mirror of https://github.com/status-im/consul.git
74ca6406ea
For mTLS to work between two proxies in peered clusters with different root CAs, proxies need to configure their outbound listener to use different root certificates for validation. Up until peering was introduced proxies would only ever use one set of root certificates to validate all mesh traffic, both inbound and outbound. Now an upstream proxy may have a leaf certificate signed by a CA that's different from the dialing proxy's. This PR makes changes to proxycfg and xds so that the upstream TLS validation uses different root certificates depending on which cluster is being dialed. |
||
---|---|---|
.. | ||
ca | ||
authz.go | ||
authz_test.go | ||
common_names.go | ||
csr.go | ||
generate.go | ||
generate_test.go | ||
parsing.go | ||
sni.go | ||
sni_test.go | ||
testing_ca.go | ||
testing_ca_test.go | ||
testing_spiffe.go | ||
uri.go | ||
uri_agent.go | ||
uri_agent_oss.go | ||
uri_agent_oss_test.go | ||
uri_service.go | ||
uri_service_oss.go | ||
uri_service_oss_test.go | ||
uri_signing.go | ||
uri_signing_test.go | ||
uri_test.go | ||
x509_patch.go | ||
x509_patch_test.go |