gRPC HTTP/1.1 reverse bridge

This is a filter that enables converting an incoming gRPC request into a HTTP/1.1 request to allow a server that does not understand HTTP/2 or gRPC semantics to handle the request.

The filter works by:

  • Checking the content type of the incoming request. If it’s a gRPC request, the filter is enabled.

  • The content type is modified to a configurable value. This can be a noop by configuring application/grpc.

  • The gRPC frame header is optionally stripped from the request body. The content length header will be adjusted if so.

  • On receiving a response, the content type of the response is validated and the status code is mapped to a grpc-status which is inserted into the response trailers.

  • The response body is optionally prefixed by the gRPC frame header, again adjusting the content length header if necessary.

Due to being mapped to HTTP/1.1, this filter will only work with unary gRPC calls.

gRPC frame header management

By setting the withhold_grpc_frame option, the filter will assume that the upstream does not understand any gRPC semantics and will convert the request body into a simple binary encoding of the request body and perform the reverse conversion on the response body. This ends up simplifying the server side handling of these requests, as they no longer need to be concerned with parsing and generating gRPC formatted data.

This works by stripping the gRPC frame header from the request body, while injecting a gRPC frame header in the response.

If this feature is not used, the upstream must be ready to receive HTTP/1.1 requests prefixed with the gRPC frame header and respond with gRPC formatted responses.

How to disable HTTP/1.1 reverse bridge filter per route

  1. admin:
  2. access_log_path: /dev/stdout
  3. address:
  4. socket_address:
  5. address: 0.0.0.0
  6. port_value: 9901
  7. static_resources:
  8. listeners:
  9. - name: listener_0
  10. address:
  11. socket_address:
  12. address: 0.0.0.0
  13. port_value: 80
  14. filter_chains:
  15. - filters:
  16. - name: envoy.http_connection_manager
  17. config:
  18. access_log:
  19. - name: envoy.file_access_log
  20. config:
  21. path: /dev/stdout
  22. stat_prefix: ingress_http
  23. route_config:
  24. name: local_route
  25. virtual_hosts:
  26. - name: local_service
  27. domains: ["*"]
  28. routes:
  29. - match:
  30. prefix: "/route-with-filter-disabled"
  31. route:
  32. host_rewrite: localhost
  33. cluster: grpc
  34. timeout: 5.00s
  35. # per_filter_config disables the filter for this route
  36. per_filter_config:
  37. envoy.filters.http.grpc_http1_reverse_bridge:
  38. disabled: true
  39. - match:
  40. prefix: "/route-with-filter-enabled"
  41. route:
  42. host_rewrite: localhost
  43. cluster: other
  44. timeout: 5.00s
  45. http_filters:
  46. - name: envoy.filters.http.grpc_http1_reverse_bridge
  47. config:
  48. content_type: application/grpc+proto
  49. withhold_grpc_frames: true
  50. - name: envoy.router
  51. config: {}
  52. clusters:
  53. - name: other
  54. connect_timeout: 5.00s
  55. type: LOGICAL_DNS
  56. dns_lookup_family: V4_ONLY
  57. lb_policy: ROUND_ROBIN
  58. hosts:
  59. - socket_address:
  60. address: localhost
  61. port_value: 4630
  62. - name: grpc
  63. connect_timeout: 5.00s
  64. type: strict_dns
  65. lb_policy: round_robin
  66. http2_protocol_options: {}
  67. load_assignment:
  68. cluster_name: grpc
  69. endpoints:
  70. - lb_endpoints:
  71. - endpoint:
  72. address:
  73. socket_address:
  74. address: localhost
  75. port_value: 10005