// Copyright (c) HashiCorp, Inc. // SPDX-License-Identifier: BUSL-1.1 package proxystateconverter import ( "errors" "fmt" "sort" "strings" "time" "github.com/hashicorp/consul/proto-public/pbmesh/v2beta1/pbproxystate" "github.com/hashicorp/consul/agent/xds/response" "google.golang.org/protobuf/types/known/durationpb" "github.com/hashicorp/consul/agent/proxycfg" "github.com/hashicorp/consul/agent/structs" ) // routesFromSnapshot returns the xDS API representation of the "routes" in the // snapshot. func (s *Converter) routesFromSnapshot(cfgSnap *proxycfg.ConfigSnapshot) error { if cfgSnap == nil { return errors.New("nil config given") } switch cfgSnap.Kind { case structs.ServiceKindConnectProxy: return s.routesForConnectProxy(cfgSnap) // TODO(proxystate): Ingress Gateways will be added in the future. //case structs.ServiceKindIngressGateway: // return s.routesForIngressGateway(cfgSnap) // TODO(proxystate): API Gateways will be added in the future. //case structs.ServiceKindAPIGateway: // return s.routesForAPIGateway(cfgSnap) // TODO(proxystate): Terminating Gateways will be added in the future. //case structs.ServiceKindTerminatingGateway: // return s.routesForTerminatingGateway(cfgSnap) // TODO(proxystate): Mesh Gateways will be added in the future. //case structs.ServiceKindMeshGateway: // return s.routesForMeshGateway(cfgSnap) default: return fmt.Errorf("Invalid service kind: %v", cfgSnap.Kind) } } // routesFromSnapshotConnectProxy returns the xDS API representation of the // "routes" in the snapshot. func (s *Converter) routesForConnectProxy(cfgSnap *proxycfg.ConfigSnapshot) error { for uid, chain := range cfgSnap.ConnectProxy.DiscoveryChain { if chain.Default { continue } // route already exists, don't clobber it. if _, ok := s.proxyState.Routes[uid.EnvoyID()]; ok { continue } virtualHost, err := s.makeUpstreamHostForDiscoveryChain(cfgSnap, uid, chain, []string{"*"}, false) if err != nil { return err } if virtualHost == nil { continue } route := &pbproxystate.Route{ VirtualHosts: []*pbproxystate.VirtualHost{virtualHost}, } s.proxyState.Routes[uid.EnvoyID()] = route } addressesMap := make(map[string]map[string]string) err := cfgSnap.ConnectProxy.DestinationsUpstream.ForEachKeyE(func(uid proxycfg.UpstreamID) error { svcConfig, ok := cfgSnap.ConnectProxy.DestinationsUpstream.Get(uid) if !ok || svcConfig == nil { return nil } if !structs.IsProtocolHTTPLike(svcConfig.Protocol) { // Routes can only be defined for HTTP services return nil } for _, address := range svcConfig.Destination.Addresses { routeName := clusterNameForDestination(cfgSnap, "~http", fmt.Sprintf("%d", svcConfig.Destination.Port), svcConfig.NamespaceOrDefault(), svcConfig.PartitionOrDefault()) if _, ok := addressesMap[routeName]; !ok { addressesMap[routeName] = make(map[string]string) } // cluster name is unique per address/port so we should not be doing any override here clusterName := clusterNameForDestination(cfgSnap, svcConfig.Name, address, svcConfig.NamespaceOrDefault(), svcConfig.PartitionOrDefault()) addressesMap[routeName][clusterName] = address } return nil }) if err != nil { return err } for routeName, clusters := range addressesMap { route, err := s.makeRouteForAddresses(clusters) if err != nil { return err } if route != nil { s.proxyState.Routes[routeName] = route } } // TODO(rb): make sure we don't generate an empty result return nil } func (s *Converter) makeRouteForAddresses(addresses map[string]string) (*pbproxystate.Route, error) { route, err := makeAddressesRoute(addresses) if err != nil { s.Logger.Error("failed to make route", "cluster", "error", err) return nil, err } return route, nil } // TODO(proxystate): Terminating Gateways will be added in the future. // Functions to add from agent/xds/clusters.go: // func routesForTerminatingGateway // TODO(proxystate): Mesh Gateways will be added in the future. // Functions to add from agent/xds/clusters.go: // func routesForMeshGateway func makeAddressesRoute(addresses map[string]string) (*pbproxystate.Route, error) { route := &pbproxystate.Route{} for clusterName, address := range addresses { destination := makeRouteDestinationFromName(clusterName) virtualHost := &pbproxystate.VirtualHost{ Name: clusterName, Domains: []string{address}, RouteRules: []*pbproxystate.RouteRule{ { Match: makeDefaultRouteMatch(), Destination: destination, }, }, } route.VirtualHosts = append(route.VirtualHosts, virtualHost) } // sort virtual hosts to have a stable order sort.SliceStable(route.VirtualHosts, func(i, j int) bool { return route.VirtualHosts[i].Name > route.VirtualHosts[j].Name }) return route, nil } // makeRouteDestinationFromName (fka makeRouteActionFromName) func makeRouteDestinationFromName(clusterName string) *pbproxystate.RouteDestination { return &pbproxystate.RouteDestination{ Destination: &pbproxystate.RouteDestination_Cluster{ Cluster: &pbproxystate.DestinationCluster{ Name: clusterName, }, }, } } // TODO(proxystate): Ingress Gateways will be added in the future. // Functions to add from agent/xds/clusters.go: // func routesForIngressGateway // TODO(proxystate): API Gateways will be added in the future. // Functions to add from agent/xds/clusters.go: // func routesForAPIGateway // func buildHTTPRouteUpstream // TODO(proxystate): Ingress Gateways will be added in the future. // Functions to add from agent/xds/clusters.go: // func findIngressServiceMatchingUpstream // TODO(proxystate): Ingress Gateways will be added in the future. // Functions to add from agent/xds/clusters.go: // func generateUpstreamIngressDomains // TODO(proxystate): Ingress Gateways will be added in the future. // Functions to add from agent/xds/clusters.go: // func generateUpstreamAPIsDomains func (s *Converter) makeUpstreamHostForDiscoveryChain( cfgSnap *proxycfg.ConfigSnapshot, uid proxycfg.UpstreamID, chain *structs.CompiledDiscoveryChain, serviceDomains []string, forMeshGateway bool, ) (*pbproxystate.VirtualHost, error) { var routeRules []*pbproxystate.RouteRule startNode := chain.Nodes[chain.StartNode] if startNode == nil { return nil, fmt.Errorf("missing first node in compiled discovery chain for: %s", chain.ServiceName) } upstreamsSnapshot, err := cfgSnap.ToConfigSnapshotUpstreams() if err != nil && !forMeshGateway { return nil, err } switch startNode.Type { case structs.DiscoveryGraphNodeTypeRouter: routeRules = make([]*pbproxystate.RouteRule, 0, len(startNode.Routes)) for _, discoveryRoute := range startNode.Routes { routeMatch := makeRouteMatchForDiscoveryRoute(discoveryRoute) var ( routeDestination *pbproxystate.RouteDestination err error ) nextNode := chain.Nodes[discoveryRoute.NextNode] var lb *structs.LoadBalancer if nextNode.LoadBalancer != nil { lb = nextNode.LoadBalancer } switch nextNode.Type { case structs.DiscoveryGraphNodeTypeSplitter: routeDestination, err = s.makeRouteDestinationForSplitter(upstreamsSnapshot, nextNode.Splits, chain, forMeshGateway) if err != nil { return nil, err } case structs.DiscoveryGraphNodeTypeResolver: rd, ok := s.makeRouteDestinationForChainCluster(upstreamsSnapshot, nextNode.Resolver.Target, chain, forMeshGateway) if !ok { continue } routeDestination = rd default: return nil, fmt.Errorf("unexpected graph node after route %q", nextNode.Type) } routeDestination.DestinationConfiguration = &pbproxystate.DestinationConfiguration{} if err := injectLBToDestinationConfiguration(lb, routeDestination.DestinationConfiguration); err != nil { return nil, fmt.Errorf("failed to apply load balancer configuration to route action: %v", err) } // TODO(rb): Better help handle the envoy case where you need (prefix=/foo/,rewrite=/) and (exact=/foo,rewrite=/) to do a full rewrite destination := discoveryRoute.Definition.Destination routeRule := &pbproxystate.RouteRule{} if destination != nil { routeDestinationConfiguration := routeDestination.DestinationConfiguration if destination.PrefixRewrite != "" { routeDestinationConfiguration.PrefixRewrite = destination.PrefixRewrite } if destination.RequestTimeout != 0 || destination.IdleTimeout != 0 { routeDestinationConfiguration.TimeoutConfig = &pbproxystate.TimeoutConfig{} } if destination.RequestTimeout > 0 { routeDestinationConfiguration.TimeoutConfig.Timeout = durationpb.New(destination.RequestTimeout) } // Disable the timeout if user specifies negative value. Setting 0 disables the timeout in Envoy. if destination.RequestTimeout < 0 { routeDestinationConfiguration.TimeoutConfig.Timeout = durationpb.New(0 * time.Second) } if destination.IdleTimeout > 0 { routeDestinationConfiguration.TimeoutConfig.IdleTimeout = durationpb.New(destination.IdleTimeout) } // Disable the timeout if user specifies negative value. Setting 0 disables the timeout in Envoy. if destination.IdleTimeout < 0 { routeDestinationConfiguration.TimeoutConfig.IdleTimeout = durationpb.New(0 * time.Second) } if destination.HasRetryFeatures() { routeDestinationConfiguration.RetryPolicy = getRetryPolicyForDestination(destination) } if err := injectHeaderManipToRoute(destination, routeRule); err != nil { return nil, fmt.Errorf("failed to apply header manipulation configuration to route: %v", err) } } routeRule.Match = routeMatch routeRule.Destination = routeDestination routeRules = append(routeRules, routeRule) } case structs.DiscoveryGraphNodeTypeSplitter: routeDestination, err := s.makeRouteDestinationForSplitter(upstreamsSnapshot, startNode.Splits, chain, forMeshGateway) if err != nil { return nil, err } var lb *structs.LoadBalancer if startNode.LoadBalancer != nil { lb = startNode.LoadBalancer } routeDestination.DestinationConfiguration = &pbproxystate.DestinationConfiguration{} if err := injectLBToDestinationConfiguration(lb, routeDestination.DestinationConfiguration); err != nil { return nil, fmt.Errorf("failed to apply load balancer configuration to route action: %v", err) } defaultRoute := &pbproxystate.RouteRule{ Match: makeDefaultRouteMatch(), Destination: routeDestination, } routeRules = []*pbproxystate.RouteRule{defaultRoute} case structs.DiscoveryGraphNodeTypeResolver: routeDestination, ok := s.makeRouteDestinationForChainCluster(upstreamsSnapshot, startNode.Resolver.Target, chain, forMeshGateway) if !ok { break } var lb *structs.LoadBalancer if startNode.LoadBalancer != nil { lb = startNode.LoadBalancer } routeDestination.DestinationConfiguration = &pbproxystate.DestinationConfiguration{} if err := injectLBToDestinationConfiguration(lb, routeDestination.DestinationConfiguration); err != nil { return nil, fmt.Errorf("failed to apply load balancer configuration to route action: %v", err) } // A request timeout can be configured on a resolver or router. If configured on a resolver, the timeout will // only apply if the start node is a resolver. This is because the timeout is attached to an (Envoy // RouteAction)[https://www.envoyproxy.io/docs/envoy/latest/api-v3/config/route/v3/route_components.proto#envoy-v3-api-msg-config-route-v3-routeaction] // If there is a splitter before this resolver, the branches of the split are configured within the same // RouteAction, and the timeout cannot be shared between branches of a split. if startNode.Resolver.RequestTimeout > 0 { to := &pbproxystate.TimeoutConfig{ Timeout: durationpb.New(startNode.Resolver.RequestTimeout), } routeDestination.DestinationConfiguration.TimeoutConfig = to } // Disable the timeout if user specifies negative value. Setting 0 disables the timeout in Envoy. if startNode.Resolver.RequestTimeout < 0 { to := &pbproxystate.TimeoutConfig{ Timeout: durationpb.New(0 * time.Second), } routeDestination.DestinationConfiguration.TimeoutConfig = to } defaultRoute := &pbproxystate.RouteRule{ Match: makeDefaultRouteMatch(), Destination: routeDestination, } routeRules = []*pbproxystate.RouteRule{defaultRoute} default: return nil, fmt.Errorf("unknown first node in discovery chain of type: %s", startNode.Type) } host := &pbproxystate.VirtualHost{ Name: uid.EnvoyID(), Domains: serviceDomains, RouteRules: routeRules, } return host, nil } func getRetryPolicyForDestination(destination *structs.ServiceRouteDestination) *pbproxystate.RetryPolicy { retryPolicy := &pbproxystate.RetryPolicy{} if destination.NumRetries > 0 { retryPolicy.NumRetries = response.MakeUint32Value(int(destination.NumRetries)) } // The RetryOn magic values come from: https://www.envoyproxy.io/docs/envoy/v1.10.0/configuration/http_filters/router_filter#config-http-filters-router-x-envoy-retry-on var retryStrings []string if len(destination.RetryOn) > 0 { retryStrings = append(retryStrings, destination.RetryOn...) } if destination.RetryOnConnectFailure { // connect-failure can be enabled by either adding connect-failure to the RetryOn list or by using the legacy RetryOnConnectFailure option // Check that it's not already in the RetryOn list, so we don't set it twice connectFailureExists := false for _, r := range retryStrings { if r == "connect-failure" { connectFailureExists = true } } if !connectFailureExists { retryStrings = append(retryStrings, "connect-failure") } } if len(destination.RetryOnStatusCodes) > 0 { retryStrings = append(retryStrings, "retriable-status-codes") retryPolicy.RetriableStatusCodes = destination.RetryOnStatusCodes } retryPolicy.RetryOn = strings.Join(retryStrings, ",") return retryPolicy } func makeRouteMatchForDiscoveryRoute(discoveryRoute *structs.DiscoveryRoute) *pbproxystate.RouteMatch { match := discoveryRoute.Definition.Match if match == nil || match.IsEmpty() { return makeDefaultRouteMatch() } routeMatch := &pbproxystate.RouteMatch{} switch { case match.HTTP.PathExact != "": routeMatch.PathMatch = &pbproxystate.PathMatch{ PathMatch: &pbproxystate.PathMatch_Exact{ Exact: match.HTTP.PathExact, }, } case match.HTTP.PathPrefix != "": routeMatch.PathMatch = &pbproxystate.PathMatch{ PathMatch: &pbproxystate.PathMatch_Prefix{ Prefix: match.HTTP.PathPrefix, }, } case match.HTTP.PathRegex != "": routeMatch.PathMatch = &pbproxystate.PathMatch{ PathMatch: &pbproxystate.PathMatch_Regex{ Regex: match.HTTP.PathRegex, }, } default: routeMatch.PathMatch = &pbproxystate.PathMatch{ PathMatch: &pbproxystate.PathMatch_Prefix{ Prefix: "/", }, } } if len(match.HTTP.Header) > 0 { routeMatch.HeaderMatches = make([]*pbproxystate.HeaderMatch, 0, len(match.HTTP.Header)) for _, hdr := range match.HTTP.Header { headerMatch := &pbproxystate.HeaderMatch{ Name: hdr.Name, } switch { case hdr.Exact != "": headerMatch.Match = &pbproxystate.HeaderMatch_Exact{ Exact: hdr.Exact, } case hdr.Regex != "": headerMatch.Match = &pbproxystate.HeaderMatch_Regex{ Regex: hdr.Regex, } case hdr.Prefix != "": headerMatch.Match = &pbproxystate.HeaderMatch_Prefix{ Prefix: hdr.Prefix, } case hdr.Suffix != "": headerMatch.Match = &pbproxystate.HeaderMatch_Suffix{ Suffix: hdr.Suffix, } case hdr.Present: headerMatch.Match = &pbproxystate.HeaderMatch_Present{ Present: true, } default: continue // skip this impossible situation } if hdr.Invert { headerMatch.InvertMatch = true } routeMatch.HeaderMatches = append(routeMatch.HeaderMatches, headerMatch) } } if len(match.HTTP.Methods) > 0 { routeMatch.MethodMatches = append(routeMatch.MethodMatches, match.HTTP.Methods...) } if len(match.HTTP.QueryParam) > 0 { routeMatch.QueryParameterMatches = make([]*pbproxystate.QueryParameterMatch, 0, len(match.HTTP.QueryParam)) for _, qm := range match.HTTP.QueryParam { queryMatcher := &pbproxystate.QueryParameterMatch{ Name: qm.Name, } switch { case qm.Exact != "": queryMatcher.Match = &pbproxystate.QueryParameterMatch_Exact{ Exact: qm.Exact, } case qm.Regex != "": queryMatcher.Match = &pbproxystate.QueryParameterMatch_Regex{ Regex: qm.Regex, } case qm.Present: queryMatcher.Match = &pbproxystate.QueryParameterMatch_Present{ Present: true, } default: continue // skip this impossible situation } routeMatch.QueryParameterMatches = append(routeMatch.QueryParameterMatches, queryMatcher) } } return routeMatch } func makeDefaultRouteMatch() *pbproxystate.RouteMatch { return &pbproxystate.RouteMatch{ PathMatch: &pbproxystate.PathMatch{ PathMatch: &pbproxystate.PathMatch_Prefix{ Prefix: "/", }, }, // TODO(banks) Envoy supports matching only valid GRPC // requests which might be nice to add here for gRPC services // but it's not supported in our current envoy SDK version // although docs say it was supported by 1.8.0. Going to defer // that until we've updated the deps. } } func (s *Converter) makeRouteDestinationForChainCluster( upstreamsSnapshot *proxycfg.ConfigSnapshotUpstreams, targetID string, chain *structs.CompiledDiscoveryChain, forMeshGateway bool, ) (*pbproxystate.RouteDestination, bool) { clusterName := s.getTargetClusterName(upstreamsSnapshot, chain, targetID, forMeshGateway) if clusterName == "" { return nil, false } return makeRouteDestinationFromName(clusterName), true } func (s *Converter) makeRouteDestinationForSplitter( upstreamsSnapshot *proxycfg.ConfigSnapshotUpstreams, splits []*structs.DiscoverySplit, chain *structs.CompiledDiscoveryChain, forMeshGateway bool, ) (*pbproxystate.RouteDestination, error) { clusters := make([]*pbproxystate.L7WeightedDestinationCluster, 0, len(splits)) for _, split := range splits { nextNode := chain.Nodes[split.NextNode] if nextNode.Type != structs.DiscoveryGraphNodeTypeResolver { return nil, fmt.Errorf("unexpected splitter destination node type: %s", nextNode.Type) } targetID := nextNode.Resolver.Target clusterName := s.getTargetClusterName(upstreamsSnapshot, chain, targetID, forMeshGateway) if clusterName == "" { continue } // The smallest representable weight is 1/10000 or .01% but envoy // deals with integers so scale everything up by 100x. weight := int(split.Weight * 100) clusterWeight := &pbproxystate.L7WeightedDestinationCluster{ Name: clusterName, Weight: response.MakeUint32Value(weight), } if err := injectHeaderManipToWeightedCluster(split.Definition, clusterWeight); err != nil { return nil, err } clusters = append(clusters, clusterWeight) } if len(clusters) <= 0 { return nil, fmt.Errorf("number of clusters in splitter must be > 0; got %d", len(clusters)) } return &pbproxystate.RouteDestination{ Destination: &pbproxystate.RouteDestination_WeightedClusters{ WeightedClusters: &pbproxystate.L7WeightedClusterGroup{ Clusters: clusters, }, }, }, nil } func injectLBToDestinationConfiguration(lb *structs.LoadBalancer, destinationConfig *pbproxystate.DestinationConfiguration) error { if lb == nil || !lb.IsHashBased() { return nil } result := make([]*pbproxystate.LoadBalancerHashPolicy, 0, len(lb.HashPolicies)) for _, policy := range lb.HashPolicies { if policy.SourceIP { p := &pbproxystate.LoadBalancerHashPolicy{ Policy: &pbproxystate.LoadBalancerHashPolicy_ConnectionProperties{ ConnectionProperties: &pbproxystate.ConnectionPropertiesPolicy{ SourceIp: true, Terminal: policy.Terminal, }, }, } result = append(result, p) continue } switch policy.Field { case structs.HashPolicyHeader: p := &pbproxystate.LoadBalancerHashPolicy{ Policy: &pbproxystate.LoadBalancerHashPolicy_Header{ Header: &pbproxystate.HeaderPolicy{ Name: policy.FieldValue, Terminal: policy.Terminal, }, }, } result = append(result, p) case structs.HashPolicyCookie: cookie := &pbproxystate.CookiePolicy{ Name: policy.FieldValue, Terminal: policy.Terminal, } if policy.CookieConfig != nil { cookie.Path = policy.CookieConfig.Path if policy.CookieConfig.TTL != 0*time.Second { cookie.Ttl = durationpb.New(policy.CookieConfig.TTL) } // Envoy will generate a session cookie if the ttl is present and zero. if policy.CookieConfig.Session { cookie.Ttl = durationpb.New(0 * time.Second) } } p := &pbproxystate.LoadBalancerHashPolicy{ Policy: &pbproxystate.LoadBalancerHashPolicy_Cookie{ Cookie: cookie, }, } result = append(result, p) case structs.HashPolicyQueryParam: p := &pbproxystate.LoadBalancerHashPolicy{ Policy: &pbproxystate.LoadBalancerHashPolicy_QueryParameter{ QueryParameter: &pbproxystate.QueryParameterPolicy{ Name: policy.FieldValue, Terminal: policy.Terminal, }, }, } result = append(result, p) default: return fmt.Errorf("unsupported load balancer hash policy field: %v", policy.Field) } } destinationConfig.HashPolicies = result return nil } func injectHeaderManipToRoute(dest *structs.ServiceRouteDestination, r *pbproxystate.RouteRule) error { if !dest.RequestHeaders.IsZero() { r.HeaderMutations = append( r.HeaderMutations, makeRequestHeaderAdd(dest.RequestHeaders.Add, true)..., ) r.HeaderMutations = append( r.HeaderMutations, makeRequestHeaderAdd(dest.RequestHeaders.Set, false)..., ) r.HeaderMutations = append( r.HeaderMutations, makeRequestHeaderRemove(dest.RequestHeaders.Remove), ) } if !dest.ResponseHeaders.IsZero() { r.HeaderMutations = append( r.HeaderMutations, makeResponseHeaderAdd(dest.ResponseHeaders.Add, true)..., ) r.HeaderMutations = append( r.HeaderMutations, makeResponseHeaderAdd(dest.ResponseHeaders.Set, false)..., ) r.HeaderMutations = append( r.HeaderMutations, makeResponseHeaderRemove(dest.ResponseHeaders.Remove), ) } return nil } func injectHeaderManipToWeightedCluster(split *structs.ServiceSplit, c *pbproxystate.L7WeightedDestinationCluster) error { if !split.RequestHeaders.IsZero() { c.HeaderMutations = append( c.HeaderMutations, makeRequestHeaderAdd(split.RequestHeaders.Add, true)..., ) c.HeaderMutations = append( c.HeaderMutations, makeRequestHeaderAdd(split.RequestHeaders.Set, false)..., ) c.HeaderMutations = append( c.HeaderMutations, makeRequestHeaderRemove(split.RequestHeaders.Remove), ) } if !split.ResponseHeaders.IsZero() { c.HeaderMutations = append( c.HeaderMutations, makeResponseHeaderAdd(split.ResponseHeaders.Add, true)..., ) c.HeaderMutations = append( c.HeaderMutations, makeResponseHeaderAdd(split.ResponseHeaders.Set, false)..., ) c.HeaderMutations = append( c.HeaderMutations, makeResponseHeaderRemove(split.ResponseHeaders.Remove), ) } return nil } func makeRequestHeaderAdd(vals map[string]string, add bool) []*pbproxystate.HeaderMutation { mutations := make([]*pbproxystate.HeaderMutation, 0, len(vals)) appendAction := pbproxystate.AppendAction_APPEND_ACTION_OVERWRITE_IF_EXISTS_OR_ADD if add { appendAction = pbproxystate.AppendAction_APPEND_ACTION_APPEND_IF_EXISTS_OR_ADD } for k, v := range vals { m := &pbproxystate.HeaderMutation{ Action: &pbproxystate.HeaderMutation_RequestHeaderAdd{ RequestHeaderAdd: &pbproxystate.RequestHeaderAdd{ Header: &pbproxystate.Header{ Key: k, Value: v, }, AppendAction: appendAction, }, }, } mutations = append(mutations, m) } return mutations } func makeRequestHeaderRemove(values []string) *pbproxystate.HeaderMutation { return &pbproxystate.HeaderMutation{ Action: &pbproxystate.HeaderMutation_RequestHeaderRemove{ RequestHeaderRemove: &pbproxystate.RequestHeaderRemove{ HeaderKeys: values, }, }, } } func makeResponseHeaderAdd(vals map[string]string, add bool) []*pbproxystate.HeaderMutation { mutations := make([]*pbproxystate.HeaderMutation, 0, len(vals)) appendAction := pbproxystate.AppendAction_APPEND_ACTION_OVERWRITE_IF_EXISTS_OR_ADD if add { appendAction = pbproxystate.AppendAction_APPEND_ACTION_APPEND_IF_EXISTS_OR_ADD } for k, v := range vals { m := &pbproxystate.HeaderMutation{ Action: &pbproxystate.HeaderMutation_ResponseHeaderAdd{ ResponseHeaderAdd: &pbproxystate.ResponseHeaderAdd{ Header: &pbproxystate.Header{ Key: k, Value: v, }, AppendAction: appendAction, }, }, } mutations = append(mutations, m) } return mutations } func makeResponseHeaderRemove(values []string) *pbproxystate.HeaderMutation { return &pbproxystate.HeaderMutation{ Action: &pbproxystate.HeaderMutation_ResponseHeaderRemove{ ResponseHeaderRemove: &pbproxystate.ResponseHeaderRemove{ HeaderKeys: values, }, }, } }