-
Notifications
You must be signed in to change notification settings - Fork 4.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Listener Generation for Terminating Gateway Destinations #13196
Conversation
82d3272
to
0d208af
Compare
agent/xds/testdata/listeners/terminating-gateway-custom-and-tagged-addresses.latest.golden
Outdated
Show resolved
Hide resolved
@DanStough I made few changes in here to fix the order in the sort algorithm and regenerate the files. I also opened #13300 to add the leaf cert generation and some testing around having valid endpoints. I think we need to do some renaming in this PR before being able to open it for review. So it match #13217 naming convention. |
Asking for a preliminary review. I still need Dhia's PR to land and rename all the "endpoint" stuff to "desintations" and also adopt the |
On second thought, I think this PR needs some more work w.r.t. transparent proxy mode in the tests. |
60545a3
to
6806f1f
Compare
0807846
to
ad4c262
Compare
Updates were made based on the new design. Ready to review. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for working on this @DanStough. I had a few questions/comments.
Signed-off-by: Dhia Ayachi <[email protected]>
ad4c262
to
b312e41
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
d8e8e0b
to
b312e41
Compare
Description
This PR adds xDS listener generation to Destinations (fka "Endpoints") for terminating gateways. To recap, destinations are external services that are not part of the Consul cluster. They are nodeless and also support IP CIDRs. Destinations are referenced the same as regular
services
in the Terminating Gateway Config Entry but are defined inservice-defaults
(#13159).Testing
Tests with Golden files are included for the three types of Destinations.
Links
Related PRs:
PR Checklist
external facing docs updated