Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 18 for ExtAuthz (0.14 sec)

  1. pilot/pkg/security/authz/builder/extauthz.go

    	for code := range envoytypev3.StatusCode_name {
    		supported = append(supported, int(code))
    	}
    	sort.Ints(supported)
    	return supported
    }()
    
    type builtExtAuthz struct {
    	http *extauthzhttp.ExtAuthz
    	tcp  *extauthztcp.ExtAuthz
    	err  error
    }
    
    func processExtensionProvider(push *model.PushContext) map[string]*builtExtAuthz {
    	resolved := map[string]*builtExtAuthz{}
    	for i, config := range push.Mesh.ExtensionProviders {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 20:06:41 UTC 2024
    - 12.7K bytes
    - Viewed (0)
  2. samples/extauthz/docker/Dockerfile

    ARG BASE_VERSION=latest
    ARG ISTIO_BASE_REGISTRY=gcr.io/istio-release
    
    FROM ${ISTIO_BASE_REGISTRY}/base:${BASE_VERSION}
    
    ARG TARGETARCH
    COPY ${TARGETARCH:-amd64}/extauthz /usr/local/bin/extauthz
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Dec 19 15:53:08 UTC 2022
    - 234 bytes
    - Viewed (0)
  3. pkg/config/analysis/analyzers/testdata/envoy-filter-add-operation.yaml

          value:
            name: envoy.filters.http.ext_authz
            typed_config:
              "@type": type.googleapis.com/envoy.extensions.filters.http.ext_authz.v3.ExtAuthz
              grpc_service:
                envoy_grpc:
                  cluster_name: acme-ext-authz
                initial_metadata:
                - key: foo
                  value: myauth.acme # required by local ext auth server.
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 31 19:38:42 UTC 2022
    - 3.6K bytes
    - Viewed (0)
  4. pilot/pkg/security/authz/builder/testdata/tcp/custom-both-http-tcp-out2.yaml

    name: envoy.filters.network.ext_authz
    typedConfig:
      '@type': type.googleapis.com/envoy.extensions.filters.network.ext_authz.v3.ExtAuthz
      failureModeAllow: true
      filterEnabledMetadata:
        filter: envoy.filters.network.rbac
        path:
        - key: istio_ext_authz_shadow_effective_policy_id
        value:
          stringMatch:
            prefix: istio-ext-authz
      grpcService:
        envoyGrpc:
          authority: my-custom-ext-authz.foo.svc.cluster.local
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Aug 07 15:18:13 UTC 2023
    - 582 bytes
    - Viewed (0)
  5. pilot/pkg/security/authz/builder/testdata/http/extended-custom-grpc-provider-out2.yaml

    name: envoy.filters.http.ext_authz
    typedConfig:
      '@type': type.googleapis.com/envoy.extensions.filters.http.ext_authz.v3.ExtAuthz
      failureModeAllow: true
      filterEnabledMetadata:
        filter: envoy.filters.http.rbac
        path:
        - key: istio_ext_authz_shadow_effective_policy_id
        value:
          stringMatch:
            prefix: istio-ext-authz
      grpcService:
        envoyGrpc:
          authority: my-custom-ext-authz.foo.svc.cluster.local
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 25 10:39:25 UTC 2024
    - 666 bytes
    - Viewed (0)
  6. pilot/pkg/security/authz/builder/testdata/http/extended-custom-grpc-provider-no-namespace-out2.yaml

    name: envoy.filters.http.ext_authz
    typedConfig:
      '@type': type.googleapis.com/envoy.extensions.filters.http.ext_authz.v3.ExtAuthz
      failureModeAllow: true
      filterEnabledMetadata:
        filter: envoy.filters.http.rbac
        path:
        - key: istio_ext_authz_shadow_effective_policy_id
        value:
          stringMatch:
            prefix: istio-ext-authz
      grpcService:
        envoyGrpc:
          authority: my-custom-ext-authz.foo.svc.cluster.local
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Mar 25 10:39:25 UTC 2024
    - 589 bytes
    - Viewed (0)
  7. tools/docker.yaml

      files:
      - tests/testdata/certs
      targets:
      - ${TARGET_OUT_LINUX}/client
      - ${TARGET_OUT_LINUX}/server
    
    # Sample authz server
    - name: ext-authz
      dockerfile: samples/extauthz/docker/Dockerfile
      targets:
        - ${TARGET_OUT_LINUX}/extauthz
    
    # TODO(https://github.com/istio/istio/issues/38224)
    - name: app_sidecar_rockylinux_9
      dockerfile: pkg/test/echo/docker/Dockerfile.app_sidecar_centos_8
      files:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 09 12:26:52 UTC 2024
    - 4.4K bytes
    - Viewed (0)
  8. pilot/pkg/security/authz/builder/testdata/http/custom-grpc-provider-no-namespace-out2.yaml

    name: envoy.filters.http.ext_authz
    typedConfig:
      '@type': type.googleapis.com/envoy.extensions.filters.http.ext_authz.v3.ExtAuthz
      failureModeAllow: true
      filterEnabledMetadata:
        filter: envoy.filters.http.rbac
        path:
        - key: istio_ext_authz_shadow_effective_policy_id
        value:
          stringMatch:
            prefix: istio-ext-authz
      grpcService:
        envoyGrpc:
          authority: my-custom-ext-authz.foo.svc.cluster.local
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Aug 07 15:18:13 UTC 2023
    - 589 bytes
    - Viewed (0)
  9. pilot/pkg/security/authz/builder/builder.go

    		}
    		return []*hcm.HttpFilter{
    			{
    				Name:       wellknown.HTTPRoleBasedAccessControl,
    				ConfigType: &hcm.HttpFilter_TypedConfig{TypedConfig: protoconv.MessageToAny(rbac)},
    			},
    		}
    	}
    
    	extauthz, err := getExtAuthz(b.extensions, providers)
    	if err != nil {
    		b.logger.AppendError(multierror.Prefix(err, "failed to process CUSTOM action, will generate deny configs for the specified rules:"))
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Nov 20 22:15:12 UTC 2023
    - 12.6K bytes
    - Viewed (0)
  10. pilot/pkg/security/authz/builder/testdata/http/custom-grpc-provider-out2.yaml

    name: envoy.filters.http.ext_authz
    typedConfig:
      '@type': type.googleapis.com/envoy.extensions.filters.http.ext_authz.v3.ExtAuthz
      failureModeAllow: true
      filterEnabledMetadata:
        filter: envoy.filters.http.rbac
        path:
        - key: istio_ext_authz_shadow_effective_policy_id
        value:
          stringMatch:
            prefix: istio-ext-authz
      grpcService:
        envoyGrpc:
          authority: my-custom-ext-authz.foo.svc.cluster.local
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Aug 07 15:18:13 UTC 2023
    - 666 bytes
    - Viewed (0)
Back to top