- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 66 for principal2 (0.18 sec)
-
pilot/pkg/security/authz/builder/testdata/http/allow-full-rule-in.yaml
notValues: ["not-ns", "not-ns-prefix-*", "*-not-ns-suffix", "*"] - key: "source.principal" values: ["principal", "principal-prefix-*", "*-suffix-principal", "*"] notValues: ["not-principal", "not-principal-prefix-*", "*-not-suffix-principal", "*"] - key: "request.auth.principal"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 4.1K bytes - Viewed (0) -
pkg/config/validation/validation_test.go
Values: []string{"source.namespace1"}, NotValues: []string{"source.namespace2"}, }, { Key: "source.principal", Values: []string{"source.principal1"}, NotValues: []string{"source.principal2"}, }, { Key: "request.auth.claims[a]", Values: []string{"claims1"}, NotValues: []string{"claims2"},
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 30 03:11:45 UTC 2024 - 196K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/allow-full-rule-out.yaml
regex: .+ principals: - andIds: ids: - orIds: ids: - authenticated: principalName: exact: spiffe://principal - authenticated: principalName: prefix: spiffe://principal-prefix- - authenticated:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 32.6K bytes - Viewed (0) -
pilot/pkg/security/authz/model/generator.go
permission(key, value string, forTCP bool) (*rbacpb.Permission, error) principal(key, value string, forTCP bool, useAuthenticated bool) (*rbacpb.Principal, error) } type extendedGenerator interface { extendedPermission(key string, value []string, forTCP bool) (*rbacpb.Permission, error) extendedPrincipal(key string, value []string, forTCP bool) (*rbacpb.Principal, error) } type destIPGenerator struct{}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 03 18:02:42 UTC 2024 - 14.1K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/extended-allow-full-rule-out.yaml
regex: .+ principals: - andIds: ids: - orIds: ids: - authenticated: principalName: exact: spiffe://principal - authenticated: principalName: prefix: spiffe://principal-prefix- - authenticated:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 03 18:02:42 UTC 2024 - 39K bytes - Viewed (0) -
pilot/pkg/security/authz/model/generator_test.go
if err != nil { t.Errorf("both permission and principal returned error") } } else if _, ok := tc.want.(*rbacpb.Principal); ok { got, err = tc.g.principal(tc.key, tc.value, tc.forTCP, false) if err != nil { t.Errorf("both permission and principal returned error") } } else { _, err1 := tc.g.principal(tc.key, tc.value, tc.forTCP, false)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 13K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/builder_test.go
}, { name: "trust-domain-wildcard-in-principal", tdBundle: trustdomain.NewBundle("td1", []string{"foobar"}), input: "simple-policy-principal-with-wildcard-in.yaml", want: []string{"simple-policy-principal-with-wildcard-out.yaml"}, }, { name: "trust-domain-aliases-in-source-principal", tdBundle: trustdomain.NewBundle("new-td", []string{"old-td", "some-trustdomain"}),
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 13.8K bytes - Viewed (0) -
docs/iam/policies/deny-objects-with-invalid-sse-kms-key-id.json
{ "Version":"2012-10-17", "Id":"PutObjectPolicy1", "Statement":[{ "Sid":"DenyObjectsWithInvalidSSEKMS", "Effect":"Deny", "Principal":"*", "Action":"s3:PutObject", "Resource":"arn:aws:s3:::multi-key-poc/*", "Condition":{ "StringNotEquals":{ "s3:x-amz-server-side-encryption-aws-kms-key-id":"minio-default-key" } } } ]
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 14 15:43:07 UTC 2024 - 439 bytes - Viewed (0) -
docs/iam/policies/deny-non-sse-kms-objects.json
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 14 15:43:07 UTC 2024 - 413 bytes - Viewed (0) -
pilot/pkg/xds/auth.go
"istio.io/istio/pkg/spiffe" ) // authenticate authenticates the ADS request using the configured authenticators. // Returns the validated principals or an error. // If no authenticators are configured, or if the request is on a non-secure // stream ( 15010 ) - returns an empty list of principals and no errors. func (s *DiscoveryServer) authenticate(ctx context.Context) ([]string, error) { c, err := security.Authenticate(ctx, s.Authenticators)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 30 00:26:45 UTC 2024 - 2.4K bytes - Viewed (0)