You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
217 lines
11 KiB
217 lines
11 KiB
syntax = "proto3"; |
|
|
|
package envoy.api.v2; |
|
|
|
option java_outer_classname = "LdsProto"; |
|
option java_multiple_files = true; |
|
option java_package = "io.envoyproxy.envoy.api.v2"; |
|
option java_generic_services = true; |
|
|
|
import "envoy/api/v2/core/address.proto"; |
|
import "envoy/api/v2/core/base.proto"; |
|
import "envoy/api/v2/discovery.proto"; |
|
import "envoy/api/v2/listener/listener.proto"; |
|
import "envoy/api/v2/listener/udp_listener_config.proto"; |
|
import "envoy/config/listener/v2/api_listener.proto"; |
|
|
|
import "google/api/annotations.proto"; |
|
import "google/protobuf/duration.proto"; |
|
import "google/protobuf/wrappers.proto"; |
|
|
|
import "validate/validate.proto"; |
|
|
|
// [#protodoc-title: Listener] |
|
// Listener :ref:`configuration overview <config_listeners>` |
|
|
|
// The Envoy instance initiates an RPC at startup to discover a list of |
|
// listeners. Updates are delivered via streaming from the LDS server and |
|
// consist of a complete update of all listeners. Existing connections will be |
|
// allowed to drain from listeners that are no longer present. |
|
service ListenerDiscoveryService { |
|
rpc DeltaListeners(stream DeltaDiscoveryRequest) returns (stream DeltaDiscoveryResponse) { |
|
} |
|
|
|
rpc StreamListeners(stream DiscoveryRequest) returns (stream DiscoveryResponse) { |
|
} |
|
|
|
rpc FetchListeners(DiscoveryRequest) returns (DiscoveryResponse) { |
|
option (google.api.http) = { |
|
post: "/v2/discovery:listeners" |
|
body: "*" |
|
}; |
|
} |
|
} |
|
|
|
// [#comment:next free field: 20] |
|
message Listener { |
|
enum DrainType { |
|
// Drain in response to calling /healthcheck/fail admin endpoint (along with the health check |
|
// filter), listener removal/modification, and hot restart. |
|
DEFAULT = 0; |
|
|
|
// Drain in response to listener removal/modification and hot restart. This setting does not |
|
// include /healthcheck/fail. This setting may be desirable if Envoy is hosting both ingress |
|
// and egress listeners. |
|
MODIFY_ONLY = 1; |
|
} |
|
|
|
// [#not-implemented-hide:] |
|
message DeprecatedV1 { |
|
// Whether the listener should bind to the port. A listener that doesn't |
|
// bind can only receive connections redirected from other listeners that |
|
// set use_original_dst parameter to true. Default is true. |
|
// |
|
// This is deprecated in v2, all Listeners will bind to their port. An |
|
// additional filter chain must be created for every original destination |
|
// port this listener may redirect to in v2, with the original port |
|
// specified in the FilterChainMatch destination_port field. |
|
// |
|
// [#comment:TODO(PiotrSikora): Remove this once verified that we no longer need it.] |
|
google.protobuf.BoolValue bind_to_port = 1; |
|
} |
|
|
|
reserved 14; |
|
|
|
// The unique name by which this listener is known. If no name is provided, |
|
// Envoy will allocate an internal UUID for the listener. If the listener is to be dynamically |
|
// updated or removed via :ref:`LDS <config_listeners_lds>` a unique name must be provided. |
|
string name = 1; |
|
|
|
// The address that the listener should listen on. In general, the address must be unique, though |
|
// that is governed by the bind rules of the OS. E.g., multiple listeners can listen on port 0 on |
|
// Linux as the actual port will be allocated by the OS. |
|
core.Address address = 2 [(validate.rules).message = {required: true}]; |
|
|
|
// A list of filter chains to consider for this listener. The |
|
// :ref:`FilterChain <envoy_api_msg_listener.FilterChain>` with the most specific |
|
// :ref:`FilterChainMatch <envoy_api_msg_listener.FilterChainMatch>` criteria is used on a |
|
// connection. |
|
// |
|
// Example using SNI for filter chain selection can be found in the |
|
// :ref:`FAQ entry <faq_how_to_setup_sni>`. |
|
repeated listener.FilterChain filter_chains = 3; |
|
|
|
// If a connection is redirected using *iptables*, the port on which the proxy |
|
// receives it might be different from the original destination address. When this flag is set to |
|
// true, the listener hands off redirected connections to the listener associated with the |
|
// original destination address. If there is no listener associated with the original destination |
|
// address, the connection is handled by the listener that receives it. Defaults to false. |
|
// |
|
// .. attention:: |
|
// |
|
// This field is deprecated. Use :ref:`an original_dst <config_listener_filters_original_dst>` |
|
// :ref:`listener filter <envoy_api_field_Listener.listener_filters>` instead. |
|
// |
|
// Note that hand off to another listener is *NOT* performed without this flag. Once |
|
// :ref:`FilterChainMatch <envoy_api_msg_listener.FilterChainMatch>` is implemented this flag |
|
// will be removed, as filter chain matching can be used to select a filter chain based on the |
|
// restored destination address. |
|
google.protobuf.BoolValue use_original_dst = 4 [deprecated = true]; |
|
|
|
// Soft limit on size of the listener’s new connection read and write buffers. |
|
// If unspecified, an implementation defined default is applied (1MiB). |
|
google.protobuf.UInt32Value per_connection_buffer_limit_bytes = 5; |
|
|
|
// Listener metadata. |
|
core.Metadata metadata = 6; |
|
|
|
// [#not-implemented-hide:] |
|
DeprecatedV1 deprecated_v1 = 7; |
|
|
|
// The type of draining to perform at a listener-wide level. |
|
DrainType drain_type = 8; |
|
|
|
// Listener filters have the opportunity to manipulate and augment the connection metadata that |
|
// is used in connection filter chain matching, for example. These filters are run before any in |
|
// :ref:`filter_chains <envoy_api_field_Listener.filter_chains>`. Order matters as the |
|
// filters are processed sequentially right after a socket has been accepted by the listener, and |
|
// before a connection is created. |
|
// UDP Listener filters can be specified when the protocol in the listener socket address in |
|
// :ref:`protocol <envoy_api_field_core.SocketAddress.protocol>` is :ref:'UDP |
|
// <envoy_api_field_core.Protocol.UDP>`. |
|
// UDP listeners currently support a single filter. |
|
repeated listener.ListenerFilter listener_filters = 9; |
|
|
|
// The timeout to wait for all listener filters to complete operation. If the timeout is reached, |
|
// the accepted socket is closed without a connection being created unless |
|
// `continue_on_listener_filters_timeout` is set to true. Specify 0 to disable the |
|
// timeout. If not specified, a default timeout of 15s is used. |
|
google.protobuf.Duration listener_filters_timeout = 15; |
|
|
|
// Whether a connection should be created when listener filters timeout. Default is false. |
|
// |
|
// .. attention:: |
|
// |
|
// Some listener filters, such as :ref:`Proxy Protocol filter |
|
// <config_listener_filters_proxy_protocol>`, should not be used with this option. It will cause |
|
// unexpected behavior when a connection is created. |
|
bool continue_on_listener_filters_timeout = 17; |
|
|
|
// Whether the listener should be set as a transparent socket. |
|
// When this flag is set to true, connections can be redirected to the listener using an |
|
// *iptables* *TPROXY* target, in which case the original source and destination addresses and |
|
// ports are preserved on accepted connections. This flag should be used in combination with |
|
// :ref:`an original_dst <config_listener_filters_original_dst>` :ref:`listener filter |
|
// <envoy_api_field_Listener.listener_filters>` to mark the connections' local addresses as |
|
// "restored." This can be used to hand off each redirected connection to another listener |
|
// associated with the connection's destination address. Direct connections to the socket without |
|
// using *TPROXY* cannot be distinguished from connections redirected using *TPROXY* and are |
|
// therefore treated as if they were redirected. |
|
// When this flag is set to false, the listener's socket is explicitly reset as non-transparent. |
|
// Setting this flag requires Envoy to run with the *CAP_NET_ADMIN* capability. |
|
// When this flag is not set (default), the socket is not modified, i.e. the transparent option |
|
// is neither set nor reset. |
|
google.protobuf.BoolValue transparent = 10; |
|
|
|
// Whether the listener should set the *IP_FREEBIND* socket option. When this |
|
// flag is set to true, listeners can be bound to an IP address that is not |
|
// configured on the system running Envoy. When this flag is set to false, the |
|
// option *IP_FREEBIND* is disabled on the socket. When this flag is not set |
|
// (default), the socket is not modified, i.e. the option is neither enabled |
|
// nor disabled. |
|
google.protobuf.BoolValue freebind = 11; |
|
|
|
// Additional socket options that may not be present in Envoy source code or |
|
// precompiled binaries. |
|
repeated core.SocketOption socket_options = 13; |
|
|
|
// Whether the listener should accept TCP Fast Open (TFO) connections. |
|
// When this flag is set to a value greater than 0, the option TCP_FASTOPEN is enabled on |
|
// the socket, with a queue length of the specified size |
|
// (see `details in RFC7413 <https://tools.ietf.org/html/rfc7413#section-5.1>`_). |
|
// When this flag is set to 0, the option TCP_FASTOPEN is disabled on the socket. |
|
// When this flag is not set (default), the socket is not modified, |
|
// i.e. the option is neither enabled nor disabled. |
|
// |
|
// On Linux, the net.ipv4.tcp_fastopen kernel parameter must include flag 0x2 to enable |
|
// TCP_FASTOPEN. |
|
// See `ip-sysctl.txt <https://www.kernel.org/doc/Documentation/networking/ip-sysctl.txt>`_. |
|
// |
|
// On macOS, only values of 0, 1, and unset are valid; other values may result in an error. |
|
// To set the queue length on macOS, set the net.inet.tcp.fastopen_backlog kernel parameter. |
|
google.protobuf.UInt32Value tcp_fast_open_queue_length = 12; |
|
|
|
// Specifies the intended direction of the traffic relative to the local Envoy. |
|
core.TrafficDirection traffic_direction = 16; |
|
|
|
// If the protocol in the listener socket address in :ref:`protocol |
|
// <envoy_api_field_core.SocketAddress.protocol>` is :ref:'UDP |
|
// <envoy_api_field_core.Protocol.UDP>`, this field specifies the actual udp listener to create, |
|
// i.e. :ref:`udp_listener_name |
|
// <envoy_api_field_listener.UdpListenerConfig.udp_listener_name>` = "raw_udp_listener" for |
|
// creating a packet-oriented UDP listener. If not present, treat it as "raw_udp_listener". |
|
listener.UdpListenerConfig udp_listener_config = 18; |
|
|
|
// [#not-implemented-hide:] |
|
// Used to represent an API listener, which is used in non-proxy clients. The type of API |
|
// exposed to the non-proxy application depends on the type of API listener. |
|
// When this field is set, no other field except for :ref:`name<envoy_api_field_Listener.name>` |
|
// should be set. |
|
// [#next-major-version: In the v3 API, instead of this messy approach where the socket |
|
// listener fields are directly in the top-level Listener message and the API listener types |
|
// are in the ApiListener message, the socket listener messages should be in their own message, |
|
// and the top-level Listener should essentially be a oneof that selects between the |
|
// socket listener and the various types of API listener. That way, a given Listener message |
|
// can structurally only contain the fields of the relevant type.] |
|
config.listener.v2.ApiListener api_listener = 19; |
|
}
|
|
|