mirror of https://github.com/hashicorp/consul
237 lines
6.8 KiB
Go
237 lines
6.8 KiB
Go
|
package builtinextensiontemplate
|
||
|
|
||
|
import (
|
||
|
"fmt"
|
||
|
"strings"
|
||
|
|
||
|
envoy_cluster_v3 "github.com/envoyproxy/go-control-plane/envoy/config/cluster/v3"
|
||
|
envoy_listener_v3 "github.com/envoyproxy/go-control-plane/envoy/config/listener/v3"
|
||
|
envoy_route_v3 "github.com/envoyproxy/go-control-plane/envoy/config/route/v3"
|
||
|
"github.com/golang/protobuf/proto"
|
||
|
"github.com/hashicorp/go-multierror"
|
||
|
|
||
|
"github.com/hashicorp/consul/agent/xds/xdscommon"
|
||
|
"github.com/hashicorp/consul/api"
|
||
|
)
|
||
|
|
||
|
type EnvoyExtension struct {
|
||
|
Constructor PluginConstructor
|
||
|
plugin Plugin
|
||
|
ready bool
|
||
|
}
|
||
|
|
||
|
var _ xdscommon.EnvoyExtension = (*EnvoyExtension)(nil)
|
||
|
|
||
|
// Validate ensures the data in ExtensionConfiguration can successfuly be used
|
||
|
// to apply the specified Envoy extension.
|
||
|
func (envoyExtension *EnvoyExtension) Validate(config xdscommon.ExtensionConfiguration) error {
|
||
|
plugin, err := envoyExtension.Constructor(config)
|
||
|
|
||
|
envoyExtension.plugin = plugin
|
||
|
envoyExtension.ready = err == nil
|
||
|
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
// Extend updates indexed xDS structures to include patches for
|
||
|
// built-in extensions. It is responsible for applying Plugins to
|
||
|
// the the appropriate xDS resources. If any portion of this function fails,
|
||
|
// it will attempt continue and return an error. The caller can then determine
|
||
|
// if it is better to use a partially applied extension or error out.
|
||
|
func (envoyExtension *EnvoyExtension) Extend(resources *xdscommon.IndexedResources, config xdscommon.ExtensionConfiguration) (*xdscommon.IndexedResources, error) {
|
||
|
if !envoyExtension.ready {
|
||
|
panic("envoy extension used without being properly constructed")
|
||
|
}
|
||
|
|
||
|
var resultErr error
|
||
|
|
||
|
switch config.Kind {
|
||
|
case api.ServiceKindTerminatingGateway, api.ServiceKindConnectProxy:
|
||
|
default:
|
||
|
return resources, nil
|
||
|
}
|
||
|
|
||
|
if !envoyExtension.plugin.CanApply(config) {
|
||
|
return resources, nil
|
||
|
}
|
||
|
|
||
|
for _, indexType := range []string{
|
||
|
xdscommon.ClusterType,
|
||
|
xdscommon.ListenerType,
|
||
|
xdscommon.RouteType,
|
||
|
} {
|
||
|
for nameOrSNI, msg := range resources.Index[indexType] {
|
||
|
switch resource := msg.(type) {
|
||
|
case *envoy_cluster_v3.Cluster:
|
||
|
// If the Envoy extension configuration is for an upstream service, the Cluster's
|
||
|
// name must match the upstream service's SNI.
|
||
|
if config.IsUpstream() && !config.MatchesUpstreamServiceSNI(nameOrSNI) {
|
||
|
continue
|
||
|
}
|
||
|
|
||
|
// If the extension's config is for an an inbound listener, the Cluster's name
|
||
|
// must be xdscommon.LocalAppClusterName.
|
||
|
if !config.IsUpstream() && nameOrSNI == xdscommon.LocalAppClusterName {
|
||
|
continue
|
||
|
}
|
||
|
|
||
|
newCluster, patched, err := envoyExtension.plugin.PatchCluster(resource)
|
||
|
if err != nil {
|
||
|
resultErr = multierror.Append(resultErr, fmt.Errorf("error patching cluster: %w", err))
|
||
|
continue
|
||
|
}
|
||
|
if patched {
|
||
|
resources.Index[xdscommon.ClusterType][nameOrSNI] = newCluster
|
||
|
}
|
||
|
|
||
|
case *envoy_listener_v3.Listener:
|
||
|
newListener, patched, err := envoyExtension.patchListener(config, resource)
|
||
|
if err != nil {
|
||
|
resultErr = multierror.Append(resultErr, fmt.Errorf("error patching listener: %w", err))
|
||
|
continue
|
||
|
}
|
||
|
if patched {
|
||
|
resources.Index[xdscommon.ListenerType][nameOrSNI] = newListener
|
||
|
}
|
||
|
|
||
|
case *envoy_route_v3.RouteConfiguration:
|
||
|
// If the Envoy extension configuration is for an upstream service, the route's
|
||
|
// name must match the upstream service's SNI.
|
||
|
if config.IsUpstream() && !config.MatchesUpstreamServiceSNI(nameOrSNI) {
|
||
|
continue
|
||
|
}
|
||
|
|
||
|
// There aren't routes for inbound services.
|
||
|
if !config.IsUpstream() {
|
||
|
continue
|
||
|
}
|
||
|
|
||
|
newRoute, patched, err := envoyExtension.plugin.PatchRoute(resource)
|
||
|
if err != nil {
|
||
|
resultErr = multierror.Append(resultErr, fmt.Errorf("error patching route: %w", err))
|
||
|
continue
|
||
|
}
|
||
|
if patched {
|
||
|
resources.Index[xdscommon.RouteType][nameOrSNI] = newRoute
|
||
|
}
|
||
|
|
||
|
default:
|
||
|
resultErr = multierror.Append(resultErr, fmt.Errorf("unsupported type was skipped: %T", resource))
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return resources, resultErr
|
||
|
}
|
||
|
|
||
|
func (envoyExtension EnvoyExtension) patchListener(config xdscommon.ExtensionConfiguration, l *envoy_listener_v3.Listener) (proto.Message, bool, error) {
|
||
|
switch config.Kind {
|
||
|
case api.ServiceKindTerminatingGateway:
|
||
|
return envoyExtension.patchTerminatingGatewayListener(config, l)
|
||
|
case api.ServiceKindConnectProxy:
|
||
|
return envoyExtension.patchConnectProxyListener(config, l)
|
||
|
}
|
||
|
return l, false, nil
|
||
|
}
|
||
|
|
||
|
func (envoyExtension EnvoyExtension) patchTerminatingGatewayListener(config xdscommon.ExtensionConfiguration, l *envoy_listener_v3.Listener) (proto.Message, bool, error) {
|
||
|
// We don't support directly targeting terminating gateways with extensions.
|
||
|
if !config.IsUpstream() {
|
||
|
return l, false, nil
|
||
|
}
|
||
|
|
||
|
var resultErr error
|
||
|
patched := false
|
||
|
for _, filterChain := range l.FilterChains {
|
||
|
sni := getSNI(filterChain)
|
||
|
|
||
|
if sni == "" {
|
||
|
continue
|
||
|
}
|
||
|
|
||
|
// The filter chain's SNI must match the upstream service's SNI.
|
||
|
if !config.MatchesUpstreamServiceSNI(sni) {
|
||
|
continue
|
||
|
}
|
||
|
|
||
|
var filters []*envoy_listener_v3.Filter
|
||
|
|
||
|
for _, filter := range filterChain.Filters {
|
||
|
newFilter, ok, err := envoyExtension.plugin.PatchFilter(filter)
|
||
|
|
||
|
if err != nil {
|
||
|
resultErr = multierror.Append(resultErr, fmt.Errorf("error patching listener filter: %w", err))
|
||
|
filters = append(filters, filter)
|
||
|
}
|
||
|
if ok {
|
||
|
filters = append(filters, newFilter)
|
||
|
patched = true
|
||
|
}
|
||
|
}
|
||
|
filterChain.Filters = filters
|
||
|
}
|
||
|
|
||
|
return l, patched, resultErr
|
||
|
}
|
||
|
|
||
|
func (envoyExtension EnvoyExtension) patchConnectProxyListener(config xdscommon.ExtensionConfiguration, l *envoy_listener_v3.Listener) (proto.Message, bool, error) {
|
||
|
var resultErr error
|
||
|
|
||
|
envoyID := ""
|
||
|
if i := strings.IndexByte(l.Name, ':'); i != -1 {
|
||
|
envoyID = l.Name[:i]
|
||
|
}
|
||
|
|
||
|
// If the Envoy extension configuration is for an upstream service, the listener's
|
||
|
// name must match the upstream service's EnvoyID.
|
||
|
if config.IsUpstream() && envoyID != config.EnvoyID() {
|
||
|
return l, false, nil
|
||
|
}
|
||
|
|
||
|
// If the Envoy extension configuration is for inbound resources, the
|
||
|
// listener must be named xdscommon.PublicListenerName.
|
||
|
if !config.IsUpstream() && envoyID != xdscommon.PublicListenerName {
|
||
|
return l, false, nil
|
||
|
}
|
||
|
|
||
|
var patched bool
|
||
|
|
||
|
for _, filterChain := range l.FilterChains {
|
||
|
var filters []*envoy_listener_v3.Filter
|
||
|
|
||
|
for _, filter := range filterChain.Filters {
|
||
|
newFilter, ok, err := envoyExtension.plugin.PatchFilter(filter)
|
||
|
if err != nil {
|
||
|
resultErr = multierror.Append(resultErr, fmt.Errorf("error patching listener filter: %w", err))
|
||
|
filters = append(filters, filter)
|
||
|
}
|
||
|
|
||
|
if ok {
|
||
|
filters = append(filters, newFilter)
|
||
|
patched = true
|
||
|
}
|
||
|
}
|
||
|
filterChain.Filters = filters
|
||
|
}
|
||
|
|
||
|
return l, patched, resultErr
|
||
|
}
|
||
|
|
||
|
func getSNI(chain *envoy_listener_v3.FilterChain) string {
|
||
|
var sni string
|
||
|
|
||
|
if chain == nil {
|
||
|
return sni
|
||
|
}
|
||
|
|
||
|
if chain.FilterChainMatch == nil {
|
||
|
return sni
|
||
|
}
|
||
|
|
||
|
if len(chain.FilterChainMatch.ServerNames) == 0 {
|
||
|
return sni
|
||
|
}
|
||
|
|
||
|
return chain.FilterChainMatch.ServerNames[0]
|
||
|
}
|