- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 24 for filterchain (0.4 sec)
-
pilot/pkg/networking/core/envoyfilter/listener_patch.go
IncrementEnvoyFilterMetric(lp.Key(), FilterChain, false) continue } IncrementEnvoyFilterMetric(lp.Key(), FilterChain, true) lis.FilterChains = append(lis.FilterChains, proto.Clone(lp.Value).(*listener.FilterChain)) } } if filterChainsRemoved { lis.FilterChains = slices.FilterInPlace(lis.FilterChains, func(fc *listener.FilterChain) bool { return fc.Filters != nil }) } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 17 15:39:29 UTC 2024 - 26.7K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_builder_test.go
services := []*model.Service{buildServiceWithPort("test.com", 80, protocol.HTTPS, tnow)} expectIstioMTLS := func(t test.Failer, filterChain *listener.FilterChain) { tlsContext := &tls.DownstreamTlsContext{} if err := filterChain.GetTransportSocket().GetTypedConfig().UnmarshalTo(tlsContext); err != nil { t.Fatal(err) } commonTLSContext := tlsContext.CommonTlsContext
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 24.7K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_inbound.go
func buildInboundPassthroughChains(lb *ListenerBuilder) []*listener.FilterChain { // Setup enough slots for common max size (permissive mode is 5 filter chains). This is not // exact, just best effort optimization filterChains := make([]*listener.FilterChain, 0, 1+5) filterChains = append(filterChains, buildInboundBlackhole(lb)) mtlsOptions := lb.authnBuilder.ForPassthrough()
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 35.1K bytes - Viewed (0) -
pilot/pkg/simulation/traffic.go
// Envoy algorithm - at each level we will filter out all FilterChains that do // not match. This means an empty match (`{}`) may not match if another chain // matches one criteria but not another. func (sim *Simulation) matchFilterChain(chains []*listener.FilterChain, defaultChain *listener.FilterChain, input Call, hasTLSInspector bool, ) (*listener.FilterChain, error) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 19.4K bytes - Viewed (0) -
pilot/pkg/networking/core/listenertest/match.go
t.Fatalf("%v: missing listener filters: %v", l.Name, missing) } } } // Check FilterChains if lt.FilterChains != nil { if lt.TotalMatch { // First check they are the same size if len(lt.FilterChains) != len(l.FilterChains) { want := []string{} for _, n := range lt.FilterChains { want = append(want, n.Name) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 6.4K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_waypoint.go
tcpName := name + "-tcp" tcpChain := &listener.FilterChain{ Filters: lb.buildInboundNetworkFilters(cc), Name: tcpName, } cc.clusterName = model.BuildSubsetKey(model.TrafficDirectionInboundVIP, "http", svc.Hostname, port.Port) httpName := name + "-http" httpChain := &listener.FilterChain{ Filters: lb.buildWaypointInboundHTTPFilters(svc, cc), Name: httpName, }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 14 04:34:37 UTC 2024 - 27.6K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_test.go
} if len(l.FilterChains) != 1 { t.Fatalf("expected %d filter chains, found %d", 1, len(l.FilterChains)) } verifyHTTPFilterChainMatch(t, l.FilterChains[0]) verifyPassThroughTCPFilterChain(t, l.DefaultFilterChain) verifyListenerFilters(t, l.ListenerFilters) } func verifyPassThroughTCPFilterChain(t *testing.T, fc *listener.FilterChain) { t.Helper() f := fc.Filters[0]
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 93.6K bytes - Viewed (0) -
pilot/pkg/networking/util/util.go
}, } return metadata } // IsHTTPFilterChain returns true if the filter chain contains a HTTP connection manager filter func IsHTTPFilterChain(filterChain *listener.FilterChain) bool { for _, f := range filterChain.Filters { if f.Name == wellknown.HTTPConnectionManager { return true } } return false }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 28.5K bytes - Viewed (0) -
pilot/pkg/networking/util/util_test.go
} }) } } func TestIsHTTPFilterChain(t *testing.T) { httpFilterChain := &listener.FilterChain{ Filters: []*listener.Filter{ { Name: xdsutil.HTTPConnectionManager, }, }, } tcpFilterChain := &listener.FilterChain{ Filters: []*listener.Filter{ { Name: xdsutil.TCPProxy, }, }, }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed May 29 01:17:58 UTC 2024 - 40K bytes - Viewed (0) -
pilot/pkg/networking/core/accesslog_test.go
kind: EnvoyFilter metadata: name: access-log-format namespace: default spec: configPatches: - applyTo: NETWORK_FILTER match: context: ANY listener: filterChain: filter: name: envoy.filters.network.tcp_proxy patch: operation: MERGE value: typed_config:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 14 04:34:30 UTC 2024 - 19.9K bytes - Viewed (0)