Compare commits
10 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| eb1e8a9cb0 | |||
| 2c797164e0 | |||
| 7725e5dd65 | |||
| 07c0cd6f2e | |||
| d29bd0810b | |||
| b62c0e5a8c | |||
| a9eb0d0732 | |||
| 92b84685c9 | |||
| cd6e62e3bc | |||
| 7cf2d91fd8 |
@@ -25,8 +25,8 @@ type Service struct {
|
|||||||
connect *connect.Service
|
connect *connect.Service
|
||||||
kv *consul.KV
|
kv *consul.KV
|
||||||
|
|
||||||
hcTicker *time.Ticker
|
// hcTicker *time.Ticker
|
||||||
ttlTicker *time.Ticker
|
// ttlTicker *time.Ticker
|
||||||
}
|
}
|
||||||
|
|
||||||
var ErrServiceUnavailable = fmt.Errorf("Service is unavailable")
|
var ErrServiceUnavailable = fmt.Errorf("Service is unavailable")
|
||||||
@@ -85,11 +85,13 @@ func (s *Service) Register() error {
|
|||||||
Address: s.Address,
|
Address: s.Address,
|
||||||
Port: s.port,
|
Port: s.port,
|
||||||
Tags: s.getTags(),
|
Tags: s.getTags(),
|
||||||
// Connect: &consul.AgentServiceConnect{Native: true},
|
Connect: &consul.AgentServiceConnect{Native: true},
|
||||||
// Proxy: &consul.AgentServiceConnectProxyConfig{
|
// Proxy: &consul.AgentServiceConnectProxyConfig{
|
||||||
// DestinationServiceName: s.Name,
|
// DestinationServiceName: s.Name,
|
||||||
// },
|
// },
|
||||||
Check: &consul.AgentServiceCheck{
|
Check: &consul.AgentServiceCheck{
|
||||||
|
// Interval: "5s",
|
||||||
|
// Timeout: "1s",
|
||||||
TTL: s.ttl.String(),
|
TTL: s.ttl.String(),
|
||||||
Status: "passing",
|
Status: "passing",
|
||||||
DeregisterCriticalServiceAfter: "10s",
|
DeregisterCriticalServiceAfter: "10s",
|
||||||
@@ -142,11 +144,10 @@ func (s *Service) Connect() (*connect.Service, error) {
|
|||||||
// })
|
// })
|
||||||
svc, err := connect.NewService(s.Name, s.client)
|
svc, err := connect.NewService(s.Name, s.client)
|
||||||
s.connect = svc
|
s.connect = svc
|
||||||
cnf := svc.ServerTLSConfig()
|
fmt.Printf("CONNECT SERVER:: %s CERTS:: %v\n", s.Name, svc.ServerTLSConfig())
|
||||||
fmt.Printf("CONNECT SERVER:: %s CONFIG:: %v\n", s.Name, cnf)
|
// for k, c := range cnf.Certificates {
|
||||||
for k, c := range cnf.Certificates {
|
// fmt.Printf("CONNECT CERT %d: %v", k, c)
|
||||||
fmt.Printf("CONNECT CERT %d: %v", k, c)
|
// }
|
||||||
}
|
|
||||||
|
|
||||||
return svc, err
|
return svc, err
|
||||||
}
|
}
|
||||||
@@ -203,8 +204,7 @@ func (s *Service) getTags() []string {
|
|||||||
"traefik.http.middlewares.requestid_" + s.Name + ".plugin.requestid.headerName=X-Request-ID",
|
"traefik.http.middlewares.requestid_" + s.Name + ".plugin.requestid.headerName=X-Request-ID",
|
||||||
// "treafik.http.middlewares.retryif_" + s.Name + ".plugin.retryif.attempts=3",
|
// "treafik.http.middlewares.retryif_" + s.Name + ".plugin.retryif.attempts=3",
|
||||||
// "treafik.http.middlewares.retryif_" + s.Name + ".plugin.retryif.statusCode=503",
|
// "treafik.http.middlewares.retryif_" + s.Name + ".plugin.retryif.statusCode=503",
|
||||||
"traefik.http.routers." + s.Name + ".rule=PathPrefix(`" + s.pathPrefix + "`)",
|
"traefik.http.routers." + s.Name + ".rule=Host(`" + s.domain + "`) && PathPrefix(`" + s.pathPrefix + "`)",
|
||||||
"traefik.http.routers." + s.Name + ".rule=Host(`" + s.domain + "`)",
|
|
||||||
"traefik.http.routers." + s.Name + ".entryPoints=https",
|
"traefik.http.routers." + s.Name + ".entryPoints=https",
|
||||||
"traefik.http.routers." + s.Name + ".tls=true",
|
"traefik.http.routers." + s.Name + ".tls=true",
|
||||||
"traefik.http.routers." + s.Name + ".service=" + s.Name,
|
"traefik.http.routers." + s.Name + ".service=" + s.Name,
|
||||||
|
|||||||
Reference in New Issue
Block a user