@@ -42,10 +42,10 @@ In this GEP:
42
42
wrangling the mTLS meshes! Supporting non-mTLS meshes will be a separate
43
43
GEP.
44
44
45
- ** Note:** It's important to separate mTLS and HTTPS here. Saying that the
46
- mTLS meshes use mTLS for secure communication does not preclude them from
47
- using custom protocols on top of mTLS, and certainly does not mean that
48
- they must use only HTTPS.
45
+ ** Note:** It's important to separate mTLS and HTTPS here. Saying that the
46
+ mTLS meshes use mTLS for secure communication does not preclude them from
47
+ using custom protocols on top of mTLS, and certainly does not mean that
48
+ they must use only HTTPS.
49
49
50
50
3 . _ Authentication_ is the act of verifying the identity of some _ principal_ ;
51
51
what the principal actually is depends on context. For this GEP we will
@@ -56,21 +56,21 @@ In this GEP:
56
56
can't trust what the OCG says about the user unless the OCG successfully
57
57
authenticates itself as a workload.
58
58
59
- ** Note:** A single workload will have only one identity, but in practice we
60
- often see a single identity being used for multiple workloads (both because
61
- multiple replicas of a single workload need to share the same identity, and
62
- because some low-security workloads may be grouped together under a single
63
- identity).
59
+ ** Note:** A single workload will have only one identity, but in practice we
60
+ often see a single identity being used for multiple workloads (both because
61
+ multiple replicas of a single workload need to share the same identity, and
62
+ because some low-security workloads may be grouped together under a single
63
+ identity).
64
64
65
65
4 . Finally, we'll distinguish between _ inbound_ and _ outbound_ behaviors.
66
66
67
- Inbound behaviors are those that are applied to a request _ arriving_ at a
68
- given workload. Authorization and rate limiting are canonical examples
69
- of inbound behaviors.
67
+ Inbound behaviors are those that are applied to a request _ arriving_ at a
68
+ given workload. Authorization and rate limiting are canonical examples
69
+ of inbound behaviors.
70
70
71
- Outbound behaviors are those that are applied to a request _ leaving_ a
72
- given workload. Load balancing, retries, and circuit breakers are canonical
73
- examples of outbound behaviors.
71
+ Outbound behaviors are those that are applied to a request _ leaving_ a
72
+ given workload. Load balancing, retries, and circuit breakers are canonical
73
+ examples of outbound behaviors.
74
74
75
75
## Goals
76
76
@@ -197,7 +197,7 @@ is sent. (For example, Linkerd requires the originating proxy to send
197
197
transport metadata right after the TLS handshake, and it will reject a
198
198
connection which doesn't do that correctly.)
199
199
200
- #### 4 . The Discovery Problem
200
+ #### 3 . The Discovery Problem
201
201
202
202
When using a mesh, not every workload in the cluster is required to be meshed
203
203
(for example, it's fairly common to have some namespaces meshed and other
0 commit comments