From e6b03fdd0230234e09b80c896575be28e8f5e28e Mon Sep 17 00:00:00 2001 From: Piotr Biernat Date: Sat, 26 Apr 2025 12:36:34 +0200 Subject: [PATCH] Removed useless tags --- consul/discovery.go | 36 +++++++++++++++++------------------- 1 file changed, 17 insertions(+), 19 deletions(-) diff --git a/consul/discovery.go b/consul/discovery.go index 6d0c622..93765d0 100644 --- a/consul/discovery.go +++ b/consul/discovery.go @@ -3,10 +3,8 @@ package consul import ( "fmt" "net/http" - "strconv" "time" - "git.ego.cloudns.be/egommerce/go-api-pkg/config" consul "github.com/hashicorp/consul/api" "github.com/hashicorp/consul/connect" ) @@ -195,29 +193,29 @@ func (s *Service) healthCheck() (bool, error) { func (s *Service) getTags() []string { tags := []string{ - "traefik.enable=true", + // "traefik.enable=true", // "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.trustForwardHeader=true", // "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.authRequestHeaders=Cookie", // "traefik.http.middlewares.auth_" + s.Name + ".forwardauth.authResponseHeaders=Set-Cookie, Server", - "traefik.http.middlewares.auth_" + s.Name + ".plugin.auth.handlerURL=" + config.GetEnv("AUTH_HANDLER_URL", "https://identity.service.ego.io/api/v1/traefik"), - "traefik.http.middlewares.stripprefix_" + s.Name + ".stripprefix.prefixes=" + s.pathPrefix, - "traefik.http.middlewares.requestid_" + s.Name + ".plugin.requestid.headerName=X-Request-ID", + // "traefik.http.middlewares.auth_" + s.Name + ".plugin.auth.handlerURL=" + config.GetEnv("AUTH_HANDLER_URL", "https://identity.service.ego.io/api/v1/traefik"), + // "traefik.http.middlewares.stripprefix_" + s.Name + ".stripprefix.prefixes=" + s.pathPrefix, + // "traefik.http.middlewares.requestid_" + s.Name + ".plugin.requestid.headerName=X-Request-ID", // "treafik.http.middlewares.retryif_" + s.Name + ".plugin.retryif.attempts=3", // "treafik.http.middlewares.retryif_" + s.Name + ".plugin.retryif.statusCode=503", - "traefik.http.routers." + s.Name + ".rule=Host(`" + s.domain + "`) && PathPrefix(`" + s.pathPrefix + "`)", - "traefik.http.routers." + s.Name + ".entryPoints=https", - "traefik.http.routers." + s.Name + ".tls=true", - "traefik.http.routers." + s.Name + ".service=" + s.Name, + // "traefik.http.routers." + s.Name + ".rule=Host(`" + s.domain + "`) && PathPrefix(`" + s.pathPrefix + "`)", + // "traefik.http.routers." + s.Name + ".entryPoints=https", + // "traefik.http.routers." + s.Name + ".tls=true", + // "traefik.http.routers." + s.Name + ".service=" + s.Name, // "traefik.http.routers." + s.Name + ".middlewares=auth_" + s.Name + ",stripprefix_" + s.Name, - "traefik.http.routers." + s.Name + ".middlewares=auth_" + s.Name + ",stripprefix_" + s.Name + ",requestid_" + s.Name + "", - "traefik.http.services." + s.Name + ".loadbalancer.server.scheme=https", - "traefik.http.services." + s.Name + ".loadbalancer.server.port=" + strconv.Itoa(s.port), - "traefik.http.services." + s.Name + ".loadbalancer.passhostheader=true", - "traefik.http.services." + s.Name + ".loadbalancer.healthcheck.interval=5s", - "traefik.http.services." + s.Name + ".loadbalancer.healthcheck.timeout=1s", - "traefik.http.services." + s.Name + ".loadbalancer.healthcheck.path=/health", - "traefik.tls.certificates.certfile=certs/client.crt", - "traefik.tls.certificates.keyfile=certs/client.key", + // "traefik.http.routers." + s.Name + ".middlewares=auth_" + s.Name + ",stripprefix_" + s.Name + ",requestid_" + s.Name + "", + // "traefik.http.services." + s.Name + ".loadbalancer.server.scheme=https", + // "traefik.http.services." + s.Name + ".loadbalancer.server.port=" + strconv.Itoa(s.port), + // "traefik.http.services." + s.Name + ".loadbalancer.passhostheader=true", + // "traefik.http.services." + s.Name + ".loadbalancer.healthcheck.interval=5s", + // "traefik.http.services." + s.Name + ".loadbalancer.healthcheck.timeout=1s", + // "traefik.http.services." + s.Name + ".loadbalancer.healthcheck.path=/health", + // "traefik.tls.certificates.certfile=certs/client.crt", + // "traefik.tls.certificates.keyfile=certs/client.key", } return tags