Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: bump gwapi to v0.7.1 #1478

Merged
merged 2 commits into from
Jun 16, 2023
Merged

feat: bump gwapi to v0.7.1 #1478

merged 2 commits into from
Jun 16, 2023

Conversation

Xunzhuo
Copy link
Member

@Xunzhuo Xunzhuo commented Jun 5, 2023

What type of PR is this?

feat: bump gwapi to v0.7.1

What this PR does / why we need it:

bump gwapi to v0.7.1

@Xunzhuo Xunzhuo requested a review from a team as a code owner June 5, 2023 02:37
@Xunzhuo Xunzhuo requested review from a team, zhaohuabing, qicz, LanceEa and zirain and removed request for a team June 5, 2023 02:38
@codecov
Copy link

codecov bot commented Jun 5, 2023

Codecov Report

Merging #1478 (56c0cf9) into main (0775da1) will decrease coverage by 0.13%.
The diff coverage is 100.00%.

@@            Coverage Diff             @@
##             main    #1478      +/-   ##
==========================================
- Coverage   61.77%   61.65%   -0.13%     
==========================================
  Files          81       81              
  Lines       12130    12131       +1     
==========================================
- Hits         7493     7479      -14     
- Misses       4172     4184      +12     
- Partials      465      468       +3     
Impacted Files Coverage Δ
internal/xds/translator/translator.go 80.76% <100.00%> (+0.09%) ⬆️

... and 2 files with indirect coverage changes

@arkodg
Copy link
Contributor

arkodg commented Jun 5, 2023

looks like IgnorePortInHostMatching https://pkg.go.dev/github.com/envoyproxy/go-control-plane/envoy/config/route/v3#RouteConfiguration needs to be set instead of stripping the port from the host (i.e. revert #1389)
thanks to @sunjayBhatia & @howardjohn's triage in kubernetes-sigs/gateway-api#2091

@Xunzhuo
Copy link
Member Author

Xunzhuo commented Jun 8, 2023

@arkodg so we need to revert #1389 ?

@arkodg
Copy link
Contributor

arkodg commented Jun 8, 2023

yah @Xunzhuo , we'll need to

can be done in this PR or we can raise issues for each

@zirain zirain closed this in #1512 Jun 14, 2023
@arkodg arkodg reopened this Jun 14, 2023
@Xunzhuo Xunzhuo force-pushed the bump-gwapi-071 branch 3 times, most recently from 236d178 to 60c8d6f Compare June 14, 2023 06:19
@arkodg
Copy link
Contributor

arkodg commented Jun 14, 2023

looks like HTTPRouteRequestMirror will need to be skipped, can you also raise a issue to track enabling it once the issue has been triaged and fixed

@Xunzhuo Xunzhuo force-pushed the bump-gwapi-071 branch 2 times, most recently from 9f11457 to e8b556d Compare June 16, 2023 02:39
Signed-off-by: bitliu <bitliu@tencent.com>
@Xunzhuo Xunzhuo force-pushed the bump-gwapi-071 branch 3 times, most recently from 07dc468 to c70a6c3 Compare June 16, 2023 03:18
Signed-off-by: bitliu <bitliu@tencent.com>
Copy link
Contributor

@arkodg arkodg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks for also improving dev velocity by introducing make testdata

@arkodg arkodg merged commit 01e1670 into envoyproxy:main Jun 16, 2023
@Xunzhuo Xunzhuo deleted the bump-gwapi-071 branch June 16, 2023 06:41
@jackkleeman
Copy link
Contributor

I think IgnorePortInHostMatching won't work for :authority exact/suffix header matching, which is set up when we have hosts defined in httproutes and not in listeners

@howardjohn
Copy link

I think IgnorePortInHostMatching won't work for :authority exact/suffix header matching, which is set up when we have hosts defined in httproutes and not in listeners

Istio handles this by matching in domains rather than a :authority header match

@jackkleeman
Copy link
Contributor

ok, maybe i can pr a fix to use that approach for the routes instead of :authority

@jackkleeman
Copy link
Contributor

hm, the problem here is that domains is listener-scoped, but i am talking about the case where httproute is more specific on hostname than listeners - in that case we are currently creating a authority header match. maybe that header match just needs to be more port agnostic

@howardjohn
Copy link

howardjohn commented Jul 20, 2023 via email

@jackkleeman
Copy link
Contributor

no indeed, but doesnt virtualhost map to gateway listener?

@howardjohn
Copy link

Listener: match whatever
Routes:

virtual_hosts:
- domains: [*.example.com]
- domains: [bar.example.com]

@jackkleeman
Copy link
Contributor

sure, but envoy/gateway currently creates only 1 virtual host per HttpListener as defined in the gateway object:

// Allocate virtual host for this httpListener.
		// 1:1 between IR HTTPListener and xDS VirtualHost
		vHost := &routev3.VirtualHost{
			Name:    httpListener.Name,
			Domains: httpListener.Hostnames,
		}

So we would need to change that to be 1-to-many irght?

@howardjohn
Copy link

Yes

@howardjohn
Copy link

TBH I did not realize I was commenting in envoyproxy/gateway repo 🙂

@jackkleeman
Copy link
Contributor

hah! no worries

@arkodg
Copy link
Contributor

arkodg commented Jul 20, 2023

hey @jackkleeman thanks for surfacing this issue, created a newer issue to track this limitation #1687

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants