open-consul/agent/xds
Andy Lindeman 42224fe45c
proxycfg: support path exposed with non-HTTP2 protocol (#7510)
If a proxied service is a gRPC or HTTP2 service, but a path is exposed
using the HTTP1 or TCP protocol, Envoy should not be configured with
`http2ProtocolOptions` for the cluster backing the path.

A situation where this comes up is a gRPC service whose healthcheck or
metrics route (e.g. for Prometheus) is an HTTP1 service running on
a different port. Previously, if these were exposed either using
`Expose: { Checks: true }` or `Expose: { Paths: ... }`, Envoy would
still be configured to communicate with the path over HTTP2, which would
not work properly.
2020-04-02 09:35:04 +02:00
..
testdata proxycfg: support path exposed with non-HTTP2 protocol (#7510) 2020-04-02 09:35:04 +02:00
clusters.go proxycfg: support path exposed with non-HTTP2 protocol (#7510) 2020-04-02 09:35:04 +02:00
clusters_test.go proxycfg: support path exposed with non-HTTP2 protocol (#7510) 2020-04-02 09:35:04 +02:00
config.go Enable CLI to register terminating gateways (#7500) 2020-03-26 10:20:56 -06:00
config_test.go Enable CLI to register terminating gateways (#7500) 2020-03-26 10:20:56 -06:00
endpoints.go Remove unused token parameter 2020-03-27 17:57:16 -04:00
endpoints_test.go
failover_math.go
failover_math_test.go
golden_test.go
listeners.go Remove unused token parameter 2020-03-27 17:57:16 -04:00
listeners_test.go
naming.go
response.go
routes.go Remove unused token parameter 2020-03-27 17:57:16 -04:00
routes_test.go
server.go A little less 'just' 2020-03-27 16:08:25 -04:00
server_oss.go
server_test.go
testing.go
xds.go Remove unused customEDSClusterJSON 2020-03-27 15:38:16 -04:00