Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for SecretAllowed (0.53 sec)

  1. pilot/pkg/config/kube/gateway/conversion.go

    		if err != nil {
    			return out, err
    		}
    		credNs := ptr.OrDefault((*string)(tls.CertificateRefs[0].Namespace), namespace)
    		sameNamespace := credNs == namespace
    		if !sameNamespace && !ctx.AllowedReferences.SecretAllowed(creds.ToResourceName(cred), namespace) {
    			return out, &ConfigError{
    				Reason: InvalidListenerRefNotPermitted,
    				Message: fmt.Sprintf(
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 04:34:37 UTC 2024
    - 84.7K bytes
    - Viewed (0)
  2. pilot/pkg/model/push_context.go

    	// Currently, only Secret has reference policy, and only implemented by Gateway API controller.
    	switch kind {
    	case gvk.Secret:
    		if ps.GatewayAPIController != nil {
    			return ps.GatewayAPIController.SecretAllowed(resourceName, namespace)
    		}
    	default:
    	}
    	return false
    }
    
    func (ps *PushContext) ServiceAccounts(hostname host.Name, namespace string) []string {
    	return ps.serviceAccounts[serviceAccountKey{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 15 09:02:11 UTC 2024
    - 91.8K bytes
    - Viewed (0)
Back to top