Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 24 for filterchain (0.4 sec)

  1. pilot/pkg/networking/core/envoyfilter/listener_patch.go

    				IncrementEnvoyFilterMetric(lp.Key(), FilterChain, false)
    				continue
    			}
    			IncrementEnvoyFilterMetric(lp.Key(), FilterChain, true)
    			lis.FilterChains = append(lis.FilterChains, proto.Clone(lp.Value).(*listener.FilterChain))
    		}
    	}
    	if filterChainsRemoved {
    		lis.FilterChains = slices.FilterInPlace(lis.FilterChains, func(fc *listener.FilterChain) bool {
    			return fc.Filters != nil
    		})
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 17 15:39:29 UTC 2024
    - 26.7K bytes
    - Viewed (0)
  2. pilot/pkg/networking/core/listener_builder_test.go

    	services := []*model.Service{buildServiceWithPort("test.com", 80, protocol.HTTPS, tnow)}
    
    	expectIstioMTLS := func(t test.Failer, filterChain *listener.FilterChain) {
    		tlsContext := &tls.DownstreamTlsContext{}
    		if err := filterChain.GetTransportSocket().GetTypedConfig().UnmarshalTo(tlsContext); err != nil {
    			t.Fatal(err)
    		}
    		commonTLSContext := tlsContext.CommonTlsContext
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 24.7K bytes
    - Viewed (0)
  3. pilot/pkg/networking/core/listener_inbound.go

    func buildInboundPassthroughChains(lb *ListenerBuilder) []*listener.FilterChain {
    	// Setup enough slots for common max size (permissive mode is 5 filter chains). This is not
    	// exact, just best effort optimization
    	filterChains := make([]*listener.FilterChain, 0, 1+5)
    	filterChains = append(filterChains, buildInboundBlackhole(lb))
    
    	mtlsOptions := lb.authnBuilder.ForPassthrough()
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 35.1K bytes
    - Viewed (0)
  4. pilot/pkg/simulation/traffic.go

    // Envoy algorithm - at each level we will filter out all FilterChains that do
    // not match. This means an empty match (`{}`) may not match if another chain
    // matches one criteria but not another.
    func (sim *Simulation) matchFilterChain(chains []*listener.FilterChain, defaultChain *listener.FilterChain,
    	input Call, hasTLSInspector bool,
    ) (*listener.FilterChain, error) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  5. pilot/pkg/networking/core/listenertest/match.go

    				t.Fatalf("%v: missing listener filters: %v", l.Name, missing)
    			}
    		}
    	}
    
    	// Check FilterChains
    	if lt.FilterChains != nil {
    		if lt.TotalMatch {
    			// First check they are the same size
    			if len(lt.FilterChains) != len(l.FilterChains) {
    				want := []string{}
    				for _, n := range lt.FilterChains {
    					want = append(want, n.Name)
    				}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  6. pilot/pkg/networking/core/listener_waypoint.go

    			tcpName := name + "-tcp"
    			tcpChain := &listener.FilterChain{
    				Filters: lb.buildInboundNetworkFilters(cc),
    				Name:    tcpName,
    			}
    			cc.clusterName = model.BuildSubsetKey(model.TrafficDirectionInboundVIP, "http", svc.Hostname, port.Port)
    			httpName := name + "-http"
    			httpChain := &listener.FilterChain{
    				Filters: lb.buildWaypointInboundHTTPFilters(svc, cc),
    				Name:    httpName,
    			}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 04:34:37 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  7. pilot/pkg/networking/core/listener_test.go

    	}
    	if len(l.FilterChains) != 1 {
    		t.Fatalf("expected %d filter chains, found %d", 1, len(l.FilterChains))
    	}
    
    	verifyHTTPFilterChainMatch(t, l.FilterChains[0])
    	verifyPassThroughTCPFilterChain(t, l.DefaultFilterChain)
    	verifyListenerFilters(t, l.ListenerFilters)
    }
    
    func verifyPassThroughTCPFilterChain(t *testing.T, fc *listener.FilterChain) {
    	t.Helper()
    	f := fc.Filters[0]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 93.6K bytes
    - Viewed (0)
  8. pilot/pkg/networking/util/util.go

    		},
    	}
    
    	return metadata
    }
    
    // IsHTTPFilterChain returns true if the filter chain contains a HTTP connection manager filter
    func IsHTTPFilterChain(filterChain *listener.FilterChain) bool {
    	for _, f := range filterChain.Filters {
    		if f.Name == wellknown.HTTPConnectionManager {
    			return true
    		}
    	}
    	return false
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 28.5K bytes
    - Viewed (0)
  9. pilot/pkg/networking/util/util_test.go

    			}
    		})
    	}
    }
    
    func TestIsHTTPFilterChain(t *testing.T) {
    	httpFilterChain := &listener.FilterChain{
    		Filters: []*listener.Filter{
    			{
    				Name: xdsutil.HTTPConnectionManager,
    			},
    		},
    	}
    
    	tcpFilterChain := &listener.FilterChain{
    		Filters: []*listener.Filter{
    			{
    				Name: xdsutil.TCPProxy,
    			},
    		},
    	}
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 29 01:17:58 UTC 2024
    - 40K bytes
    - Viewed (0)
  10. pilot/pkg/networking/core/accesslog_test.go

    kind: EnvoyFilter
    metadata:
      name: access-log-format
      namespace: default
    spec:
      configPatches:
      - applyTo: NETWORK_FILTER
        match:
          context: ANY
          listener:
            filterChain:
              filter:
                name: envoy.filters.network.tcp_proxy
        patch:
          operation: MERGE
          value:
            typed_config:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 04:34:30 UTC 2024
    - 19.9K bytes
    - Viewed (0)
Back to top