2023-03-28 18:39:22 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
2023-04-06 21:12:07 +00:00
|
|
|
package extensioncommon
|
2022-03-31 20:24:46 +00:00
|
|
|
|
|
|
|
import (
|
2023-05-26 18:10:31 +00:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
2023-05-23 11:55:06 +00:00
|
|
|
envoy_cluster_v3 "github.com/envoyproxy/go-control-plane/envoy/config/cluster/v3"
|
2022-03-31 20:24:46 +00:00
|
|
|
envoy_core_v3 "github.com/envoyproxy/go-control-plane/envoy/config/core/v3"
|
2023-05-29 13:42:35 +00:00
|
|
|
envoy_endpoint_v3 "github.com/envoyproxy/go-control-plane/envoy/config/endpoint/v3"
|
2022-03-31 20:24:46 +00:00
|
|
|
envoy_listener_v3 "github.com/envoyproxy/go-control-plane/envoy/config/listener/v3"
|
2023-05-23 11:55:06 +00:00
|
|
|
envoy_route_v3 "github.com/envoyproxy/go-control-plane/envoy/config/route/v3"
|
2022-03-31 20:24:46 +00:00
|
|
|
envoy_http_v3 "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/network/http_connection_manager/v3"
|
2023-05-26 18:10:31 +00:00
|
|
|
envoy_tcp_proxy_v3 "github.com/envoyproxy/go-control-plane/envoy/extensions/filters/network/tcp_proxy/v3"
|
2022-03-31 20:24:46 +00:00
|
|
|
envoy_tls_v3 "github.com/envoyproxy/go-control-plane/envoy/extensions/transport_sockets/tls/v3"
|
2023-05-26 18:10:31 +00:00
|
|
|
envoy_resource_v3 "github.com/envoyproxy/go-control-plane/pkg/resource/v3"
|
2023-01-11 14:39:10 +00:00
|
|
|
"google.golang.org/protobuf/proto"
|
2023-04-06 21:12:07 +00:00
|
|
|
"google.golang.org/protobuf/types/known/anypb"
|
2023-05-30 18:53:42 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/consul/api"
|
|
|
|
"github.com/hashicorp/consul/envoyextensions/xdscommon"
|
2022-03-31 20:24:46 +00:00
|
|
|
)
|
|
|
|
|
2023-04-06 21:12:07 +00:00
|
|
|
// MakeUpstreamTLSTransportSocket generates an Envoy transport socket for the given TLS context.
|
|
|
|
func MakeUpstreamTLSTransportSocket(tlsContext *envoy_tls_v3.UpstreamTlsContext) (*envoy_core_v3.TransportSocket, error) {
|
2022-03-31 20:24:46 +00:00
|
|
|
if tlsContext == nil {
|
|
|
|
return nil, nil
|
|
|
|
}
|
2023-04-06 21:12:07 +00:00
|
|
|
return MakeTransportSocket("tls", tlsContext)
|
2022-03-31 20:24:46 +00:00
|
|
|
}
|
|
|
|
|
2023-04-06 21:12:07 +00:00
|
|
|
// MakeTransportSocket generates an Envoy transport socket from the given proto message.
|
|
|
|
func MakeTransportSocket(name string, config proto.Message) (*envoy_core_v3.TransportSocket, error) {
|
2023-01-11 14:39:10 +00:00
|
|
|
any, err := anypb.New(config)
|
2022-03-31 20:24:46 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &envoy_core_v3.TransportSocket{
|
|
|
|
Name: name,
|
|
|
|
ConfigType: &envoy_core_v3.TransportSocket_TypedConfig{
|
|
|
|
TypedConfig: any,
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2023-04-06 21:12:07 +00:00
|
|
|
// MakeEnvoyHTTPFilter generates an Envoy HTTP filter from the given proto message.
|
|
|
|
func MakeEnvoyHTTPFilter(name string, cfg proto.Message) (*envoy_http_v3.HttpFilter, error) {
|
2023-01-11 14:39:10 +00:00
|
|
|
any, err := anypb.New(cfg)
|
2022-03-31 20:24:46 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &envoy_http_v3.HttpFilter{
|
|
|
|
Name: name,
|
|
|
|
ConfigType: &envoy_http_v3.HttpFilter_TypedConfig{TypedConfig: any},
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2023-04-06 21:12:07 +00:00
|
|
|
// MakeFilter generates an Envoy listener filter from the given proto message.
|
|
|
|
func MakeFilter(name string, cfg proto.Message) (*envoy_listener_v3.Filter, error) {
|
2023-01-11 14:39:10 +00:00
|
|
|
any, err := anypb.New(cfg)
|
2022-03-31 20:24:46 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &envoy_listener_v3.Filter{
|
|
|
|
Name: name,
|
|
|
|
ConfigType: &envoy_listener_v3.Filter_TypedConfig{TypedConfig: any},
|
|
|
|
}, nil
|
|
|
|
}
|
2023-05-23 11:55:06 +00:00
|
|
|
|
2023-05-30 18:53:42 +00:00
|
|
|
// TrafficDirection determines whether inbound or outbound Envoy resources will be patched.
|
|
|
|
type TrafficDirection string
|
|
|
|
|
|
|
|
const (
|
|
|
|
TrafficDirectionInbound TrafficDirection = "inbound"
|
|
|
|
TrafficDirectionOutbound TrafficDirection = "outbound"
|
|
|
|
)
|
|
|
|
|
|
|
|
var TrafficDirections = StringSet{string(TrafficDirectionInbound): {}, string(TrafficDirectionOutbound): {}}
|
|
|
|
|
|
|
|
type StringSet map[string]struct{}
|
|
|
|
|
|
|
|
func (c *StringSet) CheckRequired(v, fieldName string) error {
|
|
|
|
if _, ok := (*c)[v]; !ok {
|
|
|
|
if v == "" {
|
|
|
|
return fmt.Errorf("field %s is required", fieldName)
|
|
|
|
}
|
|
|
|
|
|
|
|
var keys []string
|
|
|
|
for k := range *c {
|
|
|
|
keys = append(keys, k)
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt.Errorf("invalid %s '%q'; supported values: %s",
|
|
|
|
fieldName, v, strings.Join(keys, ", "))
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func NormalizeEmptyToDefault(s string) string {
|
|
|
|
if s == "" {
|
|
|
|
return "default"
|
|
|
|
}
|
|
|
|
|
|
|
|
return s
|
|
|
|
}
|
|
|
|
|
|
|
|
func NormalizeServiceName(sn *api.CompoundServiceName) {
|
|
|
|
sn.Namespace = NormalizeEmptyToDefault(sn.Namespace)
|
|
|
|
sn.Partition = NormalizeEmptyToDefault(sn.Partition)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Payload represents a single Envoy resource to be modified by extensions.
|
|
|
|
// It associates the RuntimeConfig of the local proxy, the TrafficDirection
|
|
|
|
// of the resource, and the CompoundServiceName and UpstreamData (if outbound)
|
|
|
|
// of a service the Envoy resource corresponds to.
|
|
|
|
type Payload[K proto.Message] struct {
|
|
|
|
RuntimeConfig *RuntimeConfig
|
|
|
|
ServiceName *api.CompoundServiceName
|
|
|
|
Upstream *UpstreamData
|
|
|
|
TrafficDirection TrafficDirection
|
|
|
|
Message K
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p Payload[K]) IsInbound() bool {
|
|
|
|
return p.TrafficDirection == TrafficDirectionInbound
|
|
|
|
}
|
|
|
|
|
|
|
|
type ClusterPayload = Payload[*envoy_cluster_v3.Cluster]
|
|
|
|
type ClusterLoadAssignmentPayload = Payload[*envoy_endpoint_v3.ClusterLoadAssignment]
|
|
|
|
type ListenerPayload = Payload[*envoy_listener_v3.Listener]
|
|
|
|
type FilterPayload = Payload[*envoy_listener_v3.Filter]
|
|
|
|
type RoutePayload = Payload[*envoy_route_v3.RouteConfiguration]
|
|
|
|
|
|
|
|
func (cfg *RuntimeConfig) GetClusterPayload(c *envoy_cluster_v3.Cluster) ClusterPayload {
|
|
|
|
d := TrafficDirectionOutbound
|
|
|
|
var u *UpstreamData
|
|
|
|
var sn *api.CompoundServiceName
|
|
|
|
|
|
|
|
if IsLocalAppCluster(c) {
|
|
|
|
d = TrafficDirectionInbound
|
|
|
|
} else {
|
|
|
|
u, sn = cfg.findUpstreamBySNI(c.Name)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ClusterPayload{
|
|
|
|
RuntimeConfig: cfg,
|
|
|
|
ServiceName: sn,
|
|
|
|
Upstream: u,
|
|
|
|
TrafficDirection: d,
|
|
|
|
Message: c,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *RuntimeConfig) GetListenerPayload(l *envoy_listener_v3.Listener) ListenerPayload {
|
|
|
|
d := TrafficDirectionOutbound
|
|
|
|
var u *UpstreamData
|
|
|
|
var sn *api.CompoundServiceName
|
|
|
|
|
|
|
|
if IsInboundPublicListener(l) {
|
|
|
|
d = TrafficDirectionInbound
|
|
|
|
} else {
|
|
|
|
u, sn = c.findUpstreamByEnvoyID(GetListenerEnvoyID(l))
|
|
|
|
}
|
|
|
|
|
|
|
|
return ListenerPayload{
|
|
|
|
RuntimeConfig: c,
|
|
|
|
ServiceName: sn,
|
|
|
|
Upstream: u,
|
|
|
|
TrafficDirection: d,
|
|
|
|
Message: l,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *RuntimeConfig) GetFilterPayload(f *envoy_listener_v3.Filter, l *envoy_listener_v3.Listener) FilterPayload {
|
|
|
|
d := TrafficDirectionOutbound
|
|
|
|
var u *UpstreamData
|
|
|
|
var sn *api.CompoundServiceName
|
|
|
|
|
|
|
|
if IsInboundPublicListener(l) {
|
|
|
|
d = TrafficDirectionInbound
|
|
|
|
} else {
|
|
|
|
u, sn = c.findUpstreamByEnvoyID(GetListenerEnvoyID(l))
|
|
|
|
}
|
|
|
|
|
|
|
|
return FilterPayload{
|
|
|
|
RuntimeConfig: c,
|
|
|
|
ServiceName: sn,
|
|
|
|
Upstream: u,
|
|
|
|
TrafficDirection: d,
|
|
|
|
Message: f,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *RuntimeConfig) GetRoutePayload(r *envoy_route_v3.RouteConfiguration) RoutePayload {
|
|
|
|
d := TrafficDirectionOutbound
|
|
|
|
var u *UpstreamData
|
|
|
|
var sn *api.CompoundServiceName
|
|
|
|
|
|
|
|
if IsRouteToLocalAppCluster(r) {
|
|
|
|
d = TrafficDirectionInbound
|
|
|
|
} else {
|
|
|
|
u, sn = c.findUpstreamByEnvoyID(r.Name)
|
|
|
|
}
|
|
|
|
|
|
|
|
return RoutePayload{
|
|
|
|
RuntimeConfig: c,
|
|
|
|
ServiceName: sn,
|
|
|
|
Upstream: u,
|
|
|
|
TrafficDirection: d,
|
|
|
|
Message: r,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cfg *RuntimeConfig) GetClusterLoadAssignmentPayload(c *envoy_endpoint_v3.ClusterLoadAssignment) ClusterLoadAssignmentPayload {
|
|
|
|
d := TrafficDirectionOutbound
|
|
|
|
var u *UpstreamData
|
|
|
|
var sn *api.CompoundServiceName
|
|
|
|
|
|
|
|
if IsLocalAppClusterLoadAssignment(c) {
|
|
|
|
d = TrafficDirectionInbound
|
|
|
|
} else {
|
|
|
|
u, sn = cfg.findUpstreamBySNI(c.ClusterName)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
return ClusterLoadAssignmentPayload{
|
|
|
|
RuntimeConfig: cfg,
|
|
|
|
ServiceName: sn,
|
|
|
|
Upstream: u,
|
|
|
|
TrafficDirection: d,
|
|
|
|
Message: c,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *RuntimeConfig) findUpstreamByEnvoyID(envoyID string) (*UpstreamData, *api.CompoundServiceName) {
|
|
|
|
for sn, u := range c.Upstreams {
|
|
|
|
if u.EnvoyID == envoyID {
|
|
|
|
return u, &sn
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *RuntimeConfig) findUpstreamBySNI(sni string) (*UpstreamData, *api.CompoundServiceName) {
|
|
|
|
for sn, u := range c.Upstreams {
|
|
|
|
_, ok := u.SNIs[sni]
|
|
|
|
if ok {
|
|
|
|
return u, &sn
|
|
|
|
}
|
|
|
|
|
|
|
|
if strings.HasPrefix(sni, xdscommon.FailoverClusterNamePrefix) {
|
|
|
|
parts := strings.Split(sni, "~")
|
|
|
|
|
|
|
|
if len(parts) != 3 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
id := parts[2]
|
|
|
|
_, ok := u.SNIs[id]
|
|
|
|
if ok {
|
|
|
|
return u, &sn
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
2023-05-23 11:55:06 +00:00
|
|
|
// GetListenerEnvoyID returns the Envoy ID string parsed from the name of the given Listener. If none is found, it
|
|
|
|
// returns the empty string.
|
|
|
|
func GetListenerEnvoyID(l *envoy_listener_v3.Listener) string {
|
|
|
|
if id, _, found := strings.Cut(l.Name, ":"); found {
|
|
|
|
return id
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsLocalAppCluster returns true if the given Cluster represents the local Cluster, which receives inbound traffic to
|
|
|
|
// the local proxy.
|
|
|
|
func IsLocalAppCluster(c *envoy_cluster_v3.Cluster) bool {
|
|
|
|
return c.Name == xdscommon.LocalAppClusterName
|
|
|
|
}
|
|
|
|
|
2023-05-29 13:42:35 +00:00
|
|
|
// IsLocalAppClusterLoadAssignment returns true if the given ClusterLoadAssignment represents the local Cluster, which
|
|
|
|
// receives inbound traffic to the local proxy.
|
|
|
|
func IsLocalAppClusterLoadAssignment(a *envoy_endpoint_v3.ClusterLoadAssignment) bool {
|
|
|
|
return a.ClusterName == xdscommon.LocalAppClusterName
|
|
|
|
}
|
|
|
|
|
2023-05-23 11:55:06 +00:00
|
|
|
// IsRouteToLocalAppCluster takes a RouteConfiguration and returns true if all routes within it target the local
|
|
|
|
// Cluster. Note that because we currently target RouteConfiguration in PatchRoute, we have to check multiple individual
|
|
|
|
// Route resources.
|
|
|
|
func IsRouteToLocalAppCluster(r *envoy_route_v3.RouteConfiguration) bool {
|
|
|
|
clusterNames := RouteClusterNames(r)
|
|
|
|
_, match := clusterNames[xdscommon.LocalAppClusterName]
|
|
|
|
|
|
|
|
return match && len(clusterNames) == 1
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsInboundPublicListener returns true if the given Listener represents the inbound public Listener for the local
|
|
|
|
// service.
|
|
|
|
func IsInboundPublicListener(l *envoy_listener_v3.Listener) bool {
|
|
|
|
return GetListenerEnvoyID(l) == xdscommon.PublicListenerName
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsOutboundTProxyListener returns true if the given Listener represents the outbound TProxy Listener for the local
|
|
|
|
// service.
|
|
|
|
func IsOutboundTProxyListener(l *envoy_listener_v3.Listener) bool {
|
|
|
|
return GetListenerEnvoyID(l) == xdscommon.OutboundListenerName
|
|
|
|
}
|
2023-05-26 18:10:31 +00:00
|
|
|
|
|
|
|
func filterChainTProxyMatch(vip string, filterChain *envoy_listener_v3.FilterChain) bool {
|
|
|
|
for _, prefixRange := range filterChain.FilterChainMatch.PrefixRanges {
|
|
|
|
// Since we always set the address prefix as the full VIP (rather than a prefix), we can just check if they are
|
|
|
|
// equal to find the matching filter chain.
|
|
|
|
if vip == prefixRange.AddressPrefix {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func FilterClusterNames(filter *envoy_listener_v3.Filter) map[string]struct{} {
|
|
|
|
clusterNames := make(map[string]struct{})
|
|
|
|
if filter == nil {
|
|
|
|
return clusterNames
|
|
|
|
}
|
|
|
|
|
|
|
|
if config := envoy_resource_v3.GetHTTPConnectionManager(filter); config != nil {
|
|
|
|
// If it's using RDS, the cluster names will be in the route, rather than in the http filter's route config, so
|
|
|
|
// we don't return any cluster names in this case. They can be gathered from the route.
|
|
|
|
if config.GetRds() != nil {
|
|
|
|
return clusterNames
|
|
|
|
}
|
|
|
|
|
|
|
|
cfg := config.GetRouteConfig()
|
|
|
|
|
|
|
|
clusterNames = RouteClusterNames(cfg)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config := GetTCPProxy(filter); config != nil {
|
|
|
|
clusterNames[config.GetCluster()] = struct{}{}
|
|
|
|
}
|
|
|
|
|
|
|
|
return clusterNames
|
|
|
|
}
|
|
|
|
|
|
|
|
func RouteClusterNames(route *envoy_route_v3.RouteConfiguration) map[string]struct{} {
|
|
|
|
if route == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
clusterNames := make(map[string]struct{})
|
|
|
|
|
|
|
|
for _, virtualHost := range route.VirtualHosts {
|
|
|
|
for _, route := range virtualHost.Routes {
|
|
|
|
r := route.GetRoute()
|
|
|
|
if r == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if c := r.GetCluster(); c != "" {
|
|
|
|
clusterNames[r.GetCluster()] = struct{}{}
|
|
|
|
}
|
|
|
|
|
|
|
|
if wc := r.GetWeightedClusters(); wc != nil {
|
|
|
|
for _, c := range wc.GetClusters() {
|
|
|
|
if c.Name != "" {
|
|
|
|
clusterNames[c.Name] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return clusterNames
|
|
|
|
}
|
|
|
|
|
|
|
|
func GetTCPProxy(filter *envoy_listener_v3.Filter) *envoy_tcp_proxy_v3.TcpProxy {
|
|
|
|
if typedConfig := filter.GetTypedConfig(); typedConfig != nil {
|
|
|
|
config := &envoy_tcp_proxy_v3.TcpProxy{}
|
|
|
|
if err := anypb.UnmarshalTo(typedConfig, config, proto.UnmarshalOptions{}); err == nil {
|
|
|
|
return config
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func getSNI(chain *envoy_listener_v3.FilterChain) string {
|
|
|
|
var sni string
|
|
|
|
|
|
|
|
if chain == nil {
|
|
|
|
return sni
|
|
|
|
}
|
|
|
|
|
|
|
|
if chain.FilterChainMatch == nil {
|
|
|
|
return sni
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(chain.FilterChainMatch.ServerNames) == 0 {
|
|
|
|
return sni
|
|
|
|
}
|
|
|
|
|
|
|
|
return chain.FilterChainMatch.ServerNames[0]
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetHTTPConnectionManager returns the Envoy HttpConnectionManager filter from the list of network filters.
|
|
|
|
// It also returns the index within the list of filters where the connection manager was found in case the caller
|
|
|
|
// needs this information.
|
|
|
|
// It returns a non-nil error if the HttpConnectionManager is not found.
|
|
|
|
func GetHTTPConnectionManager(filters ...*envoy_listener_v3.Filter) (*envoy_http_v3.HttpConnectionManager, int, error) {
|
|
|
|
for idx, filter := range filters {
|
|
|
|
if filter.Name == "envoy.filters.network.http_connection_manager" {
|
|
|
|
if httpConnMgr := envoy_resource_v3.GetHTTPConnectionManager(filter); httpConnMgr != nil {
|
|
|
|
return httpConnMgr, idx, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil, 0, errors.New("failed to get HTTP connection manager")
|
|
|
|
}
|
|
|
|
|
|
|
|
// InsertLocation indicates where to insert an Envoy resource within a list of resources.
|
|
|
|
type InsertLocation string
|
|
|
|
|
|
|
|
const (
|
|
|
|
// InsertFirst inserts the resource as the first entry in the list.
|
|
|
|
InsertFirst InsertLocation = "First"
|
|
|
|
// InsertLast inserts the resource as the last entry in the list.
|
|
|
|
InsertLast InsertLocation = "Last"
|
|
|
|
// InsertBeforeFirstMatch inserts the resource before the first resource with a matching name.
|
|
|
|
InsertBeforeFirstMatch InsertLocation = "BeforeFirstMatch"
|
|
|
|
// InsertAfterFirstMatch inserts the resource after the first resource with a matching name.
|
|
|
|
InsertAfterFirstMatch InsertLocation = "AfterFirstMatch"
|
|
|
|
// InsertBeforeLastMatch inserts the resource before the last resource with a matching name.
|
|
|
|
InsertBeforeLastMatch InsertLocation = "BeforeLastMatch"
|
|
|
|
// InsertAfterLastMatch inserts the resource after the last resource with a matching name.
|
|
|
|
InsertAfterLastMatch InsertLocation = "AfterLastMatch"
|
|
|
|
)
|
|
|
|
|
|
|
|
// InsertOptions controls how and where to insert Envoy resources.
|
|
|
|
type InsertOptions struct {
|
|
|
|
// Location defines where to insert the resource within the list.
|
|
|
|
Location InsertLocation
|
|
|
|
// FilterName indicates the name of the resource to insert relative to.
|
|
|
|
FilterName string
|
|
|
|
}
|
|
|
|
|
|
|
|
// InsertHTTPFilter inserts the given HTTP filter into the HttpConnectionManager's filter chain in the location
|
|
|
|
// determined by the insert options. This list of filters must include the HttpConnectionManager network
|
|
|
|
// filter or the operation will fail.
|
|
|
|
//
|
|
|
|
// It returns the modified list of filters including the updated HttpConnectionManager.
|
|
|
|
// If a matching location is not found to insert the filter, a non-nil error is returned.
|
|
|
|
func InsertHTTPFilter(filters []*envoy_listener_v3.Filter, filter *envoy_http_v3.HttpFilter, opts InsertOptions) ([]*envoy_listener_v3.Filter, error) {
|
|
|
|
httpConnMgr, idx, err := GetHTTPConnectionManager(filters...)
|
|
|
|
if err != nil {
|
|
|
|
return filters, err
|
|
|
|
}
|
|
|
|
|
|
|
|
namedFilters := make([]namedFilter, 0, len(httpConnMgr.HttpFilters)+1)
|
|
|
|
for _, f := range httpConnMgr.HttpFilters {
|
|
|
|
namedFilters = append(namedFilters, f)
|
|
|
|
}
|
|
|
|
insertIdx, err := locateInsertIndex(opts, namedFilters)
|
|
|
|
if err != nil {
|
|
|
|
return filters, fmt.Errorf("failed to insert %q filter: %w", filter.Name, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
currIdx := 0
|
|
|
|
newHttpFilters := make([]*envoy_http_v3.HttpFilter, len(httpConnMgr.HttpFilters)+1)
|
|
|
|
for idx, httpFilter := range httpConnMgr.HttpFilters {
|
|
|
|
if idx == insertIdx {
|
|
|
|
newHttpFilters[currIdx] = filter
|
|
|
|
currIdx++
|
|
|
|
}
|
|
|
|
newHttpFilters[currIdx] = httpFilter
|
|
|
|
currIdx++
|
|
|
|
}
|
|
|
|
if currIdx == insertIdx {
|
|
|
|
newHttpFilters[currIdx] = filter
|
|
|
|
}
|
|
|
|
|
|
|
|
httpConnMgr.HttpFilters = newHttpFilters
|
|
|
|
newHttpConMan, err := MakeFilter("envoy.filters.network.http_connection_manager", httpConnMgr)
|
|
|
|
if err != nil {
|
|
|
|
return filters, errors.New("failed to insert new HTTP connection manager filter")
|
|
|
|
}
|
|
|
|
filters[idx] = newHttpConMan
|
|
|
|
|
|
|
|
return filters, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// InsertNetworkFilter inserts the given network filter into the filter chain in the location
|
|
|
|
// determined by the insert options.
|
|
|
|
//
|
|
|
|
// It returns the modified list of filters including the new filter.
|
|
|
|
// If a matching location is not found to insert the filter, a non-nil error is returned.
|
|
|
|
func InsertNetworkFilter(filters []*envoy_listener_v3.Filter, filter *envoy_listener_v3.Filter, opts InsertOptions) ([]*envoy_listener_v3.Filter, error) {
|
|
|
|
namedFilters := make([]namedFilter, 0, len(filters)+1)
|
|
|
|
for _, f := range filters {
|
|
|
|
namedFilters = append(namedFilters, f)
|
|
|
|
}
|
|
|
|
insertIdx, err := locateInsertIndex(opts, namedFilters)
|
|
|
|
if err != nil {
|
|
|
|
return filters, fmt.Errorf("failed to insert %q filter: %w", filter.Name, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
currIdx := 0
|
|
|
|
newFilters := make([]*envoy_listener_v3.Filter, len(filters)+1)
|
|
|
|
for idx, f := range filters {
|
|
|
|
if idx == insertIdx {
|
|
|
|
newFilters[currIdx] = filter
|
|
|
|
currIdx++
|
|
|
|
}
|
|
|
|
newFilters[currIdx] = f
|
|
|
|
currIdx++
|
|
|
|
}
|
|
|
|
if currIdx == insertIdx {
|
|
|
|
newFilters[currIdx] = filter
|
|
|
|
}
|
|
|
|
|
|
|
|
return newFilters, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// namedFilter is a convenience interface for locating Envoy filters based on name.
|
|
|
|
type namedFilter interface {
|
|
|
|
GetName() string
|
|
|
|
}
|
|
|
|
|
|
|
|
// locateInsertIndex returns the index where a filter should be inserted based on the given
|
|
|
|
// insert options.
|
|
|
|
func locateInsertIndex(opts InsertOptions, filters []namedFilter) (int, error) {
|
|
|
|
idx := 0
|
|
|
|
if opts.Location == InsertFirst {
|
|
|
|
return idx, nil
|
|
|
|
}
|
|
|
|
if opts.Location == InsertLast {
|
|
|
|
return len(filters), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
matched := false
|
|
|
|
for currIdx, filter := range filters {
|
|
|
|
if filter.GetName() == opts.FilterName {
|
|
|
|
matched = true
|
|
|
|
switch opts.Location {
|
|
|
|
case InsertBeforeFirstMatch:
|
|
|
|
return currIdx, nil
|
|
|
|
case InsertAfterFirstMatch:
|
|
|
|
return currIdx + 1, nil
|
|
|
|
case InsertBeforeLastMatch:
|
|
|
|
idx = currIdx
|
|
|
|
case InsertAfterLastMatch:
|
|
|
|
idx = currIdx + 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if matched {
|
|
|
|
return idx, nil
|
|
|
|
}
|
|
|
|
return idx, fmt.Errorf("failed to find insert location %q for %q", opts.Location, opts.FilterName)
|
|
|
|
}
|