-
Notifications
You must be signed in to change notification settings - Fork 277
Extend support for host headers with configuring routes #2369
Comments
Can this be addressed with the routes refactor? |
As of today we are ignoring host headers : Line 152 in b25fd46
We will have to ensure that it's included in the headers and domains while configuring routes. Since we want this support, changing it from documentation to enhancement required |
This was not implemented in routes v1 and not yet ready in routes v2. |
sounds good. added to #2611 |
Once we support configuring routes with host headers, users will still not be able to make requests to the hosts. As there's limitation in OSM to only supports service fqdn's on its filter chains. |
This commit allows partial hostname matches while merging both inbound and outbound traffic policies. This change is necessary to support host headers that users will specify as a part of the TrafficSpec and as this will be a single host, is can only partially match to an existing traffic policy and if that is the case the two policies should be merged. The commit also imporves the logic of the 'subset` function in this package. It checks is either slice is a subset of the other and if true, returns a unified slice of the two. This is part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit allows partial hostname matches while merging both inbound and outbound traffic policies. This change is necessary to support host headers that users will specify as a part of the TrafficSpec and as this will be a single host, is can only partially match to an existing traffic policy and if that is the case the two policies should be merged. The commit also imporves the logic of the 'subset` function in this package. It checks is either slice is a subset of the other and if true, returns a unified slice of the two. This is part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit allows partial hostname matches while merging both inbound and outbound traffic policies. This change is necessary to support host headers that users will specify as a part of the TrafficSpec and as this will be a single host, is can only partially match to an existing traffic policy and if that is the case the two policies should be merged. The commit also imporves the logic of the 'subset` function in this package. It checks is either slice is a subset of the other and if true, returns a unified slice of the two. This is part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route and updated the hostRewriteSepecifier for the envoy. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
This commit adds new inbound and outbound traffic policies if host header is provided in the route and updated the hostRewriteSepecifier for the envoy. Part of openservicemesh#2369 Signed-off-by: Sneha Chhabria <snchh@microsoft.com>
I wanted to call out that specifying a custom host header in SMI's traffic specs doesn't serve any purpose at the moment. Per the current implementation, a host header derived from an SMI HTTPRouteGroup resource is programmed as a header match in a route's match criteria ( Such a route needs to first match the The only use case to specify a host header match in an envoy route is when using a wildcard ( |
The existing demo is broken because of incorrect host header matching specified which prevents bookbuyer from accessing the bookstore service. The host header in the HTTP request includes the port, but the spec was missing this. Since the host header feature is not complete (see openservicemesh/osm#2369) and this is unnecessary for this demo, this change removes it. The demo works as expected with SMI policies with this fix. Resolves openservicemesh/osm#3491 Signed-off-by: Shashank Ram <shashr2204@gmail.com>
The existing demo is broken because of incorrect host header matching specified which prevents bookbuyer from accessing the bookstore service. The host header in the HTTP request includes the port, but the spec was missing this. Since the host header feature is not complete (see openservicemesh/osm#2369) and this is unnecessary for this demo, this change removes it. The demo works as expected with SMI policies with this fix. Resolves openservicemesh/osm#3491 Signed-off-by: Shashank Ram <shashr2204@gmail.com>
SMI Traffic Spec allows us to specify headers and Host is one of these.
We use the kubernetes host names when building the envoy configs. This means we disregard any host header specified in the traffic spec ( for both a traffic target and traffic split)
We need to extend out the route configuration to provide support for it
The text was updated successfully, but these errors were encountered: