-
Notifications
You must be signed in to change notification settings - Fork 520
envoy per gateway #404
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
envoy per gateway #404
Conversation
5e8ec0e
to
3435da1
Compare
attaching some test logs done with 2 gateways 2 Gateway resources
2 HTTPRoute resources
Port forward to the 2 envoy services
Can reach
Can reach
|
reviewers please note that this PR doesnt handle delete of Gateway resources, will raise an issue to track it once this PR is in, and will fix be fixed in a follow up commit. |
1a0d520
to
15af025
Compare
15af025
to
c171031
Compare
Codecov Report
@@ Coverage Diff @@
## main #404 +/- ##
==========================================
- Coverage 60.46% 60.15% -0.32%
==========================================
Files 40 40
Lines 4323 4327 +4
==========================================
- Hits 2614 2603 -11
- Misses 1560 1574 +14
- Partials 149 150 +1
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. |
5f5f281
to
f79369d
Compare
xref: #380 |
xref: #382 |
f79369d
to
5bd432b
Compare
* create a xdsIR per gateway * create a infraIR per gateway * use the gateway namespace-name as the key for above IRs * populate the envoy bootstrap config with a node id that matches the IR key * populate the xds server snapshot for each xds request based on the node id Fixes: envoyproxy#349 Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: danehans <[email protected]>
Signed-off-by: danehans <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
5bd432b
to
41dc3c1
Compare
I tested this PR with #438 and the additional conformance tests pass. |
@@ -21,7 +21,7 @@ const ( | |||
DefaultEnvoyGatewayDNSPrefix = config.EnvoyGatewayServiceName | |||
|
|||
// DefaultEnvoyDNSPrefix defines the default Envoy DNS prefix. | |||
DefaultEnvoyDNSPrefix = config.EnvoyServiceName | |||
DefaultEnvoyDNSPrefix = "*" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Created #440 to develop a more secure control plane auth solution.
func expectedDeploymentName(proxyName string) string { | ||
return fmt.Sprintf("%s-%s", config.EnvoyDeploymentPrefix, proxyName) | ||
} | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
xref #441
This reverts commit 231e4fb. Signed-off-by: danehans <[email protected]>
create a xdsIR per gateway
create a infraIR per gateway
use the gateway namespace-name as the key for above IRs
populate the envoy bootstrap config with a
service cluster
val that matches the IR keypopulate the xds server snapshot for each xds request based on the
service cluster
Fixes: #349
Signed-off-by: Arko Dasgupta [email protected]