- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for PolicyMatcherFor (0.16 sec)
-
pilot/pkg/security/authn/factory.go
return newPolicyApplier( push.AuthnPolicies.GetRootNamespace(), nil, push.AuthnPolicies.GetPeerAuthenticationsForWorkload(model.PolicyMatcherFor(namespace, labels, isWaypoint)), push, )
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 3K bytes - Viewed (0) -
pilot/pkg/model/policyattachment.go
// or the Services the workload is a part of. type WorkloadPolicyMatcher struct { Namespace string WorkloadLabels labels.Instance IsWaypoint bool Service string } func PolicyMatcherFor(workloadNamespace string, labels labels.Instance, isWaypoint bool) WorkloadPolicyMatcher { return WorkloadPolicyMatcher{ Namespace: workloadNamespace, WorkloadLabels: labels, IsWaypoint: isWaypoint, }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 4.9K bytes - Viewed (0) -
pilot/pkg/model/authentication_test.go
}, }, }, }, wantNamespaceMutualTLS: MTLSStrict, }, } for _, tc := range cases { t.Run(tc.name, func(t *testing.T) { matcher := PolicyMatcherFor(tc.workloadNamespace, tc.workloadLabels, tc.isWaypoint) if got := policies.GetJwtPoliciesForWorkload(matcher); !reflect.DeepEqual(tc.wantRequestAuthn, got) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 45.1K bytes - Viewed (0)