-
Notifications
You must be signed in to change notification settings - Fork 8.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feature] Implements Envoy WASM extension based on Sentinel Go and proxy-go #2752
Comments
/assign @halfrost |
Regarding my current progress: I am taking the most basic flow.Rule as an example to run through the whole basic wasm extension logic. I initialize an Entry with simply configure WithTrafficType(base.Inbound). I run sentinel locally and read the wiki, and I found that the interception logic is triggered by the runtime. So what I do now is to initialize sentinel when the Envoy begins to load the wasm plugin. After configuration, I start the go coroutine, and sentinel starts to work (this is my expectation). Then call the entry method in wasm's onXXX api to get the SentinelEntry result. The problem currently being resolved:
|
Update current progress, I encountered 2 problems and blocked the progress:
So currently this feature is still in progress. I will focus on solving the above 2 problems. If you have any good ideas, welcome to discuss with me. Let's make sentinel better. 💪🏻 |
More detail about this feature
Implements Envoy WASM extension based on Sentinel Go and proxy-go (github.com/tetratelabs/proxy-wasm-go-sdk), which will support traffic governance for both HTTP traffic and gRPC services, also it will support configuring rules through Sentinel CRD standard methods
I will work on this feature. If you have any questions or something else want to discuss, welcome to discuss in this issue.
Repo: https://github.com/sentinel-group/sentinel-go-proxy-wasm-extension
The text was updated successfully, but these errors were encountered: