Fix default KV configuration
Signed-off-by: Emile Vauge <emile@vauge.com>
This commit is contained in:
parent
d1ffbd8a03
commit
223e8cafac
2 changed files with 2 additions and 5 deletions
|
@ -216,7 +216,6 @@ func NewTraefikDefaultPointersConfiguration() *TraefikConfiguration {
|
||||||
var defaultDocker provider.Docker
|
var defaultDocker provider.Docker
|
||||||
defaultDocker.Watch = true
|
defaultDocker.Watch = true
|
||||||
defaultDocker.Endpoint = "unix:///var/run/docker.sock"
|
defaultDocker.Endpoint = "unix:///var/run/docker.sock"
|
||||||
defaultDocker.TLS = &provider.DockerTLS{}
|
|
||||||
|
|
||||||
// default File
|
// default File
|
||||||
var defaultFile provider.File
|
var defaultFile provider.File
|
||||||
|
@ -238,8 +237,7 @@ func NewTraefikDefaultPointersConfiguration() *TraefikConfiguration {
|
||||||
var defaultConsul provider.Consul
|
var defaultConsul provider.Consul
|
||||||
defaultConsul.Watch = true
|
defaultConsul.Watch = true
|
||||||
defaultConsul.Endpoint = "127.0.0.1:8500"
|
defaultConsul.Endpoint = "127.0.0.1:8500"
|
||||||
defaultConsul.Prefix = "/traefik"
|
defaultConsul.Prefix = "traefik"
|
||||||
defaultConsul.TLS = &provider.KvTLS{}
|
|
||||||
defaultConsul.Constraints = []types.Constraint{}
|
defaultConsul.Constraints = []types.Constraint{}
|
||||||
|
|
||||||
// default ConsulCatalog
|
// default ConsulCatalog
|
||||||
|
@ -252,7 +250,6 @@ func NewTraefikDefaultPointersConfiguration() *TraefikConfiguration {
|
||||||
defaultEtcd.Watch = true
|
defaultEtcd.Watch = true
|
||||||
defaultEtcd.Endpoint = "127.0.0.1:400"
|
defaultEtcd.Endpoint = "127.0.0.1:400"
|
||||||
defaultEtcd.Prefix = "/traefik"
|
defaultEtcd.Prefix = "/traefik"
|
||||||
defaultEtcd.TLS = &provider.KvTLS{}
|
|
||||||
defaultEtcd.Constraints = []types.Constraint{}
|
defaultEtcd.Constraints = []types.Constraint{}
|
||||||
|
|
||||||
//default Zookeeper
|
//default Zookeeper
|
||||||
|
|
|
@ -95,7 +95,7 @@ func (provider *Kv) provide(configurationChan chan<- types.ConfigMessage, pool *
|
||||||
cert, err := tls.LoadX509KeyPair(provider.TLS.Cert, provider.TLS.Key)
|
cert, err := tls.LoadX509KeyPair(provider.TLS.Cert, provider.TLS.Key)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("Failed to load keypair. %s", err)
|
return fmt.Errorf("Failed to load TLS keypair: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
storeConfig.TLS = &tls.Config{
|
storeConfig.TLS = &tls.Config{
|
||||||
|
|
Loading…
Reference in a new issue