Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for TransportSocketMatches (0.42 sec)

  1. pilot/pkg/networking/core/cluster_waypoint.go

    	// Upstream of the "encap" listener.
    	clusters = append(clusters, cb.buildWaypointConnectOriginate(proxy, push))
    
    	for _, c := range clusters {
    		if c.TransportSocket != nil && c.TransportSocketMatches != nil {
    			log.Errorf("invalid cluster, multiple matches: %v", c.Name)
    		}
    	}
    	return clusters
    }
    
    // `inbound-vip||hostname|port`. EDS routing to the internal listener for each pod in the VIP.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 9K bytes
    - Viewed (0)
  2. pilot/pkg/networking/core/cluster_test.go

    	g.Expect(tlsContext).ToNot(BeNil())
    	g.Expect(tlsContext.GetSni()).To(Equal("custom.sni.com"))
    	g.Expect(clusters[1].TransportSocketMatches).To(HaveLen(0))
    
    	for _, i := range []int{0, 2, 3} {
    		g.Expect(getTLSContext(t, clusters[i])).To(BeNil())
    		g.Expect(clusters[i].TransportSocketMatches).To(HaveLen(2))
    	}
    }
    
    func TestAutoMTLSClusterIgnoreWorkloadLevelPeerAuthn(t *testing.T) {
    	g := NewWithT(t)
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 108.8K bytes
    - Viewed (0)
Back to top