- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for getTLS (0.13 sec)
-
pkg/config/analysis/analyzers/destinationrule/ca-certificates.go
drNs := r.Metadata.FullName.Namespace drName := r.Metadata.FullName.String() mode := dr.GetTrafficPolicy().GetTls().GetMode() if mode == v1alpha3.ClientTLSSettings_SIMPLE || mode == v1alpha3.ClientTLSSettings_MUTUAL { if dr.GetTrafficPolicy().GetTls().GetCaCertificates() == "" && !(dr.GetTrafficPolicy().GetTls().GetCredentialName() != "" && dr.WorkloadSelector != nil) { m := msg.NewNoServerCertificateVerificationDestinationLevel(r, drName,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 14 07:22:31 UTC 2024 - 2.9K bytes - Viewed (0) -
istioctl/pkg/precheck/precheck.go
verificationImpacted = verificationImpacted || checkVerify(dr.Spec.GetTrafficPolicy().GetTls()) sniImpacted = sniImpacted || checkSNI(dr.Spec.GetTrafficPolicy().GetTls()) for _, pl := range dr.Spec.GetTrafficPolicy().GetPortLevelSettings() { verificationImpacted = verificationImpacted || checkVerify(pl.GetTls()) sniImpacted = sniImpacted || checkSNI(pl.GetTls()) } for _, ss := range dr.Spec.Subsets {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Apr 12 02:57:30 UTC 2024 - 19.3K bytes - Viewed (0) -
pilot/pkg/model/gateway.go
} sanitizeServerHostNamespace(s, gatewayConfig.Namespace) gatewayNameForServer[s] = gatewayName log.Debugf("MergeGateways: gateway %q processing server %s :%v", gatewayName, s.Name, s.Hosts) cn := s.GetTls().GetCredentialName() if cn != "" && proxy.VerifiedIdentity != nil { rn := credentials.ToResourceName(cn) parse, _ := credentials.ParseResourceName(rn, proxy.VerifiedIdentity.Namespace, "", "")
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 14 04:34:37 UTC 2024 - 26K bytes - Viewed (0) -
pilot/pkg/networking/grpcgen/cds.go
// 3. Once we support gRPC servers, we have no good way to detect if a server is implemented with xds.NewGrpcServer and will actually support our config // For these reasons, support only explicit tls configuration. switch policy.GetTls().GetMode() { case networking.ClientTLSSettings_DISABLE: // nothing to do case networking.ClientTLSSettings_SIMPLE: // TODO support this case networking.ClientTLSSettings_MUTUAL: // TODO support this
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Mar 28 17:09:02 UTC 2024 - 9.2K bytes - Viewed (0) -
pilot/pkg/networking/core/cluster_builder.go
util.AddSubsetToMetadata(subsetCluster.cluster.Metadata, subset.Name) subsetCluster.cluster.Metadata = util.AddALPNOverrideToMetadata(subsetCluster.cluster.Metadata, opts.policy.GetTls().GetMode()) return subsetCluster.build() } // applyDestinationRule applies the destination rule if it exists for the Service. // It returns the subset clusters if any created as it applies the destination rule.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 31.6K bytes - Viewed (0) -
pilot/pkg/networking/core/cluster_builder_test.go
t.Errorf("got diff: `%v", diff) } if tc.enableAutoSni { if tc.destRule.GetTrafficPolicy().GetTls().Sni == "" { assert.Equal(t, ec.httpProtocolOptions.UpstreamHttpProtocolOptions.AutoSni, true) } if tc.destRule.GetTrafficPolicy().GetTls().GetInsecureSkipVerify().GetValue() { assert.Equal(t, ec.httpProtocolOptions.UpstreamHttpProtocolOptions.AutoSanValidation, false)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 110.4K bytes - Viewed (0) -
pilot/pkg/networking/core/gateway.go
} } } // check all hostname in vHostDedupMap and if is not exist with HttpsRedirect set to true // create VirtualHost to redirect for _, hostname := range server.Hosts { if !server.GetTls().GetHttpsRedirect() { continue } if vHost, exists := vHostDedupMap[host.Name(hostname)]; exists { vHost.RequireTls = route.VirtualHost_ALL continue } newVHost := &route.VirtualHost{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 04:44:06 UTC 2024 - 46.4K bytes - Viewed (0) -
pkg/config/validation/validation.go
v = AppendValidation(v, fmt.Errorf("port names in servers must be unique: duplicate name %s", s.Port.Name)) } portNames[s.Port.Name] = true if !protocol.Parse(s.Port.Protocol).IsHTTP() && s.GetTls().GetHttpsRedirect() { v = AppendValidation(v, WrapWarning(fmt.Errorf("tls.httpsRedirect should only be used with http servers"))) } } } return v.Unwrap() })
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 04:03:33 UTC 2024 - 107.2K bytes - Viewed (0)