@@ -83,11 +83,20 @@ class XdsClusterResource extends XdsResourceType<CdsUpdate> {
8383 "type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.UpstreamTlsContext" ;
8484 private static final String TYPE_URL_UPSTREAM_TLS_CONTEXT_V2 =
8585 "type.googleapis.com/envoy.api.v2.auth.UpstreamTlsContext" ;
86- static final String TRANSPORT_SOCKET_NAME_HTTP11_PROXY =
87- "type.googleapis.com/envoy.extensions.transport_sockets.http_11_proxy.v3"
88- + ".Http11ProxyUpstreamTransport" ;
89- static final String TRANSPORT_SOCKET_NAME_RAW_BUFFER =
90- "type.googleapis.com/envoy.extensions.transport_sockets.raw_buffer.v3.RawBuffer" ;
86+
87+ // TODO(sergiitk): should this be in XdsResourceType next to TRANSPORT_SOCKET_NAME_TLS?
88+ @ VisibleForTesting
89+ static final String TRANSPORT_SOCKET_NAME_HTTP11_PROXY = "envoy.transport_sockets.http_11_proxy" ;
90+ @ VisibleForTesting
91+ static final String TRANSPORT_SOCKET_NAME_RAW_BUFFER = "envoy.transport_sockets.raw_buffer" ;
92+
93+ // TODO(sergiitk): tell Eric about the bug.
94+ // static final String TRANSPORT_SOCKET_NAME_HTTP11_PROXY =
95+ // "type.googleapis.com/envoy.extensions.transport_sockets.http_11_proxy.v3"
96+ // + ".Http11ProxyUpstreamTransport";
97+ // static final String TRANSPORT_SOCKET_NAME_RAW_BUFFER =
98+ // "type.googleapis.com/envoy.extensions.transport_sockets.raw_buffer.v3.RawBuffer";
99+
91100 private final LoadBalancerRegistry loadBalancerRegistry
92101 = LoadBalancerRegistry .getDefaultRegistry ();
93102 private static final XdsLogger logger = XdsLogger .withLogId (
@@ -282,19 +291,29 @@ private static StructOrError<CdsUpdate.Builder> parseNonAggregateCluster(
282291 + ", socketIsH1Proxy=" + socketIsH1Proxy
283292 + ", isEnabledXdsHttpConnect=" + isEnabledXdsHttpConnect
284293 + ", socketIsH1ProxyAndSupported=" + socketIsH1ProxyAndSupported + "." ;
285- logger .log (XdsLogLevel .ERROR , extraErrorMsg );
294+ logger .log (XdsLogLevel .FORCE_WARNING , extraErrorMsg );
286295
287296 return StructOrError .fromError (errMsg + "." );
288297 }
289298
290299 if (hasTransportSocket && socketIsH1ProxyAndSupported ) {
300+ logger .log (XdsLogLevel .FORCE_INFO , "Enabling HTTP11 Proxy, trying to parse" );
291301 isHttp11ProxyAvailable = true ;
302+
292303 try {
293304 Http11ProxyUpstreamTransport wrappedTransportSocket = transportSocket
294- .getTypedConfig ().unpack (io . envoyproxy . envoy . extensions . transport_sockets
295- . http_11_proxy . v3 . Http11ProxyUpstreamTransport . class );
305+ .getTypedConfig ().unpack (Http11ProxyUpstreamTransport . class );
306+
296307 hasTransportSocket = wrappedTransportSocket .hasTransportSocket ();
297308 transportSocket = wrappedTransportSocket .getTransportSocket ();
309+ transportSocketName = hasTransportSocket ? transportSocket .getName () : "<wrapped-invalid>" ;
310+
311+ logger .log (XdsLogLevel .FORCE_INFO ,
312+ "Enabled HTTP11 Proxy, wrapped socket: " + transportSocketName
313+ );
314+
315+ // TODO(sergiitk): tell Eric this is missing the wrapped socket check.
316+
298317 } catch (InvalidProtocolBufferException e ) {
299318 return StructOrError .fromError (
300319 "Cluster " + clusterName + ": malformed Http11ProxyUpstreamTransport: " + e );
0 commit comments