-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
wasm configuration types refactor #868
wasm configuration types refactor #868
Conversation
Signed-off-by: Eguzki Astiz Lezaun <eastizle@redhat.com>
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #868 +/- ##
==========================================
+ Coverage 80.20% 81.22% +1.01%
==========================================
Files 64 89 +25
Lines 4492 6940 +2448
==========================================
+ Hits 3603 5637 +2034
- Misses 600 885 +285
- Partials 289 418 +129
Flags with carried forward coverage won't be shown. Click here to find out more.
|
Signed-off-by: Eguzki Astiz Lezaun <eastizle@redhat.com>
Signed-off-by: Eguzki Astiz Lezaun <eastizle@redhat.com>
Signed-off-by: Eguzki Astiz Lezaun <eastizle@redhat.com>
Signed-off-by: Eguzki Astiz Lezaun <eastizle@redhat.com>
Signed-off-by: Eguzki Astiz Lezaun <eastizle@redhat.com>
8c7229e
to
9547e83
Compare
Signed-off-by: Eguzki Astiz Lezaun <eastizle@redhat.com>
Data []DataType `json:"data,omitempty"` | ||
} | ||
|
||
// +kubebuilder:validation:Enum:=ratelimit;auth |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I made up auth
, open for a new magic word
Signed-off-by: Eguzki Astiz Lezaun <eastizle@redhat.com>
feedb9e
to
1092921
Compare
Signed-off-by: Eguzki Astiz Lezaun <eastizle@redhat.com>
1092921
to
a416430
Compare
Signed-off-by: Eguzki Astiz Lezaun <eastizle@redhat.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! good job! 🍡
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm, verified steps on istio as well
What
Kuadrant/wasm-shim#87 introduced a new kuadrant's Wasm configuration. It is based on extensions. It's basically the same, but more extensible, which allows to include auth in the future. The wasm controllers (istio and envoygateway based ones) are updated to generate the new configuration scheme expected by the wasm module.
The scope of this issue is limited to rate limiting. External auth using wasm will be covered in following up tasks.
Example of the new wasm configuration:
Related work: Kuadrant/wasm-shim#87
TODO:
Verification steps
Setup (Persona: Cluster admin)
Run the operator with a custom wasm build (right now it is not being merged in
main
)Now follow the guide named Authenticated Rate Limiting for Application Developers and start requesting an instance of Kuadrant. The guide should take you to authenticated rate limiting configuration and the traffic should be rate limiting as expected.
Once you go through all the steps successfully, let's inspect the resources and new configuration.
Verification of kuadrant managed EnvoyGateway resources
EnvoyExtensionPolicy
Check EnvoyExtensionPolicy resource defined by kuadrant
kubectl get envoyextensionpolicy -n gateway-system kuadrant-wasm-for-kuadrant-ingressgateway -o yaml | yq e -P
Few things to highlight:
oci://quay.io/kuadrant/wasm-shim:external-auth
.