-
Notifications
You must be signed in to change notification settings - Fork 76
/
static_endpoints_configurer.go
104 lines (94 loc) · 3.29 KB
/
static_endpoints_configurer.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package v3
import (
envoy_listener "github.com/envoyproxy/go-control-plane/envoy/config/listener/v3"
envoy_route "github.com/envoyproxy/go-control-plane/envoy/config/route/v3"
envoy_hcm "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/network/http_connection_manager/v3"
envoy_type_matcher "github.com/envoyproxy/go-control-plane/envoy/type/matcher/v3"
)
import (
util_proto "github.com/apache/dubbo-kubernetes/pkg/util/proto"
util_xds "github.com/apache/dubbo-kubernetes/pkg/util/xds"
envoy_common "github.com/apache/dubbo-kubernetes/pkg/xds/envoy"
)
type StaticEndpointsConfigurer struct {
VirtualHostName string
Paths []*envoy_common.StaticEndpointPath
}
var _ FilterChainConfigurer = &StaticEndpointsConfigurer{}
func (c *StaticEndpointsConfigurer) Configure(filterChain *envoy_listener.FilterChain) error {
routes := []*envoy_route.Route{}
for _, p := range c.Paths {
route := &envoy_route.Route{
Match: &envoy_route.RouteMatch{
PathSpecifier: &envoy_route.RouteMatch_Prefix{
Prefix: p.Path,
},
},
Name: envoy_common.AnonymousResource,
Action: &envoy_route.Route_Route{
Route: &envoy_route.RouteAction{
ClusterSpecifier: &envoy_route.RouteAction_Cluster{
Cluster: p.ClusterName,
},
PrefixRewrite: p.RewritePath,
},
},
}
if p.HeaderExactMatch != "" {
matcher := envoy_type_matcher.StringMatcher{
MatchPattern: &envoy_type_matcher.StringMatcher_Exact{
Exact: p.HeaderExactMatch,
},
}
route.Match.Headers = []*envoy_route.HeaderMatcher{{
Name: p.Header,
HeaderMatchSpecifier: &envoy_route.HeaderMatcher_StringMatch{
StringMatch: &matcher,
},
}}
}
routes = append(routes, route)
}
config := &envoy_hcm.HttpConnectionManager{
StatPrefix: util_xds.SanitizeMetric(c.VirtualHostName),
CodecType: envoy_hcm.HttpConnectionManager_AUTO,
HttpFilters: []*envoy_hcm.HttpFilter{},
RouteSpecifier: &envoy_hcm.HttpConnectionManager_RouteConfig{
RouteConfig: &envoy_route.RouteConfiguration{
VirtualHosts: []*envoy_route.VirtualHost{{
Name: c.VirtualHostName,
Domains: []string{"*"},
Routes: routes,
}},
ValidateClusters: util_proto.Bool(false),
},
},
}
pbst, err := util_proto.MarshalAnyDeterministic(config)
if err != nil {
return err
}
filterChain.Filters = append(filterChain.Filters, &envoy_listener.Filter{
Name: "envoy.filters.network.http_connection_manager",
ConfigType: &envoy_listener.Filter_TypedConfig{
TypedConfig: pbst,
},
})
return nil
}