From 72eca0706543e33b4db0aaf2c7789038d63454ea Mon Sep 17 00:00:00 2001 From: "Mark D. Roth" Date: Thu, 7 Sep 2023 16:32:05 +0000 Subject: [PATCH] A42 update: header hash policy behaves the same as route header matching --- A42-xds-ring-hash-lb-policy.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/A42-xds-ring-hash-lb-policy.md b/A42-xds-ring-hash-lb-policy.md index d35e085cd..417128200 100644 --- a/A42-xds-ring-hash-lb-policy.md +++ b/A42-xds-ring-hash-lb-policy.md @@ -72,7 +72,11 @@ Here is how gRPC will handle each type of hash policy: - [`header`](https://github.com/envoyproxy/envoy/blob/2443032526cf6e50d63d35770df9473dd0460fc0/api/envoy/config/route/v3/route_components.proto#L710): gRPC will support this type of hash policy. This allows hashing on a - request header. + request header. The header matching logic will behave the same way as + specified for route matching, as per [gRFC + A28](https://github.com/grpc/proposal/blob/master/A28-xds-traffic-splitting-and-routing.md#picking) + (i.e., it will ignore headers with a `-bin` suffix and may need + special handling for `content-type`). - [`cookie`](https://github.com/envoyproxy/envoy/blob/2443032526cf6e50d63d35770df9473dd0460fc0/api/envoy/config/route/v3/route_components.proto#L713): gRPC does not support HTTP cookies, so we will not support this hash policy. If specified, this policy will not return any result.