Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 13 for DestinationPort (0.29 sec)

  1. pilot/pkg/security/authz/builder/testdata/http/extended-allow-full-rule-out.yaml

                - orRules:
                    rules:
                    - destinationPort: 80
                    - destinationPort: 90
                - notRule:
                    orRules:
                      rules:
                      - destinationPort: 8000
                      - destinationPort: 9000
                - orRules:
                    rules:
                    - destinationIp:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 03 18:02:42 UTC 2024
    - 39K bytes
    - Viewed (0)
  2. pilot/pkg/security/authz/builder/testdata/http/allow-full-rule-out.yaml

                - orRules:
                    rules:
                    - destinationPort: 80
                    - destinationPort: 90
                - notRule:
                    orRules:
                      rules:
                      - destinationPort: 8000
                      - destinationPort: 9000
                - orRules:
                    rules:
                    - destinationIp:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Apr 20 01:58:53 UTC 2024
    - 32.6K bytes
    - Viewed (0)
  3. pilot/pkg/networking/core/envoyfilter/listener_patch_test.go

    					Listener: &networking.EnvoyFilter_ListenerMatch{
    						Name: model.VirtualInboundListenerName,
    						FilterChain: &networking.EnvoyFilter_ListenerMatch_FilterChainMatch{
    							DestinationPort: 6380,
    							Filter: &networking.EnvoyFilter_ListenerMatch_FilterMatch{
    								Name: "network-filter-to-be-replaced",
    							},
    						},
    					},
    				},
    			},
    			Patch: &networking.EnvoyFilter_Patch{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Apr 21 17:42:54 UTC 2024
    - 70.1K bytes
    - Viewed (0)
  4. pilot/pkg/security/authz/model/permission.go

    			DestinationIp: cidr,
    		},
    	}
    }
    
    func permissionDestinationPort(port uint32) *rbacpb.Permission {
    	return &rbacpb.Permission{
    		Rule: &rbacpb.Permission_DestinationPort{
    			DestinationPort: port,
    		},
    	}
    }
    
    func permissionRequestedServerName(name *matcher.StringMatcher) *rbacpb.Permission {
    	return &rbacpb.Permission{
    		Rule: &rbacpb.Permission_RequestedServerName{
    			RequestedServerName: name,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Apr 20 01:58:53 UTC 2024
    - 3K bytes
    - Viewed (0)
  5. pilot/pkg/networking/core/envoyfilter/listener_patch.go

    				return false
    			}
    		}
    	}
    
    	// check match for destination port within the FilterChainMatch
    	if match.DestinationPort > 0 {
    		if fc.FilterChainMatch == nil || fc.FilterChainMatch.DestinationPort == nil {
    			return false
    		} else if fc.FilterChainMatch.DestinationPort.Value != match.DestinationPort {
    			return false
    		}
    	}
    	return true
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 17 15:39:29 UTC 2024
    - 26.7K bytes
    - Viewed (0)
  6. pilot/pkg/security/authz/model/generator_test.go

              addressPrefix: 1.2.3.4
              prefixLen: 32`),
    		},
    		{
    			name:  "destPortGenerator",
    			g:     destPortGenerator{},
    			value: "80",
    			want: yamlPermission(t, `
             destinationPort: 80`),
    		},
    		{
    			name:  "connSNIGenerator",
    			g:     connSNIGenerator{},
    			value: "exact.com",
    			want: yamlPermission(t, `
             requestedServerName:
              exact: exact.com`),
    		},
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Apr 20 01:58:53 UTC 2024
    - 13K bytes
    - Viewed (0)
  7. pilot/pkg/networking/core/listener_builder.go

    			// We should not allow requests to the listen port directly. Requests must be
    			// sent to some other original port and iptables redirected to 15001. This
    			// ensures we do not passthrough back to the listen port.
    			DestinationPort: &wrappers.UInt32Value{Value: uint32(push.Mesh.ProxyListenPort)},
    		},
    		Filters: append(
    			buildMetricsNetworkFilters(push, node, istionetworking.ListenerClassSidecarOutbound, nil),
    			&listener.Filter{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 06 04:44:06 UTC 2024
    - 17.9K bytes
    - Viewed (0)
  8. pilot/pkg/networking/core/listener_inbound.go

    	match := &listener.FilterChainMatch{}
    	match.ApplicationProtocols = opt.ApplicationProtocols
    	match.TransportProtocol = opt.TransportProtocol
    	if cc.port.TargetPort > 0 {
    		match.DestinationPort = &wrappers.UInt32Value{Value: cc.port.TargetPort}
    	}
    	return match
    }
    
    func (lb *ListenerBuilder) buildInboundHBONEListeners() []*listener.Listener {
    	routes := []*route.Route{{
    		Match: &route.RouteMatch{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 35.1K bytes
    - Viewed (0)
  9. pilot/pkg/simulation/traffic.go

    func (sim *Simulation) matchFilterChain(chains []*listener.FilterChain, defaultChain *listener.FilterChain,
    	input Call, hasTLSInspector bool,
    ) (*listener.FilterChain, error) {
    	chains = filter("DestinationPort", chains, func(fc *listener.FilterChainMatch) bool {
    		return fc.GetDestinationPort() == nil
    	}, func(fc *listener.FilterChainMatch) bool {
    		return int(fc.GetDestinationPort().GetValue()) == input.Port
    	})
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  10. pilot/pkg/networking/core/listener_test.go

    	virtualListener := xdstest.ExtractListener(model.VirtualInboundListenerName, listeners)
    	for _, fc := range virtualListener.FilterChains {
    		if fc.FilterChainMatch.DestinationPort.GetValue() == 15021 {
    			t.Fatalf("port 15021 should not be included in inbound listener")
    		}
    	}
    }
    
    func testInboundListenerConfigWithGrpc(t *testing.T, proxy *model.Proxy, services ...*model.Service) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 93.6K bytes
    - Viewed (0)
Back to top