Skip to content

Commit 4ebb517

Browse files
committed
Regenerate manifests and CRDs after adding max-connections-to-accept param
1 parent dc20744 commit 4ebb517

File tree

14 files changed

+149
-60
lines changed

14 files changed

+149
-60
lines changed

apis/projectcontour/v1alpha1/contourconfig.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -445,13 +445,13 @@ type EnvoyListenerConfig struct {
445445
// +kubebuilder:validation:Minimum=1
446446
// +optional
447447
MaxConnectionsPerListener *uint32 `json:"maxConnectionsPerListener,omitempty"`
448-
449-
// MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
448+
449+
// MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
450450
// connections Envoy will accept per socket event.
451451
//
452452
// +kubebuilder:validation:Minimum=1
453453
// +optional
454-
MaxConnectionsToAcceptPerSocketEvent *uint32 `json:"maxConnectionsToAcceptPerSocketEvent,omitempty"`
454+
MaxConnectionsToAcceptPerSocketEvent *uint32 `json:"maxConnectionsToAcceptPerSocketEvent,omitempty"`
455455
}
456456

457457
// SocketOptions defines configurable socket options for Envoy listeners.

apis/projectcontour/v1alpha1/zz_generated.deepcopy.go

Lines changed: 5 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

cmd/contour/serve.go

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -447,29 +447,29 @@ func (s *Server) doServe() error {
447447
}
448448

449449
listenerConfig := xdscache_v3.ListenerConfig{
450-
UseProxyProto: *contourConfiguration.Envoy.Listener.UseProxyProto,
451-
HTTPAccessLog: contourConfiguration.Envoy.HTTPListener.AccessLog,
452-
HTTPSAccessLog: contourConfiguration.Envoy.HTTPSListener.AccessLog,
453-
AccessLogType: contourConfiguration.Envoy.Logging.AccessLogFormat,
454-
AccessLogJSONFields: contourConfiguration.Envoy.Logging.AccessLogJSONFields,
455-
AccessLogLevel: contourConfiguration.Envoy.Logging.AccessLogLevel,
456-
AccessLogFormatString: contourConfiguration.Envoy.Logging.AccessLogFormatString,
457-
AccessLogFormatterExtensions: contourConfiguration.Envoy.Logging.AccessLogFormatterExtensions(),
458-
MinimumTLSVersion: annotation.TLSVersion(contourConfiguration.Envoy.Listener.TLS.MinimumProtocolVersion, "1.2"),
459-
MaximumTLSVersion: annotation.TLSVersion(contourConfiguration.Envoy.Listener.TLS.MaximumProtocolVersion, "1.3"),
460-
CipherSuites: contourConfiguration.Envoy.Listener.TLS.SanitizedCipherSuites(),
461-
Timeouts: timeouts,
462-
DefaultHTTPVersions: parseDefaultHTTPVersions(contourConfiguration.Envoy.DefaultHTTPVersions),
463-
AllowChunkedLength: !*contourConfiguration.Envoy.Listener.DisableAllowChunkedLength,
464-
MergeSlashes: !*contourConfiguration.Envoy.Listener.DisableMergeSlashes,
465-
ServerHeaderTransformation: contourConfiguration.Envoy.Listener.ServerHeaderTransformation,
466-
XffNumTrustedHops: *contourConfiguration.Envoy.Network.XffNumTrustedHops,
467-
ConnectionBalancer: contourConfiguration.Envoy.Listener.ConnectionBalancer,
468-
MaxRequestsPerConnection: contourConfiguration.Envoy.Listener.MaxRequestsPerConnection,
469-
HTTP2MaxConcurrentStreams: contourConfiguration.Envoy.Listener.HTTP2MaxConcurrentStreams,
470-
PerConnectionBufferLimitBytes: contourConfiguration.Envoy.Listener.PerConnectionBufferLimitBytes,
471-
SocketOptions: contourConfiguration.Envoy.Listener.SocketOptions,
472-
MaxConnectionsToAcceptPerSocketEvent: contourConfiguration.Envoy.Listener.MaxConnectionsToAcceptPerSocketEvent,
450+
UseProxyProto: *contourConfiguration.Envoy.Listener.UseProxyProto,
451+
HTTPAccessLog: contourConfiguration.Envoy.HTTPListener.AccessLog,
452+
HTTPSAccessLog: contourConfiguration.Envoy.HTTPSListener.AccessLog,
453+
AccessLogType: contourConfiguration.Envoy.Logging.AccessLogFormat,
454+
AccessLogJSONFields: contourConfiguration.Envoy.Logging.AccessLogJSONFields,
455+
AccessLogLevel: contourConfiguration.Envoy.Logging.AccessLogLevel,
456+
AccessLogFormatString: contourConfiguration.Envoy.Logging.AccessLogFormatString,
457+
AccessLogFormatterExtensions: contourConfiguration.Envoy.Logging.AccessLogFormatterExtensions(),
458+
MinimumTLSVersion: annotation.TLSVersion(contourConfiguration.Envoy.Listener.TLS.MinimumProtocolVersion, "1.2"),
459+
MaximumTLSVersion: annotation.TLSVersion(contourConfiguration.Envoy.Listener.TLS.MaximumProtocolVersion, "1.3"),
460+
CipherSuites: contourConfiguration.Envoy.Listener.TLS.SanitizedCipherSuites(),
461+
Timeouts: timeouts,
462+
DefaultHTTPVersions: parseDefaultHTTPVersions(contourConfiguration.Envoy.DefaultHTTPVersions),
463+
AllowChunkedLength: !*contourConfiguration.Envoy.Listener.DisableAllowChunkedLength,
464+
MergeSlashes: !*contourConfiguration.Envoy.Listener.DisableMergeSlashes,
465+
ServerHeaderTransformation: contourConfiguration.Envoy.Listener.ServerHeaderTransformation,
466+
XffNumTrustedHops: *contourConfiguration.Envoy.Network.XffNumTrustedHops,
467+
ConnectionBalancer: contourConfiguration.Envoy.Listener.ConnectionBalancer,
468+
MaxRequestsPerConnection: contourConfiguration.Envoy.Listener.MaxRequestsPerConnection,
469+
HTTP2MaxConcurrentStreams: contourConfiguration.Envoy.Listener.HTTP2MaxConcurrentStreams,
470+
PerConnectionBufferLimitBytes: contourConfiguration.Envoy.Listener.PerConnectionBufferLimitBytes,
471+
SocketOptions: contourConfiguration.Envoy.Listener.SocketOptions,
472+
MaxConnectionsToAcceptPerSocketEvent: contourConfiguration.Envoy.Listener.MaxConnectionsToAcceptPerSocketEvent,
473473
}
474474

475475
if listenerConfig.TracingConfig, err = s.setupTracingService(contourConfiguration.Tracing); err != nil {

cmd/contour/servecontext.go

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -526,17 +526,17 @@ func (ctx *serveContext) convertToContourConfigurationSpec() contour_v1alpha1.Co
526526
},
527527
Envoy: &contour_v1alpha1.EnvoyConfig{
528528
Listener: &contour_v1alpha1.EnvoyListenerConfig{
529-
UseProxyProto: &ctx.useProxyProto,
530-
DisableAllowChunkedLength: &ctx.Config.DisableAllowChunkedLength,
531-
DisableMergeSlashes: &ctx.Config.DisableMergeSlashes,
532-
ServerHeaderTransformation: serverHeaderTransformation,
533-
ConnectionBalancer: ctx.Config.Listener.ConnectionBalancer,
534-
PerConnectionBufferLimitBytes: ctx.Config.Listener.PerConnectionBufferLimitBytes,
535-
MaxRequestsPerConnection: ctx.Config.Listener.MaxRequestsPerConnection,
536-
MaxRequestsPerIOCycle: ctx.Config.Listener.MaxRequestsPerIOCycle,
537-
HTTP2MaxConcurrentStreams: ctx.Config.Listener.HTTP2MaxConcurrentStreams,
538-
MaxConnectionsPerListener: ctx.Config.Listener.MaxConnectionsPerListener,
539-
MaxConnectionsToAcceptPerSocketEvent: ctx.Config.Listener.MaxConnectionsToAcceptPerSocketEvent,
529+
UseProxyProto: &ctx.useProxyProto,
530+
DisableAllowChunkedLength: &ctx.Config.DisableAllowChunkedLength,
531+
DisableMergeSlashes: &ctx.Config.DisableMergeSlashes,
532+
ServerHeaderTransformation: serverHeaderTransformation,
533+
ConnectionBalancer: ctx.Config.Listener.ConnectionBalancer,
534+
PerConnectionBufferLimitBytes: ctx.Config.Listener.PerConnectionBufferLimitBytes,
535+
MaxRequestsPerConnection: ctx.Config.Listener.MaxRequestsPerConnection,
536+
MaxRequestsPerIOCycle: ctx.Config.Listener.MaxRequestsPerIOCycle,
537+
HTTP2MaxConcurrentStreams: ctx.Config.Listener.HTTP2MaxConcurrentStreams,
538+
MaxConnectionsPerListener: ctx.Config.Listener.MaxConnectionsPerListener,
539+
MaxConnectionsToAcceptPerSocketEvent: ctx.Config.Listener.MaxConnectionsToAcceptPerSocketEvent,
540540
TLS: &contour_v1alpha1.EnvoyTLS{
541541
MinimumProtocolVersion: ctx.Config.TLS.MinimumProtocolVersion,
542542
MaximumProtocolVersion: ctx.Config.TLS.MaximumProtocolVersion,

design/external-authorization-design.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ This document describes a design for performing request authorization for virtua
3434
A new `ExtensionService` CRD adds a way to represent and track an authorization service.
3535
This CRD is relatively generic, so that it can be reused for Envoy rate limiting and logging services.
3636
The core of the `ExtensionService` CRD is subset of the `projectcontour.v1.HTTPProxy` `Service` specification.
37-
Re-using the `Service` type allows the operator to specify configuration in familiar and consistent terms, especially TLS configuration.
37+
Reusing the `Service` type allows the operator to specify configuration in familiar and consistent terms, especially TLS configuration.
3838

3939
Note that only the Envoy [GRPC authorization protocol][2] will be supported.
4040
The GRPC protocol is a superset of the HTTP protocol and requires less configuration.

examples/contour/01-crds.yaml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -326,6 +326,13 @@ spec:
326326
format: int32
327327
minimum: 1
328328
type: integer
329+
maxConnectionsToAcceptPerSocketEvent:
330+
description: |-
331+
MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
332+
connections Envoy will accept per socket event.
333+
format: int32
334+
minimum: 1
335+
type: integer
329336
maxRequestsPerConnection:
330337
description: |-
331338
Defines the maximum requests for downstream connections. If not specified, there is no limit.
@@ -4220,6 +4227,13 @@ spec:
42204227
format: int32
42214228
minimum: 1
42224229
type: integer
4230+
maxConnectionsToAcceptPerSocketEvent:
4231+
description: |-
4232+
MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
4233+
connections Envoy will accept per socket event.
4234+
format: int32
4235+
minimum: 1
4236+
type: integer
42234237
maxRequestsPerConnection:
42244238
description: |-
42254239
Defines the maximum requests for downstream connections. If not specified, there is no limit.

examples/render/contour-deployment.yaml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -546,6 +546,13 @@ spec:
546546
format: int32
547547
minimum: 1
548548
type: integer
549+
maxConnectionsToAcceptPerSocketEvent:
550+
description: |-
551+
MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
552+
connections Envoy will accept per socket event.
553+
format: int32
554+
minimum: 1
555+
type: integer
549556
maxRequestsPerConnection:
550557
description: |-
551558
Defines the maximum requests for downstream connections. If not specified, there is no limit.
@@ -4440,6 +4447,13 @@ spec:
44404447
format: int32
44414448
minimum: 1
44424449
type: integer
4450+
maxConnectionsToAcceptPerSocketEvent:
4451+
description: |-
4452+
MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
4453+
connections Envoy will accept per socket event.
4454+
format: int32
4455+
minimum: 1
4456+
type: integer
44434457
maxRequestsPerConnection:
44444458
description: |-
44454459
Defines the maximum requests for downstream connections. If not specified, there is no limit.

examples/render/contour-gateway-provisioner.yaml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -337,6 +337,13 @@ spec:
337337
format: int32
338338
minimum: 1
339339
type: integer
340+
maxConnectionsToAcceptPerSocketEvent:
341+
description: |-
342+
MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
343+
connections Envoy will accept per socket event.
344+
format: int32
345+
minimum: 1
346+
type: integer
340347
maxRequestsPerConnection:
341348
description: |-
342349
Defines the maximum requests for downstream connections. If not specified, there is no limit.
@@ -4231,6 +4238,13 @@ spec:
42314238
format: int32
42324239
minimum: 1
42334240
type: integer
4241+
maxConnectionsToAcceptPerSocketEvent:
4242+
description: |-
4243+
MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
4244+
connections Envoy will accept per socket event.
4245+
format: int32
4246+
minimum: 1
4247+
type: integer
42344248
maxRequestsPerConnection:
42354249
description: |-
42364250
Defines the maximum requests for downstream connections. If not specified, there is no limit.

examples/render/contour-gateway.yaml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -362,6 +362,13 @@ spec:
362362
format: int32
363363
minimum: 1
364364
type: integer
365+
maxConnectionsToAcceptPerSocketEvent:
366+
description: |-
367+
MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
368+
connections Envoy will accept per socket event.
369+
format: int32
370+
minimum: 1
371+
type: integer
365372
maxRequestsPerConnection:
366373
description: |-
367374
Defines the maximum requests for downstream connections. If not specified, there is no limit.
@@ -4256,6 +4263,13 @@ spec:
42564263
format: int32
42574264
minimum: 1
42584265
type: integer
4266+
maxConnectionsToAcceptPerSocketEvent:
4267+
description: |-
4268+
MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
4269+
connections Envoy will accept per socket event.
4270+
format: int32
4271+
minimum: 1
4272+
type: integer
42594273
maxRequestsPerConnection:
42604274
description: |-
42614275
Defines the maximum requests for downstream connections. If not specified, there is no limit.

examples/render/contour.yaml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -546,6 +546,13 @@ spec:
546546
format: int32
547547
minimum: 1
548548
type: integer
549+
maxConnectionsToAcceptPerSocketEvent:
550+
description: |-
551+
MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
552+
connections Envoy will accept per socket event.
553+
format: int32
554+
minimum: 1
555+
type: integer
549556
maxRequestsPerConnection:
550557
description: |-
551558
Defines the maximum requests for downstream connections. If not specified, there is no limit.
@@ -4440,6 +4447,13 @@ spec:
44404447
format: int32
44414448
minimum: 1
44424449
type: integer
4450+
maxConnectionsToAcceptPerSocketEvent:
4451+
description: |-
4452+
MaxConnectionsToAcceptPerSocketEvent defines the maximum number of
4453+
connections Envoy will accept per socket event.
4454+
format: int32
4455+
minimum: 1
4456+
type: integer
44434457
maxRequestsPerConnection:
44444458
description: |-
44454459
Defines the maximum requests for downstream connections. If not specified, there is no limit.

0 commit comments

Comments
 (0)