2023-03-28 18:39:22 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
2023-02-08 21:52:12 +00:00
|
|
|
package proxycfg
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
2023-03-20 16:42:30 +00:00
|
|
|
"github.com/hashicorp/consul/acl"
|
2023-06-13 16:12:43 +00:00
|
|
|
"github.com/hashicorp/consul/agent/leafcert"
|
2023-02-08 21:52:12 +00:00
|
|
|
"github.com/hashicorp/consul/agent/proxycfg/internal/watch"
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2023-02-17 21:14:46 +00:00
|
|
|
"github.com/hashicorp/consul/proto/private/pbpeering"
|
2023-02-08 21:52:12 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var _ kindHandler = (*handlerAPIGateway)(nil)
|
|
|
|
|
|
|
|
// handlerAPIGateway generates a new ConfigSnapshot in response to
|
|
|
|
// changes related to an api-gateway.
|
|
|
|
type handlerAPIGateway struct {
|
|
|
|
handlerState
|
|
|
|
}
|
|
|
|
|
|
|
|
// initialize sets up the initial watches needed based on the api-gateway registration
|
|
|
|
func (h *handlerAPIGateway) initialize(ctx context.Context) (ConfigSnapshot, error) {
|
|
|
|
snap := newConfigSnapshotFromServiceInstance(h.serviceInstance, h.stateConfig)
|
|
|
|
|
|
|
|
// Watch for root changes
|
|
|
|
err := h.dataSources.CARoots.Notify(ctx, &structs.DCSpecificRequest{
|
|
|
|
Datacenter: h.source.Datacenter,
|
|
|
|
QueryOptions: structs.QueryOptions{Token: h.token},
|
|
|
|
Source: *h.source,
|
|
|
|
}, rootsWatchID, h.ch)
|
|
|
|
if err != nil {
|
|
|
|
return snap, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get information about the entire service mesh.
|
|
|
|
err = h.dataSources.ConfigEntry.Notify(ctx, &structs.ConfigEntryQuery{
|
|
|
|
Kind: structs.MeshConfig,
|
|
|
|
Name: structs.MeshConfigMesh,
|
|
|
|
Datacenter: h.source.Datacenter,
|
|
|
|
QueryOptions: structs.QueryOptions{Token: h.token},
|
|
|
|
EnterpriseMeta: *structs.DefaultEnterpriseMetaInPartition(h.proxyID.PartitionOrDefault()),
|
|
|
|
}, meshConfigEntryID, h.ch)
|
|
|
|
if err != nil {
|
|
|
|
return snap, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Watch the api-gateway's config entry
|
2023-03-20 16:42:30 +00:00
|
|
|
err = h.subscribeToConfigEntry(ctx, structs.APIGateway, h.service, h.proxyID.EnterpriseMeta, gatewayConfigWatchID)
|
2023-02-08 21:52:12 +00:00
|
|
|
if err != nil {
|
|
|
|
return snap, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Watch the bound-api-gateway's config entry
|
2023-03-20 16:42:30 +00:00
|
|
|
err = h.subscribeToConfigEntry(ctx, structs.BoundAPIGateway, h.service, h.proxyID.EnterpriseMeta, gatewayConfigWatchID)
|
2023-02-08 21:52:12 +00:00
|
|
|
if err != nil {
|
|
|
|
return snap, err
|
|
|
|
}
|
|
|
|
|
|
|
|
snap.APIGateway.Listeners = make(map[string]structs.APIGatewayListener)
|
|
|
|
snap.APIGateway.BoundListeners = make(map[string]structs.BoundAPIGatewayListener)
|
|
|
|
snap.APIGateway.HTTPRoutes = watch.NewMap[structs.ResourceReference, *structs.HTTPRouteConfigEntry]()
|
|
|
|
snap.APIGateway.TCPRoutes = watch.NewMap[structs.ResourceReference, *structs.TCPRouteConfigEntry]()
|
|
|
|
snap.APIGateway.Certificates = watch.NewMap[structs.ResourceReference, *structs.InlineCertificateConfigEntry]()
|
|
|
|
|
2023-02-10 21:13:44 +00:00
|
|
|
snap.APIGateway.Upstreams = make(listenerRouteUpstreams)
|
|
|
|
snap.APIGateway.UpstreamsSet = make(routeUpstreamSet)
|
|
|
|
|
2023-02-08 21:52:12 +00:00
|
|
|
// These need to be initialized here but are set by handlerUpstreams
|
|
|
|
snap.APIGateway.DiscoveryChain = make(map[UpstreamID]*structs.CompiledDiscoveryChain)
|
|
|
|
snap.APIGateway.PeerUpstreamEndpoints = watch.NewMap[UpstreamID, structs.CheckServiceNodes]()
|
|
|
|
snap.APIGateway.PeerUpstreamEndpointsUseHostnames = make(map[UpstreamID]struct{})
|
|
|
|
snap.APIGateway.UpstreamPeerTrustBundles = watch.NewMap[string, *pbpeering.PeeringTrustBundle]()
|
|
|
|
snap.APIGateway.WatchedDiscoveryChains = make(map[UpstreamID]context.CancelFunc)
|
|
|
|
snap.APIGateway.WatchedGateways = make(map[UpstreamID]map[string]context.CancelFunc)
|
|
|
|
snap.APIGateway.WatchedGatewayEndpoints = make(map[UpstreamID]map[string]structs.CheckServiceNodes)
|
2023-02-15 17:54:44 +00:00
|
|
|
snap.APIGateway.WatchedLocalGWEndpoints = watch.NewMap[string, structs.CheckServiceNodes]()
|
2023-02-08 21:52:12 +00:00
|
|
|
snap.APIGateway.WatchedUpstreams = make(map[UpstreamID]map[string]context.CancelFunc)
|
|
|
|
snap.APIGateway.WatchedUpstreamEndpoints = make(map[UpstreamID]map[string]structs.CheckServiceNodes)
|
|
|
|
|
|
|
|
return snap, nil
|
|
|
|
}
|
|
|
|
|
2023-03-20 16:42:30 +00:00
|
|
|
func (h *handlerAPIGateway) subscribeToConfigEntry(ctx context.Context, kind, name string, entMeta acl.EnterpriseMeta, watchID string) error {
|
2023-02-08 21:52:12 +00:00
|
|
|
return h.dataSources.ConfigEntry.Notify(ctx, &structs.ConfigEntryQuery{
|
|
|
|
Kind: kind,
|
|
|
|
Name: name,
|
|
|
|
Datacenter: h.source.Datacenter,
|
|
|
|
QueryOptions: structs.QueryOptions{Token: h.token},
|
2023-03-20 16:42:30 +00:00
|
|
|
EnterpriseMeta: entMeta,
|
2023-02-08 21:52:12 +00:00
|
|
|
}, watchID, h.ch)
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleUpdate responds to changes in the api-gateway. In general, we want
|
|
|
|
// to crawl the various resources related to or attached to the gateway and
|
|
|
|
// collect the list of things need to generate xDS. This list of resources
|
|
|
|
// includes the bound-api-gateway, http-routes, tcp-routes, and inline-certificates.
|
|
|
|
func (h *handlerAPIGateway) handleUpdate(ctx context.Context, u UpdateEvent, snap *ConfigSnapshot) error {
|
|
|
|
if u.Err != nil {
|
|
|
|
return fmt.Errorf("error filling agent cache: %v", u.Err)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
case u.CorrelationID == rootsWatchID:
|
|
|
|
// Handle change in the CA roots
|
|
|
|
if err := h.handleRootCAUpdate(u, snap); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
case u.CorrelationID == gatewayConfigWatchID:
|
|
|
|
// Handle change in the api-gateway or bound-api-gateway config entry
|
|
|
|
if err := h.handleGatewayConfigUpdate(ctx, u, snap); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
case u.CorrelationID == inlineCertificateConfigWatchID:
|
|
|
|
// Handle change in an attached inline-certificate config entry
|
|
|
|
if err := h.handleInlineCertConfigUpdate(ctx, u, snap); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
case u.CorrelationID == routeConfigWatchID:
|
|
|
|
// Handle change in an attached http-route or tcp-route config entry
|
|
|
|
if err := h.handleRouteConfigUpdate(ctx, u, snap); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
default:
|
2023-05-19 18:50:59 +00:00
|
|
|
if err := (*handlerUpstreams)(h).handleUpdateUpstreams(ctx, u, snap); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-02-08 21:52:12 +00:00
|
|
|
}
|
|
|
|
|
2023-05-19 18:50:59 +00:00
|
|
|
return h.recompileDiscoveryChains(snap)
|
2023-02-08 21:52:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// handleRootCAUpdate responds to changes in the watched root CA for a gateway
|
|
|
|
func (h *handlerAPIGateway) handleRootCAUpdate(u UpdateEvent, snap *ConfigSnapshot) error {
|
|
|
|
roots, ok := u.Result.(*structs.IndexedCARoots)
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("invalid type for response: %T", u.Result)
|
|
|
|
}
|
|
|
|
snap.Roots = roots
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleGatewayConfigUpdate responds to changes in the watched config entry for a gateway.
|
|
|
|
// In particular, we want to make sure that we're subscribing to any attached resources such
|
|
|
|
// as routes and certificates. These additional subscriptions will enable us to update the
|
|
|
|
// config snapshot appropriately for any route or certificate changes.
|
|
|
|
func (h *handlerAPIGateway) handleGatewayConfigUpdate(ctx context.Context, u UpdateEvent, snap *ConfigSnapshot) error {
|
|
|
|
resp, ok := u.Result.(*structs.ConfigEntryResponse)
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("invalid type for response: %T", u.Result)
|
|
|
|
} else if resp.Entry == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
switch gwConf := resp.Entry.(type) {
|
|
|
|
case *structs.BoundAPIGatewayConfigEntry:
|
|
|
|
snap.APIGateway.BoundGatewayConfig = gwConf
|
|
|
|
|
|
|
|
seenRefs := make(map[structs.ResourceReference]any)
|
|
|
|
for _, listener := range gwConf.Listeners {
|
|
|
|
snap.APIGateway.BoundListeners[listener.Name] = listener
|
|
|
|
|
|
|
|
// Subscribe to changes in each attached x-route config entry
|
|
|
|
for _, ref := range listener.Routes {
|
|
|
|
seenRefs[ref] = struct{}{}
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
switch ref.Kind {
|
|
|
|
case structs.HTTPRoute:
|
|
|
|
snap.APIGateway.HTTPRoutes.InitWatch(ref, cancel)
|
|
|
|
case structs.TCPRoute:
|
|
|
|
snap.APIGateway.TCPRoutes.InitWatch(ref, cancel)
|
|
|
|
default:
|
|
|
|
cancel()
|
|
|
|
return fmt.Errorf("unexpected route kind on gateway: %s", ref.Kind)
|
|
|
|
}
|
|
|
|
|
2023-03-20 16:42:30 +00:00
|
|
|
err := h.subscribeToConfigEntry(ctx, ref.Kind, ref.Name, ref.EnterpriseMeta, routeConfigWatchID)
|
2023-02-08 21:52:12 +00:00
|
|
|
if err != nil {
|
|
|
|
// TODO May want to continue
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Subscribe to changes in each attached inline-certificate config entry
|
|
|
|
for _, ref := range listener.Certificates {
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
|
|
seenRefs[ref] = struct{}{}
|
|
|
|
snap.APIGateway.Certificates.InitWatch(ref, cancel)
|
|
|
|
|
2023-03-20 16:42:30 +00:00
|
|
|
err := h.subscribeToConfigEntry(ctx, ref.Kind, ref.Name, ref.EnterpriseMeta, inlineCertificateConfigWatchID)
|
2023-02-08 21:52:12 +00:00
|
|
|
if err != nil {
|
|
|
|
// TODO May want to continue
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unsubscribe from any config entries that are no longer attached
|
|
|
|
snap.APIGateway.HTTPRoutes.ForEachKey(func(ref structs.ResourceReference) bool {
|
|
|
|
if _, ok := seenRefs[ref]; !ok {
|
2023-02-10 21:13:44 +00:00
|
|
|
snap.APIGateway.Upstreams.delete(ref)
|
|
|
|
snap.APIGateway.UpstreamsSet.delete(ref)
|
2023-02-08 21:52:12 +00:00
|
|
|
snap.APIGateway.HTTPRoutes.CancelWatch(ref)
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
})
|
|
|
|
|
|
|
|
snap.APIGateway.TCPRoutes.ForEachKey(func(ref structs.ResourceReference) bool {
|
|
|
|
if _, ok := seenRefs[ref]; !ok {
|
2023-02-10 21:13:44 +00:00
|
|
|
snap.APIGateway.Upstreams.delete(ref)
|
|
|
|
snap.APIGateway.UpstreamsSet.delete(ref)
|
2023-02-08 21:52:12 +00:00
|
|
|
snap.APIGateway.TCPRoutes.CancelWatch(ref)
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
})
|
|
|
|
|
|
|
|
snap.APIGateway.Certificates.ForEachKey(func(ref structs.ResourceReference) bool {
|
|
|
|
if _, ok := seenRefs[ref]; !ok {
|
|
|
|
snap.APIGateway.Certificates.CancelWatch(ref)
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
})
|
|
|
|
|
|
|
|
snap.APIGateway.BoundGatewayConfigLoaded = true
|
|
|
|
break
|
|
|
|
case *structs.APIGatewayConfigEntry:
|
|
|
|
snap.APIGateway.GatewayConfig = gwConf
|
|
|
|
|
|
|
|
for _, listener := range gwConf.Listeners {
|
|
|
|
snap.APIGateway.Listeners[listener.Name] = listener
|
|
|
|
}
|
|
|
|
|
|
|
|
snap.APIGateway.GatewayConfigLoaded = true
|
|
|
|
break
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("invalid type for config entry: %T", resp.Entry)
|
|
|
|
}
|
|
|
|
|
2023-02-09 21:20:12 +00:00
|
|
|
return h.watchIngressLeafCert(ctx, snap)
|
2023-02-08 21:52:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// handleInlineCertConfigUpdate stores the certificate for the gateway
|
|
|
|
func (h *handlerAPIGateway) handleInlineCertConfigUpdate(_ context.Context, u UpdateEvent, snap *ConfigSnapshot) error {
|
|
|
|
resp, ok := u.Result.(*structs.ConfigEntryResponse)
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("invalid type for response: %T", u.Result)
|
|
|
|
} else if resp.Entry == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
cfg, ok := resp.Entry.(*structs.InlineCertificateConfigEntry)
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("invalid type for config entry: %T", resp.Entry)
|
|
|
|
}
|
|
|
|
|
|
|
|
ref := structs.ResourceReference{
|
2023-02-10 20:47:16 +00:00
|
|
|
Kind: cfg.GetKind(),
|
|
|
|
Name: cfg.GetName(),
|
|
|
|
EnterpriseMeta: *cfg.GetEnterpriseMeta(),
|
2023-02-08 21:52:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
snap.APIGateway.Certificates.Set(ref, cfg)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// handleRouteConfigUpdate builds the list of upstreams for services on
|
|
|
|
// the route and watches the related discovery chains.
|
|
|
|
func (h *handlerAPIGateway) handleRouteConfigUpdate(ctx context.Context, u UpdateEvent, snap *ConfigSnapshot) error {
|
|
|
|
resp, ok := u.Result.(*structs.ConfigEntryResponse)
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("invalid type for response: %T", u.Result)
|
|
|
|
} else if resp.Entry == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
ref := structs.ResourceReference{
|
2023-02-10 20:47:16 +00:00
|
|
|
Kind: resp.Entry.GetKind(),
|
|
|
|
Name: resp.Entry.GetName(),
|
|
|
|
EnterpriseMeta: *resp.Entry.GetEnterpriseMeta(),
|
2023-02-08 21:52:12 +00:00
|
|
|
}
|
|
|
|
|
2023-02-10 21:13:44 +00:00
|
|
|
seenUpstreamIDs := make(upstreamIDSet)
|
2023-02-08 21:52:12 +00:00
|
|
|
upstreams := make(map[APIGatewayListenerKey]structs.Upstreams)
|
|
|
|
|
|
|
|
switch route := resp.Entry.(type) {
|
|
|
|
case *structs.HTTPRouteConfigEntry:
|
|
|
|
snap.APIGateway.HTTPRoutes.Set(ref, route)
|
|
|
|
|
|
|
|
for _, rule := range route.Rules {
|
|
|
|
for _, service := range rule.Services {
|
|
|
|
for _, listener := range snap.APIGateway.Listeners {
|
|
|
|
shouldBind := false
|
|
|
|
for _, parent := range route.Parents {
|
|
|
|
if h.referenceIsForListener(parent, listener, snap) {
|
|
|
|
shouldBind = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !shouldBind {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
upstream := structs.Upstream{
|
|
|
|
DestinationName: service.Name,
|
|
|
|
DestinationNamespace: service.NamespaceOrDefault(),
|
|
|
|
DestinationPartition: service.PartitionOrDefault(),
|
|
|
|
LocalBindPort: listener.Port,
|
|
|
|
// Pass the protocol that was configured on the listener in order
|
|
|
|
// to force that protocol on the Envoy listener.
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"protocol": "http",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2023-05-19 18:50:59 +00:00
|
|
|
listenerKey := APIGatewayListenerKeyFromListener(listener)
|
2023-02-08 21:52:12 +00:00
|
|
|
upstreams[listenerKey] = append(upstreams[listenerKey], upstream)
|
|
|
|
}
|
|
|
|
|
|
|
|
upstreamID := NewUpstreamIDFromServiceName(service.ServiceName())
|
|
|
|
seenUpstreamIDs[upstreamID] = struct{}{}
|
|
|
|
|
|
|
|
watchOpts := discoveryChainWatchOpts{
|
|
|
|
id: upstreamID,
|
|
|
|
name: service.Name,
|
|
|
|
namespace: service.NamespaceOrDefault(),
|
|
|
|
partition: service.PartitionOrDefault(),
|
|
|
|
datacenter: h.stateConfig.source.Datacenter,
|
|
|
|
}
|
|
|
|
|
|
|
|
handler := &handlerUpstreams{handlerState: h.handlerState}
|
|
|
|
if err := handler.watchDiscoveryChain(ctx, snap, watchOpts); err != nil {
|
|
|
|
return fmt.Errorf("failed to watch discovery chain for %s: %w", upstreamID, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
case *structs.TCPRouteConfigEntry:
|
|
|
|
snap.APIGateway.TCPRoutes.Set(ref, route)
|
|
|
|
|
|
|
|
for _, service := range route.Services {
|
|
|
|
upstreamID := NewUpstreamIDFromServiceName(service.ServiceName())
|
2023-02-10 21:13:44 +00:00
|
|
|
seenUpstreamIDs.add(upstreamID)
|
2023-02-08 21:52:12 +00:00
|
|
|
|
|
|
|
// For each listener, check if this route should bind and, if so, create an upstream.
|
|
|
|
for _, listener := range snap.APIGateway.Listeners {
|
|
|
|
shouldBind := false
|
|
|
|
for _, parent := range route.Parents {
|
|
|
|
if h.referenceIsForListener(parent, listener, snap) {
|
|
|
|
shouldBind = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !shouldBind {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
upstream := structs.Upstream{
|
|
|
|
DestinationName: service.Name,
|
|
|
|
DestinationNamespace: service.NamespaceOrDefault(),
|
|
|
|
DestinationPartition: service.PartitionOrDefault(),
|
|
|
|
LocalBindPort: listener.Port,
|
|
|
|
// Pass the protocol that was configured on the ingress listener in order
|
|
|
|
// to force that protocol on the Envoy listener.
|
|
|
|
Config: map[string]interface{}{
|
|
|
|
"protocol": "tcp",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2023-05-19 18:50:59 +00:00
|
|
|
listenerKey := APIGatewayListenerKeyFromListener(listener)
|
2023-02-08 21:52:12 +00:00
|
|
|
upstreams[listenerKey] = append(upstreams[listenerKey], upstream)
|
|
|
|
}
|
|
|
|
|
|
|
|
watchOpts := discoveryChainWatchOpts{
|
|
|
|
id: upstreamID,
|
|
|
|
name: service.Name,
|
|
|
|
namespace: service.NamespaceOrDefault(),
|
|
|
|
partition: service.PartitionOrDefault(),
|
|
|
|
datacenter: h.stateConfig.source.Datacenter,
|
|
|
|
}
|
|
|
|
|
|
|
|
handler := &handlerUpstreams{handlerState: h.handlerState}
|
|
|
|
if err := handler.watchDiscoveryChain(ctx, snap, watchOpts); err != nil {
|
|
|
|
return fmt.Errorf("failed to watch discovery chain for %s: %w", upstreamID, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("invalid type for config entry: %T", resp.Entry)
|
|
|
|
}
|
|
|
|
|
2023-02-10 21:13:44 +00:00
|
|
|
for listener, set := range upstreams {
|
|
|
|
snap.APIGateway.Upstreams.set(ref, listener, set)
|
|
|
|
}
|
|
|
|
snap.APIGateway.UpstreamsSet.set(ref, seenUpstreamIDs)
|
2023-02-08 21:52:12 +00:00
|
|
|
|
|
|
|
// Stop watching any upstreams and discovery chains that have become irrelevant
|
|
|
|
for upstreamID, cancelDiscoChain := range snap.APIGateway.WatchedDiscoveryChains {
|
2023-02-10 21:13:44 +00:00
|
|
|
if snap.APIGateway.UpstreamsSet.hasUpstream(upstreamID) {
|
2023-02-08 21:52:12 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
for targetID, cancelUpstream := range snap.APIGateway.WatchedUpstreams[upstreamID] {
|
|
|
|
cancelUpstream()
|
|
|
|
delete(snap.APIGateway.WatchedUpstreams[upstreamID], targetID)
|
|
|
|
delete(snap.APIGateway.WatchedUpstreamEndpoints[upstreamID], targetID)
|
|
|
|
|
|
|
|
if targetUID := NewUpstreamIDFromTargetID(targetID); targetUID.Peer != "" {
|
|
|
|
snap.APIGateway.PeerUpstreamEndpoints.CancelWatch(targetUID)
|
|
|
|
snap.APIGateway.UpstreamPeerTrustBundles.CancelWatch(targetUID.Peer)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
cancelDiscoChain()
|
|
|
|
delete(snap.APIGateway.WatchedDiscoveryChains, upstreamID)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-05-19 18:50:59 +00:00
|
|
|
func (h *handlerAPIGateway) recompileDiscoveryChains(snap *ConfigSnapshot) error {
|
|
|
|
synthesizedChains := map[UpstreamID]*structs.CompiledDiscoveryChain{}
|
|
|
|
|
|
|
|
for name, listener := range snap.APIGateway.Listeners {
|
|
|
|
boundListener, ok := snap.APIGateway.BoundListeners[name]
|
|
|
|
if !(ok && snap.APIGateway.GatewayConfig.ListenerIsReady(name)) {
|
|
|
|
// Skip any listeners that don't have a bound listener. Once the bound listener is created, this will be run again.
|
|
|
|
// skip any listeners that might be in an invalid state
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a synthesized discovery chain for each service.
|
|
|
|
services, upstreams, compiled, err := snap.APIGateway.synthesizeChains(h.source.Datacenter, listener, boundListener)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(upstreams) == 0 {
|
|
|
|
// skip if we can't construct any upstreams
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, service := range services {
|
|
|
|
id := NewUpstreamIDFromServiceName(structs.NewServiceName(service.Name, &service.EnterpriseMeta))
|
xds: generate listeners directly from API gateway snapshot (#17398)
* API Gateway XDS Primitives, endpoints and clusters (#17002)
* XDS primitive generation for endpoints and clusters
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
* server_test
* deleted extra file
* add missing parents to test
---------
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
* Routes for API Gateway (#17158)
* XDS primitive generation for endpoints and clusters
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
* server_test
* deleted extra file
* add missing parents to test
* checkpoint
* delete extra file
* httproute flattening code
* linting issue
* so close on this, calling for tonight
* unit test passing
* add in header manip to virtual host
* upstream rebuild commented out
* Use consistent upstream name whether or not we're rebuilding
* Start working through route naming logic
* Fix typos in test descriptions
* Simplify route naming logic
* Simplify RebuildHTTPRouteUpstream
* Merge additional compiled discovery chains instead of overwriting
* Use correct chain for flattened route, clean up + add TODOs
* Remove empty conditional branch
* Restore previous variable declaration
Limit the scope of this PR
* Clean up, improve TODO
* add logging, clean up todos
* clean up function
---------
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
* checkpoint, skeleton, tests not passing
* checkpoint
* endpoints xds cluster configuration
* resources test fix
* fix reversion in resources_test
* checkpoint
* Update agent/proxycfg/api_gateway.go
Co-authored-by: John Maguire <john.maguire@hashicorp.com>
* unit tests passing
* gofmt
* add deterministic sorting to appease the unit test gods
* remove panic
* Find ready upstream matching listener instead of first in list
* Clean up, improve TODO
* Modify getReadyUpstreams to filter upstreams by listener (#17410)
Each listener would previously have all upstreams from any route that bound to the listener. This is problematic when a route bound to one listener also binds to other listeners and so includes upstreams for multiple listeners. The list for a given listener would then wind up including upstreams for other listeners.
* clean up todos, references to api gateway in listeners_ingress
* merge in Nathan's fix
* Update agent/consul/discoverychain/gateway.go
* cleanup current todos, remove snapshot manipulation from generation code
* Update agent/structs/config_entry_gateways.go
Co-authored-by: Thomas Eckert <teckert@hashicorp.com>
* Update agent/consul/discoverychain/gateway.go
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
* Update agent/consul/discoverychain/gateway.go
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
* Update agent/proxycfg/snapshot.go
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
* clarified header comment for FlattenHTTPRoute, changed RebuildHTTPRouteUpstream to BuildHTTPRouteUpstream
* simplify cert logic
* Delete scratch
* revert route related changes in listener PR
* Update agent/consul/discoverychain/gateway.go
* Update agent/proxycfg/snapshot.go
* clean up uneeded extra lines in endpoints
---------
Co-authored-by: Nathan Coleman <nathan.coleman@hashicorp.com>
Co-authored-by: John Maguire <john.maguire@hashicorp.com>
Co-authored-by: Thomas Eckert <teckert@hashicorp.com>
2023-05-22 21:36:29 +00:00
|
|
|
|
2023-05-19 18:50:59 +00:00
|
|
|
if compiled[i].ServiceName != service.Name {
|
|
|
|
return fmt.Errorf("Compiled Discovery chain for %s does not match service %s", compiled[i].ServiceName, id)
|
|
|
|
}
|
|
|
|
synthesizedChains[id] = compiled[i]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Merge in additional discovery chains
|
|
|
|
for id, chain := range synthesizedChains {
|
|
|
|
snap.APIGateway.DiscoveryChain[id] = chain
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-02-08 21:52:12 +00:00
|
|
|
// referenceIsForListener returns whether the provided structs.ResourceReference
|
|
|
|
// targets the provided structs.APIGatewayListener. For this to be true, the kind
|
|
|
|
// and name must match the structs.APIGatewayConfigEntry containing the listener,
|
|
|
|
// and the reference must specify either no section name or the name of the listener
|
|
|
|
// as the section name.
|
|
|
|
//
|
|
|
|
// TODO This would probably be more generally useful as a helper in the structs pkg
|
|
|
|
func (h *handlerAPIGateway) referenceIsForListener(ref structs.ResourceReference, listener structs.APIGatewayListener, snap *ConfigSnapshot) bool {
|
2023-02-09 21:20:12 +00:00
|
|
|
if ref.Kind != structs.APIGateway && ref.Kind != "" {
|
2023-02-08 21:52:12 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
if ref.Name != snap.APIGateway.GatewayConfig.Name {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return ref.SectionName == "" || ref.SectionName == listener.Name
|
|
|
|
}
|
2023-02-09 21:20:12 +00:00
|
|
|
|
|
|
|
func (h *handlerAPIGateway) watchIngressLeafCert(ctx context.Context, snap *ConfigSnapshot) error {
|
|
|
|
// Note that we DON'T test for TLS.enabled because we need a leaf cert for the
|
|
|
|
// gateway even without TLS to use as a client cert.
|
|
|
|
if !snap.APIGateway.GatewayConfigLoaded {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Watch the leaf cert
|
|
|
|
if snap.APIGateway.LeafCertWatchCancel != nil {
|
|
|
|
snap.APIGateway.LeafCertWatchCancel()
|
|
|
|
}
|
|
|
|
ctx, cancel := context.WithCancel(ctx)
|
2023-06-13 16:12:43 +00:00
|
|
|
err := h.dataSources.LeafCertificate.Notify(ctx, &leafcert.ConnectCALeafRequest{
|
2023-02-09 21:20:12 +00:00
|
|
|
Datacenter: h.source.Datacenter,
|
|
|
|
Token: h.token,
|
|
|
|
Service: h.service,
|
|
|
|
EnterpriseMeta: h.proxyID.EnterpriseMeta,
|
|
|
|
}, leafWatchID, h.ch)
|
|
|
|
if err != nil {
|
|
|
|
cancel()
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
snap.APIGateway.LeafCertWatchCancel = cancel
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|