Compare commits
6 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 159bce1ff2 | |||
| 22bc1e29a3 | |||
| 4ce9064fbb | |||
| 75f7a75379 | |||
| 398d7a2074 | |||
| b699008fa3 |
@@ -27,16 +27,20 @@ type Service struct {
|
||||
|
||||
var ErrServiceUnavailable = fmt.Errorf("Service is unavailable")
|
||||
|
||||
func NewService(servAddr, id, name, hostname, domain, pathPrefix string, appPort int) (*Service, error) {
|
||||
func NewService(servAddr, id, name, useDomainOverIp, addr, domain, pathPrefix string, appPort int) (*Service, error) {
|
||||
s := new(Service)
|
||||
s.Name = name
|
||||
s.Address = hostname
|
||||
s.Address = addr
|
||||
s.appID = id
|
||||
s.domain = domain
|
||||
s.pathPrefix = pathPrefix
|
||||
s.port = appPort
|
||||
s.ttl = time.Second * 10
|
||||
|
||||
if useDomainOverIp == "true" { // FIXME types...
|
||||
s.Address = domain
|
||||
}
|
||||
|
||||
client, err := consul.NewClient(newClientConfig(servAddr))
|
||||
if err != nil {
|
||||
return nil, err
|
||||
@@ -66,7 +70,7 @@ func (s *Service) GetFullAddr() string {
|
||||
if isTLS {
|
||||
proto = "https"
|
||||
}
|
||||
return fmt.Sprintf("%s://%s:%d/", proto, s.domain, s.port)
|
||||
return fmt.Sprintf("%s://%s:%d/", proto, s.Address, s.port)
|
||||
}
|
||||
|
||||
func (s *Service) Register() error {
|
||||
@@ -95,6 +99,11 @@ func (s *Service) Register() error {
|
||||
return nil
|
||||
}
|
||||
func (s *Service) Unregister() error {
|
||||
// s.client.Catalog().Deregister(&consul.CatalogDeregistration{
|
||||
// Address: s.Address,
|
||||
// ServiceID: s.GetID(),
|
||||
// }, nil)
|
||||
|
||||
return s.agent.ServiceDeregister(s.GetID())
|
||||
}
|
||||
|
||||
@@ -113,7 +122,7 @@ func (s *Service) RegisterHealthChecks() {
|
||||
ticker := time.NewTicker(interval)
|
||||
for range ticker.C {
|
||||
if _, err := s.healthCheck(); err != nil {
|
||||
fmt.Printf("HealthCheck endpoint not available #: %v\n", err)
|
||||
fmt.Printf("HealthCheck endpoint not available (%s)#: %v\n", s.GetFullAddr(), err)
|
||||
}
|
||||
}
|
||||
}()
|
||||
@@ -182,8 +191,10 @@ func (s *Service) getTags() []string {
|
||||
// "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.authRequestHeaders=Cookie",
|
||||
// "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.authResponseHeaders=Set-Cookie, Server",
|
||||
"traefik.http.middlewares.auth_" + s.Name + ".plugin.auth.handlerURL=" + config.GetEnv("AUTH_HANDLER_URL", "http://identity.service.ego.io/api/v1/traefik"),
|
||||
"traefik.http.middlewares.requestid_" + s.Name + ".plugin.requestid.headerName=X-Request-ID",
|
||||
"traefik.http.middlewares.stripprefix_" + s.Name + ".stripprefix.prefixes=" + s.pathPrefix,
|
||||
"traefik.http.middlewares.requestid_" + s.Name + ".plugin.requestid.headerName=X-Request-ID",
|
||||
"treafik.http.middlewares.retryif_" + s.Name + ".plugin.retryif.attempts: 3",
|
||||
"treafik.http.middlewares.retryif_" + s.Name + ".plugin.retryif.statusCode: 503",
|
||||
"traefik.http.routers." + s.Name + ".rule=PathPrefix(`" + s.pathPrefix + "`)",
|
||||
// "traefik.http.routers." + s.Name + ".rule=Host(`" + s.domain + "`)",
|
||||
"traefik.http.routers." + s.Name + ".entryPoints=https",
|
||||
|
||||
Reference in New Issue
Block a user