// This is heavily derived from // https://lyft.github.io/envoy/docs/configuration/http_conn_man/route_config/route_config.html#config-http-conn-man-route-table. // The v2 gRPC API differences are tagged with [V2-API-DIFF]. syntax = "proto3"; package envoy.api.v2; import "api/base.proto"; import "api/discovery.proto"; import "google/api/annotations.proto"; import "google/protobuf/duration.proto"; import "google/protobuf/wrappers.proto"; // The resource_names field in DiscoveryRequest specifies a route configuration. // This allows an Envoy configuration with multiple HTTP listeners (and // associated HTTP connection manager filters) to use different route // configurations. Each listener will bind its HTTP connection manager filter to // a route table via this identifier. service RouteDiscoveryService { rpc StreamRoutes(stream DiscoveryRequest) returns (stream DiscoveryResponse) { } rpc FetchRoutes(DiscoveryRequest) returns (DiscoveryResponse) { option (google.api.http) = { post: "/v2/discovery:routes" body: "*" }; } } // Compared to the cluster field that specifies a single upstream cluster as the // target of a request, the weighted_clusters option allows for specification of // multiple upstream clusters along with weights that indicate the percentage of // traffic to be forwarded to each cluster. The router selects an upstream // cluster based on the weights. message WeightedCluster { message ClusterWeight { // Name of the upstream cluster. The cluster must exist in the cluster // manager configuration. string name = 1; // An integer between 0-100. When a request matches the route, the choice of // an upstream cluster is determined by its weight. The sum of weights // across all entries in the clusters array must add up to 100. google.protobuf.UInt32Value weight = 2; // Optional endpoint metadata match criteria. Only endpoints in the upstream // cluster with metadata matching that set in metadata_match will be // considered. The filter name should be specified as "envoy.lb". Metadata metadata_match = 3; } // Specifies one or more upstream clusters associated with the route. repeated ClusterWeight clusters = 1; // Specifies the runtime key prefix that should be used to construct the // runtime keys associated with each cluster. When the runtime_key_prefix is // specified, the router will look for weights associated with each upstream // cluster under the key runtime_key_prefix + "." + cluster[i].name where // cluster[i] denotes an entry in the clusters array field. If the runtime // key for the cluster does not exist, the value specified in the // configuration file will be used as the default weight. See the runtime // documentation for how key names map to the underlying implementation. string runtime_key_prefix = 2; } message RouteMatch { // A path specifier must be present. oneof path_specifier { // If specified, the route is a prefix rule meaning that the prefix must // match the beginning of the :path header. string prefix = 1; // If specified, the route is an exact path rule meaning that the path must // exactly match the :path header once the query string is removed. string path = 2; // If specified, the route is a regular expression match on the :path header // once the query string is removed [V2-API-DIFF]. string regex = 3; } // Indicates that prefix/path matching should be case insensitive. The default // is true. google.protobuf.BoolValue case_sensitive = 4; // Indicates that the route should additionally match on a runtime key. An // integer between 0-100. Every time the route is considered for a match, a // random number between 0-99 is selected. If the number is <= the value found // in the key (checked first) or, if the key is not present, the default // value, the route is a match (assuming everything also about the route // matches). // A runtime route configuration can be used to roll out route changes in a // gradual manner without full code/config deploys. Refer to traffic shifting // docs for additional documentation. RuntimeUInt32 runtime = 5; // Specifies a set of headers that the route should match on. The router will // check the request’s headers against all the specified headers in the route // config. A match will happen if all the headers in the route are present in // the request with the same values (or based on presence if the value field // is not in the config). repeated HeaderMatcher headers = 6; } message CorsPolicy { // Specifies the origins that will be allowed to do CORS requests. repeated string allow_origin = 1; // Specifies the content for the access-control-allow-methods header. string allow_methods = 2; // Specifies the content for the access-control-allow-headers header. string allow_headers = 3; // Specifies the content for the access-control-expose-headers header. string expose_headers = 4; // Specifies the content for the access-control-max-age header. string max_age = 5; // Specifies whether the resource allows credentials. google.protobuf.BoolValue allow_credentials = 6; // Specifies if CORS is enabled. Defaults to true. Only effective on route. google.protobuf.BoolValue enabled = 7; } message RouteAction { oneof cluster_specifier { // Indicates the upstream cluster to which the request should be routed // to. string cluster = 1; // Envoy will determine the cluster to route to by reading the value of the // HTTP header named by cluster_header from the request headers. If the // header is not found or the referenced cluster does not exist, Envoy will // return a 404 response. string cluster_header = 2; // Multiple upstream clusters can be specified for a given route. The // request is routed to one of the upstream clusters based on weights // assigned to each cluster. See traffic splitting for additional // documentation. WeightedCluster weighted_clusters = 3; } // Optional endpoint metadata match criteria. Only endpoints in the upstream // cluster with metadata matching that set in metadata_match will be // considered. The filter name should be specified as "envoy.lb". Metadata metadata_match = 4; // Indicates that during forwarding, the matched prefix (or path) should be // swapped with this value. This option allows application URLs to be rooted // at a different path from those exposed at the reverse proxy layer. string prefix_rewrite = 5; oneof host_rewrite_specifier { // Indicates that during forwarding, the host header will be swapped with // this value. string host_rewrite = 6; // Indicates that during forwarding, the host header will be swapped with // the hostname of the upstream host chosen by the cluster manager. This // option is applicable only when the destination cluster for a route is of // type strict_dns or logical_dns. Setting this to true with other cluster // types has no effect. google.protobuf.BoolValue auto_host_rewrite = 7; } // Specifies the timeout for the route. If not specified, the default is 15s. // Note that this timeout includes all retries. See also // x-envoy-upstream-rq-timeout-ms, x-envoy-upstream-rq-per-try-timeout-ms, and // the retry overview. google.protobuf.Duration timeout = 8; message RetryPolicy { // Specifies the conditions under which retry takes place. These are the // same conditions documented for x-envoy-retry-on. string retry_on = 1; // Specifies the allowed number of retries. This parameter is optional and // defaults to 1. These are the same conditions documented for // x-envoy-max-retries. google.protobuf.UInt32Value num_retries = 2; // Specifies a non-zero timeout per retry attempt. This parameter is // optional. The same conditions documented for // x-envoy-upstream-rq-per-try-timeout-ms apply. google.protobuf.Duration per_try_timeout = 3; } // Indicates that the route has a retry policy. RetryPolicy retry_policy = 9; // Indicates that the route has a request mirroring policy. message RequestMirrorPolicy { // Specifies the cluster that requests will be mirrored to. The cluster must // exist in the cluster manager configuration. string cluster = 1; // If not specified, all requests to the target cluster will be mirrored. If // specified, Envoy will lookup the runtime key to get the % of requests to // mirror. Valid values are from 0 to 10000, allowing for increments of // 0.01% of requests to be mirrored. If the runtime key is specified in the // configuration but not present in runtime, 0 is the default and thus 0% of // requests will be mirrored. string runtime_key = 2; } RequestMirrorPolicy request_mirror_policy = 10; RoutingPriority priority = 11; // Specifies a set of headers that will be added to requests matching this // route. repeated HeaderValueOption request_headers_to_add = 12; // Specifies a set of rate limit configurations that could be applied to the // route. repeated RateLimit rate_limits = 13; // Specifies if the rate limit filter should include the virtual host rate // limits. By default, if the route configured rate limits, the virtual host // rate_limits are not applied to the request. google.protobuf.BoolValue include_vh_rate_limits = 14; message HashPolicy { // [V2-API-DIFF] We expect additional hash policies in the future, e.g. // cookie based, originating IP, etc. message Header { // The name of the request header that will be used to obtain the hash // key. If the request header is not present, the load balancer will use a // random number as the hash, effectively making the load balancing policy // random. string header_name = 1; } // Envoy supports two types of cookie affinity: // // 1. Passive. Envoy takes a cookie that's present in the cookies header and // hashes on its value. // // 2. Generated. Envoy generates and sets a cookie with an expiration (TTL) // on the first request from the client in its response to the client, // based on the endpoint the request gets sent to. The client then // presents this on the next and all subsequent requests, the hash of // this is sufficient to ensure these requests get sent to the same // endpoint. message Cookie { // The name of the cookie that will be used to obtain the hash key. If the // cookie is not present and ttl below is not set, the load balancer will // use a random number as the hash, effectively making the load balancing // policy random. string name = 1; // If specified, a cookie with the TTL will be generated if the cookie is // not present. google.protobuf.Duration ttl = 2; } message ConnectionProperties { // Hash on source IP address. bool source_ip = 1; } oneof policy_specifier { Header header = 1; Cookie cookie = 2; ConnectionProperties connection_properties = 3; } } repeated HashPolicy hash_policy = 15; // Indicates that a HTTP/1.1 client connection to this particular route // should be allowed (and expected) to upgrade to a WebSocket connection. The // default is false. // // Attention // // If set to true, Envoy will expect the first request matching this route to // contain WebSocket upgrade headers. If the headers are not present, the // connection will be rejected. If set to true, Envoy will setup plain TCP // proxying between the client and the upstream server. Hence, an upstream // server that rejects the WebSocket upgrade request is also responsible for // closing the associated connection. Until then, Envoy will continue to // proxy data from the client to the upstream server. // // Redirects, timeouts and retries are not supported on routes where // websocket upgrades are allowed. google.protobuf.BoolValue use_websocket = 16; // Indicates that the route has a CORS policy. CorsPolicy cors = 17; } message RedirectAction { // A 302 redirect response will be sent which swaps the host portion of the // URL with this value. string host_redirect = 1; // A 302 redirect response will be sent which swaps the path portion of the // URL with this value. string path_redirect = 2; } message Decorator { // The operation (or span name) to be used for the matched route. string operation = 1; } // The match/action distinction in Route is surfaced explicitly in the v2 API // [V2-API-DIFF]. message Route { RouteMatch match = 1; oneof action { // Route request to some upstream cluster. RouteAction route = 2; // Return a 302 redirect. RedirectAction redirect = 3; } // See base.Metadata description. Metadata metadata = 4; // Decorator for matched route. Decorator decorator = 5; } // A virtual cluster is a way of specifying a regex matching rule against // certain important endpoints such that statistics are generated explicitly for // the matched requests. The reason this is useful is that when doing // prefix/path matching Envoy does not always know what the application // considers to be an endpoint. Thus, it’s impossible for Envoy to generically // emit per endpoint statistics. However, often systems have highly critical // endpoints that they wish to get “perfect” statistics on. Virtual cluster // statistics are perfect in the sense that they are emitted on the downstream // side such that they include network level failures. message VirtualCluster { // Specifies a regex pattern to use for matching requests. string pattern = 1; // Specifies the name of the virtual cluster. The virtual cluster name as well // as the virtual host name are used when emitting statistics. string name = 2; // Optionally specifies the HTTP method to match on. For example GET, PUT, // etc. RequestMethod method = 3; } // See // https://lyft.github.io/envoy/docs/configuration/http_conn_man/route_config/rate_limits.html message RateLimit { // Refers to the stage set in the filter. The rate limit configuration only // applies to filters with the same stage number. The default stage number is // 0. // NOTE: The filter supports a range of 0 - 10 inclusively for stage numbers. google.protobuf.UInt32Value stage = 1; // The key to be set in runtime to disable this rate limit configuration. string disable_key = 2; message Action { // The following descriptor entry is appended to the descriptor: // ("source_cluster", "") message SourceCluster { } // The following descriptor entry is appended to the descriptor: // ("destination_cluster", "") message DestinationCluster { } // The following descriptor entry is appended when a header contains a key // that matches the header_name: // ("", "") message RequestHeaders { // The header name to be queried from the request headers. The header’s // value is used to populate the value of the descriptor entry for the // descriptor_key. string header_name = 1; // The key to use in the descriptor entry. string descriptor_key = 2; } // The following descriptor entry is appended to the descriptor and is // populated using the trusted address from x-forwarded-for: // ("remote_address", "") message RemoteAddress { } // The following descriptor entry is appended to the descriptor: // ("generic_key", "") message GenericKey { // The value to use in the descriptor entry. string descriptor_value = 1; } // The following descriptor entry is appended to the descriptor: // (“header_match”, “”) message HeaderValueMatch { // The value to use in the descriptor entry. string descriptor_value = 1; // If set to true, the action will append a descriptor entry when the // request matches the headers. If set to false, the action will append a // descriptor entry when the request does not match the headers. The // default value is true. google.protobuf.BoolValue expect_match = 2; // Specifies a set of headers that the rate limit action should match // on. The action will check the request’s headers against all the // specified headers in the config. A match will happen if all the // headers in the config are present in the request with the same values // (or based on presence if the value field is not in the config). repeated HeaderMatcher headers = 3; } oneof action_specifier { SourceCluster source_cluster = 1; DestinationCluster destination_cluster = 2; RequestHeaders request_headers = 3; RemoteAddress remote_address = 4; GenericKey generic_key = 5; HeaderValueMatch header_value_match = 6; } } // A list of actions that are to be applied for this rate limit configuration. // Order matters as the actions are processed sequentially and the descriptor // is composed by appending descriptor entries in that sequence. If an action // cannot append a descriptor entry, no descriptor is generated for the // configuration. See composing actions for additional documentation. repeated Action actions = 3; } message HeaderMatcher { // Specifies the name of the header in the request. string name = 1; // Specifies the value of the header. If the value is absent a request that // has the name header will match, regardless of the header’s value. string value = 2; // Specifies whether the header value is a regular expression or not. // Defaults to false. google.protobuf.BoolValue regex = 3; } message VirtualHost { // The logical name of the virtual host. This is used when emitting certain // statistics but is not relevant for routing. string name = 1; // A list of domains (host/authority header) that will be matched to this // virtual host. Wildcard hosts are supported in the form of “*.foo.com” or // “*-bar.foo.com”. Note that the wildcard will not match the empty string. // e.g. “*-bar.foo.com” will match “baz-bar.foo.com” but not “-bar.foo.com”. // Additionally, a special entry “*” is allowed which will match any // host/authority header. Only a single virtual host in the entire route // configuration can match on “*”. A domain must be unique across all virtual // hosts or the config will fail to load. repeated string domains = 2; // The list of routes that will be matched, in order, for incoming requests. // The first route that matches will be used. repeated Route routes = 3; enum TlsRequirementType { // No TLS requirement for the virtual host. NONE = 0; // External requests must use TLS. If a request is external and it is not // using TLS, a 302 redirect will be sent telling the client to use HTTPS. EXTERNAL_ONLY = 1; // All requests must use TLS. If a request is not using TLS, a 302 redirect // will be sent telling the client to use HTTPS. ALL = 2; } // Specifies the type of TLS enforcement the virtual host expects. TlsRequirementType require_tls = 4; // A list of virtual clusters defined for this virtual host. Virtual clusters // are used for additional statistics gathering. repeated VirtualCluster virtual_clusters = 5; // Specifies a set of rate limit configurations that will be applied to the // virtual host. repeated RateLimit rate_limits = 6; // Specifies a list of HTTP headers that should be added to each request // handled by this virtual host. In the presence of duplicate header keys, // precedence rules apply. repeated HeaderValueOption request_headers_to_add = 7; // Indicates that the virtual host has a CORS policy. CorsPolicy cors = 8; } message RouteConfiguration { // The name of the route configuration. For example, it might match the // router_config_name in the HttpConnectionManager > route_specifier > rds // message. string name = 1; // An array of virtual hosts that make up the route table. repeated VirtualHost virtual_hosts = 2; // Specifies a list of HTTP headers that the connection manager will consider // to be internal only. If they are found on external requests they will be // cleaned prior to filter invocation. See x-envoy-internal for more // information. repeated string internal_only_headers = 3; // Specifies a list of HTTP headers that should be added to each response that // the connection manager encodes. repeated HeaderValueOption response_headers_to_add = 4; // Specifies a list of HTTP headers that should be removed from each response // that the connection manager encodes. repeated string response_headers_to_remove = 5; // Specifies a list of HTTP headers that should be added to each request // routed by the HTTP connection manager. In the presence of duplicate // header keys, precendence rules apply. repeated HeaderValueOption request_headers_to_add = 6; // An optional boolean that specifies whether the clusters that the route // table refers to will be validated by the cluster manager. If set to true // and a route refers to a non-existent cluster, the route table will not // load. If set to false and a route refers to a non-existent cluster, the // route table will load and the router filter will return a 404 if the route // is selected at runtime. This setting defaults to true if the route table // is statically defined via the route_config option. This setting default to // false if the route table is loaded dynamically via the rds option. Users // may which to override the default behavior in certain cases (for example // when using CDS with a static route table). google.protobuf.BoolValue validate_clusters = 7; }