Skip to content

Commit e040d84

Browse files
committed
Renamed Service variable
1 parent 856d509 commit e040d84

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

webhook.go

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ var (
6060
watcher *fsnotify.Watcher
6161
signals chan os.Signal
6262

63-
S *service.Service
63+
Service *service.Service
6464
)
6565

6666
func matchLoadedHook(id string) *hook.Hook {
@@ -112,25 +112,25 @@ func main() {
112112
}
113113

114114
// Setup a new Service instance
115-
S = service.New(*ip, *port)
115+
Service = service.New(*ip, *port)
116116

117117
// We must setup TLS prior to opening a listening port.
118118
if *secure {
119-
S.SetTLSEnabled()
119+
Service.SetTLSEnabled()
120120

121-
err := S.SetTLSKeyPair(*cert, *key)
121+
err := Service.SetTLSKeyPair(*cert, *key)
122122
if err != nil {
123123
fmt.Println(err)
124124
os.Exit(1)
125125
}
126126

127-
err = S.SetTLSMinVersion(*tlsMinVersion)
127+
err = Service.SetTLSMinVersion(*tlsMinVersion)
128128
if err != nil {
129129
fmt.Println(err)
130130
os.Exit(1)
131131
}
132132

133-
S.SetTLSCiphers(*tlsCipherSuites)
133+
Service.SetTLSCiphers(*tlsCipherSuites)
134134
}
135135

136136
// logQueue is a queue for log messages encountered during startup. We need
@@ -139,7 +139,7 @@ func main() {
139139
var logQueue []string
140140

141141
// Open listener early so we can drop privileges.
142-
err := S.Listen()
142+
err := Service.Listen()
143143
if err != nil {
144144
logQueue = append(logQueue, fmt.Sprintf("error listening on port: %s", err))
145145
// we'll bail out below
@@ -182,15 +182,15 @@ func main() {
182182
if *pidPath != "" {
183183
var err error
184184

185-
err = S.CreatePIDFile(*pidPath)
185+
err = Service.CreatePIDFile(*pidPath)
186186
if err != nil {
187187
log.Fatalf("Error creating pidfile: %v", err)
188188
}
189189

190190
defer func() {
191191
// NOTE(moorereason): my testing shows that this doesn't work with
192192
// ^C, so we also do a Remove in the signal handler elsewhere.
193-
if nerr := S.DeletePIDFile(); nerr != nil {
193+
if nerr := Service.DeletePIDFile(); nerr != nil {
194194
log.Print(nerr)
195195
}
196196
}()
@@ -199,7 +199,7 @@ func main() {
199199
log.Println("version " + version + " starting")
200200

201201
// set os signal watcher
202-
setupSignals(S)
202+
setupSignals(Service)
203203

204204
// load and parse hooks
205205
if len(hooksFiles) == 0 {
@@ -291,15 +291,15 @@ func main() {
291291
r.HandleFunc(hooksURL, hookHandler)
292292

293293
// Create common HTTP server settings
294-
S.SetHTTPHandler(r)
294+
Service.SetHTTPHandler(r)
295295

296296
if !*secure {
297-
log.Printf("serving hooks on http://%s%s", S.Address, makeHumanPattern(hooksURLPrefix))
297+
log.Printf("serving hooks on http://%s%s", Service.Address, makeHumanPattern(hooksURLPrefix))
298298
} else {
299-
log.Printf("serving hooks on https://%s%s", S.Address, makeHumanPattern(hooksURLPrefix))
299+
log.Printf("serving hooks on https://%s%s", Service.Address, makeHumanPattern(hooksURLPrefix))
300300
}
301301

302-
log.Print(S.Serve())
302+
log.Print(Service.Serve())
303303
}
304304

305305
func hookHandler(w http.ResponseWriter, r *http.Request) {

0 commit comments

Comments
 (0)