Skip to content

ssl: split out client (config) context, small cleanups.#1318

Merged
htuch merged 2 commits intoenvoyproxy:masterfrom
htuch:client-ssl-context
Jul 24, 2017
Merged

ssl: split out client (config) context, small cleanups.#1318
htuch merged 2 commits intoenvoyproxy:masterfrom
htuch:client-ssl-context

Conversation

@htuch
Copy link
Member

@htuch htuch commented Jul 24, 2017

  • To support the TLS context stuff in the v2 CDS update, we need to cleanly distinguish between
    client, server and common context.

  • Constify various members of ContextConfigImpl etc.

* To support the TLS context stuff in the v2 CDS update, we need to cleanly distinguish between
  client, server and common context.

* Constify various members of ContextConfigImpl etc.

/**
* Builds an ClientContext from an ContextConfig
* Builds an ClientContext from a Client ContextConfig.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: ClientContextConfig.

mattklein123
mattklein123 previously approved these changes Jul 24, 2017
@htuch htuch merged commit 40b3487 into envoyproxy:master Jul 24, 2017
@htuch htuch deleted the client-ssl-context branch July 24, 2017 19:24
rshriram pushed a commit to rshriram/envoy that referenced this pull request Oct 30, 2018
…yproxy#1318)

Automatic merge from submit-queue.

Use StopIterationAndWatermark instead of StopIterationAndBuffer

**What this PR does / why we need it**:Do not buffer request body during Mixer Check() call. This is to avoid buffer overflow when POST request has large body and Mixer filter is waiting for Check() response.

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes envoyproxy#1315 

**Special notes for your reviewer**:

**Release note**:

```release-note
NONE
```
jpsim pushed a commit that referenced this pull request Nov 28, 2022
Description: Adds an iterator to the `Headers` classes to iterate through headers. Note that this violates C++ design by iterating through the header key, not the header key/value pair. I chose this design because `pybind11` was giving me invalid memory access errors while trying to iterate through pairs.
Risk Level: Low
Testing: Pending

Signed-off-by: Cerek Hillen <chillen@lyft.com>
Signed-off-by: JP Simard <jp@jpsim.com>
jpsim pushed a commit that referenced this pull request Nov 29, 2022
Description: Adds an iterator to the `Headers` classes to iterate through headers. Note that this violates C++ design by iterating through the header key, not the header key/value pair. I chose this design because `pybind11` was giving me invalid memory access errors while trying to iterate through pairs.
Risk Level: Low
Testing: Pending

Signed-off-by: Cerek Hillen <chillen@lyft.com>
Signed-off-by: JP Simard <jp@jpsim.com>
mathetake pushed a commit that referenced this pull request Mar 3, 2026
…urityPolicyIndexFunc (#1318)

**Description**

The `backendSecurityPolicyIndexFunc` is missing cases for Azure apikey
and credential types. This is causing the controller to not update the
ai-gateway proxy on changes to watched resources, e.g. secrets.

**Related Issues/PRs (if applicable)**

Fixes: #1313

Signed-off-by: Tim Swanson <tiswanso@cisco.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants