- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 47 for Authz (0.24 sec)
-
istioctl/pkg/authz/authz.go
Example: ` # Check AuthorizationPolicy applied to pod httpbin-88ddbcfdd-nt5jb: istioctl x authz check httpbin-88ddbcfdd-nt5jb # Check AuthorizationPolicy applied to one pod under a deployment istioctl x authz check deployment/productpage-v1 # Check AuthorizationPolicy from Envoy config dump file: istioctl x authz check -f httpbin_config_dump.json`, Args: func(cmd *cobra.Command, args []string) error {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 13 05:23:38 UTC 2024 - 5K bytes - Viewed (0) -
pkg/registry/admissionregistration/validatingadmissionpolicybinding/authz.go
Mikalai Radchuk <******@****.***> 1714565943 +0200
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed May 01 12:19:03 UTC 2024 - 3.7K bytes - Viewed (0) -
samples/extauthz/local-ext-authz.yaml
# limitations under the License. # Example configurations for deploying ext-authz server locally with the application container in the same pod. # Define the service entry for the local ext-authz service on port 8000. apiVersion: networking.istio.io/v1alpha3 kind: ServiceEntry metadata: name: httpbin-ext-authz-http spec: hosts: - "ext-authz-http.local" endpoints: - address: "127.0.0.1" ports: - name: http
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Dec 04 03:54:58 UTC 2023 - 2.6K bytes - Viewed (0) -
tests/integration/security/policy_attachment_only/testdata/authz/gateway-authz.yaml.tmpl
- issuer: "******@****.***" jwksUri: "https://raw.githubusercontent.com/istio/istio/master/tests/common/jwt/jwks.json" --- apiVersion: security.istio.io/v1beta1 kind: AuthorizationPolicy metadata: name: authz-gateway-{{ .To.ServiceName }} spec: targetRef: name: {{ .To.ServiceName }}-gateway kind: Gateway group: gateway.networking.k8s.io action: ALLOW rules: - to: - operation:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 24 19:50:43 UTC 2023 - 847 bytes - Viewed (0) -
samples/extauthz/README.md
## Usage 1. Deploy the Ext Authz service in a dedicated pod: ```console $ kubectl apply -f ext-authz.yaml service/ext-authz created deployment.apps/ext-authz created ``` Note, you can also deploy the Ext Authz service locally with the application container in the same pod, see the example in `local-ext-authz.yaml`.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Sep 21 13:52:47 UTC 2023 - 4.1K bytes - Viewed (0) -
pkg/test/framework/components/authz/kube.go
) const ( httpName = "ext-authz-http" grpcName = "ext-authz-grpc" httpPort = 8000 grpcPort = 9000 providerTemplate = ` extensionProviders: - name: "{{ .httpName }}" envoyExtAuthzHttp: service: "{{ .fqdn }}" port: {{ .httpPort }} headersToUpstreamOnAllow: ["x-ext-authz-*"] headersToDownstreamOnDeny: ["x-ext-authz-*"] includeRequestHeadersInCheck: ["x-ext-authz"]
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 10 20:33:28 UTC 2024 - 7K bytes - Viewed (0) -
releasenotes/notes/filter-order.yaml
* Metadata Exchange * CUSTOM Authz * WASM Authn * Authn * WASM Authz * Authz * WASM Stats * Stats * WASM unspecified This changes the following areas: * Inbound TCP filters now place Metadata Exchange before Authn.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Sep 15 18:28:50 UTC 2023 - 895 bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-custom-grpc-provider-out2.yaml
path: - key: istio_ext_authz_shadow_effective_policy_id value: stringMatch: prefix: istio-ext-authz grpcService: envoyGrpc: authority: my-custom-ext-authz.foo.svc.cluster.local clusterName: outbound|9000||my-custom-ext-authz.foo.svc.cluster.local timeout: 0.002s statusOnError: code: Forbidden transportApiVersion: V3 withRequestBody:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 666 bytes - Viewed (0) -
tests/integration/security/policy_attachment_only/main_test.go
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jan 10 01:47:52 UTC 2024 - 2.9K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-custom-grpc-provider-no-namespace-out2.yaml
path: - key: istio_ext_authz_shadow_effective_policy_id value: stringMatch: prefix: istio-ext-authz grpcService: envoyGrpc: authority: my-custom-ext-authz.foo.svc.cluster.local clusterName: outbound|9000||my-custom-ext-authz.foo.svc.cluster.local timeout: 600s statusOnError: code: Forbidden
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 589 bytes - Viewed (0)