- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for ALPNs (0.34 sec)
-
src/crypto/tls/bogo_shim_test.go
} if *noTLS13 && cfg.MaxVersion == VersionTLS13 { cfg.MaxVersion = VersionTLS12 } if *advertiseALPN != "" { alpns := *advertiseALPN for len(alpns) > 0 { alpnLen := int(alpns[0]) cfg.NextProtos = append(cfg.NextProtos, alpns[1:1+alpnLen]) alpns = alpns[alpnLen+1:] } } if *hostName != "" { cfg.ServerName = *hostName } if *keyfile != "" || *certfile != "" {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 11 17:25:39 UTC 2024 - 12.6K bytes - Viewed (0) -
pkg/test/echo/common/model.go
Hostname string // If set to true, the cert will be provisioned by proxy, and extra cert volume will be mounted. ProxyProvision bool // AcceptAnyALPN, if true, will make the server accept ANY ALPNs. This comes at the expense of // allowing h2 negotiation and being able to detect the negotiated ALPN (as there is none), because // Golang doesn't like us doing this (https://github.com/golang/go/issues/46310).
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 05 00:22:45 UTC 2022 - 3.1K bytes - Viewed (0) -
pkg/test/echo/proto/echo.proto
string certFile = 16; string keyFile = 17; // If non-empty, verify the server CA with the ca cert file. string caCertFile = 18; // Skip verifying peer's certificate. bool insecureSkipVerify = 19; // List of ALPNs to present. If not set, this will be automatically be set based on the protocol Alpn alpn = 13; // Server name (SNI) to present in TLS connections. If not set, Host will be used for http requests. string serverName = 20;
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jan 31 17:42:23 UTC 2023 - 3.8K bytes - Viewed (0) -
pilot/cmd/pilot-agent/status/server_test.go
statusCode int alpns []string }{ { name: "bad-path-should-be-disallowed", probePath: "bad-path-should-be-disallowed", statusCode: http.StatusNotFound, }, { name: "readyz", probePath: "app-health/hello-world/readyz", statusCode: http.StatusOK, expectedProtocol: "HTTP/1.1", alpns: nil, }, {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 15:07:03 UTC 2024 - 42.6K bytes - Viewed (0) -
pkg/test/echo/server/endpoint/hbone.go
} config := &tls.Config{ Certificates: []tls.Certificate{cert}, NextProtos: []string{"h2"}, GetConfigForClient: func(info *tls.ClientHelloInfo) (*tls.Config, error) { // There isn't a way to pass through all ALPNs presented by the client down to the // HTTP server to return in the response. However, for debugging, we can at least log // them at this level. epLog.Infof("TLS connection with alpn: %v", info.SupportedProtos)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Nov 14 20:23:34 UTC 2022 - 2.7K bytes - Viewed (0) -
pilot/pkg/networking/core/filterchain_options.go
}, } inboundStrictFilterChainMatchOptions = []FilterChainMatchOptions{ { // client side traffic was detected as HTTP by the outbound listener. // If we are in strict mode, we will get mTLS HTTP ALPNS only. ApplicationProtocols: mtlsHTTPALPNs, Protocol: networking.ListenerProtocolHTTP, TransportProtocol: xdsfilters.TLSTransportProtocol, TLS: true, }, {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Mar 28 17:09:02 UTC 2024 - 8.4K bytes - Viewed (0) -
pilot/pkg/xds/filters/filters.go
}), }, } } } return res }() func BuildRouterFilter(ctx RouterFilterContext) *hcm.HttpFilter { return routers[ctx] } var ( // These ALPNs are injected in the client side by the ALPN filter. // "istio" is added for each upstream protocol in order to make it // backward compatible. e.g., 1.4 proxy -> 1.3 proxy.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 09 09:24:25 UTC 2024 - 15.5K bytes - Viewed (0) -
pkg/test/echo/server/endpoint/http.go
} config := &tls.Config{ Certificates: []tls.Certificate{cert}, NextProtos: nextProtos, GetConfigForClient: func(info *tls.ClientHelloInfo) (*tls.Config, error) { // There isn't a way to pass through all ALPNs presented by the client down to the // HTTP server to return in the response. However, for debugging, we can at least log // them at this level. epLog.Infof("TLS connection with alpn: %v", info.SupportedProtos)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue May 23 16:20:31 UTC 2023 - 12.8K bytes - Viewed (0) -
pilot/pkg/networking/core/gateway_test.go
}, }, }, }, RequireClientCertificate: proto.BoolFalse, }, }, { // tcp server is non-istio mtls, no istio-peer-exchange in the alpns name: "tcp server with terminating (non-istio)mutual tls", server: &networking.Server{ Hosts: []string{"httpbin.example.com", "bookinfo.example.com"}, Port: &networking.Port{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 04:44:06 UTC 2024 - 144K bytes - Viewed (0) -
pkg/test/echo/proto/echo.pb.go
// Skip verifying peer's certificate. InsecureSkipVerify bool `protobuf:"varint,19,opt,name=insecureSkipVerify,proto3" json:"insecureSkipVerify,omitempty"` // List of ALPNs to present. If not set, this will be automatically be set based on the protocol Alpn *Alpn `protobuf:"bytes,13,opt,name=alpn,proto3" json:"alpn,omitempty"`
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 31 02:27:10 UTC 2024 - 33.3K bytes - Viewed (0)