Skip to content

Instantly share code, notes, and snippets.

#[doc = r" Generated server implementations."]
pub mod cluster_discovery_service_server {
#![allow(unused_variables, dead_code, missing_docs)]
use tonic::codegen::*;
#[doc = "Generated trait containing gRPC methods that should be implemented for use with ClusterDiscoveryServiceServer."]
#[async_trait]
pub trait ClusterDiscoveryService: Send + Sync + 'static {
#[doc = "Server streaming response type for the StreamClusters method."]
type StreamClustersStream: Stream<
// use tonic::{transport::Server, Request, Response, Status};
// pub mod envoy {
// include!("protobuf/envoy.api.v2.rs");
// // tonic::include_proto!("envoy.api.v2");
// }
use tonic::{transport::Server, Request, Response, Status};
use envoy::api::v2::cluster;
cube(size=[100,10,40]);
translate([101,0,0]) {
cube(size=[100,10,40]);
}
translate([0,0,42]) {
cube(size=[50,1,25]);
translate([51,0,0]) {
cube(size=[50,1,25]);
}
}
static_resources:
listeners:
- name: main
address:
socket_address:
address: 0.0.0.0
port_value: 8000
metadata:
filter_metadata:
envoy.filters.http.lua:
use lazy_static::lazy_static;
use std::collections::HashMap;
lazy_static! {
static ref CONFIGS: HashMap<u32, &'static str> = {
let mut m = HashMap::new();
m.insert(0, "foo");
m
};
}
use lib 't';
use Test::APIcast::Blackbox 'no_plan';
# These test are a bit difficult to understand. Due to the Nginx is set to listen
# proxy_protocol, all backends upstream need to use another port, if not the
# backend client and API will fail, this is why a new server is added on
# --backend test section
require("policies.pl");
repeat_each(1);
#!/bin/bash
TEMP_FOLDER=$(mktemp -d)
mkdir -p $TEMP_FOLDER
chmod 777 $TEMP_FOLDER
echo "1) Temporal folder is: $TEMP_FOLDER"
cd $TEMP_FOLDER
cat <<EOF >>$TEMP_FOLDER/test.json
{
"definitions": {
"address": {
"type": "object",
"properties": {
"street_address": {
"type": "string"
}
},
"required": [
local format = string.format
local resty_url = require "resty.url"
local resty_resolver = require 'resty.resolver'
local round_robin = require 'resty.balancer.round_robin'
local http_proxy = require 'resty.http.proxy'
local file_reader = require("resty.file").file_reader
local _M = { }
2020-05-22 15:41:37 [Camel Thread #5 - NettyServerTCPWorker] DEBUG o.a.c.c.n.h.HttpServerInitializerFactory - Server SSL handler configured and added as an interceptor against the ChannelPipeline: io.netty.handler.ssl.SslHandler@7b005446
2020-05-22 15:41:37 [Camel Thread #5 - NettyServerTCPWorker] DEBUG io.netty.handler.ssl.SslHandler - [id: 0x7f8a3fd1, L:/10.131.1.0:8443 - R:/10.131.0.251:52038] HANDSHAKEN: protocol:TLSv1.2 cipher suite:TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
2020-05-22 15:41:37 [Camel (camel-1) thread #6 - NettyConsumerExecutorGroup] DEBUG o.a.c.c.netty.http.NettyHttpConsumer - Message received: HttpObjectAggregator$AggregatedFullHttpRequest(decodeResult: success, version: HTTP/1.1, content: CompositeByteBuf(ridx: 0, widx: 0, cap: 0, components=0))
GET https://endpoint-service:443/ HTTP/1.1
Host: endpoint-service:443
content-length: 0
2020-05-22 15:41:37 [Camel (camel-1) thread #6 - NettyConsumerExecutorGroup] DEBUG o.a.c.c.netty.http.NettyHttpConsumer - Message received: HttpObjectAggregato