Compare commits

...

33 Commits

Author SHA1 Message Date
50dda77019 go.mod update priv git url 2024-05-30 17:01:18 +02:00
c454307d56 consul fixes 2024-04-19 19:17:09 +02:00
359a89ba62 consul fixes 2024-04-19 19:01:16 +02:00
3b73091cfb consul fixes 2023-07-29 15:11:22 +02:00
c8beab76f1 consul fixes 2023-07-29 14:57:36 +02:00
599eaa3712 consul fixes 2023-07-29 13:47:51 +02:00
1de38fdfdf consul fixes 2023-07-26 23:19:17 +02:00
4d1f3644b0 consul fixes 2023-07-26 23:14:25 +02:00
71b3f13284 consul fixes 2023-07-08 17:18:19 +02:00
c64bc3fe6b consul fixes 2023-07-08 17:16:53 +02:00
016bddb5c4 register fix 2 2023-07-08 17:11:53 +02:00
98d85810f3 register fix 2 2023-07-08 13:02:13 +02:00
3fc1191f6e register fix 2 2023-07-08 02:22:28 +02:00
52793ac244 register fix 2 2023-07-06 23:02:05 +02:00
f8a1ae841d register fix 2 2023-07-06 21:49:12 +02:00
9d424742d6 register fix 2 2023-07-06 21:45:45 +02:00
a9b73a6536 register fix 2 2023-07-06 19:30:00 +02:00
95584eb407 register fix 2 2023-07-05 23:44:47 +02:00
ce7e2bc75a register fix 2 2023-07-05 23:37:55 +02:00
4bedc5d926 register fix 2 2023-07-05 23:35:17 +02:00
ea7f98f8bb register fix 2023-07-05 22:45:12 +02:00
bbdce9b25a register fix 2023-07-05 22:25:56 +02:00
1d75153698 consul register fix 2023-07-04 18:54:12 +02:00
c177133daf consul register fix 2023-07-04 18:46:00 +02:00
dad915f2ec consul register fix 2023-07-04 18:41:52 +02:00
54e4006d0d consul connect fixing 2023-07-04 00:02:23 +02:00
9cb590bf7a consul register as sidecar_service fix 2023-07-03 00:36:07 +02:00
70c41dab96 consul register as sidecar_service fix 2023-07-02 23:04:26 +02:00
99ac0a83c6 consul register as sidecar_service 2023-07-02 23:03:05 +02:00
30c45b4503 consul https temp fix 2023-07-02 22:38:13 +02:00
49f552bf68 consul register as sidecar_service 2023-07-02 22:30:53 +02:00
6f875cbb94 consul register as sidecar_service 2023-07-02 22:24:55 +02:00
f9331deec1 consul debug 2023-07-02 01:46:11 +02:00
2 changed files with 42 additions and 30 deletions

View File

@@ -61,16 +61,26 @@ func (s *Service) GetID() string {
}
func (s *Service) GetFullAddr() string {
return fmt.Sprintf("https://%s:%d/", s.domain, s.port)
isTLS := s.port == 443
proto := "http"
if isTLS {
proto = "https"
}
return fmt.Sprintf("%s://%s:%d/", proto, s.domain, s.port)
}
func (s *Service) Register() error {
def := &consul.AgentServiceRegistration{
ID: s.GetID(),
ID: s.GetID(),
// Kind: consul.ServiceKindConnectProxy,
Name: s.Name,
Address: s.Address,
Port: s.port,
Tags: s.getTags(),
// Connect: &consul.AgentServiceConnect{Native: true},
// Proxy: &consul.AgentServiceConnectProxyConfig{
// DestinationServiceName: s.Name,
// },
Check: &consul.AgentServiceCheck{
TTL: s.ttl.String(),
Status: "passing",
@@ -82,38 +92,42 @@ func (s *Service) Register() error {
return err
}
go func(s *Service) { // startup register
ticker := time.NewTicker(time.Second * 1)
for range ticker.C {
if ok, _ := s.healthCheck(); ok {
ticker.Stop()
}
}
}(s)
go func(s *Service) { // TTL
interval := s.ttl - time.Second*2 // 2 seconds overhead
ticker := time.NewTicker(interval)
for range ticker.C {
if _, err := s.healthCheck(); err != nil {
fmt.Printf("TTL Error #: %v\n", err)
}
}
}(s)
return nil
}
func (s *Service) Unregister() error {
return s.agent.ServiceDeregister(s.GetID())
}
func (s *Service) RegisterHealthChecks() {
go func() { // startup register
ticker := time.NewTicker(time.Second * 1)
for range ticker.C {
if ok, _ := s.healthCheck(); ok {
ticker.Stop()
}
}
}()
go func() { // TTL
interval := s.ttl - (time.Second * 2) // 2 seconds overhead
ticker := time.NewTicker(interval)
for range ticker.C {
if _, err := s.healthCheck(); err != nil {
fmt.Printf("TTL Error #: %v\n", err)
}
}
}()
}
func (s *Service) Connect() (*connect.Service, error) {
// srvName := s.Name
srvName := s.Name
fmt.Printf("CONNECT SERVER: %s\n", srvName)
svc, err := connect.NewService(srvName, s.client)
// l := hclog.New(&hclog.LoggerOptions{
// Name: "consul-registry",
// Level: hclog.Trace,
// })
svc, err := connect.NewService(s.Name, s.client)
s.connect = svc
cnf := svc.ServerTLSConfig()
fmt.Printf("CONNECT SERVER:: %s CONFIG:: %v\n", s.Name, cnf)
for k, c := range cnf.Certificates {
fmt.Printf("CONNECT CERT %d: %v", k, c)
}
@@ -135,7 +149,6 @@ func (s *Service) healthCheck() (bool, error) {
}
req.Header.Set("User-Agent", "service/internal")
fmt.Printf("Sending HEALTH CHECK request to: %s\n", healthUrl)
resp, err := client.Do(req)
if err != nil {
return false
@@ -144,7 +157,6 @@ func (s *Service) healthCheck() (bool, error) {
var body []byte
resp.Body.Read(body)
fmt.Printf("HEALTH CHECK response to: %v -- %v\n", resp, body)
return resp.StatusCode == http.StatusOK
}()
@@ -168,7 +180,7 @@ func (s *Service) getTags() []string {
"traefik.enable=true",
"traefik.http.routers." + s.Name + ".rule=PathPrefix(`" + s.pathPrefix + "`)",
"traefik.http.routers." + s.Name + ".entryPoints=https",
"traefik.http.routers." + s.Name + ".tls=true",
// "traefik.http.routers." + s.Name + ".tls=true",
"traefik.http.routers." + s.Name + ".service=" + s.Name,
"traefik.http.routers." + s.Name + ".middlewares=auth_" + s.Name + ",requestid_" + s.Name + ",stripprefix_" + s.Name,
"traefik.http.services." + s.Name + ".loadbalancer.server.scheme=http",

4
go.mod
View File

@@ -1,9 +1,9 @@
module git.pbiernat.dev/egommerce/go-api-pkg
module git.pbiernat.io/egommerce/go-api-pkg
go 1.18
require (
git.pbiernat.dev/egommerce/api-entities v0.0.26
git.pbiernat.io/egommerce/api-entities v0.0.26
github.com/fluent/fluent-logger-golang v1.9.0
github.com/go-redis/redis/v8 v8.11.5
github.com/hashicorp/consul v1.16.0