54 lines
1.5 KiB
Go
54 lines
1.5 KiB
Go
package connect
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"log"
|
|
"net"
|
|
"net/http"
|
|
|
|
"github.com/hashicorp/consul/api"
|
|
)
|
|
|
|
type apiHandler struct{}
|
|
|
|
func (apiHandler) ServeHTTP(http.ResponseWriter, *http.Request) {}
|
|
|
|
// Note: this assumes a suitable Consul ACL token with 'service:write' for
|
|
// service 'web' is set in CONSUL_HTTP_TOKEN ENV var.
|
|
func ExampleService_ServerTLSConfig_hTTP() {
|
|
client, _ := api.NewClient(api.DefaultConfig())
|
|
svc, _ := NewService("web", client)
|
|
server := &http.Server{
|
|
Addr: ":8080",
|
|
Handler: apiHandler{},
|
|
TLSConfig: svc.ServerTLSConfig(),
|
|
}
|
|
// Cert and key files are blank since the tls.Config will handle providing
|
|
// those dynamically.
|
|
log.Fatal(server.ListenAndServeTLS("", ""))
|
|
}
|
|
|
|
func acceptLoop(l net.Listener) {}
|
|
|
|
// Note: this assumes a suitable Consul ACL token with 'service:write' for
|
|
// service 'web' is set in CONSUL_HTTP_TOKEN ENV var.
|
|
func ExampleService_ServerTLSConfig_tLS() {
|
|
client, _ := api.NewClient(api.DefaultConfig())
|
|
svc, _ := NewService("web", client)
|
|
l, _ := tls.Listen("tcp", ":8080", svc.ServerTLSConfig())
|
|
acceptLoop(l)
|
|
}
|
|
|
|
func handleResponse(r *http.Response) {}
|
|
|
|
// Note: this assumes a suitable Consul ACL token with 'service:write' for
|
|
// service 'web' is set in CONSUL_HTTP_TOKEN ENV var.
|
|
func ExampleService_HTTPClient() {
|
|
client, _ := api.NewClient(api.DefaultConfig())
|
|
svc, _ := NewService("web", client)
|
|
|
|
httpClient := svc.HTTPClient()
|
|
resp, _ := httpClient.Get("https://web.service.consul/foo/bar")
|
|
handleResponse(resp)
|
|
}
|