proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
package proxycfgglue
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/hashicorp/go-hclog"
|
|
|
|
|
|
|
|
"github.com/hashicorp/consul/acl"
|
|
|
|
"github.com/hashicorp/consul/agent/cache"
|
|
|
|
"github.com/hashicorp/consul/agent/consul/stream"
|
|
|
|
"github.com/hashicorp/consul/agent/proxycfg"
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
|
|
"github.com/hashicorp/consul/agent/submatview"
|
|
|
|
"github.com/hashicorp/consul/proto/pbconfigentry"
|
|
|
|
"github.com/hashicorp/consul/proto/pbsubscribe"
|
|
|
|
)
|
|
|
|
|
|
|
|
// ServerDataSourceDeps contains the dependencies needed for sourcing data from
|
|
|
|
// server-local sources (e.g. materialized views).
|
|
|
|
type ServerDataSourceDeps struct {
|
|
|
|
ViewStore *submatview.Store
|
|
|
|
EventPublisher *stream.EventPublisher
|
|
|
|
Logger hclog.Logger
|
|
|
|
ACLResolver submatview.ACLResolver
|
2022-07-01 15:18:33 +00:00
|
|
|
GetStore func() Store
|
proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ServerConfigEntry satisfies the proxycfg.ConfigEntry interface by sourcing
|
|
|
|
// data from a local materialized view (backed by an EventPublisher subscription).
|
|
|
|
func ServerConfigEntry(deps ServerDataSourceDeps) proxycfg.ConfigEntry {
|
|
|
|
return serverConfigEntry{deps}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServerConfigEntryList satisfies the proxycfg.ConfigEntry interface by sourcing
|
|
|
|
// data from a local materialized view (backed by an EventPublisher subscription).
|
|
|
|
func ServerConfigEntryList(deps ServerDataSourceDeps) proxycfg.ConfigEntryList {
|
|
|
|
return serverConfigEntry{deps}
|
|
|
|
}
|
|
|
|
|
|
|
|
type serverConfigEntry struct {
|
|
|
|
deps ServerDataSourceDeps
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e serverConfigEntry) Notify(ctx context.Context, req *structs.ConfigEntryQuery, correlationID string, ch chan<- proxycfg.UpdateEvent) error {
|
|
|
|
cfgReq, err := newConfigEntryRequest(req, e.deps)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-07-01 15:18:33 +00:00
|
|
|
return e.deps.ViewStore.NotifyCallback(ctx, cfgReq, correlationID, dispatchCacheUpdate(ch))
|
proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func newConfigEntryRequest(req *structs.ConfigEntryQuery, deps ServerDataSourceDeps) (*configEntryRequest, error) {
|
|
|
|
var topic pbsubscribe.Topic
|
|
|
|
switch req.Kind {
|
|
|
|
case structs.MeshConfig:
|
|
|
|
topic = pbsubscribe.Topic_MeshConfig
|
|
|
|
case structs.ServiceResolver:
|
|
|
|
topic = pbsubscribe.Topic_ServiceResolver
|
|
|
|
case structs.IngressGateway:
|
|
|
|
topic = pbsubscribe.Topic_IngressGateway
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("cannot map config entry kind: %s to a topic", req.Kind)
|
|
|
|
}
|
|
|
|
return &configEntryRequest{
|
|
|
|
topic: topic,
|
|
|
|
req: req,
|
|
|
|
deps: deps,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type configEntryRequest struct {
|
|
|
|
topic pbsubscribe.Topic
|
|
|
|
req *structs.ConfigEntryQuery
|
|
|
|
deps ServerDataSourceDeps
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *configEntryRequest) CacheInfo() cache.RequestInfo { return r.req.CacheInfo() }
|
|
|
|
|
|
|
|
func (r *configEntryRequest) NewMaterializer() (submatview.Materializer, error) {
|
|
|
|
var view submatview.View
|
|
|
|
if r.req.Name == "" {
|
|
|
|
view = newConfigEntryListView(r.req.Kind, r.req.EnterpriseMeta)
|
|
|
|
} else {
|
|
|
|
view = &configEntryView{}
|
|
|
|
}
|
|
|
|
|
|
|
|
return submatview.NewLocalMaterializer(submatview.LocalMaterializerDeps{
|
|
|
|
Backend: r.deps.EventPublisher,
|
|
|
|
ACLResolver: r.deps.ACLResolver,
|
|
|
|
Deps: submatview.Deps{
|
|
|
|
View: view,
|
|
|
|
Logger: r.deps.Logger,
|
|
|
|
Request: r.Request,
|
|
|
|
},
|
|
|
|
}), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *configEntryRequest) Type() string { return "proxycfgglue.ConfigEntry" }
|
|
|
|
|
|
|
|
func (r *configEntryRequest) Request(index uint64) *pbsubscribe.SubscribeRequest {
|
|
|
|
req := &pbsubscribe.SubscribeRequest{
|
|
|
|
Topic: r.topic,
|
|
|
|
Index: index,
|
|
|
|
Datacenter: r.req.Datacenter,
|
|
|
|
Token: r.req.QueryOptions.Token,
|
|
|
|
}
|
|
|
|
|
|
|
|
if name := r.req.Name; name == "" {
|
|
|
|
req.Subject = &pbsubscribe.SubscribeRequest_WildcardSubject{
|
|
|
|
WildcardSubject: true,
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
req.Subject = &pbsubscribe.SubscribeRequest_NamedSubject{
|
|
|
|
NamedSubject: &pbsubscribe.NamedSubject{
|
|
|
|
Key: name,
|
|
|
|
Partition: r.req.PartitionOrDefault(),
|
|
|
|
Namespace: r.req.NamespaceOrDefault(),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return req
|
|
|
|
}
|
|
|
|
|
|
|
|
// configEntryView implements a submatview.View for a single config entry.
|
|
|
|
type configEntryView struct {
|
|
|
|
state structs.ConfigEntry
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *configEntryView) Reset() {
|
|
|
|
v.state = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *configEntryView) Result(index uint64) any {
|
|
|
|
return &structs.ConfigEntryResponse{
|
|
|
|
QueryMeta: structs.QueryMeta{
|
|
|
|
Index: index,
|
|
|
|
Backend: structs.QueryBackendStreaming,
|
|
|
|
},
|
|
|
|
Entry: v.state,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *configEntryView) Update(events []*pbsubscribe.Event) error {
|
|
|
|
for _, event := range events {
|
|
|
|
update := event.GetConfigEntry()
|
|
|
|
if update == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
switch update.Op {
|
|
|
|
case pbsubscribe.ConfigEntryUpdate_Delete:
|
|
|
|
v.state = nil
|
|
|
|
case pbsubscribe.ConfigEntryUpdate_Upsert:
|
|
|
|
v.state = pbconfigentry.ConfigEntryToStructs(update.ConfigEntry)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// configEntryListView implements a submatview.View for a list of config entries
|
|
|
|
// that are all of the same kind (name is treated as unique).
|
|
|
|
type configEntryListView struct {
|
|
|
|
kind string
|
|
|
|
entMeta acl.EnterpriseMeta
|
|
|
|
state map[string]structs.ConfigEntry
|
|
|
|
}
|
|
|
|
|
|
|
|
func newConfigEntryListView(kind string, entMeta acl.EnterpriseMeta) *configEntryListView {
|
|
|
|
view := &configEntryListView{kind: kind, entMeta: entMeta}
|
|
|
|
view.Reset()
|
|
|
|
return view
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *configEntryListView) Reset() {
|
|
|
|
v.state = make(map[string]structs.ConfigEntry)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *configEntryListView) Result(index uint64) any {
|
|
|
|
entries := make([]structs.ConfigEntry, 0, len(v.state))
|
|
|
|
for _, entry := range v.state {
|
|
|
|
entries = append(entries, entry)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &structs.IndexedConfigEntries{
|
|
|
|
Kind: v.kind,
|
|
|
|
Entries: entries,
|
|
|
|
QueryMeta: structs.QueryMeta{
|
|
|
|
Index: index,
|
|
|
|
Backend: structs.QueryBackendStreaming,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *configEntryListView) Update(events []*pbsubscribe.Event) error {
|
|
|
|
for _, event := range v.filterByEnterpriseMeta(events) {
|
|
|
|
update := event.GetConfigEntry()
|
|
|
|
configEntry := pbconfigentry.ConfigEntryToStructs(update.ConfigEntry)
|
|
|
|
name := structs.NewServiceName(configEntry.GetName(), configEntry.GetEnterpriseMeta()).String()
|
|
|
|
|
|
|
|
switch update.Op {
|
|
|
|
case pbsubscribe.ConfigEntryUpdate_Delete:
|
|
|
|
delete(v.state, name)
|
|
|
|
case pbsubscribe.ConfigEntryUpdate_Upsert:
|
|
|
|
v.state[name] = configEntry
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// filterByEnterpriseMeta filters the given set of events to remove those that
|
|
|
|
// don't match the request's enterprise meta - this is necessary because when
|
|
|
|
// subscribing to a topic with SubjectWildcard we'll get events for resources
|
|
|
|
// in all partitions and namespaces.
|
|
|
|
func (v *configEntryListView) filterByEnterpriseMeta(events []*pbsubscribe.Event) []*pbsubscribe.Event {
|
|
|
|
partition := v.entMeta.PartitionOrDefault()
|
|
|
|
namespace := v.entMeta.NamespaceOrDefault()
|
|
|
|
|
|
|
|
filtered := make([]*pbsubscribe.Event, 0, len(events))
|
|
|
|
for _, event := range events {
|
|
|
|
configEntry := event.GetConfigEntry().GetConfigEntry()
|
|
|
|
if configEntry == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
entMeta := configEntry.GetEnterpriseMeta()
|
|
|
|
if partition != acl.WildcardName && !acl.EqualPartitions(partition, entMeta.GetPartition()) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if namespace != acl.WildcardName && !acl.EqualNamespaces(namespace, entMeta.GetNamespace()) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
filtered = append(filtered, event)
|
|
|
|
}
|
|
|
|
return filtered
|
|
|
|
}
|