Consul is a distributed, highly available, and data center aware solution to connect and configure applications across dynamic, distributed infrastructure.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

175 lines
5.9 KiB

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
syntax = "proto3";
package hashicorp.consul.mesh.v2beta1;
import "pbcatalog/v2beta1/failover_policy.proto";
import "pbcatalog/v2beta1/protocol.proto";
import "pbmesh/v2beta1/common.proto";
import "pbmesh/v2beta1/destination_policy.proto";
import "pbmesh/v2beta1/grpc_route.proto";
import "pbmesh/v2beta1/http_route.proto";
import "pbmesh/v2beta1/http_route_retries.proto";
import "pbmesh/v2beta1/http_route_timeouts.proto";
import "pbmesh/v2beta1/pbproxystate/references.proto";
import "pbresource/annotations.proto";
import "pbresource/resource.proto";
// This is a Resource type.
message ComputedRoutes {
option (hashicorp.consul.resource.spec) = {scope: SCOPE_NAMESPACE};
// PortedConfigs is the map of service ports to the ComputedPortRoutes for
// those ports.
//
// The port identifier key here is always normalized to the target (workload)
// port name regardless of whether a virtual or target port identifier was
// provided in input config.
map<string, ComputedPortRoutes> ported_configs = 1;
// BoundReferences is a slice of mixed type references of resources that were
// involved in the formulation of this resource.
repeated hashicorp.consul.resource.Reference bound_references = 2;
}
message ComputedPortRoutes {
oneof config {
ComputedHTTPRoute http = 1;
ComputedGRPCRoute grpc = 2;
ComputedTCPRoute tcp = 3;
}
bool using_default_config = 4; // TODO
ParentReference parent_ref = 5;
// Protocol is the ParentRef.Port's protocol. It is based on the value in the
// Service object, but may differ depending upon which xRoutes are actually
// in use.
hashicorp.consul.catalog.v2beta1.Protocol protocol = 6;
// map key is an opaque string; like disco chain target name
map<string, BackendTargetDetails> targets = 7;
}
message ComputedHTTPRoute {
reserved 1; // hostnames
repeated ComputedHTTPRouteRule rules = 2;
}
message ComputedHTTPRouteRule {
repeated HTTPRouteMatch matches = 1;
repeated HTTPRouteFilter filters = 2;
repeated ComputedHTTPBackendRef backend_refs = 3;
HTTPRouteTimeouts timeouts = 4;
HTTPRouteRetries retries = 5;
}
message ComputedHTTPBackendRef {
// BackendTarget indicates which key in the targets map provides
// the rest of the configuration.
//
// If this field is set to the empty string, or is the sentinel value
// "NULL-ROUTE" is an indication that all of the traffic destined for this
// backend reference should be null routed in a format appropriate for the
// protocol (i.e. for HTTP use 5xx).
string backend_target = 1;
uint32 weight = 2;
repeated HTTPRouteFilter filters = 3;
}
message ComputedGRPCRoute {
reserved 1; // hostnames
repeated ComputedGRPCRouteRule rules = 2;
}
message ComputedGRPCRouteRule {
repeated GRPCRouteMatch matches = 1;
repeated GRPCRouteFilter filters = 2;
repeated ComputedGRPCBackendRef backend_refs = 3;
HTTPRouteTimeouts timeouts = 4;
HTTPRouteRetries retries = 5;
}
message ComputedGRPCBackendRef {
// BackendTarget indicates which key in the targets map provides
// the rest of the configuration.
//
// If this field is set to the empty string, or is the sentinel value
// "NULL-ROUTE" is an indication that all of the traffic destined for this
// backend reference should be null routed in a format appropriate for the
// protocol (i.e. for HTTP use 5xx).
string backend_target = 1;
uint32 weight = 2;
repeated GRPCRouteFilter filters = 3;
}
message ComputedTCPRoute {
repeated ComputedTCPRouteRule rules = 1;
}
message ComputedTCPRouteRule {
repeated ComputedTCPBackendRef backend_refs = 1;
}
// TODO: look into smuggling the target through a different typeURL, or just skip in favor of letting the caller do their own lookups?
message ComputedTCPBackendRef {
// BackendTarget indicates which key in the targets map provides
// the rest of the configuration.
//
// If this field is set to the empty string, or is the sentinel value
// "NULL-ROUTE" is an indication that all of the traffic destined for this
// backend reference should be null routed in a format appropriate for the
// protocol (i.e. for HTTP use 5xx).
string backend_target = 1;
uint32 weight = 2;
}
message BackendTargetDetails {
BackendTargetDetailsType type = 1;
BackendReference backend_ref = 2;
string mesh_port = 3;
ComputedFailoverConfig failover_config = 4;
DestinationConfig destination_config = 5;
reserved 6 to 20; // leaving a gap between computed and retroactively added fields.
// ServiceEndpointsRef is not populated naturally and the field exists only for downstream consumers.
pbproxystate.EndpointRef service_endpoints_ref = 24;
reserved 22; // formerly ServiceEndpoints, never marshaled
// IdentityRefs are not populated naturally and the field exists only for
// downstream consumers.
repeated hashicorp.consul.resource.Reference identity_refs = 23;
}
// +kubebuilder:validation:Enum=BACKEND_TARGET_DETAILS_TYPE_UNSPECIFIED;BACKEND_TARGET_DETAILS_TYPE_DIRECT;BACKEND_TARGET_DETAILS_TYPE_INDIRECT
// +kubebuilder:validation:Type=string
enum BackendTargetDetailsType {
BACKEND_TARGET_DETAILS_TYPE_UNSPECIFIED = 0;
// Direct means that the target is directly routable from a route. This does
// not mean that the target is not also indirect though.
BACKEND_TARGET_DETAILS_TYPE_DIRECT = 1;
// Indirect means that the target is not directly routable from a route.
//
// One example would be for a FailoverPolicy destination.
BACKEND_TARGET_DETAILS_TYPE_INDIRECT = 2;
}
message ComputedFailoverConfig {
repeated ComputedFailoverDestination destinations = 1;
hashicorp.consul.catalog.v2beta1.FailoverMode mode = 2;
repeated string regions = 3;
// SamenessGroup specifies the sameness group to failover to.
string sameness_group = 4;
}
message ComputedFailoverDestination {
// BackendTarget must be a Service.
string backend_target = 1;
}