open-consul/agent/xds/testdata
Freddy 6ef38eaea7
Configure upstream TLS context with peer root certs (#13321)
For mTLS to work between two proxies in peered clusters with different root CAs,
proxies need to configure their outbound listener to use different root certificates
for validation.

Up until peering was introduced proxies would only ever use one set of root certificates
to validate all mesh traffic, both inbound and outbound. Now an upstream proxy
may have a leaf certificate signed by a CA that's different from the dialing proxy's.

This PR makes changes to proxycfg and xds so that the upstream TLS validation
uses different root certificates depending on which cluster is being dialed.
2022-06-01 15:53:52 -06:00
..
clusters Configure upstream TLS context with peer root certs (#13321) 2022-06-01 15:53:52 -06:00
endpoints connect: Add Envoy 1.21.1 to support matrix, remove 1.17.4 (#12777) 2022-04-14 10:44:42 -07:00
listeners test: regenerate golden files (#13336) 2022-06-01 15:17:03 -05:00
rbac connect: Remove support for Envoy 1.16 (#11354) 2021-10-27 18:51:35 -07:00
routes fix: multiple grpc/http2 services for ingress listeners 2022-05-26 10:43:58 -04:00
serverless_plugin Support making requests to lambda from connect proxies. 2022-05-05 17:42:30 -04:00
alt-test-leaf-cert.golden
alt-test-leaf-key.golden
alt-test-root-cert.golden
cache-test-leaf-cert.golden
cache-test-leaf-key.golden
db-test-leaf-cert.golden
db-test-leaf-key.golden
test-leaf-cert.golden
test-leaf-key.golden
test-root-cert.golden