2023-03-28 18:39:22 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
package state
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
|
|
|
|
"github.com/hashicorp/consul/acl"
|
|
|
|
"github.com/hashicorp/consul/agent/consul/stream"
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
2023-02-17 21:14:46 +00:00
|
|
|
"github.com/hashicorp/consul/proto/private/pbconfigentry"
|
|
|
|
"github.com/hashicorp/consul/proto/private/pbsubscribe"
|
proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Adding events for a new config entry kind? Remember to update ConfigEntryFromStructs and ConfigEntryToStructs.
|
|
|
|
var configEntryKindToTopic = map[string]stream.Topic{
|
2022-07-01 15:15:49 +00:00
|
|
|
structs.MeshConfig: EventTopicMeshConfig,
|
|
|
|
structs.ServiceResolver: EventTopicServiceResolver,
|
|
|
|
structs.IngressGateway: EventTopicIngressGateway,
|
|
|
|
structs.ServiceIntentions: EventTopicServiceIntentions,
|
2022-10-24 18:50:28 +00:00
|
|
|
structs.ServiceDefaults: EventTopicServiceDefaults,
|
2023-01-18 22:14:34 +00:00
|
|
|
structs.APIGateway: EventTopicAPIGateway,
|
|
|
|
structs.TCPRoute: EventTopicTCPRoute,
|
|
|
|
structs.HTTPRoute: EventTopicHTTPRoute,
|
|
|
|
structs.InlineCertificate: EventTopicInlineCertificate,
|
|
|
|
structs.BoundAPIGateway: EventTopicBoundAPIGateway,
|
2023-03-27 21:00:25 +00:00
|
|
|
structs.RateLimitIPConfig: EventTopicIPRateLimit,
|
proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// EventSubjectConfigEntry is a stream.Subject used to route and receive events
|
|
|
|
// for a specific config entry (kind is encoded in the topic).
|
|
|
|
type EventSubjectConfigEntry struct {
|
|
|
|
Name string
|
|
|
|
EnterpriseMeta *acl.EnterpriseMeta
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s EventSubjectConfigEntry) String() string {
|
|
|
|
return fmt.Sprintf(
|
|
|
|
"%s/%s/%s",
|
|
|
|
s.EnterpriseMeta.PartitionOrDefault(),
|
|
|
|
s.EnterpriseMeta.NamespaceOrDefault(),
|
|
|
|
s.Name,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
type EventPayloadConfigEntry struct {
|
|
|
|
Op pbsubscribe.ConfigEntryUpdate_UpdateOp
|
|
|
|
Value structs.ConfigEntry
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e EventPayloadConfigEntry) Subject() stream.Subject {
|
|
|
|
return EventSubjectConfigEntry{
|
|
|
|
Name: e.Value.GetName(),
|
|
|
|
EnterpriseMeta: e.Value.GetEnterpriseMeta(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e EventPayloadConfigEntry) HasReadPermission(authz acl.Authorizer) bool {
|
|
|
|
return e.Value.CanRead(authz) == nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (e EventPayloadConfigEntry) ToSubscriptionEvent(idx uint64) *pbsubscribe.Event {
|
|
|
|
return &pbsubscribe.Event{
|
|
|
|
Index: idx,
|
|
|
|
Payload: &pbsubscribe.Event_ConfigEntry{
|
|
|
|
ConfigEntry: &pbsubscribe.ConfigEntryUpdate{
|
|
|
|
Op: e.Op,
|
|
|
|
ConfigEntry: pbconfigentry.ConfigEntryFromStructs(e.Value),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// ConfigEntryEventsFromChanges returns events that will be emitted when config
|
|
|
|
// entries change in the state store.
|
|
|
|
func ConfigEntryEventsFromChanges(tx ReadTxn, changes Changes) ([]stream.Event, error) {
|
|
|
|
var events []stream.Event
|
|
|
|
for _, c := range changes.Changes {
|
|
|
|
if c.Table != tableConfigEntries {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
configEntry := changeObject(c).(structs.ConfigEntry)
|
|
|
|
topic, ok := configEntryKindToTopic[configEntry.GetKind()]
|
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
op := pbsubscribe.ConfigEntryUpdate_Upsert
|
|
|
|
if c.Deleted() {
|
|
|
|
op = pbsubscribe.ConfigEntryUpdate_Delete
|
|
|
|
}
|
|
|
|
events = append(events, configEntryEvent(topic, changes.Index, op, configEntry))
|
|
|
|
}
|
|
|
|
return events, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MeshConfigSnapshot is a stream.SnapshotFunc that returns a snapshot of mesh
|
|
|
|
// config entries.
|
|
|
|
func (s *Store) MeshConfigSnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.MeshConfig, req, buf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServiceResolverSnapshot is a stream.SnapshotFunc that returns a snapshot of
|
|
|
|
// service-resolver config entries.
|
|
|
|
func (s *Store) ServiceResolverSnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.ServiceResolver, req, buf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IngressGatewaySnapshot is a stream.SnapshotFunc that returns a snapshot of
|
|
|
|
// ingress-gateway config entries.
|
|
|
|
func (s *Store) IngressGatewaySnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.IngressGateway, req, buf)
|
|
|
|
}
|
|
|
|
|
2022-07-01 15:15:49 +00:00
|
|
|
// ServiceIntentionsSnapshot is a stream.SnapshotFunc that returns a snapshot of
|
|
|
|
// service-intentions config entries.
|
|
|
|
func (s *Store) ServiceIntentionsSnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.ServiceIntentions, req, buf)
|
|
|
|
}
|
|
|
|
|
2022-10-24 18:50:28 +00:00
|
|
|
// ServiceDefaultsSnapshot is a stream.SnapshotFunc that returns a snapshot of
|
|
|
|
// service-defaults config entries.
|
|
|
|
func (s *Store) ServiceDefaultsSnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.ServiceDefaults, req, buf)
|
|
|
|
}
|
|
|
|
|
2023-01-18 22:14:34 +00:00
|
|
|
// APIGatewaySnapshot is a stream.SnapshotFunc that returns a snapshot of
|
|
|
|
// api-gateway config entries.
|
|
|
|
func (s *Store) APIGatewaySnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.APIGateway, req, buf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TCPRouteSnapshot is a stream.SnapshotFunc that returns a snapshot of
|
|
|
|
// tcp-route config entries.
|
|
|
|
func (s *Store) TCPRouteSnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.TCPRoute, req, buf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// HTTPRouteSnapshot is a stream.SnapshotFunc that retuns a snapshot of
|
|
|
|
// http-route config entries.
|
|
|
|
func (s *Store) HTTPRouteSnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.HTTPRoute, req, buf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// InlineCertificateSnapshot is a stream.SnapshotFunc that returns a snapshot of
|
|
|
|
// inline-certificate config entries.
|
|
|
|
func (s *Store) InlineCertificateSnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.InlineCertificate, req, buf)
|
|
|
|
}
|
|
|
|
|
|
|
|
// BoundAPIGatewaySnapshot is a stream.SnapshotFunc that returns a snapshot of
|
|
|
|
// bound-api-gateway config entries.
|
|
|
|
func (s *Store) BoundAPIGatewaySnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.BoundAPIGateway, req, buf)
|
|
|
|
}
|
|
|
|
|
2023-03-27 21:00:25 +00:00
|
|
|
// IPRateLimiterSnapshot is a stream.SnapshotFunc that returns a snapshot of
|
|
|
|
// "control-plane-request-limit" config entries.
|
|
|
|
func (s *Store) IPRateLimiterSnapshot(req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
return s.configEntrySnapshot(structs.RateLimitIPConfig, req, buf)
|
|
|
|
}
|
|
|
|
|
proxycfg: server-local config entry data sources
This is the OSS portion of enterprise PR 2056.
This commit provides server-local implementations of the proxycfg.ConfigEntry
and proxycfg.ConfigEntryList interfaces, that source data from streaming events.
It makes use of the LocalMaterializer type introduced for peering replication,
adding the necessary support for authorization.
It also adds support for "wildcard" subscriptions (within a topic) to the event
publisher, as this is needed to fetch service-resolvers for all services when
configuring mesh gateways.
Currently, events will be emitted for just the ingress-gateway, service-resolver,
and mesh config entry types, as these are the only entries required by proxycfg
— the events will be emitted on topics named IngressGateway, ServiceResolver,
and MeshConfig topics respectively.
Though these events will only be consumed "locally" for now, they can also be
consumed via the gRPC endpoint (confirmed using grpcurl) so using them from
client agents should be a case of swapping the LocalMaterializer for an
RPCMaterializer.
2022-07-01 15:09:47 +00:00
|
|
|
func (s *Store) configEntrySnapshot(kind string, req stream.SubscribeRequest, buf stream.SnapshotAppender) (uint64, error) {
|
|
|
|
var (
|
|
|
|
idx uint64
|
|
|
|
err error
|
|
|
|
entries []structs.ConfigEntry
|
|
|
|
)
|
|
|
|
if subject, ok := req.Subject.(EventSubjectConfigEntry); ok {
|
|
|
|
var entry structs.ConfigEntry
|
|
|
|
idx, entry, err = s.ConfigEntry(nil, kind, subject.Name, subject.EnterpriseMeta)
|
|
|
|
if entry != nil {
|
|
|
|
entries = []structs.ConfigEntry{entry}
|
|
|
|
}
|
|
|
|
} else if req.Subject == stream.SubjectWildcard {
|
|
|
|
entMeta := structs.WildcardEnterpriseMetaInPartition(structs.WildcardSpecifier)
|
|
|
|
idx, entries, err = s.ConfigEntriesByKind(nil, kind, entMeta)
|
|
|
|
} else {
|
|
|
|
return 0, fmt.Errorf("subject must be of type EventSubjectConfigEntry or be SubjectWildcard, was: %T", req.Subject)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if l := len(entries); l != 0 {
|
|
|
|
topic := configEntryKindToTopic[kind]
|
|
|
|
events := make([]stream.Event, l)
|
|
|
|
for i, e := range entries {
|
|
|
|
events[i] = configEntryEvent(topic, idx, pbsubscribe.ConfigEntryUpdate_Upsert, e)
|
|
|
|
}
|
|
|
|
buf.Append(events)
|
|
|
|
}
|
|
|
|
|
|
|
|
return idx, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func configEntryEvent(topic stream.Topic, idx uint64, op pbsubscribe.ConfigEntryUpdate_UpdateOp, configEntry structs.ConfigEntry) stream.Event {
|
|
|
|
return stream.Event{
|
|
|
|
Topic: topic,
|
|
|
|
Index: idx,
|
|
|
|
Payload: EventPayloadConfigEntry{
|
|
|
|
Op: op,
|
|
|
|
Value: configEntry,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|