- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 148 for destinationFile (0.2 sec)
-
releasenotes/notes/enable-verify-certificate-at-client.yaml
This means server certificates will be automatically verified using the OS CA certificates when not using a DestinationRule caCertificates field. If undesired please use the new `compatibilityVersion` feature to fallback to old behavior, or `insecureSkipVerify` field in DestinationRule to skip the verification. upgradeNotes: - title: Default value of the feature flag `VERIFY_CERT_AT_CLIENT` is set to true content: |
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 24 15:53:10 UTC 2024 - 911 bytes - Viewed (0) -
pilot/pkg/networking/core/tunnelingconfig/apply.go
) type ApplyFunc = func(tcpProxy *tcp.TcpProxy, destinationRule *networking.DestinationRule, subsetName string) // Apply configures tunneling_config in a given TcpProxy depending on the destination rule and the destination hosts var Apply ApplyFunc = func(tcpProxy *tcp.TcpProxy, destinationRule *networking.DestinationRule, subsetName string) { var tunnelSettings *networking.TrafficPolicy_TunnelSettings
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Mar 28 17:09:02 UTC 2024 - 1.9K bytes - Viewed (0) -
tests/integration/security/ca_custom_root/secure_naming_test.go
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 7.5K bytes - Viewed (0) -
samples/bookinfo/networking/destination-rule-all.yaml
apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata: name: productpage spec: host: productpage subsets: - name: v1 labels: version: v1 --- apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata: name: reviews spec: host: reviews subsets: - name: v1 labels: version: v1 - name: v2 labels: version: v2 - name: v3
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jul 09 23:15:58 UTC 2018 - 972 bytes - Viewed (0) -
pilot/pkg/networking/core/cluster_cache.go
return h.Sum64() } func (t *clusterCache) DependentConfigs() []model.ConfigHash { drs := t.destinationRule.GetFrom() configs := make([]model.ConfigHash, 0, len(drs)+1+len(t.envoyFilterKeys)) if t.destinationRule != nil { for _, dr := range drs { configs = append(configs, model.ConfigKey{Kind: kind.DestinationRule, Name: dr.Name, Namespace: dr.Namespace}.HashCode()) } } if t.service != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 19:09:43 UTC 2024 - 6.1K bytes - Viewed (0) -
pkg/config/schema/kind/resources.gen.go
case CustomResourceDefinition: return "CustomResourceDefinition" case DNSName: return "DNSName" case DaemonSet: return "DaemonSet" case Deployment: return "Deployment" case DestinationRule: return "DestinationRule" case EndpointSlice: return "EndpointSlice" case Endpoints: return "Endpoints" case EnvoyFilter: return "EnvoyFilter" case GRPCRoute: return "GRPCRoute" case Gateway:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Feb 27 07:19:38 UTC 2024 - 4.9K bytes - Viewed (0) -
pkg/config/analysis/analyzers/virtualservice/destinationrules.go
} return false } func initDestHostsAndSubsets(ctx analysis.Context) map[hostAndSubset]bool { hostsAndSubsets := make(map[hostAndSubset]bool) ctx.ForEach(gvk.DestinationRule, func(r *resource.Instance) bool { dr := r.Message.(*v1alpha3.DestinationRule) drNamespace := r.Metadata.FullName.Namespace for _, ss := range dr.GetSubsets() { hs := hostAndSubset{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Aug 07 15:18:05 UTC 2023 - 4.1K bytes - Viewed (0) -
pilot/pkg/xds/endpoints/mtls_checker.go
type mtlsChecker struct { push *model.PushContext svcPort int destinationRule *networkingapi.ClientTLSSettings_TLSmode } func newMtlsChecker(push *model.PushContext, svcPort int, dr *config.Config, subset string) *mtlsChecker { return &mtlsChecker{ push: push, svcPort: svcPort, destinationRule: tlsModeForDestinationRule(dr, subset, svcPort), } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Dec 01 07:32:22 UTC 2023 - 3.3K bytes - Viewed (0) -
tests/testdata/config/destination-rule-ssl.yaml
# Fails if a service with the name exists: trusted_ca required ! apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata: name: ssl-simple namespace: testns spec: host: ssl1.webinf.info trafficPolicy: loadBalancer: simple: LEAST_CONN tls: mode: SIMPLE --- # This will not work: myCA not found, results in rejecting all clusters if the # service exists. apiVersion: networking.istio.io/v1alpha3
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Jan 19 04:56:49 UTC 2019 - 598 bytes - Viewed (0) -
tests/integration/pilot/testdata/tunneling/destination-rule.tmpl.yaml
apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata: name: tunnel-outbound-traffic-to-external-svc-via-external-forward-proxy spec: host: external-forward-proxy.{{ .externalNamespace }}.svc.cluster.local subsets: - name: external-svc-tcp trafficPolicy: tunnel: targetHost: external.{{ .externalNamespace }} targetPort: {{ .externalSvcTcpPort }} - name: external-svc-tls trafficPolicy:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Jan 20 19:37:50 UTC 2024 - 1K bytes - Viewed (0)