Backport of parse config protocol on write to optimize disco-chain compilation into release/1.16.x (#19858)
* parse config protocol on write to optimize disco-chain compilation (#19829) * parse config protocol on write to optimize disco-chain compilation * add changelog * add test fixes from PR * add missing config field --------- Co-authored-by: Dhia Ayachi <dhia@hashicorp.com>
This commit is contained in:
parent
c279233d2b
commit
b2a57ae0fd
|
@ -0,0 +1,3 @@
|
||||||
|
```release-note:enhancement
|
||||||
|
mesh: parse the proxy-defaults protocol when write the config-entry to avoid parsing it when compiling the discovery chain.
|
||||||
|
```
|
|
@ -8,14 +8,12 @@ import (
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/mitchellh/hashstructure"
|
|
||||||
"github.com/mitchellh/mapstructure"
|
|
||||||
|
|
||||||
"github.com/hashicorp/consul/acl"
|
"github.com/hashicorp/consul/acl"
|
||||||
"github.com/hashicorp/consul/agent/configentry"
|
"github.com/hashicorp/consul/agent/configentry"
|
||||||
"github.com/hashicorp/consul/agent/connect"
|
"github.com/hashicorp/consul/agent/connect"
|
||||||
"github.com/hashicorp/consul/agent/structs"
|
"github.com/hashicorp/consul/agent/structs"
|
||||||
"github.com/hashicorp/consul/proto/private/pbpeering"
|
"github.com/hashicorp/consul/proto/private/pbpeering"
|
||||||
|
"github.com/mitchellh/hashstructure"
|
||||||
)
|
)
|
||||||
|
|
||||||
type CompileRequest struct {
|
type CompileRequest struct {
|
||||||
|
@ -244,21 +242,13 @@ func (c *compiler) recordServiceProtocol(sid structs.ServiceID) error {
|
||||||
return c.recordProtocol(sid, serviceDefault.Protocol)
|
return c.recordProtocol(sid, serviceDefault.Protocol)
|
||||||
}
|
}
|
||||||
if proxyDefault := c.entries.GetProxyDefaults(sid.PartitionOrDefault()); proxyDefault != nil {
|
if proxyDefault := c.entries.GetProxyDefaults(sid.PartitionOrDefault()); proxyDefault != nil {
|
||||||
var cfg proxyConfig
|
if proxyDefault.Protocol != "" {
|
||||||
// Ignore errors and fallback on defaults if it does happen.
|
return c.recordProtocol(sid, proxyDefault.Protocol)
|
||||||
_ = mapstructure.WeakDecode(proxyDefault.Config, &cfg)
|
|
||||||
if cfg.Protocol != "" {
|
|
||||||
return c.recordProtocol(sid, cfg.Protocol)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return c.recordProtocol(sid, "")
|
return c.recordProtocol(sid, "")
|
||||||
}
|
}
|
||||||
|
|
||||||
// proxyConfig is a snippet from agent/xds/config.go:ProxyConfig
|
|
||||||
type proxyConfig struct {
|
|
||||||
Protocol string `mapstructure:"protocol"`
|
|
||||||
}
|
|
||||||
|
|
||||||
func (c *compiler) recordProtocol(fromService structs.ServiceID, protocol string) error {
|
func (c *compiler) recordProtocol(fromService structs.ServiceID, protocol string) error {
|
||||||
if protocol == "" {
|
if protocol == "" {
|
||||||
protocol = "tcp"
|
protocol = "tcp"
|
||||||
|
|
|
@ -1144,6 +1144,7 @@ func testcase_PeerRedirectProxyDefHTTP() compileTestCase {
|
||||||
entries.AddProxyDefaults(&structs.ProxyConfigEntry{
|
entries.AddProxyDefaults(&structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"Protocol": "http",
|
"Protocol": "http",
|
||||||
},
|
},
|
||||||
|
@ -1770,6 +1771,7 @@ func testcase_DefaultResolver_WithProxyDefaults() compileTestCase {
|
||||||
entries.AddProxyDefaults(&structs.ProxyConfigEntry{
|
entries.AddProxyDefaults(&structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
|
Protocol: "grpc",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "grpc",
|
"protocol": "grpc",
|
||||||
},
|
},
|
||||||
|
@ -3265,6 +3267,7 @@ func setGlobalProxyProtocol(entries *configentry.DiscoveryChainSet, protocol str
|
||||||
entries.AddProxyDefaults(&structs.ProxyConfigEntry{
|
entries.AddProxyDefaults(&structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
|
Protocol: protocol,
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": protocol,
|
"protocol": protocol,
|
||||||
},
|
},
|
||||||
|
|
|
@ -783,6 +783,7 @@ func TestGatewayChainSynthesizer_ComplexChain(t *testing.T) {
|
||||||
&structs.ProxyConfigEntry{
|
&structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyConfigGlobal,
|
Kind: structs.ProxyConfigGlobal,
|
||||||
Name: "global",
|
Name: "global",
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http",
|
"protocol": "http",
|
||||||
},
|
},
|
||||||
|
|
|
@ -6,6 +6,7 @@ package state
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"github.com/mitchellh/mapstructure"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
memdb "github.com/hashicorp/go-memdb"
|
memdb "github.com/hashicorp/go-memdb"
|
||||||
|
@ -519,6 +520,11 @@ func insertConfigEntryWithTxn(tx WriteTxn, idx uint64, conf structs.ConfigEntry)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
case structs.ProxyDefaults:
|
||||||
|
err := addProtocol(conf.(*structs.ProxyConfigEntry))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Assign virtual-ips, if needed
|
// Assign virtual-ips, if needed
|
||||||
|
@ -544,6 +550,21 @@ func insertConfigEntryWithTxn(tx WriteTxn, idx uint64, conf structs.ConfigEntry)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// proxyConfig is a snippet from agent/xds/config.go:ProxyConfig
|
||||||
|
type proxyConfig struct {
|
||||||
|
Protocol string `mapstructure:"protocol"`
|
||||||
|
}
|
||||||
|
|
||||||
|
func addProtocol(conf *structs.ProxyConfigEntry) error {
|
||||||
|
var cfg proxyConfig
|
||||||
|
err := mapstructure.WeakDecode(conf.Config, &cfg)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
conf.Protocol = cfg.Protocol
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func configEntryHasVirtualIP(c structs.ConfigEntry) bool {
|
func configEntryHasVirtualIP(c structs.ConfigEntry) bool {
|
||||||
if c == nil || c.GetName() == "" {
|
if c == nil || c.GetName() == "" {
|
||||||
return false
|
return false
|
||||||
|
|
|
@ -24,16 +24,27 @@ import (
|
||||||
func TestStore_ConfigEntry(t *testing.T) {
|
func TestStore_ConfigEntry(t *testing.T) {
|
||||||
s := testConfigStateStore(t)
|
s := testConfigStateStore(t)
|
||||||
|
|
||||||
|
cfg := &structs.ProxyConfigEntry{
|
||||||
|
Kind: structs.ProxyDefaults,
|
||||||
|
Name: "global",
|
||||||
|
Config: map[string]interface{}{
|
||||||
|
"DestinationServiceName": "foo",
|
||||||
|
"protocol": "udp",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
expected := &structs.ProxyConfigEntry{
|
expected := &structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: "global",
|
Name: "global",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"DestinationServiceName": "foo",
|
"DestinationServiceName": "foo",
|
||||||
|
"protocol": "udp",
|
||||||
},
|
},
|
||||||
|
Protocol: "udp",
|
||||||
}
|
}
|
||||||
|
|
||||||
// Create
|
// Create
|
||||||
require.NoError(t, s.EnsureConfigEntry(0, expected))
|
require.NoError(t, s.EnsureConfigEntry(0, cfg))
|
||||||
|
|
||||||
idx, config, err := s.ConfigEntry(nil, structs.ProxyDefaults, "global", nil)
|
idx, config, err := s.ConfigEntry(nil, structs.ProxyDefaults, "global", nil)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
|
@ -74,6 +74,7 @@ func TestManager_BasicLifecycle(t *testing.T) {
|
||||||
set.AddEntries(&structs.ProxyConfigEntry{
|
set.AddEntries(&structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http",
|
"protocol": "http",
|
||||||
},
|
},
|
||||||
|
|
|
@ -586,6 +586,7 @@ func TestConfigSnapshotPeeredMeshGateway(t testing.T, variant string, nsFn func(
|
||||||
)
|
)
|
||||||
case "default-services-http":
|
case "default-services-http":
|
||||||
proxyDefaults := &structs.ProxyConfigEntry{
|
proxyDefaults := &structs.ProxyConfigEntry{
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http",
|
"protocol": "http",
|
||||||
},
|
},
|
||||||
|
@ -689,6 +690,7 @@ func TestConfigSnapshotPeeredMeshGateway(t testing.T, variant string, nsFn func(
|
||||||
&structs.ProxyConfigEntry{
|
&structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http",
|
"protocol": "http",
|
||||||
},
|
},
|
||||||
|
|
|
@ -133,6 +133,7 @@ func TestConfigSnapshotTransparentProxyHTTPUpstream(t testing.T, additionalEntri
|
||||||
entries := append(additionalEntries, &structs.ProxyConfigEntry{
|
entries := append(additionalEntries, &structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http",
|
"protocol": "http",
|
||||||
},
|
},
|
||||||
|
|
|
@ -478,6 +478,7 @@ func setupTestVariationDiscoveryChain(
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
EnterpriseMeta: em,
|
EnterpriseMeta: em,
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http",
|
"protocol": "http",
|
||||||
},
|
},
|
||||||
|
@ -538,6 +539,7 @@ func setupTestVariationDiscoveryChain(
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
EnterpriseMeta: entMeta,
|
EnterpriseMeta: entMeta,
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http",
|
"protocol": "http",
|
||||||
},
|
},
|
||||||
|
@ -593,6 +595,7 @@ func setupTestVariationDiscoveryChain(
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
EnterpriseMeta: entMeta,
|
EnterpriseMeta: entMeta,
|
||||||
|
Protocol: "grpc",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "grpc",
|
"protocol": "grpc",
|
||||||
},
|
},
|
||||||
|
@ -628,6 +631,7 @@ func setupTestVariationDiscoveryChain(
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
EnterpriseMeta: entMeta,
|
EnterpriseMeta: entMeta,
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http",
|
"protocol": "http",
|
||||||
},
|
},
|
||||||
|
@ -879,6 +883,7 @@ func setupTestVariationDiscoveryChain(
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
EnterpriseMeta: entMeta,
|
EnterpriseMeta: entMeta,
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http",
|
"protocol": "http",
|
||||||
},
|
},
|
||||||
|
|
|
@ -397,6 +397,7 @@ type ProxyConfigEntry struct {
|
||||||
Kind string
|
Kind string
|
||||||
Name string
|
Name string
|
||||||
Config map[string]interface{}
|
Config map[string]interface{}
|
||||||
|
Protocol string `json:"-"`
|
||||||
Mode ProxyMode `json:",omitempty"`
|
Mode ProxyMode `json:",omitempty"`
|
||||||
TransparentProxy TransparentProxyConfig `json:",omitempty" alias:"transparent_proxy"`
|
TransparentProxy TransparentProxyConfig `json:",omitempty" alias:"transparent_proxy"`
|
||||||
MutualTLSMode MutualTLSMode `json:",omitempty" alias:"mutual_tls_mode"`
|
MutualTLSMode MutualTLSMode `json:",omitempty" alias:"mutual_tls_mode"`
|
||||||
|
|
|
@ -116,7 +116,7 @@ func (s *DiscoveryGraphNode) IsResolver() bool {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DiscoveryGraphNode) MapKey() string {
|
func (s *DiscoveryGraphNode) MapKey() string {
|
||||||
return fmt.Sprintf("%s:%s", s.Type, s.Name)
|
return s.Type + ":" + s.Name
|
||||||
}
|
}
|
||||||
|
|
||||||
// compiled form of ServiceResolverConfigEntry
|
// compiled form of ServiceResolverConfigEntry
|
||||||
|
|
|
@ -78,6 +78,7 @@ func makeListenerDiscoChainTests(enterprise bool) []listenerTestCase {
|
||||||
&structs.ProxyConfigEntry{
|
&structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
|
Protocol: "http",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http",
|
"protocol": "http",
|
||||||
},
|
},
|
||||||
|
@ -92,6 +93,7 @@ func makeListenerDiscoChainTests(enterprise bool) []listenerTestCase {
|
||||||
&structs.ProxyConfigEntry{
|
&structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
|
Protocol: "http2",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "http2",
|
"protocol": "http2",
|
||||||
},
|
},
|
||||||
|
@ -106,6 +108,7 @@ func makeListenerDiscoChainTests(enterprise bool) []listenerTestCase {
|
||||||
&structs.ProxyConfigEntry{
|
&structs.ProxyConfigEntry{
|
||||||
Kind: structs.ProxyDefaults,
|
Kind: structs.ProxyDefaults,
|
||||||
Name: structs.ProxyConfigGlobal,
|
Name: structs.ProxyConfigGlobal,
|
||||||
|
Protocol: "grpc",
|
||||||
Config: map[string]interface{}{
|
Config: map[string]interface{}{
|
||||||
"protocol": "grpc",
|
"protocol": "grpc",
|
||||||
},
|
},
|
||||||
|
|
Loading…
Reference in New Issue