-
Notifications
You must be signed in to change notification settings - Fork 896
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Eureka: Remove encoded port from VIP address defaults #5451
Conversation
Signed-off-by: Adrian Cole <adrian@tetrate.io>
@@ -266,7 +283,7 @@ private static String vipAddress(@Nullable String vipAddress, String hostName, P | |||
if (!portWrapper.isEnabled()) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this check is still helpful as it avoids adding secureVipAddress when there's no secure port
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## main #5451 +/- ##
=========================================
Coverage 73.99% 74.00%
- Complexity 20740 20748 +8
=========================================
Files 1800 1800
Lines 76426 76431 +5
Branches 9728 9728
=========================================
+ Hits 56552 56561 +9
- Misses 15266 15267 +1
+ Partials 4608 4603 -5 ☔ View full report in Codecov by Sentry. |
eureka/src/main/java/com/linecorp/armeria/server/eureka/EurekaUpdatingListener.java
Outdated
Show resolved
Hide resolved
Signed-off-by: Adrian Cole <adrian@tetrate.io>
fixed the description |
test flake is unrelated |
ps the really really long story about this small bug https://github.com/openzipkin/zipkin/releases/tag/3.0.6 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I apologize for the lack of integration testing and greatly appreciate your effort!
there seems to be another glitch which I will look into (past this). More UX related? openzipkin/zipkin#3697 (comment) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @codefromthecrypt 🙇 👍 🙇
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks!! 🙇♂️
Motivation: Currently, when armeria registers a server, it appends `:${port}` to Eureka VIP addresses to. While it makes sense to encode the port into the Eureka `serviceId`, the VIP address fields are meant to be hostnames or IPs. Encoding a port into the VIP address makes these unusable for certain clients like spring-cloud-sleuth who heuristically look for a port and only if it is absent trigger Eureka lookups. Modifications: - I removed the logic that appended `:${port}` to both the `vipAddress` and `secureVipAddress` - I changed the test which actually proved the bug was present! Result: - Manual integration with zipkin, sleuth is now able to look up its endpoint in Eureka. --------- Signed-off-by: Adrian Cole <adrian@tetrate.io>
Motivation:
Currently, when armeria registers a server, it appends
:${port}
to Eureka VIP addresses to. While it makes sense to encode the port into the EurekaserviceId
, the VIP address fields are meant to be hostnames or IPs. Encoding a port into the VIP address makes these unusable for certain clients like spring-cloud-sleuth who heuristically look for a port and only if it is absent trigger Eureka lookups.Modifications:
:${port}
to both thevipAddress
andsecureVipAddress
Result: