Connect-Native Integration with Go

    We provide a library that makes it drop-in simple to integrate Connect with most Go applications. This page shows examples of integrating this library for accepting or establishing Connect-based connections. For most Go applications, Connect can be natively integrated in just a single line of code excluding imports and struct initialization.

    In addition to this, please read and understand the . In particular, after integrating applications with Connect, they must declare that they accept Connect-based connections via their service definitions.

    Any server that supports TLS (HTTP, gRPC, net/rpc, etc.) can begin accepting Connect-based connections in just a few lines of code. For most existing applications, converting the server to accept Connect-based connections will require only a one-line change excluding imports and structure initialization.

    The Go library exposes a *tls.Config that automatically communicates with Consul to load certificates and authorize inbound connections during the TLS handshake. This also automatically starts goroutines to update any changing certs.

    Example, followed by more details:

    1. import(
    2. "net/http"
    3. "github.com/hashicorp/consul/api"
    4. "github.com/hashicorp/consul/connect"
    5. )
    6. func main() {
    7. // Create a Consul API client
    8. client, _ := api.NewClient(api.DefaultConfig())
    9. // Create an instance representing this service. "my-service" is the
    10. // name of _this_ service. The service should be cleaned up via Close.
    11. svc, _ := connect.NewService("my-service", client)
    12. defer svc.Close()
    13. // Creating an HTTP server that serves via Connect
    14. server := &http.Server{
    15. Addr: ":8080",
    16. TLSConfig: svc.ServerTLSConfig(),
    17. // ... other standard fields
    18. }
    19. // Serve!
    20. server.ListenAndServeTLS("", "")
    21. }

    The first step is to create a Consul API client. This is almost always the default configuration with an ACL token set, since you want to communicate to the local agent. The default configuration will also read the ACL token from environment variables if set. The Go library will use this client to request certificates, authorize connections, and more.

    Next, connect.NewService is called to create a service structure representing the currently running service. This structure maintains all the state for accepting and establishing connections. An application should generally create one service and reuse that one service for all servers and clients.

    Since the service returns a standard *tls.Config, any server that supports TLS can be configured. This includes gRPC, net/rpc, basic TCP, and more. Another example is shown below with just a plain TLS listener:

    1. import(
    2. "crypto/tls"
    3. "github.com/hashicorp/consul/connect"
    4. )
    5. func main() {
    6. // Create a Consul API client
    7. client, _ := api.NewClient(api.DefaultConfig())
    8. // Create an instance representing this service. "my-service" is the
    9. // name of _this_ service. The service should be cleaned up via Close.
    10. svc, _ := connect.NewService("my-service", client)
    11. defer svc.Close()
    12. // Creating an HTTP server that serves via Connect
    13. listener, _ := tls.Listen("tcp", ":8080", svc.ServerTLSConfig())
    14. defer listener.Close()
    15. // Accept
    16. go acceptLoop(listener)
    17. }

    For Go applications that need to Connect to HTTP-based upstream dependencies, the Go library can construct an *http.Client that automatically establishes Connect-based connections as long as Consul-based service discovery is used.

    Example, followed by more details:

    1. import(
    2. "github.com/hashicorp/consul/api"
    3. "github.com/hashicorp/consul/connect"
    4. )
    5. func main() {
    6. // Create a Consul API client
    7. client, _ := api.NewClient(api.DefaultConfig())
    8. // Create an instance representing this service. "my-service" is the
    9. // name of _this_ service. The service should be cleaned up via Close.
    10. svc, _ := connect.NewService("my-service", client)
    11. defer svc.Close()
    12. // Get an HTTP client
    13. // Perform a request, then use the standard response
    14. resp, _ := httpClient.Get("https://userinfo.service.consul/user/mitchellh")
    15. }

    The first step is to create a Consul API client and service. These are the same steps as accepting connections and are explained in detail in the section above. If your application is both a client and server, both the API client and service structure can be shared and reused.

    Next, we call svc.HTTPClient() to return a specially configured . This client will automatically established Connect-based connections using Consul service discovery.

    Finally, we perform an HTTP GET request to a hypothetical userinfo service. The HTTP client configuration automatically sends the correct client certificate, verifies the server certificate, and manages background goroutines for updating our certificates as necessary.

    If the application already uses a manually constructed *http.Client, the svc.HTTPDialTLS function can be used to configure the http.Transport.DialTLS field to achieve equivalent behavior.

    • The scheme must be https://.
    • It must be a Consul DNS name in one of the following forms:
    • The top-level domain must be .consul even if your cluster has a custom domain configured for its DNS interface. This might be relaxed in the future.
    • Tag filters for services are not currently supported (i.e. tag1.web.service.consul) however the same behavior can be achieved using a prepared query.
    • External DNS names, raw IP addresses and so on will cause an error and should be fetched using a separate HTTPClient.

    For a raw net.Conn TLS connection, the svc.Dial function can be used. This will establish a connection to the desired service via Connect and return the net.Conn. This connection can then be used as desired.

    Example:

    1. import (
    2. "context"
    3. "github.com/hashicorp/consul/api"
    4. "github.com/hashicorp/consul/connect"
    5. )
    6. func main() {
    7. // Create a Consul API client
    8. client, _ := api.NewClient(api.DefaultConfig())
    9. // Create an instance representing this service. "my-service" is the
    10. // name of _this_ service. The service should be cleaned up via Close.
    11. svc, _ := connect.NewService("my-service", client)
    12. defer svc.Close()
    13. // Connect to the "userinfo" Consul service.
    14. conn, _ := svc.Dial(context.Background(), &connect.ConsulResolver{
    15. Client: client,
    16. Name: "userinfo",
    17. })
    18. }

    This uses a familiar Dial-like function to establish raw net.Conn values. The second parameter to dial is an implementation of the connect.Resolver interface. The example above uses the *connect.ConsulResolver implementation to perform Consul-based service discovery. This also automatically determines the correct certificate metadata we expect the remote service to serve.

    In the raw TLS connection example, you see the use of a implementation. This interface can be implemented to perform address resolution. This must return the address and also the URI SAN expected in the TLS certificate served by the remote service.

    The Go library provides two built-in resolvers:

    • can be used for static addresses where no service discovery is required. The expected cert URI SAN must be manually specified.