-
Notifications
You must be signed in to change notification settings - Fork 480
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding GEP 724: Refresh Route-Gateway Binding #725
Adding GEP 724: Refresh Route-Gateway Binding #725
Conversation
/hold for discussion. |
@robscott: GitHub didn't allow me to request PR reviews from the following users: howardjohn. Note that only kubernetes-sigs members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this: Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
8b30c0e
to
06aa81c
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I really like this. Istio has a pretty similar model (but this is much clearer, IMO) that hasn't shown any obvious issues
site-src/geps/gep-724.md
Outdated
|
||
// SectionName is the name of a section within the target resource. When | ||
// unspecified, this targets the entire resource. In the following | ||
// resources, SectionName is interpreted as the following: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: I assume for custom attachment points they can choose to make this something else? If so it may be best to clarify that in the comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah good point, will clarify that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If custom attachment points are supported, maybe SectionName
is too specific? Maybe Anchor
, TargetName
, Fragment
, ID
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I personally think SectionName
is sufficiently generic. It's meant to refer to a single section within a resource. I can see an extension that just took a jsonpath or something, but I think that may be too complicated for >99% of use cases. Were there any specific use cases/extensions you had in mind?
* May be more difficult to understand which Routes are attached to a Gateway. | ||
* Adding/replacing a Gateway requires changes to Routes. | ||
|
||
### Potential Expansion |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How does this impact possible route -> route
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we'd end up with 3 options here, I'm not sure which is best:
- 1:many Route->Routes: Nearly identical to Route->Gateway pattern described here, parent Route describes trusted namespaces per rule, child Routes use attachTo mechanism to attach to a parent.
- 1:1 Route->Route: Require direct reference in both directions (include + attachTo would both be direct refs).
- 1:1 Route->Route: Direct reference from parent to child, ReferencePolicy to denote trust from child ns.
I think 1 and 3 make the most sense, it really just depends on how we want the feature to be used. If we want Routes to be able to somewhat blindly delegate a path to a namespace, 1 makes more sense. If we want Routes to include a very specific Route in another namespace, 3 probably makes more sense.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(3) seems to make most sense to me.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We designed Contour's HTTPProxy to be more like (3), but we've definitely had requests for not requiring a specific Route name, which I think is more like (1).
I think that (3) requires more out-of-band coordination between parties than (1) does, which could be good or bad. I'm still inclined to err on the side of more coordination and explicit config, because blanked includes scare me a bit. But it's not a strong preference.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah the more I've thought about this, the more I think 3 is the best approach. That means Route->Route would work nearly identically to Route->Service, which seems reasonable to me.
LGTM -- we've had some feedback from users that indirection of which GW a Route was attached to was not very useful: app owners desire to be in the loop when such Route => GW bindings change. |
43e0354
to
91be407
Compare
Thanks to everyone for the great feedback on this in the community meeting yesterday! As suggested, I've added a rationale section and made the conceptual scope of the change I'm proposing more clear. PTAL |
91be407
to
2de5839
Compare
/retest |
site-src/geps/gep-724.md
Outdated
|
||
// SectionName is the name of a section within the target resource. When | ||
// unspecified, this targets the entire resource. In the following | ||
// resources, SectionName is interpreted as the following: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If custom attachment points are supported, maybe SectionName
is too specific? Maybe Anchor
, TargetName
, Fragment
, ID
?
|
||
#### Disadvantages | ||
|
||
* Even the simplest cross-namespace reference from Gateway -> Route would |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A cross-namespace reference from Route -> Gateway would equally require the Gateway to have a reference policy, right?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This relies on the existing namespace selector in Gateway listeners to denote where Routes are trusted to bind from. Although it would be nice to reuse ReferencePolicy here, the nested list of listeners makes it significantly more complex + verbose as shown in the alternatives.
|
||
The other way we could use ReferencePolicy would be with Routes referencing | ||
Gateways. Unfortunately the nested structure of Gateways makes this nearly | ||
impossible to do effectively. A core concept for Gateways is that each listener |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
My main objection to this approach is that ReferencePolicy
is a access control object, not a binding object. Best to not mix those concerns.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agree that we have to be careful here, but in this case ReferencePolicy would effectively been allowing access/references from Routes to Gateway listeners. To clarify I'm not saying this is a great alternative, just that I think it's still somewhat unique from binding.
@howardjohn could you post a link to the istio mechanism? |
https://istio.io/latest/docs/reference/config/networking/gateway/, grep for "some-config-namespace/my-gateway". Basically VirtualService points to a specific Gateway, and the two way handshake is based on hostname alignment |
404e956
to
4693e5e
Compare
site-src/geps/gep-724.md
Outdated
#### Added | ||
To Route Specs: | ||
```go | ||
// ParentRefs references the parent resources this Route should be attached |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
should is lenient and doesn't get the point across.
We want to communicate "anyone can attach to this route ONLY IF they are in this list".
Something along the lines:
// ParentRefs references the parent resources this Route should be attached | |
// ParentRefs references the resources that can process/attach/use this Route. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah, agreed, although I would nit that it should be attach to
. :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we think "can attach to" is sufficient here? Not exactly sure how to phrase this, but I think the behavior we want is for these referenced resources to be attached as long as they allow it. Exceptions to that would include conflicts or being referenced from a namespace or kind that isn't allowed. I think we need to be clear that this expresses a desire to attach to the given resource, not just permission for a resource to be attached.
site-src/geps/gep-724.md
Outdated
* Provide a clear path to enable Route inclusion (Routes including Routes). | ||
* Simplify user experience based on initial feedback. | ||
* Enable other kinds of Route parents in addition to Gateway, this could include: | ||
* Routes (as part of Route inclusion) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is the contention here that this proposal makes the route→route use-case more cumbersome? If so, I share that concern. Seems like that should be called out in the list of disadvantages.
site-src/geps/gep-724.md
Outdated
// | ||
// +kubebuilder:validation:MinLength=1 | ||
// +kubebuilder:validation:MaxLength=253 | ||
Kind string `json:"kind"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
When route-to-route is an option, that may become the majority. That said, using gateway as the default does make sense.
// resource more than once. | ||
// | ||
// +optional | ||
// +kubebuilder:validation:MaxItems=16 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there some rationale for limiting this to 16 parents?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just trying to avoid unbounded lists. Hard to think of any use case where this value would be more than 3 or 4. I guess it's possible that a single Route could be used to redirect to HTTPS, and that could get reused frequently. Did you have a use case for >16?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm thinking of route-to-route. Maybe I want to add the same microservice to many different applications. I don't have a concrete use-case though, so I don't feel too strongly about this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah I think it's unlikely that we'll use this mechanism for attaching to a Route, but since we don't have a GEP for that yet, we can't know for sure. At least with values like this, we can always increase the number of items allowed, nearly impossible to decrease in the future.
site-src/geps/gep-724.md
Outdated
// +kubebuilder:validation:MinLength=1 | ||
// +kubebuilder:validation:MaxLength=253 | ||
// +optional | ||
SectionName string `json:"sectionName,omitempty"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
MinLength=0
or pointer type.
I suggested on a call that we could use ObjectFieldSelector
or similar to specify the section, but I neglected to comment on the PR earlier. Would it make sense to use ObjectFieldSelector
so the API is explicit about which section this references?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will update to a pointer, thanks!
As far as ObjectFieldSelector (ref for anyone curious), I'm not sure it's quite what we're looking for here. As I understand it, it allows us to select a single field within a resource. That would allow for the valid spec.listeners[1]
, but lots of invalid values as well (someone may select some other part of a Gateway that may not make any sense).
Even the valid example of spec.listeners[1]
has issues in that it would be tied to an index and not a name. That would require Gateway admins to maintain a very specific ordering of their listeners. If that order ever switched, lots of things could break. A similar argument could be made for changing a listener name, but that seems both more manageable and expected.
If I'm understanding the relevant API conventions correctly, this field should be interpreted with standard JavaScript syntax, so I don't think we'd even get the flexibility of jsonpath here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What I had in mind was that ParentRef
would have a field like SectionFieldRef corev1.ObjectFieldSelector
in addition to the SectionName string
field, and the user would specify sectionFieldRef: spec.listeners
along with sectionName
. The API could require that the field identified by sectionFieldRef
be a +listType=map
, and then sectionName
would specify the value to match against the field identified by +listMapKey
:
type GatewaySpec struct {
// ...
// +listType=map
// +listMapKey=name
Listeners []Listener `json:"listeners"`
// ...
}
type ParentRef struct {
// ...
// SectionFieldRef specifies a field containing sections within the
// referent. The specified field must be listType=map. If
// SectionFieldRef is specified, then SectionName must be specified as
// well, and the value of SectionName will be used to identify the
// specific section by matching it against the field specified by
// listTypeMap.
//
// Support: Core
//
// +kubebuilder:validation:MinLength=1
// +kubebuilder:validation:MaxLength=253
// +optional
SectionFieldRef corev1.ObjectFieldSelector `json:"sectionFieldRef,omitempty"`
// SectionName is ...
SectionName string `json:"sectionName,omitempty"`
// ...
}
Example:
kind: Gateway
metadata:
namespace: infra
name: lb
spec:
listeners:
- name: foo
# ...
---
kind: HTTPRoute
# ...
spec:
attachTo:
- kind: Gateway
namespace: infra
name: lb
sectionFieldRef:
fieldPath: spec.listeners
sectionName: foo
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ObjectFieldSelector
might not be the best type (maybe it would be better to define a new type that includes the field path and the item name), but the idea is to make explicit what SectionName
is identifying.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the explanation @Miciah! That does make a lot more sense. I can see that being a natural extension point if/when we want to support attaching to other arbitrary fields in Gateway or elsewhere. If I'm understanding correctly, it looks like it would be easy to add as a new optional field in the future without any kind of breaking changes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For the direction and overall design, this LGTM, but I think there are few more tidy-up changes needed.
I think we need to ensure that we s/networking.x-k8s.io/gateway.networking.k8s.io
everywhere. :)
// ... | ||
// Kinds specifies the groups and kinds of Routes that are allowed to bind to | ||
// this Gateway listener. When unspecified or empty, the only limitation on | ||
// the kinds of Routes supported is the Listener protocol. Kind MUST |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd completely agree that we should avoid this if we were still using selection, but with this new approach, I think the only thing most Gateway admins should have to worry about is the hostname, port, and protocol of a listener + the namespaces it supports. If you need to further restrict Route kinds, that's possible, but that seems like an advanced and usually unnecessary use case.
I think this is the argument that clinches this for me. As long as we mandate what controllers must do for the status of an object that attempts to attach to a listener that can't support it, I think it's okay.
However, I do think that it's important to have some status information that makes it clear to a Gateway owner that Routes have attempted to attach to a Listener that doesn't support them - we need to ensure there's a trail in both Gateway -> Route and Route -> Gateway directions for people to follow when things go wrong, because the objects have different owners.
In terms of having defaults, I think that it's important for the described behavior that this be defaulted to an empty list, but we can specify defaults in the RouteGroupKind struct. I feel like @hbagdi's concern here is about discoverability and status though?
Kinds []RouteGroupKind `json:"kinds,omitempty"` | ||
} | ||
|
||
type RouteGroupKind struct { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This means that the way these fields are used is that if this stanza is not specified, match anything. If it is, match only this. You must specify at least a Kind, in which case the group defaults to gateway.networking.io
. Otherwise, you may specify any Kind.
I like it.
site-src/geps/gep-724.md
Outdated
#### Added | ||
To Route Specs: | ||
```go | ||
// ParentRefs references the parent resources this Route should be attached |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah, agreed, although I would nit that it should be attach to
. :)
site-src/geps/gep-724.md
Outdated
// | ||
// +kubebuilder:validation:MinLength=1 | ||
// +kubebuilder:validation:MaxLength=253 | ||
Kind string `json:"kind"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I lean towards explicitness on this one as well. +1 to no default.
* May be more difficult to understand which Routes are attached to a Gateway. | ||
* Adding/replacing a Gateway requires changes to Routes. | ||
|
||
### Potential Expansion |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We designed Contour's HTTPProxy to be more like (3), but we've definitely had requests for not requiring a specific Route name, which I think is more like (1).
I think that (3) requires more out-of-band coordination between parties than (1) does, which could be good or bad. I'm still inclined to err on the side of more coordination and explicit config, because blanked includes scare me a bit. But it's not a strong preference.
site-src/geps/gep-724.md
Outdated
* Provide a clear path to enable Route inclusion (Routes including Routes). | ||
* Simplify user experience based on initial feedback. | ||
* Enable other kinds of Route parents in addition to Gateway, this could include: | ||
* Routes (as part of Route inclusion) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The thing that makes Route -> Route inclusion much more complex is the semantics about how you carve up the URL/request metadata space. In HTTPProxy, we explicitly decided that the rules for assigning certain requests to a child HTTPProxy (in the Gateway API, this would be a child HTTPRoute) would become surrounding, uneditable constraints on that child, and that the child did not need to know about those constraints beforehand.
This has tradeoffs, obviously, but the key part here is that you can't design the Route -> Route reference mechanism without also designing how much the included Routes will know about where they are included.
In short, I think that what we have here is broad enough to allow us to experiment in either way, and we shouldn't hold this GEP up on figuring out how Route->Route inclusion works.
Overall, this is in good shape. Fantastic work by @robscott to integrate the deluge of feedback :) /lgtm |
} | ||
``` | ||
|
||
### Gateway Status |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jpeach @youngnick @hbagdi I've added a new status section to describe suggested additions to status. I think this is relevant to different comments from all of you throughout the review of this GEP, so wanted to get your feedback on this addition if you have time.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is great, love it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Status changes are excellent, as are the others.
/lgtm
} | ||
``` | ||
|
||
### Gateway Status |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is great, love it.
Thanks to everyone for the great feedback on this GEP! Now that it's gotten 3 different LGTMs, I'm going to remove the hold and hope for one final LGTM to get it in. My last update clarifies that it is valid to attach a Route to multiple sections/listeners within the same Parent/Gateway. I'm thinking we should be able to cover any additional tweaks to this GEP in the implementation PR if necessary. /hold cancel |
Impressive heavy lifting here. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@robscott what font did you use for this / is there an original? I ask because ReferencePolicy
was renamed but these two pictures weren't updated which left some of the documentation not making much sense.
For this picture, that's:
https://github.com/kubernetes-sigs/gateway-api/blob/9f820af97aaf6e8587712fec7b9266f42da81258/geps/gep-724/index.md#1-referencegrant-with-gateways-selecting-routes
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What type of PR is this?
/kind gep
What this PR does / why we need it:
This PR adds GEP #724 as a follow up to various proposals and docs around how we can improve Route-Gateway binding.
Does this PR introduce a user-facing change?:
Deploy Preview: https://deploy-preview-725--kubernetes-sigs-gateway-api.netlify.app/geps/gep-724/