-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feature regression: no longer possible to rewrite authority #16775
Comments
Yeah, this was a bit of a bug, because it allowed rewrites specific for HTTP/1 and not HTTP/2 so would cause inconsistent behavior. Would any of If not happy to discuss the use case further. |
We do use |
ah, gotcha. So if host_rewrite_specifier were added to ClusterWeight that'd work for you? Also you did catch this validation is runtime guarded, yes? Ideally you should just be able to flip the runtime guard back while we figure out a long term solution. |
Yep, I was planning to set the runtime flag in the meantime. Thanks for adding that
Yep |
@adisuissa @lizan thoughts? |
@htuch can you comment on this? |
I guess this is reasonable to ask for behavior wise. What I'm missing a bit is what are the set of hierarchically overridable things we want to make available more generally. We already have request/response headers to add, now we add host rewrite, what does the full picture here look like? We don't need to boil the ocean, but at the same time, building an understandable/maintainable/consistent API should have some notion of what makes sense to have as hierarchically overridable. I have this feeling that if we had rewritten the API from scratch with these requirements, it would have a dedicated message that could be composed across levels. |
Risk Level: low (config guarded addition) Testing: new unit tests Docs Changes: in API docs Release Notes: inline Fixes #16775 Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
@howardjohn should be fixed - lmk if this doesn't work for all your use cases and I'll keep iterating :-) |
Risk Level: low (config guarded addition) Testing: new unit tests Docs Changes: in API docs Release Notes: inline Fixes envoyproxy#16775 Signed-off-by: Alyssa Wilk <alyssar@chromium.org> Signed-off-by: chris.xin <xinchuantao@qq.com>
Risk Level: low (config guarded addition) Testing: new unit tests Docs Changes: in API docs Release Notes: inline Fixes envoyproxy#16775 Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Title: no longer possible to rewrite authority
Description:
#14747 changed the behavior of header modifications that are allowed. Previously, we relied on this to rewrite the authority on a per-destination basis.
After the change, this is no longer possible. While we can do a rewrite at the route level, we cannot do it on a per-weighted-cluster basis, unlike all other headers.
For us this represents a breaking change, so we will likely set the runtime flag for now. But we want to understand a long term plan.
cc @alyssawilk
[optional Relevant Links:]
Istio specific issue: istio/istio#33226
The text was updated successfully, but these errors were encountered: