Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for AuthNFilter (0.17 sec)

  1. pilot/pkg/security/authn/factory.go

    	// It may return nil, if no JWT validation is needed.
    	JwtFilter(useExtendedJwt, clearRouteCache bool) *hcm.HttpFilter
    
    	// AuthNFilter returns the (authn) HTTP filter to enforce the underlying authentication policy.
    	// It may return nil, if no authentication is needed.
    	AuthNFilter(forSidecar bool) *hcm.HttpFilter
    
    	// PortLevelSetting returns port level mTLS settings.
    	PortLevelSetting() map[uint32]model.MutualTLSMode
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 3K bytes
    - Viewed (0)
  2. pilot/pkg/networking/plugin/authn/authentication.go

    	}
    	res := []*hcm.HttpFilter{}
    	if filter := b.applier.JwtFilter(false, false); filter != nil {
    		res = append(res, filter)
    	}
    	forSidecar := b.proxy.Type == model.SidecarProxy
    	if filter := b.applier.AuthNFilter(forSidecar); filter != nil {
    		res = append(res, filter)
    	}
    
    	return res
    }
    
    func needPerPortPassthroughFilterChain(port uint32, node *model.Proxy) bool {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 4.4K bytes
    - Viewed (0)
  3. pilot/pkg/security/authn/policy_applier.go

    			},
    		})
    	}
    	return config
    }
    
    // AuthNFilter returns the Istio authn filter config:
    // - If RequestAuthentication is used, it overwrite the settings for request principal validation and extraction based on the new API.
    // - If RequestAuthentication is used, principal binding is always set to ORIGIN.
    func (a policyApplier) AuthNFilter(forSidecar bool) *hcm.HttpFilter {
    	var filterConfigProto *authn_filter.FilterConfig
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Feb 23 09:47:21 UTC 2024
    - 19.2K bytes
    - Viewed (0)
  4. pilot/pkg/security/authn/policy_applier_test.go

    				},
    			},
    			expected: nil,
    		},
    	}
    	for _, c := range cases {
    		t.Run(c.name, func(t *testing.T) {
    			got := newPolicyApplier("root-namespace", c.jwtIn, c.peerIn, &model.PushContext{}).AuthNFilter(c.forSidecar)
    			if !reflect.DeepEqual(c.expected, got) {
    				t.Errorf("got:\n%v\nwanted:\n%v\n", humanReadableAuthnFilterDump(got), humanReadableAuthnFilterDump(c.expected))
    			}
    		})
    	}
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Dec 01 07:32:22 UTC 2023
    - 60.2K bytes
    - Viewed (0)
Back to top