullAddr() string {
@@ -69,7 +70,7 @@ func (s *Service) Register() error {
Tags: s.getTags(), Tags: s.getTags(),
Check: &consul.AgentServiceCheck{ Check: &consul.AgentServiceCheck{
TTL: s.ttl.String(), TTL: s.ttl.String(),
DeregisterCriticalServiceAfter: "5s", DeregisterCriticalServiceAfter: "10s",
}, },
} }
@@ -78,7 +79,7 @@ func (s *Service) Register() error {
} }
go func(s *Service) { // startup register go func(s *Service) { // startup register
ticker := time.NewTicker(time.Millisecond * 100) ticker := time.NewTicker(time.Second * 1)
for range ticker.C { for range ticker.C {
if ok, _ := s.healthCheck(); ok { if ok, _ := s.healthCheck(); ok {
ticker.Stop() ticker.Stop()
@@ -91,7 +92,7 @@ func (s *Service) Register() error {
ticker := time.NewTicker(interval) ticker := time.NewTicker(interval)
for range ticker.C { for range ticker.C {
if _, err := s.healthCheck(); err != nil { if _, err := s.healthCheck(); err != nil {
fmt.Printf("TTL Error: %v\n", err) fmt.Printf("TTL Error #: %v\n", err)
} }
} }
}(s) }(s)
@@ -118,7 +119,7 @@ func (s *Service) healthCheck() (bool, error) {
if err != nil { if err != nil {
return false return false
} }
req.Header.Set("User-Agent", "Health Check") req.Header.Set("User-Agent", "service/internal")
resp, err := client.Do(req) resp, err := client.Do(req)
if err != nil { if err != nil {
@@ -131,6 +132,7 @@ func (s *Service) healthCheck() (bool, error) {
if alive { if alive {
if err := s.agent.PassTTL("service:"+s.GetID(), "OK"); err != nil { if err := s.agent.PassTTL("service:"+s.GetID(), "OK"); err != nil {
fmt.Printf("Failed to pass TTL: %v", err)
return false, err return false, err
} }
return true, nil return true, nil
@@ -153,7 +155,7 @@ func (s *Service) getTags() []string {
"traefik.http.services." + s.Name + ".loadbalancer.server.scheme=http", "traefik.http.services." + s.Name + ".loadbalancer.server.scheme=http",
"traefik.http.services." + s.Name + ".loadbalancer.server.port=" + strconv.Itoa(s.port), "traefik.http.services." + s.Name + ".loadbalancer.server.port=" + strconv.Itoa(s.port),
"traefik.http.services." + s.Name + ".loadbalancer.passhostheader=false", "traefik.http.services." + s.Name + ".loadbalancer.passhostheader=false",
"traefik.http.middlewares.auth_" + s.Name + ".plugin.auth.handlerURL="", "traefik.http.middlewares.auth_" + s.Name + ".plugin.auth.handlerURL=" + config.GetEnv("AUTH_HANDLER_URL", ""),
// "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.authRequestHeaders=Cookie", // "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.authRequestHeaders=Cookie",
// "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.authResponseHeaders=Set-Cookie, Server", // "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.authResponseHeaders=Set-Cookie, Server",
// "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.trustForwardHeader=true", // "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.trustForwardHeader=true",