-
Notifications
You must be signed in to change notification settings - Fork 606
envoy per gateway #404
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
envoy per gateway #404
Conversation
5e8ec0e to
3435da1
Compare
|
attaching some test logs done with 2 gateways 2 Gateway resources 2 HTTPRoute resources Port forward to the 2 envoy services Can reach Can reach |
|
reviewers please note that this PR doesnt handle delete of Gateway resources, will raise an issue to track it once this PR is in, and will fix be fixed in a follow up commit. |
1a0d520 to
15af025
Compare
15af025 to
c171031
Compare
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## main #404 +/- ##
==========================================
+ Coverage 60.00% 60.13% +0.12%
==========================================
Files 40 40
Lines 4333 4337 +4
==========================================
+ Hits 2600 2608 +8
+ Misses 1580 1579 -1
+ Partials 153 150 -3 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
5f5f281 to
f79369d
Compare
|
xref: #380 |
|
xref: #382 |
f79369d to
5bd432b
Compare
* create a xdsIR per gateway * create a infraIR per gateway * use the gateway namespace-name as the key for above IRs * populate the envoy bootstrap config with a node id that matches the IR key * populate the xds server snapshot for each xds request based on the node id Fixes: envoyproxy#349 Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: danehans <[email protected]>
Signed-off-by: danehans <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
Signed-off-by: Arko Dasgupta <[email protected]>
5bd432b to
41dc3c1
Compare
|
I tested this PR with #438 and the additional conformance tests pass. |
|
|
||
| // DefaultEnvoyDNSPrefix defines the default Envoy DNS prefix. | ||
| DefaultEnvoyDNSPrefix = config.EnvoyServiceName | ||
| DefaultEnvoyDNSPrefix = "*" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Created #440 to develop a more secure control plane auth solution.
| func expectedDeploymentName(proxyName string) string { | ||
| return fmt.Sprintf("%s-%s", config.EnvoyDeploymentPrefix, proxyName) | ||
| } | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
xref #441
This reverts commit 231e4fb. Signed-off-by: danehans <[email protected]>
create a xdsIR per gateway
create a infraIR per gateway
use the gateway namespace-name as the key for above IRs
populate the envoy bootstrap config with a
service clusterval that matches the IR keypopulate the xds server snapshot for each xds request based on the
service clusterFixes: #349
Signed-off-by: Arko Dasgupta [email protected]