--- layout: docs page_title: Service Mesh Native App Integration - Go Apps description: >- Consul's service mesh supports native integrations of Go applications into the service mesh through a Go library. Example code demonstrates how to connect your Go applications to the service mesh. --- # Service Mesh Native Integration for Go Applications The Connect Native golang SDK is currently deprecated and will be removed in a future Consul release. The SDK will be removed when the long term replacement to native application integration (such as a proxyless gRPC service mesh integration) is delivered. Refer to [GH-10339](https://github.com/hashicorp/consul/issues/10339) for additional information and to track progress toward one potential solution that is tracked as replacement functionality. We provide a library that makes it drop-in simple to integrate Consul service mesh with most [Go](https://golang.org/) applications. This page shows examples of integrating this library for accepting or establishing mesh-based connections. For most Go applications, Consul service mesh can be natively integrated in just a single line of code excluding imports and struct initialization. In addition to this, please read and understand the [overview of service mesh native integrations](/consul/docs/connect/native). In particular, after natively integrating applications with Consul service mesh, they must declare that they accept mesh-based connections via their service definitions. The noun _connect_ is used throughout this documentation and the Go API to refer to the connect subsystem that provides Consul's service mesh capabilities. ## Accepting Connections -> **Note:** When calling `ConnectAuthorize()` on incoming connections this library will return _deny_ if `Permissions` are defined on the matching intention. The method is currently only suited for networking layer 4 (e.g. TCP) integration. Any server that supports TLS (HTTP, gRPC, net/rpc, etc.) can begin accepting mesh-based connections in just a few lines of code. For most existing applications, converting the server to accept mesh-based connections will require only a one-line change excluding imports and structure initialization. The Go library exposes a `*tls.Config` that _automatically_ communicates with Consul to load certificates and authorize inbound connections during the TLS handshake. This also automatically starts goroutines to update any changing certs. Example, followed by more details: ```go import( "net/http" "github.com/hashicorp/consul/api" "github.com/hashicorp/consul/connect" ) func main() { // Create a Consul API client client, _ := api.NewClient(api.DefaultConfig()) // Create an instance representing this service. "my-service" is the // name of _this_ service. The service should be cleaned up via Close. svc, _ := connect.NewService("my-service", client) defer svc.Close() // Creating an HTTP server that serves via service mesh server := &http.Server{ Addr: ":8080", TLSConfig: svc.ServerTLSConfig(), // ... other standard fields } // Serve! server.ListenAndServeTLS("", "") } ``` The first step is to create a Consul API client. This is almost always the default configuration with an ACL token set, since you want to communicate to the local agent. The default configuration will also read the ACL token from environment variables if set. The Go library will use this client to request certificates, authorize connections, and more. Next, `connect.NewService` is called to create a service structure representing the _currently running service_. This structure maintains all the state for accepting and establishing connections. An application should generally create one service and reuse that one service for all servers and clients. Finally, a standard `*http.Server` is created. The magic line is the `TLSConfig` value. This is set to a TLS configuration returned by the service structure. This TLS configuration is configured to automatically load certificates in the background, cache them, and authorize inbound connections. The service structure automatically handles maintaining blocking queries to update certificates in the background if they change. Since the service returns a standard `*tls.Config`, _any_ server that supports TLS can be configured. This includes gRPC, net/rpc, basic TCP, and more. Another example is shown below with just a plain TLS listener: ```go import( "crypto/tls" "github.com/hashicorp/consul/api" "github.com/hashicorp/consul/connect" ) func main() { // Create a Consul API client client, _ := api.NewClient(api.DefaultConfig()) // Create an instance representing this service. "my-service" is the // name of _this_ service. The service should be cleaned up via Close. svc, _ := connect.NewService("my-service", client) defer svc.Close() // Creating an HTTP server that serves via service mesh listener, _ := tls.Listen("tcp", ":8080", svc.ServerTLSConfig()) defer listener.Close() // Accept go acceptLoop(listener) } ``` ## HTTP Clients For Go applications that need to connect to HTTP-based upstream dependencies, the Go library can construct an `*http.Client` that automatically establishes mesh-based connections as long as Consul-based service discovery is used. Example, followed by more details: ```go import( "github.com/hashicorp/consul/api" "github.com/hashicorp/consul/connect" ) func main() { // Create a Consul API client client, _ := api.NewClient(api.DefaultConfig()) // Create an instance representing this service. "my-service" is the // name of _this_ service. The service should be cleaned up via Close. svc, _ := connect.NewService("my-service", client) defer svc.Close() // Get an HTTP client httpClient := svc.HTTPClient() // Perform a request, then use the standard response resp, _ := httpClient.Get("https://userinfo.service.consul/user/mitchellh") } ``` The first step is to create a Consul API client and service. These are the same steps as accepting connections and are explained in detail in the section above. If your application is both a client and server, both the API client and service structure can be shared and reused. Next, we call `svc.HTTPClient()` to return a specially configured `*http.Client`. This client will automatically established mesh-based connections using Consul service discovery. Finally, we perform an HTTP `GET` request to a hypothetical userinfo service. The HTTP client configuration automatically sends the correct client certificate, verifies the server certificate, and manages background goroutines for updating our certificates as necessary. If the application already uses a manually constructed `*http.Client`, the `svc.HTTPDialTLS` function can be used to configure the `http.Transport.DialTLS` field to achieve equivalent behavior. ### Hostname Requirements The hostname used in the request URL is used to identify the logical service discovery mechanism for the target. **It's not actually resolved via DNS** but used as a logical identifier for a Consul service discovery mechanism. It has the following specific limitations: - The scheme must be `https://`. - It must be a Consul DNS name in one of the following forms: - `.service[.].consul` to discover a healthy service instance for a given service. - `.query[.].consul` to discover an instance via [Prepared Query](/consul/api-docs/query). - The top-level domain _must_ be `.consul` even if your cluster has a custom `domain` configured for its DNS interface. This might be relaxed in the future. - Tag filters for services are not currently supported (i.e. `tag1.web.service.consul`) however the same behavior can be achieved using a prepared query. - External DNS names, raw IP addresses and so on will cause an error and should be fetched using a separate `HTTPClient`. ## Raw TLS Connection For a raw `net.Conn` TLS connection, the `svc.Dial` function can be used. This will establish a connection to the desired service via the service mesh and return the `net.Conn`. This connection can then be used as desired. Example: ```go import ( "context" "github.com/hashicorp/consul/api" "github.com/hashicorp/consul/connect" ) func main() { // Create a Consul API client client, _ := api.NewClient(api.DefaultConfig()) // Create an instance representing this service. "my-service" is the // name of _this_ service. The service should be cleaned up via Close. svc, _ := connect.NewService("my-service", client) defer svc.Close() // Connect to the "userinfo" Consul service. conn, _ := svc.Dial(context.Background(), &connect.ConsulResolver{ Client: client, Name: "userinfo", }) } ``` This uses a familiar `Dial`-like function to establish raw `net.Conn` values. The second parameter to dial is an implementation of the `connect.Resolver` interface. The example above uses the `*connect.ConsulResolver` implementation to perform Consul-based service discovery. This also automatically determines the correct certificate metadata we expect the remote service to serve. ## Static Addresses, Custom Resolvers In the raw TLS connection example, you see the use of a `connect.Resolver` implementation. This interface can be implemented to perform address resolution. This must return the address and also the URI SAN expected in the TLS certificate served by the remote service. The Go library provides two built-in resolvers: - `*connect.StaticResolver` can be used for static addresses where no service discovery is required. The expected cert URI SAN must be manually specified. - `*connect.ConsulResolver` which resolves services and prepared queries via the Consul API. This also automatically determines the expected cert URI SAN.