open-consul/lib
Freddy 6ef38eaea7
Configure upstream TLS context with peer root certs (#13321)
For mTLS to work between two proxies in peered clusters with different root CAs,
proxies need to configure their outbound listener to use different root certificates
for validation.

Up until peering was introduced proxies would only ever use one set of root certificates
to validate all mesh traffic, both inbound and outbound. Now an upstream proxy
may have a leaf certificate signed by a CA that's different from the dialing proxy's.

This PR makes changes to proxycfg and xds so that the upstream TLS validation
uses different root certificates depending on which cluster is being dialed.
2022-06-01 15:53:52 -06:00
..
decode
file
maps
mutex
retry
routine
semaphore
serf
stringslice
template
ttlcache
cluster.go
cluster_test.go
eof.go
eof_test.go
glob.go
glob_test.go
json.go
map_walker.go
map_walker_test.go
math.go
math_test.go
path.go
rand.go
rtt.go
rtt_test.go
stop_context.go
stop_context_test.go
strings.go Configure upstream TLS context with peer root certs (#13321) 2022-06-01 15:53:52 -06:00
telemetry.go telemetry: remove unused arg (#13161) 2022-05-19 19:17:30 -07:00
telemetry_test.go telemetry: remove unused arg (#13161) 2022-05-19 19:17:30 -07:00
translate.go
translate_test.go
useragent.go
useragent_test.go
uuid.go