Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 208 for principal1 (0.21 sec)

  1. pilot/pkg/security/authz/model/principal.go

    	return &rbacpb.Principal{
    		Identifier: &rbacpb.Principal_AndIds{
    			AndIds: &rbacpb.Principal_Set{
    				Ids: principals,
    			},
    		},
    	}
    }
    
    func principalNot(principal *rbacpb.Principal) *rbacpb.Principal {
    	return &rbacpb.Principal{
    		Identifier: &rbacpb.Principal_NotId{
    			NotId: principal,
    		},
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Nov 17 18:44:57 UTC 2022
    - 2.8K bytes
    - Viewed (0)
  2. pilot/pkg/security/authz/builder/testdata/http/multiple-policies-out.yaml

                rules:
                - any: true
            principals:
            - andIds:
                ids:
                - orIds:
                    ids:
                    - authenticated:
                        principalName:
                          exact: spiffe://principals1
                    - authenticated:
                        principalName:
                          exact: spiffe://principals2
          ns[foo]-policy[httpbin-6]-rule[0]:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Oct 17 16:35:46 UTC 2023
    - 4.5K bytes
    - Viewed (0)
  3. pilot/pkg/security/authz/model/model.go

    	}
    
    	var principals []*rbacpb.Principal
    	for _, rl := range m.principals {
    		principal, err := generatePrincipal(rl, forTCP, useAuthenticated, action)
    		if err != nil {
    			return nil, err
    		}
    		principals = append(principals, principal)
    	}
    	if len(principals) == 0 {
    		return nil, fmt.Errorf("must have at least 1 principal")
    	}
    
    	return &rbacpb.Policy{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 25 10:39:25 UTC 2024
    - 13.8K bytes
    - Viewed (0)
  4. pilot/pkg/security/authz/builder/testdata/http/simple-policy-principal-with-wildcard-out.yaml

                    - authenticated:
                        principalName:
                          exact: spiffe://td1/ns/foo/sa/rule[0]-from[1]-principal[1]
                    - authenticated:
                        principalName:
                          safeRegex:
                            regex: spiffe://.*bar/ns/foo/sa/rule[0]-from[1]-principal[1]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Oct 17 16:35:46 UTC 2023
    - 1.1K bytes
    - Viewed (0)
  5. pilot/pkg/security/authz/builder/testdata/http/extended-simple-policy-principal-with-wildcard-out.yaml

                    - authenticated:
                        principalName:
                          exact: spiffe://td1/ns/foo/sa/rule[0]-from[1]-principal[1]
                    - authenticated:
                        principalName:
                          safeRegex:
                            regex: spiffe://.*bar/ns/foo/sa/rule[0]-from[1]-principal[1]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 25 10:39:25 UTC 2024
    - 1.1K bytes
    - Viewed (0)
  6. pilot/pkg/security/trustdomain/bundle.go

    	for _, principal := range principals {
    		isTrustDomainBeingEnforced := isTrustDomainBeingEnforced(principal)
    		// Return the existing principals if the policy doesn't care about the trust domain.
    		if !isTrustDomainBeingEnforced {
    			principalsIncludingAliases = append(principalsIncludingAliases, principal)
    			continue
    		}
    		trustDomainFromPrincipal, err := getTrustDomainFromSpiffeIdentity(principal)
    		if err != nil {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Oct 23 15:48:01 UTC 2023
    - 7.5K bytes
    - Viewed (0)
  7. tests/integration/security/testdata/authz/allow-principal.yaml.tmpl

                methods: [ "GET" ]
          from:
            - source:
                principals: [ "{{ .Allowed.ServiceAccountName }}" ]
        - to:
            - operation: # GRPC
                ports: [ "{{ (.To.PortForName `grpc`).WorkloadPort }}" ]
                paths: [ "/proto.EchoTestService/Echo" ]
                methods: [ "POST" ]
          from:
            - source:
                principals: [ "{{ .Allowed.ServiceAccountName }}" ]
        - to:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 08 07:03:01 UTC 2023
    - 998 bytes
    - Viewed (0)
  8. tests/integration/security/testdata/authz/deny-principal.yaml.tmpl

                methods: [ "GET" ]
          from:
            - source:
                principals: [ "{{ .Denied.ServiceAccountName }}" ]
        - to:
            - operation: # GRPC
                ports: [ "{{ (.To.PortForName `grpc`).WorkloadPort }}" ]
                paths: [ "/proto.EchoTestService/Echo" ]
                methods: [ "POST" ]
          from:
            - source:
                principals: [ "{{ .Denied.ServiceAccountName }}" ]
        - to:
            - operation: # TCP
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 08 07:03:01 UTC 2023
    - 1K bytes
    - Viewed (0)
  9. pilot/pkg/security/authz/builder/testdata/tcp/deny-both-http-tcp-out.yaml

                            exact: spiffe://not-principal
                      - authenticated:
                          principalName:
                            safeRegex:
                              regex: spiffe://.*not-principal-suffix
                      - authenticated:
                          principalName:
                            prefix: spiffe://not-principal-prefix
                      - authenticated:
                          principalName:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Oct 17 16:35:46 UTC 2023
    - 11.1K bytes
    - Viewed (0)
  10. pilot/pkg/serviceregistry/kube/controller/ambient/testdata/deny-groups-in.yaml

      rules:
      # Has mix of L4 and L7 in from
      - from:
        - source:
            principals: ["from-mix-principal"]
            requestPrincipals: ["from-mix-requestPrincipals"]
            namespaces: ["from-mix-ns"]
        to:
        - operation:
            ports: ["80"]
      # Has mix of L4 and L7 in to
      - from:
        - source:
            principals: ["to-mix-principal"]
            namespaces: ["to-mix-ns"]
        to:
        - operation:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Feb 29 18:40:34 UTC 2024
    - 1.4K bytes
    - Viewed (0)
Back to top