|
|
|
licenses(["notice"]) # Apache 2
|
|
|
|
|
|
|
|
package_group(
|
|
|
|
name = "docs",
|
|
|
|
packages = [
|
|
|
|
"//docs",
|
|
|
|
],
|
|
|
|
)
|
|
|
|
|
|
|
|
# TODO(htuch): Grow this to cover everything we want to generate docs for, so we can just invoke
|
|
|
|
# bazel build //docs:protos --aspects tools/protodoc/protodoc.bzl%proto_doc_aspect --output_groups=rst
|
|
|
|
proto_library(
|
|
|
|
name = "protos",
|
|
|
|
deps = [
|
|
|
|
"//envoy/admin/v2alpha:clusters",
|
|
|
|
"//envoy/admin/v2alpha:config_dump",
|
|
|
|
"//envoy/api/v2:cds",
|
|
|
|
"//envoy/api/v2:discovery",
|
|
|
|
"//envoy/api/v2:eds",
|
|
|
|
"//envoy/api/v2:lds",
|
|
|
|
"//envoy/api/v2:rds",
|
|
|
|
"//envoy/api/v2/cluster:circuit_breaker",
|
|
|
|
"//envoy/api/v2/cluster:outlier_detection",
|
|
|
|
"//envoy/api/v2/core:protocol",
|
|
|
|
"//envoy/api/v2/listener",
|
|
|
|
"//envoy/api/v2/ratelimit",
|
|
|
|
"//envoy/api/v2/route",
|
|
|
|
"//envoy/config/accesslog/v2:als",
|
|
|
|
"//envoy/config/accesslog/v2:file",
|
|
|
|
"//envoy/config/bootstrap/v2:bootstrap",
|
|
|
|
"//envoy/config/filter/accesslog/v2:accesslog",
|
|
|
|
"//envoy/config/filter/http/buffer/v2:buffer",
|
|
|
|
"//envoy/config/filter/http/ext_authz/v2alpha:ext_authz",
|
|
|
|
"//envoy/config/filter/http/fault/v2:fault",
|
|
|
|
"//envoy/config/filter/http/gzip/v2:gzip",
|
|
|
|
"//envoy/config/filter/http/header_to_metadata/v2:header_to_metadata",
|
|
|
|
"//envoy/config/filter/http/health_check/v2:health_check",
|
|
|
|
"//envoy/config/filter/http/ip_tagging/v2:ip_tagging",
|
|
|
|
"//envoy/config/filter/http/lua/v2:lua",
|
|
|
|
"//envoy/config/filter/http/rate_limit/v2:rate_limit",
|
|
|
|
"//envoy/config/filter/http/rbac/v2:rbac",
|
|
|
|
"//envoy/config/filter/http/router/v2:router",
|
|
|
|
"//envoy/config/filter/http/squash/v2:squash",
|
|
|
|
"//envoy/config/filter/http/transcoder/v2:transcoder",
|
|
|
|
"//envoy/config/filter/network/client_ssl_auth/v2:client_ssl_auth",
|
|
|
|
"//envoy/config/filter/network/ext_authz/v2:ext_authz",
|
|
|
|
"//envoy/config/filter/network/http_connection_manager/v2:http_connection_manager",
|
|
|
|
"//envoy/config/filter/network/mongo_proxy/v2:mongo_proxy",
|
|
|
|
"//envoy/config/filter/network/rate_limit/v2:rate_limit",
|
|
|
|
"//envoy/config/filter/network/redis_proxy/v2:redis_proxy",
|
|
|
|
"//envoy/config/filter/network/tcp_proxy/v2:tcp_proxy",
|
|
|
|
"//envoy/config/grpc_credential/v2alpha:file_based_metadata",
|
|
|
|
"//envoy/config/health_checker/redis/v2:redis",
|
|
|
|
"//envoy/config/metrics/v2:metrics_service",
|
|
|
|
"//envoy/config/metrics/v2:stats",
|
|
|
|
"//envoy/config/ratelimit/v2:rls",
|
|
|
|
"//envoy/config/rbac/v2alpha:rbac",
|
|
|
|
"//envoy/config/trace/v2:trace",
|
|
|
|
"//envoy/config/transport_socket/capture/v2alpha:capture",
|
|
|
|
"//envoy/data/accesslog/v2:accesslog",
|
|
|
|
"//envoy/data/core/v2alpha:health_check_event",
|
|
|
|
"//envoy/data/tap/v2alpha:capture",
|
|
|
|
"//envoy/service/accesslog/v2:als",
|
|
|
|
"//envoy/service/auth/v2alpha:attribute_context",
|
|
|
|
"//envoy/service/auth/v2alpha:external_auth",
|
|
|
|
"//envoy/service/discovery/v2:ads",
|
|
|
|
"//envoy/service/load_stats/v2:lrs",
|
|
|
|
"//envoy/service/metrics/v2:metrics_service",
|
|
|
|
"//envoy/type:percent",
|
Support range based header matching for request routing. (#475)
v2 api changes: Use oneof to specify header match options, based on value(exact_match), regex or range.
The existing value and regex fields will be deprecated. Use the header_match_specfier oneof instead.
Add a new range.proto (envoy.type.v2) for the range type definition.
The SInt64Range message is defined in envoy.type.v2 range.proto.
It consists of start and end (inclusive, exclusive) sint64 values.
v1 api: Add a range_match object to the route headers json. Presence of this object indicates range based route match.
Example: For the below route config:
{
"prefix": "/",
"cluster": "PartitionB",
"name": "PartitionKey",
"range_match": { "start": 0, "end": 10}
}
In the incoming request, if the PartitionKey header value = 0, route match succeeds. Route match fails if the header value = 10, -10, "somestring".
This feature can be used for request routing with Service Fabric stateful services, to route to the desired partition with the [ranged partitioning scheme](https://docs.microsoft.com/en-us/azure/service-fabric/service-fabric-concepts-partitioning#ranged-partitioning-scheme)
Signed-off-by: Kavya Kotacherry <kavyako@microsoft.com>
7 years ago
|
|
|
"//envoy/type:range",
|
|
|
|
"//envoy/type/matcher:metadata",
|
|
|
|
"//envoy/type/matcher:number",
|
|
|
|
"//envoy/type/matcher:string",
|
|
|
|
],
|
|
|
|
)
|