Conversation
5e8ec0e to
3435da1
Compare
|
attaching some test logs done with 2 gateways 2 Gateway resources 2 HTTPRoute resources Port forward to the 2 envoy services Can reach Can reach |
|
reviewers please note that this PR doesnt handle delete of Gateway resources, will raise an issue to track it once this PR is in, and will fix be fixed in a follow up commit. |
1a0d520 to
15af025
Compare
15af025 to
c171031
Compare
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## main #404 +/- ##
==========================================
+ Coverage 60.00% 60.13% +0.12%
==========================================
Files 40 40
Lines 4333 4337 +4
==========================================
+ Hits 2600 2608 +8
+ Misses 1580 1579 -1
+ Partials 153 150 -3 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
5f5f281 to
f79369d
Compare
|
xref: #380 |
|
xref: #382 |
f79369d to
5bd432b
Compare
* create a xdsIR per gateway * create a infraIR per gateway * use the gateway namespace-name as the key for above IRs * populate the envoy bootstrap config with a node id that matches the IR key * populate the xds server snapshot for each xds request based on the node id Fixes: envoyproxy#349 Signed-off-by: Arko Dasgupta <arko@tetrate.io>
Signed-off-by: Arko Dasgupta <arko@tetrate.io>
Signed-off-by: Arko Dasgupta <arko@tetrate.io>
Signed-off-by: Arko Dasgupta <arko@tetrate.io>
Signed-off-by: Arko Dasgupta <arko@tetrate.io>
Signed-off-by: Arko Dasgupta <arko@tetrate.io>
Signed-off-by: danehans <daneyonhansen@gmail.com>
Signed-off-by: danehans <daneyonhansen@gmail.com>
Signed-off-by: Arko Dasgupta <arko@tetrate.io>
5bd432b to
41dc3c1
Compare
|
I tested this PR with #438 and the additional conformance tests pass. |
|
|
||
| // DefaultEnvoyDNSPrefix defines the default Envoy DNS prefix. | ||
| DefaultEnvoyDNSPrefix = config.EnvoyServiceName | ||
| DefaultEnvoyDNSPrefix = "*" |
There was a problem hiding this comment.
Created #440 to develop a more secure control plane auth solution.
| func expectedDeploymentName(proxyName string) string { | ||
| return fmt.Sprintf("%s-%s", config.EnvoyDeploymentPrefix, proxyName) | ||
| } | ||
|
|
This reverts commit 231e4fb. Signed-off-by: danehans <daneyonhansen@gmail.com>
create a xdsIR per gateway
create a infraIR per gateway
use the gateway namespace-name as the key for above IRs
populate the envoy bootstrap config with a
service clusterval that matches the IR keypopulate the xds server snapshot for each xds request based on the
service clusterFixes: #349
Signed-off-by: Arko Dasgupta arko@tetrate.io