- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 208 for principal1 (0.21 sec)
-
pilot/pkg/security/authz/model/principal.go
return &rbacpb.Principal{ Identifier: &rbacpb.Principal_AndIds{ AndIds: &rbacpb.Principal_Set{ Ids: principals, }, }, } } func principalNot(principal *rbacpb.Principal) *rbacpb.Principal { return &rbacpb.Principal{ Identifier: &rbacpb.Principal_NotId{ NotId: principal, }, } }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Nov 17 18:44:57 UTC 2022 - 2.8K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/multiple-policies-out.yaml
rules: - any: true principals: - andIds: ids: - orIds: ids: - authenticated: principalName: exact: spiffe://principals1 - authenticated: principalName: exact: spiffe://principals2 ns[foo]-policy[httpbin-6]-rule[0]:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 17 16:35:46 UTC 2023 - 4.5K bytes - Viewed (0) -
pilot/pkg/security/authz/model/model.go
} var principals []*rbacpb.Principal for _, rl := range m.principals { principal, err := generatePrincipal(rl, forTCP, useAuthenticated, action) if err != nil { return nil, err } principals = append(principals, principal) } if len(principals) == 0 { return nil, fmt.Errorf("must have at least 1 principal") } return &rbacpb.Policy{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 13.8K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/simple-policy-principal-with-wildcard-out.yaml
- authenticated: principalName: exact: spiffe://td1/ns/foo/sa/rule[0]-from[1]-principal[1] - authenticated: principalName: safeRegex: regex: spiffe://.*bar/ns/foo/sa/rule[0]-from[1]-principal[1]
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 17 16:35:46 UTC 2023 - 1.1K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-simple-policy-principal-with-wildcard-out.yaml
- authenticated: principalName: exact: spiffe://td1/ns/foo/sa/rule[0]-from[1]-principal[1] - authenticated: principalName: safeRegex: regex: spiffe://.*bar/ns/foo/sa/rule[0]-from[1]-principal[1]
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Mar 25 10:39:25 UTC 2024 - 1.1K bytes - Viewed (0) -
pilot/pkg/security/trustdomain/bundle.go
for _, principal := range principals { isTrustDomainBeingEnforced := isTrustDomainBeingEnforced(principal) // Return the existing principals if the policy doesn't care about the trust domain. if !isTrustDomainBeingEnforced { principalsIncludingAliases = append(principalsIncludingAliases, principal) continue } trustDomainFromPrincipal, err := getTrustDomainFromSpiffeIdentity(principal) if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Oct 23 15:48:01 UTC 2023 - 7.5K bytes - Viewed (0) -
tests/integration/security/testdata/authz/allow-principal.yaml.tmpl
methods: [ "GET" ] from: - source: principals: [ "{{ .Allowed.ServiceAccountName }}" ] - to: - operation: # GRPC ports: [ "{{ (.To.PortForName `grpc`).WorkloadPort }}" ] paths: [ "/proto.EchoTestService/Echo" ] methods: [ "POST" ] from: - source: principals: [ "{{ .Allowed.ServiceAccountName }}" ] - to:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 08 07:03:01 UTC 2023 - 998 bytes - Viewed (0) -
tests/integration/security/testdata/authz/deny-principal.yaml.tmpl
methods: [ "GET" ] from: - source: principals: [ "{{ .Denied.ServiceAccountName }}" ] - to: - operation: # GRPC ports: [ "{{ (.To.PortForName `grpc`).WorkloadPort }}" ] paths: [ "/proto.EchoTestService/Echo" ] methods: [ "POST" ] from: - source: principals: [ "{{ .Denied.ServiceAccountName }}" ] - to: - operation: # TCP
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 08 07:03:01 UTC 2023 - 1K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/tcp/deny-both-http-tcp-out.yaml
exact: spiffe://not-principal - authenticated: principalName: safeRegex: regex: spiffe://.*not-principal-suffix - authenticated: principalName: prefix: spiffe://not-principal-prefix - authenticated: principalName:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 17 16:35:46 UTC 2023 - 11.1K bytes - Viewed (0) -
pilot/pkg/serviceregistry/kube/controller/ambient/testdata/deny-groups-in.yaml
rules: # Has mix of L4 and L7 in from - from: - source: principals: ["from-mix-principal"] requestPrincipals: ["from-mix-requestPrincipals"] namespaces: ["from-mix-ns"] to: - operation: ports: ["80"] # Has mix of L4 and L7 in to - from: - source: principals: ["to-mix-principal"] namespaces: ["to-mix-ns"] to: - operation:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Feb 29 18:40:34 UTC 2024 - 1.4K bytes - Viewed (0)