Documentation ¶
Index ¶
- Constants
- Variables
- func AnyToMessage(a *pany.Any) (proto.Message, error)
- func EnsureRouteAction(out *envoy_config_route_v3.Route) error
- func EnvoyPathAsString(matcher *envoy_config_route_v3.RouteMatch) string
- func FilterLogLevel(r io.ReadCloser, level LogLevel) strings.Builder
- func GogoMessageToAnyGoProto(msg proto.Message) (*pany.Any, error)
- func MessageToAny(msg proto.Message) (*pany.Any, error)
- func MustAnyToMessage(a *pany.Any) proto.Message
- func MustGogoMessageToAnyGoProto(msg proto.Message) *pany.Any
- func MustMessageToAny(msg proto.Message) *pany.Any
- func NewSslConfigTranslator() *sslConfigTranslator
- func PathAsString(matcher *matchers.Matcher) string
- func SanitizeForEnvoy(ctx context.Context, resourceName, resourceTypeName string) string
- func SortGatewayRoutesByPath(routes []*gatewayv1.Route)
- func SortRoutesByPath(routes []*v1.Route)
- type CertSource
- type LogLevel
- type SslConfigTranslator
Constants ¶
View Source
const (
MetadataPluginName = "envoy.grpc_credentials.file_based_metadata"
)
Variables ¶
View Source
var ( TlsVersionNotFoundError = func(v v1.SslParameters_ProtocolVersion) error { return eris.Errorf("tls version %v not found", v) } SslSecretNotFoundError = func(err error) error { return eris.Wrapf(err, "SSL secret not found") } NotTlsSecretError = func(ref *core.ResourceRef) error { return eris.Errorf("%v is not a TLS secret", ref) } NoCertificateFoundError = eris.New("no certificate information found") MissingValidationContextError = eris.Errorf("must provide validation context name if verifying SAN") RootCaMustBeProvidedError = eris.Errorf("a root_ca must be provided if verify_subject_alt_name is not empty") )
View Source
var (
InvalidRouteActionError = errors.New("cannot use this plugin on non-Route_Route route actions")
)
Functions ¶
func EnsureRouteAction ¶ added in v0.18.22
func EnsureRouteAction(out *envoy_config_route_v3.Route) error
func EnvoyPathAsString ¶ added in v1.0.0
func EnvoyPathAsString(matcher *envoy_config_route_v3.RouteMatch) string
func FilterLogLevel ¶ added in v0.19.2
func FilterLogLevel(r io.ReadCloser, level LogLevel) strings.Builder
Filter JSON logs with level
func GogoMessageToAnyGoProto ¶ added in v1.5.0
gogoprotos converted directly to goproto any can't be marshalled unless you wrap the contents of the gogoproto in a typed struct
func MustGogoMessageToAnyGoProto ¶ added in v1.5.0
gogoprotos converted directly to goproto any can't be marshalled unless you wrap the contents of the gogoproto in a typed struct
func NewSslConfigTranslator ¶
func NewSslConfigTranslator() *sslConfigTranslator
func PathAsString ¶
func SanitizeForEnvoy ¶ added in v0.14.0
func SortGatewayRoutesByPath ¶ added in v0.18.32
func SortRoutesByPath ¶
Matchers sort according to the following rules: 1. exact path < regex path < prefix path 2. lexicographically greater path string < lexicographically greater path string
Types ¶
type CertSource ¶
type CertSource interface { GetSecretRef() *core.ResourceRef GetSslFiles() *v1.SSLFiles GetSds() *v1.SDSConfig GetVerifySubjectAltName() []string GetParameters() *v1.SslParameters GetAlpnProtocols() []string }
type LogLevel ¶ added in v0.19.2
type LogLevel int8
A Level is a logging priority. Higher levels are more important.
type SslConfigTranslator ¶
type SslConfigTranslator interface { ResolveUpstreamSslConfig(secrets v1.SecretList, uc *v1.UpstreamSslConfig) (*envoyauth.UpstreamTlsContext, error) ResolveDownstreamSslConfig(secrets v1.SecretList, dc *v1.SslConfig) (*envoyauth.DownstreamTlsContext, error) ResolveCommonSslConfig(cs CertSource, secrets v1.SecretList, mustHaveCert bool) (*envoyauth.CommonTlsContext, error) }
Source Files ¶
Directories ¶
Path | Synopsis |
---|---|
Package mock_utils is a generated GoMock package.
|
Package mock_utils is a generated GoMock package. |
Click to show internal directories.
Click to hide internal directories.