@@ -80,9 +80,6 @@ class XdsClusterResource extends XdsResourceType<CdsUpdate> {
8080 "type.googleapis.com/envoy.extensions.transport_sockets.tls.v3.UpstreamTlsContext" ;
8181 private static final String TYPE_URL_UPSTREAM_TLS_CONTEXT_V2 =
8282 "type.googleapis.com/envoy.api.v2.auth.UpstreamTlsContext" ;
83- static final String TRANSPORT_SOCKET_NAME_HTTP11_PROXY =
84- "type.googleapis.com/envoy.extensions.transport_sockets.http_11_proxy.v3"
85- + ".Http11ProxyUpstreamTransport" ;
8683 private final LoadBalancerRegistry loadBalancerRegistry
8784 = LoadBalancerRegistry .getDefaultRegistry ();
8885
@@ -261,14 +258,14 @@ private static StructOrError<CdsUpdate.Builder> parseNonAggregateCluster(
261258 TransportSocket transportSocket = cluster .getTransportSocket ();
262259
263260 if (hasTransportSocket && !TRANSPORT_SOCKET_NAME_TLS .equals (transportSocket .getName ())
264- && !(isEnabledXdsHttpConnect
265- && TRANSPORT_SOCKET_NAME_HTTP11_PROXY . equals ( transportSocket . getName () ))) {
261+ && !(isEnabledXdsHttpConnect && transportSocket . getTypedConfig (). is (
262+ Http11ProxyUpstreamTransport . class ))) {
266263 return StructOrError .fromError (
267264 "transport-socket with name " + transportSocket .getName () + " not supported." );
268265 }
269266
270- if (hasTransportSocket && isEnabledXdsHttpConnect
271- && TRANSPORT_SOCKET_NAME_HTTP11_PROXY . equals ( transportSocket . getName () )) {
267+ if (hasTransportSocket && isEnabledXdsHttpConnect && transportSocket . getTypedConfig (). is (
268+ Http11ProxyUpstreamTransport . class )) {
272269 isHttp11ProxyAvailable = true ;
273270 try {
274271 Http11ProxyUpstreamTransport wrappedTransportSocket = transportSocket
0 commit comments