Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for MTLSDisable (0.2 sec)

  1. pilot/pkg/networking/core/cluster_tls_test.go

    			nil,
    			[]string{"spiffe://foo/serviceaccount/1"},
    			"foo.com",
    			&model.Proxy{Metadata: &model.NodeMetadata{}},
    			true, false, model.MTLSDisable,
    			nil,
    			userSupplied,
    		},
    		{
    			"Auto fill nil settings when mTLS nil for internal service in unknown mode",
    			nil,
    			[]string{"spiffe://foo/serviceaccount/1"},
    			"foo.com",
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 06 03:53:05 UTC 2024
    - 60.9K bytes
    - Viewed (0)
  2. pilot/pkg/security/authn/policy_applier_test.go

    						Mtls: &v1beta1.PeerAuthentication_MutualTLS{
    							Mode: v1beta1.PeerAuthentication_MutualTLS_DISABLE,
    						},
    					},
    				},
    			},
    			expected: MTLSSettings{Port: 8080, Mode: model.MTLSDisable},
    		},
    		{
    			name: "Single policy - permissive mode",
    			peerPolicies: []*config.Config{
    				{
    					Spec: &v1beta1.PeerAuthentication{
    						Mtls: &v1beta1.PeerAuthentication_MutualTLS{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Dec 01 07:32:22 UTC 2023
    - 60.2K bytes
    - Viewed (0)
  3. pilot/pkg/model/push_context_test.go

    			serviceResolution: Passthrough,
    			wanted:            MTLSDisable,
    		},
    		{
    			name:              "headless service with instances",
    			serviceNamespace:  partialNS,
    			servicePort:       80,
    			serviceResolution: Passthrough,
    			serviceInstances:  []*ServiceInstance{instancePlainText},
    			wanted:            MTLSDisable,
    		},
    	}
    
    	serviceName := host.Name("some-service")
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Apr 21 17:42:54 UTC 2024
    - 95.3K bytes
    - Viewed (0)
  4. pilot/pkg/model/push_context.go

    		instances := ps.ServiceEndpointsByPort(service, port.Port, nil)
    		if len(instances) == 0 {
    			return MTLSDisable
    		}
    		for _, i := range instances {
    			// Infer mTls disabled if any of the endpoint is with tls disabled
    			if i.TLSMode == DisabledTLSModeLabel {
    				return MTLSDisable
    			}
    		}
    	}
    
    	// 2. check mTLS settings from beta policy (i.e PeerAuthentication) at namespace / mesh level.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 15 09:02:11 UTC 2024
    - 91.8K bytes
    - Viewed (0)
Back to top