return connection.ssl() ? Headers::get().SchemeValues.Https : Headers::get().SchemeValues.Http;
// See if the data we have so far shows the HTTP/2 prefix. We ignore the case where someone sends
if (Network::Utility::isLoopbackAddress(*connection.connectionInfoProvider().remoteAddress())) {
ConnectionManagerUtility::MutateRequestHeadersResult ConnectionManagerUtility::mutateRequestHeaders(
if (result.size() > 1 || !Utility::isValidRefererValue(result[0]->value().getStringView())) {
// After determining internal request status, if there is no final remote address, due to no XFF,
!runtime.snapshot().featureEnabled("tracing.global_enabled", *overall_sampling, result)) {
// TODO: Optimize client_cert_details based on perf analysis (direct string appending may be more
// When AppendForward or SanitizeSet is set, the client certificate information should be set into
if (auto* proxy_status_config = config.proxyStatusConfig(); proxy_status_config != nullptr) {
ASSERT(escaped_slashes_action != envoy::extensions::filters::network::http_connection_manager::
if (escaped_slashes_action != envoy::extensions::filters::network::http_connection_manager::v3::