-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Listener filter to detect protocol #7527
Comments
Note that we might want to have a lot of reasonably small protocol-specific inspectors (e.g. e.g. HTTP inspector (which would work only for plaintext connections) should be able to set:
|
An HTTP inspector sounds reasonable to me.
@PiotrSikora Not sure about this item, the |
That's fine, you can still latch to a filter chain that includes requested server name in it's Also, this is not very different from the existing case with TLS inspector, where requests are latched to a filter chain based on the SNI from the first request, even though subsequent requests can be for a different |
I don't think we should extract filter_chains:
- filter_chain_match:
server_names: a.com
- filter_chain_match:
server_names: b.com The first request ( |
How is this different from the case when you don't extract As mentioned previously, we already act on the |
I think TLS SNI is a little bit different than hosts. The TLS SNI sticks to each connection but host is per request. I am not sure if we should use host in filter chain match. I think server name in filter chain match should use some criteria that are constant for TCP connection, for example, destination |
) Description: new listener filter for inspecting http protocol. - Http1x: check request line - Http2: check connection preface Pros: Performance; Cons: False positive possibility Risk Level: low Testing: unit test, manual test Docs Changes: Added Release Notes: Added #Issue: #7527 Signed-off-by: Yan Xue <[email protected]>
…voyproxy#7559) Description: new listener filter for inspecting http protocol. - Http1x: check request line - Http2: check connection preface Pros: Performance; Cons: False positive possibility Risk Level: low Testing: unit test, manual test Docs Changes: Added Release Notes: Added #Issue: envoyproxy#7527 Signed-off-by: Yan Xue <[email protected]>
Like tls inspector, we'd like to add another listener filter which will detect the protocol, e.g. HTTP, by sniffing the packet. The listener filter can add the value to application protocols or maybe other fields to guide the filter chain match.
From istio side, the change will simplify the user configuration. Would the community consider to add the feature? Please let me know and I'd like to implement it.
The text was updated successfully, but these errors were encountered: