-
Notifications
You must be signed in to change notification settings - Fork 4.8k
/
router.h
1322 lines (1134 loc) · 46.7 KB
/
router.h
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
#pragma once
#include <chrono>
#include <cstdint>
#include <functional>
#include <list>
#include <map>
#include <memory>
#include <string>
#include "envoy/access_log/access_log.h"
#include "envoy/common/conn_pool.h"
#include "envoy/common/matchers.h"
#include "envoy/config/core/v3/base.pb.h"
#include "envoy/config/route/v3/route_components.pb.h"
#include "envoy/config/typed_metadata.h"
#include "envoy/http/codec.h"
#include "envoy/http/codes.h"
#include "envoy/http/conn_pool.h"
#include "envoy/http/hash_policy.h"
#include "envoy/http/header_map.h"
#include "envoy/router/internal_redirect.h"
#include "envoy/tcp/conn_pool.h"
#include "envoy/tracing/http_tracer.h"
#include "envoy/type/v3/percent.pb.h"
#include "envoy/upstream/resource_manager.h"
#include "envoy/upstream/retry.h"
#include "common/protobuf/protobuf.h"
#include "common/protobuf/utility.h"
#include "absl/types/optional.h"
namespace Envoy {
namespace Upstream {
class ClusterManager;
class LoadBalancerContext;
class ThreadLocalCluster;
} // namespace Upstream
namespace Router {
/**
* Functionality common among routing primitives, such as DirectResponseEntry and RouteEntry.
*/
class ResponseEntry {
public:
virtual ~ResponseEntry() = default;
/**
* Do potentially destructive header transforms on response headers prior to forwarding. For
* example, adding or removing headers. This should only be called ONCE immediately after
* obtaining the initial response headers.
* @param headers supplies the response headers, which may be modified during this call.
* @param stream_info holds additional information about the request.
*/
virtual void finalizeResponseHeaders(Http::ResponseHeaderMap& headers,
const StreamInfo::StreamInfo& stream_info) const PURE;
};
/**
* A routing primitive that specifies a direct (non-proxied) HTTP response.
*/
class DirectResponseEntry : public ResponseEntry {
public:
~DirectResponseEntry() override = default;
/**
* Returns the HTTP status code to return.
* @return Http::Code the response Code.
*/
virtual Http::Code responseCode() const PURE;
/**
* Returns the redirect path based on the request headers.
* @param headers supplies the request headers.
* @return std::string the redirect URL if this DirectResponseEntry is a redirect,
* or an empty string otherwise.
*/
virtual std::string newPath(const Http::RequestHeaderMap& headers) const PURE;
/**
* Returns the response body to send with direct responses.
* @return std::string& the response body specified in the route configuration,
* or an empty string if no response body is specified.
*/
virtual const std::string& responseBody() const PURE;
/**
* Do potentially destructive header transforms on Path header prior to redirection. For
* example prefix rewriting for redirects etc. This should only be called ONCE
* immediately prior to redirecting.
* @param headers supplies the request headers, which may be modified during this call.
* @param insert_envoy_original_path insert x-envoy-original-path header?
*/
virtual void rewritePathHeader(Http::RequestHeaderMap& headers,
bool insert_envoy_original_path) const PURE;
/**
* @return std::string& the name of the route.
*/
virtual const std::string& routeName() const PURE;
};
/**
* CorsPolicy for Route and VirtualHost.
*/
class CorsPolicy {
public:
virtual ~CorsPolicy() = default;
/**
* @return std::vector<StringMatcherPtr>& access-control-allow-origin matchers.
*/
virtual const std::vector<Matchers::StringMatcherPtr>& allowOrigins() const PURE;
/**
* @return std::string access-control-allow-methods value.
*/
virtual const std::string& allowMethods() const PURE;
/**
* @return std::string access-control-allow-headers value.
*/
virtual const std::string& allowHeaders() const PURE;
/**
* @return std::string access-control-expose-headers value.
*/
virtual const std::string& exposeHeaders() const PURE;
/**
* @return std::string access-control-max-age value.
*/
virtual const std::string& maxAge() const PURE;
/**
* @return const absl::optional<bool>& Whether access-control-allow-credentials should be true.
*/
virtual const absl::optional<bool>& allowCredentials() const PURE;
/**
* @return bool Whether CORS is enabled for the route or virtual host.
*/
virtual bool enabled() const PURE;
/**
* @return bool Whether CORS policies are evaluated when filter is off.
*/
virtual bool shadowEnabled() const PURE;
};
/**
* An interface to be implemented by rate limited reset header parsers.
*/
class ResetHeaderParser {
public:
virtual ~ResetHeaderParser() = default;
/**
* Iterate over the headers, choose the first one that matches by name, and try to parse its
* value.
*/
virtual absl::optional<std::chrono::milliseconds>
parseInterval(TimeSource& time_source, const Http::HeaderMap& headers) const PURE;
};
using ResetHeaderParserSharedPtr = std::shared_ptr<ResetHeaderParser>;
/**
* Route level retry policy.
*/
class RetryPolicy {
public:
// clang-format off
static const uint32_t RETRY_ON_5XX = 0x1;
static const uint32_t RETRY_ON_GATEWAY_ERROR = 0x2;
static const uint32_t RETRY_ON_CONNECT_FAILURE = 0x4;
static const uint32_t RETRY_ON_RETRIABLE_4XX = 0x8;
static const uint32_t RETRY_ON_REFUSED_STREAM = 0x10;
static const uint32_t RETRY_ON_GRPC_CANCELLED = 0x20;
static const uint32_t RETRY_ON_GRPC_DEADLINE_EXCEEDED = 0x40;
static const uint32_t RETRY_ON_GRPC_RESOURCE_EXHAUSTED = 0x80;
static const uint32_t RETRY_ON_GRPC_UNAVAILABLE = 0x100;
static const uint32_t RETRY_ON_GRPC_INTERNAL = 0x200;
static const uint32_t RETRY_ON_RETRIABLE_STATUS_CODES = 0x400;
static const uint32_t RETRY_ON_RESET = 0x800;
static const uint32_t RETRY_ON_RETRIABLE_HEADERS = 0x1000;
static const uint32_t RETRY_ON_ENVOY_RATE_LIMITED = 0x2000;
// clang-format on
virtual ~RetryPolicy() = default;
/**
* @return std::chrono::milliseconds timeout per retry attempt.
*/
virtual std::chrono::milliseconds perTryTimeout() const PURE;
/**
* @return uint32_t the number of retries to allow against the route.
*/
virtual uint32_t numRetries() const PURE;
/**
* @return uint32_t a local OR of RETRY_ON values above.
*/
virtual uint32_t retryOn() const PURE;
/**
* Initializes a new set of RetryHostPredicates to be used when retrying with this retry policy.
* @return list of RetryHostPredicates to use
*/
virtual std::vector<Upstream::RetryHostPredicateSharedPtr> retryHostPredicates() const PURE;
/**
* Initializes a RetryPriority to be used when retrying with this retry policy.
* @return the RetryPriority to use when determining priority load for retries, or nullptr
* if none should be used.
*/
virtual Upstream::RetryPrioritySharedPtr retryPriority() const PURE;
/**
* Number of times host selection should be reattempted when selecting a host
* for a retry attempt.
*/
virtual uint32_t hostSelectionMaxAttempts() const PURE;
/**
* List of status codes that should trigger a retry when the retriable-status-codes retry
* policy is enabled.
*/
virtual const std::vector<uint32_t>& retriableStatusCodes() const PURE;
/**
* @return std::vector<Http::HeaderMatcherSharedPtr>& list of response header matchers that
* will be checked when the 'retriable-headers' retry policy is enabled.
*/
virtual const std::vector<Http::HeaderMatcherSharedPtr>& retriableHeaders() const PURE;
/**
* @return std::vector<Http::HeaderMatcherSharedPt>& list of request header
* matchers that will be checked before enabling retries.
*/
virtual const std::vector<Http::HeaderMatcherSharedPtr>& retriableRequestHeaders() const PURE;
/**
* @return absl::optional<std::chrono::milliseconds> base retry interval
*/
virtual absl::optional<std::chrono::milliseconds> baseInterval() const PURE;
/**
* @return absl::optional<std::chrono::milliseconds> maximum retry interval
*/
virtual absl::optional<std::chrono::milliseconds> maxInterval() const PURE;
/**
* @return std::vector<Http::ResetHeaderParserSharedPtr>& list of reset header
* parsers that will be used to extract a retry back-off interval from response headers.
*/
virtual const std::vector<ResetHeaderParserSharedPtr>& resetHeaders() const PURE;
/**
* @return std::chrono::milliseconds upper limit placed on a retry
* back-off interval parsed from response headers.
*/
virtual std::chrono::milliseconds resetMaxInterval() const PURE;
};
/**
* RetryStatus whether request should be retried or not.
*/
enum class RetryStatus { No, NoOverflow, NoRetryLimitExceeded, Yes };
/**
* InternalRedirectPolicy from the route configuration.
*/
class InternalRedirectPolicy {
public:
virtual ~InternalRedirectPolicy() = default;
/**
* @return whether internal redirect is enabled on this route.
*/
virtual bool enabled() const PURE;
/**
* @param response_code the response code from the upstream.
* @return whether the given response_code should trigger an internal redirect on this route.
*/
virtual bool shouldRedirectForResponseCode(const Http::Code& response_code) const PURE;
/**
* Creates the target route predicates. This should really be called only once for each upstream
* redirect response. Creating the predicates lazily to avoid wasting CPU cycles on non-redirect
* responses, which should be the most common case.
* @return a vector of newly constructed InternalRedirectPredicate instances.
*/
virtual std::vector<InternalRedirectPredicateSharedPtr> predicates() const PURE;
/**
* @return the maximum number of allowed internal redirects on this route.
*/
virtual uint32_t maxInternalRedirects() const PURE;
/**
* @return if it is allowed to follow the redirect with a different scheme in
* the target URI than the downstream request.
*/
virtual bool isCrossSchemeRedirectAllowed() const PURE;
};
/**
* Wraps retry state for an active routed request.
*/
class RetryState {
public:
using DoRetryCallback = std::function<void()>;
virtual ~RetryState() = default;
/**
* @return true if a policy is in place for the active request that allows retries.
*/
virtual bool enabled() PURE;
/**
* Attempts to parse any matching rate limited reset headers (RFC 7231), either in the form of an
* interval directly, or in the form of a unix timestamp relative to the current system time.
* @return the interval if parsing was successful.
*/
virtual absl::optional<std::chrono::milliseconds>
parseResetInterval(const Http::ResponseHeaderMap& response_headers) const PURE;
/**
* Determine whether a request should be retried based on the response headers.
* @param response_headers supplies the response headers.
* @param callback supplies the callback that will be invoked when the retry should take place.
* This is used to add timed backoff, etc. The callback will never be called
* inline.
* @return RetryStatus if a retry should take place. @param callback will be called at some point
* in the future. Otherwise a retry should not take place and the callback will never be
* called. Calling code should proceed with error handling.
*/
virtual RetryStatus shouldRetryHeaders(const Http::ResponseHeaderMap& response_headers,
DoRetryCallback callback) PURE;
/**
* Determines whether given response headers would be retried by the retry policy, assuming
* sufficient retry budget and circuit breaker headroom. This is useful in cases where
* the information about whether a response is "good" or not is useful, but a retry should
* not be attempted for other reasons.
* @param response_headers supplies the response headers.
* @return bool true if a retry would be warranted based on the retry policy.
*/
virtual bool wouldRetryFromHeaders(const Http::ResponseHeaderMap& response_headers) PURE;
/**
* Determine whether a request should be retried after a reset based on the reason for the reset.
* @param reset_reason supplies the reset reason.
* @param callback supplies the callback that will be invoked when the retry should take place.
* This is used to add timed backoff, etc. The callback will never be called
* inline.
* @return RetryStatus if a retry should take place. @param callback will be called at some point
* in the future. Otherwise a retry should not take place and the callback will never be
* called. Calling code should proceed with error handling.
*/
virtual RetryStatus shouldRetryReset(const Http::StreamResetReason reset_reason,
DoRetryCallback callback) PURE;
/**
* Determine whether a "hedged" retry should be sent after the per try
* timeout expires. This means the original request is not canceled, but a
* new one is sent to hedge against the original request taking even longer.
* @param callback supplies the callback that will be invoked when the retry should take place.
* This is used to add timed backoff, etc. The callback will never be called
* inline.
* @return RetryStatus if a retry should take place. @param callback will be called at some point
* in the future. Otherwise a retry should not take place and the callback will never be
* called. Calling code should proceed with error handling.
*/
virtual RetryStatus shouldHedgeRetryPerTryTimeout(DoRetryCallback callback) PURE;
/**
* Called when a host was attempted but the request failed and is eligible for another retry.
* Should be used to update whatever internal state depends on previously attempted hosts.
* @param host the previously attempted host.
*/
virtual void onHostAttempted(Upstream::HostDescriptionConstSharedPtr host) PURE;
/**
* Determine whether host selection should be reattempted. Applies to host selection during
* retries, and is used to provide configurable host selection for retries.
* @param host the host under consideration
* @return whether host selection should be reattempted
*/
virtual bool shouldSelectAnotherHost(const Upstream::Host& host) PURE;
/**
* Returns a reference to the PriorityLoad that should be used for the next retry.
* @param priority_set current priority set.
* @param original_priority_load original priority load.
* @param priority_mapping_func see @Upstream::RetryPriority::PriorityMappingFunc.
* @return HealthyAndDegradedLoad that should be used to select a priority for the next retry.
*/
virtual const Upstream::HealthyAndDegradedLoad& priorityLoadForRetry(
const Upstream::PrioritySet& priority_set,
const Upstream::HealthyAndDegradedLoad& original_priority_load,
const Upstream::RetryPriority::PriorityMappingFunc& priority_mapping_func) PURE;
/**
* return how many times host selection should be reattempted during host selection.
*/
virtual uint32_t hostSelectionMaxAttempts() const PURE;
};
using RetryStatePtr = std::unique_ptr<RetryState>;
/**
* Per route policy for request shadowing.
*/
class ShadowPolicy {
public:
virtual ~ShadowPolicy() = default;
/**
* @return the name of the cluster that a matching request should be shadowed to. Returns empty
* string if no shadowing should take place.
*/
virtual const std::string& cluster() const PURE;
/**
* @return the runtime key that will be used to determine whether an individual request should
* be shadowed. The lack of a key means that all requests will be shadowed. If a key is
* present it will be used to drive random selection in the range 0-10000 for 0.01%
* increments.
*/
virtual const std::string& runtimeKey() const PURE;
/**
* @return the default fraction of traffic the should be shadowed, if the runtime key is not
* present.
*/
virtual const envoy::type::v3::FractionalPercent& defaultValue() const PURE;
/**
* @return true if the trace span should be sampled.
*/
virtual bool traceSampled() const PURE;
};
using ShadowPolicyPtr = std::unique_ptr<ShadowPolicy>;
/**
* All virtual cluster stats. @see stats_macro.h
*/
#define ALL_VIRTUAL_CLUSTER_STATS(COUNTER, GAUGE, HISTOGRAM, TEXT_READOUT, STATNAME) \
COUNTER(upstream_rq_retry) \
COUNTER(upstream_rq_retry_limit_exceeded) \
COUNTER(upstream_rq_retry_overflow) \
COUNTER(upstream_rq_retry_success) \
COUNTER(upstream_rq_timeout) \
COUNTER(upstream_rq_total) \
STATNAME(other) \
STATNAME(vcluster) \
STATNAME(vhost)
/**
* Struct definition for all virtual cluster stats. @see stats_macro.h
*/
MAKE_STAT_NAMES_STRUCT(VirtualClusterStatNames, ALL_VIRTUAL_CLUSTER_STATS);
MAKE_STATS_STRUCT(VirtualClusterStats, VirtualClusterStatNames, ALL_VIRTUAL_CLUSTER_STATS);
/**
* Virtual cluster definition (allows splitting a virtual host into virtual clusters orthogonal to
* routes for stat tracking and priority purposes).
*/
class VirtualCluster {
public:
virtual ~VirtualCluster() = default;
/**
* @return the stat-name of the virtual cluster.
*/
virtual Stats::StatName statName() const PURE;
/**
* @return VirtualClusterStats& strongly named stats for this virtual cluster.
*/
virtual VirtualClusterStats& stats() const PURE;
static VirtualClusterStats generateStats(Stats::Scope& scope,
const VirtualClusterStatNames& stat_names) {
return VirtualClusterStats(stat_names, scope);
}
};
class RateLimitPolicy;
class Config;
/**
* All route specific config returned by the method at
* NamedHttpFilterConfigFactory::createRouteSpecificFilterConfig
* should be derived from this class.
*/
class RouteSpecificFilterConfig {
public:
virtual ~RouteSpecificFilterConfig() = default;
};
using RouteSpecificFilterConfigConstSharedPtr = std::shared_ptr<const RouteSpecificFilterConfig>;
/**
* Virtual host definition.
*/
class VirtualHost {
public:
virtual ~VirtualHost() = default;
/**
* @return const CorsPolicy* the CORS policy for this virtual host.
*/
virtual const CorsPolicy* corsPolicy() const PURE;
/**
* @return the stat-name of the virtual host.
*/
virtual Stats::StatName statName() const PURE;
/**
* @return const RateLimitPolicy& the rate limit policy for the virtual host.
*/
virtual const RateLimitPolicy& rateLimitPolicy() const PURE;
/**
* @return const Config& the RouteConfiguration that owns this virtual host.
*/
virtual const Config& routeConfig() const PURE;
/**
* @return const RouteSpecificFilterConfig* the per-filter config pre-processed object for
* the given filter name. If there is not per-filter config, or the filter factory returns
* nullptr, nullptr is returned.
*/
virtual const RouteSpecificFilterConfig* perFilterConfig(const std::string& name) const PURE;
/**
* This is a helper on top of perFilterConfig() that casts the return object to the specified
* type.
*/
template <class Derived> const Derived* perFilterConfigTyped(const std::string& name) const {
return dynamic_cast<const Derived*>(perFilterConfig(name));
}
/**
* @return bool whether to include the request count header in upstream requests.
*/
virtual bool includeAttemptCountInRequest() const PURE;
/**
* @return bool whether to include the request count header in the downstream response.
*/
virtual bool includeAttemptCountInResponse() const PURE;
/**
* @return uint32_t any route cap on bytes which should be buffered for shadowing or retries.
* This is an upper bound so does not necessarily reflect the bytes which will be buffered
* as other limits may apply.
* If a per route limit exists, it takes precedence over this configuration.
* Unlike some other buffer limits, 0 here indicates buffering should not be performed
* rather than no limit applies.
*/
virtual uint32_t retryShadowBufferLimit() const PURE;
};
/**
* Route level hedging policy.
*/
class HedgePolicy {
public:
virtual ~HedgePolicy() = default;
/**
* @return number of upstream requests that should be sent initially.
*/
virtual uint32_t initialRequests() const PURE;
/**
* @return percent chance that an additional upstream request should be sent
* on top of the value from initialRequests().
*/
virtual const envoy::type::v3::FractionalPercent& additionalRequestChance() const PURE;
/**
* @return bool indicating whether request hedging should occur when a request
* is retried due to a per try timeout. The alternative is the original request
* will be canceled immediately.
*/
virtual bool hedgeOnPerTryTimeout() const PURE;
};
class MetadataMatchCriterion {
public:
virtual ~MetadataMatchCriterion() = default;
/*
* @return const std::string& the name of the metadata key
*/
virtual const std::string& name() const PURE;
/*
* @return const Envoy::HashedValue& the value for the metadata key
*/
virtual const HashedValue& value() const PURE;
};
using MetadataMatchCriterionConstSharedPtr = std::shared_ptr<const MetadataMatchCriterion>;
class MetadataMatchCriteria;
using MetadataMatchCriteriaConstPtr = std::unique_ptr<const MetadataMatchCriteria>;
class MetadataMatchCriteria {
public:
virtual ~MetadataMatchCriteria() = default;
/*
* @return std::vector<MetadataMatchCriterionConstSharedPtr>& a vector of
* metadata to be matched against upstream endpoints when load
* balancing, sorted lexically by name.
*/
virtual const std::vector<MetadataMatchCriterionConstSharedPtr>&
metadataMatchCriteria() const PURE;
/**
* Creates a new MetadataMatchCriteria, merging existing
* metadata criteria with the provided criteria. The result criteria is the
* combination of both sets of criteria, with those from the metadata_matches
* ProtobufWkt::Struct taking precedence.
* @param metadata_matches supplies the new criteria.
* @return MetadataMatchCriteriaConstPtr the result criteria.
*/
virtual MetadataMatchCriteriaConstPtr
mergeMatchCriteria(const ProtobufWkt::Struct& metadata_matches) const PURE;
/**
* Creates a new MetadataMatchCriteria with criteria vector reduced to given names
* @param names names of metadata keys to preserve
* @return MetadataMatchCriteriaConstPtr the result criteria. Returns nullptr if the result
* criteria are empty.
*/
virtual MetadataMatchCriteriaConstPtr
filterMatchCriteria(const std::set<std::string>& names) const PURE;
};
/**
* Criterion that a route entry uses for matching TLS connection context.
*/
class TlsContextMatchCriteria {
public:
virtual ~TlsContextMatchCriteria() = default;
/**
* @return bool indicating whether the client presented credentials.
*/
virtual const absl::optional<bool>& presented() const PURE;
/**
* @return bool indicating whether the client credentials successfully validated against the TLS
* context validation context.
*/
virtual const absl::optional<bool>& validated() const PURE;
};
using TlsContextMatchCriteriaConstPtr = std::unique_ptr<const TlsContextMatchCriteria>;
/**
* Type of path matching that a route entry uses.
*/
enum class PathMatchType {
None,
Prefix,
Exact,
Regex,
};
/**
* Criterion that a route entry uses for matching a particular path.
*/
class PathMatchCriterion {
public:
virtual ~PathMatchCriterion() = default;
/**
* @return PathMatchType type of path match.
*/
virtual PathMatchType matchType() const PURE;
/**
* @return const std::string& the string with which to compare paths.
*/
virtual const std::string& matcher() const PURE;
};
/**
* Base class for all route typed metadata factories.
*/
class HttpRouteTypedMetadataFactory : public Envoy::Config::TypedMetadataFactory {};
/**
* An individual resolved route entry.
*/
class RouteEntry : public ResponseEntry {
public:
~RouteEntry() override = default;
/**
* @return const std::string& the upstream cluster that owns the route.
*/
virtual const std::string& clusterName() const PURE;
/**
* Returns the HTTP status code to use when configured cluster is not found.
* @return Http::Code to use when configured cluster is not found.
*/
virtual Http::Code clusterNotFoundResponseCode() const PURE;
/**
* @return const CorsPolicy* the CORS policy for this virtual host.
*/
virtual const CorsPolicy* corsPolicy() const PURE;
/**
* Do potentially destructive header transforms on request headers prior to forwarding. For
* example URL prefix rewriting, adding headers, etc. This should only be called ONCE
* immediately prior to forwarding. It is done this way vs. copying for performance reasons.
* @param headers supplies the request headers, which may be modified during this call.
* @param stream_info holds additional information about the request.
* @param insert_envoy_original_path insert x-envoy-original-path header if path rewritten?
*/
virtual void finalizeRequestHeaders(Http::RequestHeaderMap& headers,
const StreamInfo::StreamInfo& stream_info,
bool insert_envoy_original_path) const PURE;
/**
* @return const HashPolicy* the optional hash policy for the route.
*/
virtual const Http::HashPolicy* hashPolicy() const PURE;
/**
* @return const HedgePolicy& the hedge policy for the route. All routes have a hedge policy even
* if it is empty and does not allow for hedged requests.
*/
virtual const HedgePolicy& hedgePolicy() const PURE;
/**
* @return the priority of the route.
*/
virtual Upstream::ResourcePriority priority() const PURE;
/**
* @return const RateLimitPolicy& the rate limit policy for the route.
*/
virtual const RateLimitPolicy& rateLimitPolicy() const PURE;
/**
* @return const RetryPolicy& the retry policy for the route. All routes have a retry policy even
* if it is empty and does not allow retries.
*/
virtual const RetryPolicy& retryPolicy() const PURE;
/**
* @return const InternalRedirectPolicy& the internal redirect policy for the route. All routes
* have a internal redirect policy even if it is not enabled, which means redirects are
* simply proxied as normal responses.
*/
virtual const InternalRedirectPolicy& internalRedirectPolicy() const PURE;
/**
* @return uint32_t any route cap on bytes which should be buffered for shadowing or retries.
* This is an upper bound so does not necessarily reflect the bytes which will be buffered
* as other limits may apply.
* Unlike some other buffer limits, 0 here indicates buffering should not be performed
* rather than no limit applies.
*/
virtual uint32_t retryShadowBufferLimit() const PURE;
/**
* @return const std::vector<ShadowPolicy>& the shadow policies for the route. The vector is empty
* if no shadowing takes place.
*/
virtual const std::vector<ShadowPolicyPtr>& shadowPolicies() const PURE;
/**
* @return std::chrono::milliseconds the route's timeout.
*/
virtual std::chrono::milliseconds timeout() const PURE;
/**
* @return optional<std::chrono::milliseconds> the route's idle timeout. Zero indicates a
* disabled idle timeout, while nullopt indicates deference to the global timeout.
*/
virtual absl::optional<std::chrono::milliseconds> idleTimeout() const PURE;
/**
* @return optional<std::chrono::milliseconds> the route's maximum stream duration.
*/
virtual absl::optional<std::chrono::milliseconds> maxStreamDuration() const PURE;
/**
* @return optional<std::chrono::milliseconds> the max grpc-timeout this route will allow.
*/
virtual absl::optional<std::chrono::milliseconds> grpcTimeoutHeaderMax() const PURE;
/**
* @return optional<std::chrono::milliseconds> the delta between grpc-timeout and enforced grpc
* timeout.
*/
virtual absl::optional<std::chrono::milliseconds> grpcTimeoutHeaderOffset() const PURE;
/**
* @return absl::optional<std::chrono::milliseconds> the maximum allowed timeout value derived
* from 'grpc-timeout' header of a gRPC request. Non-present value disables use of 'grpc-timeout'
* header, while 0 represents infinity.
*/
virtual absl::optional<std::chrono::milliseconds> maxGrpcTimeout() const PURE;
/**
* @return absl::optional<std::chrono::milliseconds> the timeout offset to apply to the timeout
* provided by the 'grpc-timeout' header of a gRPC request. This value will be positive and should
* be subtracted from the value provided by the header.
*/
virtual absl::optional<std::chrono::milliseconds> grpcTimeoutOffset() const PURE;
/**
* Determine whether a specific request path belongs to a virtual cluster for use in stats, etc.
* @param headers supplies the request headers.
* @return the virtual cluster or nullptr if there is no match.
*/
virtual const VirtualCluster* virtualCluster(const Http::HeaderMap& headers) const PURE;
/**
* @return const VirtualHost& the virtual host that owns the route.
*/
virtual const VirtualHost& virtualHost() const PURE;
/**
* @return bool true if the :authority header should be overwritten with the upstream hostname.
*/
virtual bool autoHostRewrite() const PURE;
/**
* @return MetadataMatchCriteria* the metadata that a subset load balancer should match when
* selecting an upstream host
*/
virtual const MetadataMatchCriteria* metadataMatchCriteria() const PURE;
/**
* @return const std::multimap<std::string, std::string> the opaque configuration associated
* with the route
*/
virtual const std::multimap<std::string, std::string>& opaqueConfig() const PURE;
/**
* @return bool true if the virtual host rate limits should be included.
*/
virtual bool includeVirtualHostRateLimits() const PURE;
/**
* @return const Envoy::Config::TypedMetadata& return the typed metadata provided in the config
* for this route.
*/
virtual const Envoy::Config::TypedMetadata& typedMetadata() const PURE;
/**
* @return const envoy::config::core::v3::Metadata& return the metadata provided in the config for
* this route.
*/
virtual const envoy::config::core::v3::Metadata& metadata() const PURE;
/**
* @return TlsContextMatchCriteria* the tls context match criterion for this route. If there is no
* tls context match criteria, nullptr is returned.
*/
virtual const TlsContextMatchCriteria* tlsContextMatchCriteria() const PURE;
/**
* @return const PathMatchCriterion& the match criterion for this route.
*/
virtual const PathMatchCriterion& pathMatchCriterion() const PURE;
/**
* @return const RouteSpecificFilterConfig* the per-filter config pre-processed object for
* the given filter name. If there is not per-filter config, or the filter factory returns
* nullptr, nullptr is returned.
*/
virtual const RouteSpecificFilterConfig* perFilterConfig(const std::string& name) const PURE;
/**
* This is a helper on top of perFilterConfig() that casts the return object to the specified
* type.
*/
template <class Derived> const Derived* perFilterConfigTyped(const std::string& name) const {
return dynamic_cast<const Derived*>(perFilterConfig(name));
};
/**
* This is a helper to get the route's per-filter config if it exists, otherwise the virtual
* host's. Or nullptr if none of them exist.
*/
template <class Derived>
const Derived* mostSpecificPerFilterConfigTyped(const std::string& name) const {
const Derived* config = perFilterConfigTyped<Derived>(name);
return config ? config : virtualHost().perFilterConfigTyped<Derived>(name);
}
/**
* True if the virtual host this RouteEntry belongs to is configured to include the attempt
* count header.
* @return bool whether x-envoy-attempt-count should be included on the upstream request.
*/
virtual bool includeAttemptCountInRequest() const PURE;
/**
* True if the virtual host this RouteEntry belongs to is configured to include the attempt
* count header.
* @return bool whether x-envoy-attempt-count should be included on the downstream response.
*/
virtual bool includeAttemptCountInResponse() const PURE;
using UpgradeMap = std::map<std::string, bool>;
/**
* @return a map of route-specific upgrades to their enabled/disabled status.
*/
virtual const UpgradeMap& upgradeMap() const PURE;
using ConnectConfig = envoy::config::route::v3::RouteAction::UpgradeConfig::ConnectConfig;
/**
* If present, informs how to handle proxying CONNECT requests on this route.
*/
virtual const absl::optional<ConnectConfig>& connectConfig() const PURE;
/**
* @return std::string& the name of the route.
*/
virtual const std::string& routeName() const PURE;
};
/**
* An interface representing the Decorator.
*/
class Decorator {
public:
virtual ~Decorator() = default;
/**
* This method decorates the supplied span.
* @param Tracing::Span& the span.
*/
virtual void apply(Tracing::Span& span) const PURE;
/**
* This method returns the operation name.
* @return the operation name
*/
virtual const std::string& getOperation() const PURE;
/**
* This method returns whether the decorator information
* should be propagated to other services.
* @return whether to propagate
*/
virtual bool propagate() const PURE;
};
using DecoratorConstPtr = std::unique_ptr<const Decorator>;
/**
* An interface representing the Tracing for the route configuration.
*/
class RouteTracing {
public:
virtual ~RouteTracing() = default;
/**
* This method returns the client sampling percentage.
* @return the client sampling percentage
*/
virtual const envoy::type::v3::FractionalPercent& getClientSampling() const PURE;
/**
* This method returns the random sampling percentage.
* @return the random sampling percentage
*/
virtual const envoy::type::v3::FractionalPercent& getRandomSampling() const PURE;
/**
* This method returns the overall sampling percentage.
* @return the overall sampling percentage
*/
virtual const envoy::type::v3::FractionalPercent& getOverallSampling() const PURE;
/**