-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fingerprint: add DNS address and port to Consul fingerprint #19969
Conversation
37c669d
to
8f20afc
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm mainly looking for clarification around what exactly the bool
return represents on a consulExtractor
func, and whether we want to return early on any parse errors encountered along the way as happens here currently, or if we instead want to continue along down the line trying the other options.
other than that, lgtm!
In order to provide a DNS address and port to Connect tasks configured for transparent proxy, we need to fingerprint the Consul DNS address and port. The client will pass this address/port to the iptables configuration provided to the `consul-cni` plugin. Ref: #10628
8f20afc
to
17688c5
Compare
@gulducat I've reworked the logic here a good bit, so that we're not using the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The intent is way clearer now, nice work!
just a couple comments about test coverage which you can button up or not at your discretion.
In order to provide a DNS address and port to Connect tasks configured for transparent proxy, we need to fingerprint the Consul DNS address and port. The client will pass this address/port to the iptables configuration provided to the
consul-cni
plugin.Ref: #10628