Add L7 and PROXY protocol fields to gRPC API and CLI
Proto: Route message gains mode, tls_cert, tls_key, backend_tls,
send_proxy_protocol fields. ListenerStatus gains proxy_protocol.
Generated code regenerated with protoc v29.5.
gRPC server: AddRoute validates mode ("l4"/"l7", defaults to "l4"),
requires tls_cert/tls_key for L7 routes, persists all fields via
write-through. ListRoutes returns full route info. GetStatus
includes proxy_protocol on listener status.
Client package: Route struct expanded with Mode, TLSCert, TLSKey,
BackendTLS, SendProxyProtocol. AddRoute signature changed to accept
a Route struct instead of individual hostname/backend strings.
ListenerStatus gains ProxyProtocol. ListRoutes maps all proto fields.
mcproxyctl: routes add gains --mode, --tls-cert, --tls-key,
--backend-tls, --send-proxy-protocol flags. routes list displays
mode and option tags for each route.
New tests: add L7 route via gRPC with field round-trip verification,
L7 route missing cert/key (InvalidArgument), invalid mode rejection,
default-to-L4 backward compatibility, proxy_protocol in status.
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -90,8 +90,13 @@ func (a *AdminServer) ListRoutes(_ context.Context, req *pb.ListRoutesRequest) (
|
||||
}
|
||||
for hostname, route := range routes {
|
||||
resp.Routes = append(resp.Routes, &pb.Route{
|
||||
Hostname: hostname,
|
||||
Backend: route.Backend,
|
||||
Hostname: hostname,
|
||||
Backend: route.Backend,
|
||||
Mode: route.Mode,
|
||||
TlsCert: route.TLSCert,
|
||||
TlsKey: route.TLSKey,
|
||||
BackendTls: route.BackendTLS,
|
||||
SendProxyProtocol: route.SendProxyProtocol,
|
||||
})
|
||||
}
|
||||
return resp, nil
|
||||
@@ -118,17 +123,42 @@ func (a *AdminServer) AddRoute(_ context.Context, req *pb.AddRouteRequest) (*pb.
|
||||
|
||||
hostname := strings.ToLower(req.Route.Hostname)
|
||||
|
||||
// Normalize mode.
|
||||
mode := req.Route.Mode
|
||||
if mode == "" {
|
||||
mode = "l4"
|
||||
}
|
||||
if mode != "l4" && mode != "l7" {
|
||||
return nil, status.Errorf(codes.InvalidArgument, "mode must be \"l4\" or \"l7\", got %q", mode)
|
||||
}
|
||||
|
||||
// L7 routes require cert/key paths.
|
||||
if mode == "l7" {
|
||||
if req.Route.TlsCert == "" || req.Route.TlsKey == "" {
|
||||
return nil, status.Error(codes.InvalidArgument, "L7 routes require tls_cert and tls_key")
|
||||
}
|
||||
}
|
||||
|
||||
// Write-through: DB first, then memory.
|
||||
if _, err := a.store.CreateRoute(ls.ID, hostname, req.Route.Backend, "l4", "", "", false, false); err != nil {
|
||||
if _, err := a.store.CreateRoute(ls.ID, hostname, req.Route.Backend, mode,
|
||||
req.Route.TlsCert, req.Route.TlsKey, req.Route.BackendTls, req.Route.SendProxyProtocol); err != nil {
|
||||
return nil, status.Errorf(codes.AlreadyExists, "%v", err)
|
||||
}
|
||||
|
||||
if err := ls.AddRoute(hostname, server.RouteInfo{Backend: req.Route.Backend, Mode: "l4"}); err != nil {
|
||||
info := server.RouteInfo{
|
||||
Backend: req.Route.Backend,
|
||||
Mode: mode,
|
||||
TLSCert: req.Route.TlsCert,
|
||||
TLSKey: req.Route.TlsKey,
|
||||
BackendTLS: req.Route.BackendTls,
|
||||
SendProxyProtocol: req.Route.SendProxyProtocol,
|
||||
}
|
||||
if err := ls.AddRoute(hostname, info); err != nil {
|
||||
// DB succeeded but memory failed (should not happen since DB enforces uniqueness).
|
||||
a.logger.Error("inconsistency: DB write succeeded but memory update failed", "error", err)
|
||||
}
|
||||
|
||||
a.logger.Info("route added", "listener", ls.Addr, "hostname", hostname, "backend", req.Route.Backend)
|
||||
a.logger.Info("route added", "listener", ls.Addr, "hostname", hostname, "backend", req.Route.Backend, "mode", mode)
|
||||
return &pb.AddRouteResponse{}, nil
|
||||
}
|
||||
|
||||
@@ -287,6 +317,7 @@ func (a *AdminServer) GetStatus(_ context.Context, _ *pb.GetStatusRequest) (*pb.
|
||||
Addr: ls.Addr,
|
||||
RouteCount: int32(len(routes)),
|
||||
ActiveConnections: ls.ActiveConnections.Load(),
|
||||
ProxyProtocol: ls.ProxyProtocol,
|
||||
})
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user