Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 8 of 8 for GetAuthorizationPolicies (0.31 sec)

  1. pilot/pkg/serviceregistry/kube/controller/ambient/ambientindex_workloadentry_test.go

    	assert.Equal(t,
    		s.lookup(s.addrXdsName("127.0.0.1"))[0].GetWorkload().GetAuthorizationPolicies(),
    		nil)
    	s.clearEvents()
    
    	s.addPolicy(t, "selector", "ns1", map[string]string{"app": "a"}, gvk.AuthorizationPolicy, nil)
    	s.assertEvent(t, s.wleXdsName("name1"))
    	assert.Equal(t,
    		s.lookup(s.addrXdsName("127.0.0.1"))[0].GetWorkload().GetAuthorizationPolicies(),
    		[]string{"ns1/selector"})
    
    	// WorkloadEntry not in policy
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 08 01:04:50 UTC 2024
    - 15.6K bytes
    - Viewed (0)
  2. pilot/pkg/model/authorization.go

    	// The name of the root namespace. Policy in the root namespace applies to workloads in all namespaces.
    	RootNamespace string `json:"root_namespace"`
    }
    
    // GetAuthorizationPolicies returns the AuthorizationPolicies for the given environment.
    func GetAuthorizationPolicies(env *Environment) *AuthorizationPolicies {
    	policy := &AuthorizationPolicies{
    		NamespaceToPolicies: map[string][]AuthorizationPolicy{},
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 4.2K bytes
    - Viewed (0)
  3. pilot/pkg/model/authorization_test.go

    		store.add(cfg)
    	}
    	environment := &Environment{
    		ConfigStore: store,
    		Watcher:     mesh.NewFixedWatcher(&meshconfig.MeshConfig{RootNamespace: "istio-config"}),
    	}
    	authzPolicies := GetAuthorizationPolicies(environment)
    	return authzPolicies
    }
    
    func newConfig(name, ns string, spec config.Spec) config.Config {
    	return config.Config{
    		Meta: config.Meta{
    			GroupVersionKind: gvk.AuthorizationPolicy,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 12.7K bytes
    - Viewed (0)
  4. pilot/pkg/networking/core/networkfilter_test.go

    		})
    
    		fcc := inboundChainConfig{
    			clusterName: "inbound|8888||",
    			port:        model.ServiceInstancePort{ServicePort: &model.Port{}},
    		}
    		push := cg.PushContext()
    		push.AuthzPolicies = getAuthorizationPolicies()
    		proxy := node(nil)
    		listenerFilters := NewListenerBuilder(proxy, push).buildInboundNetworkFilters(fcc)
    
    		RBACTCPFilterName := "envoy.filters.network.rbac"
    		listenerFilterChain := &listener.FilterChain{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 25.8K bytes
    - Viewed (0)
  5. pilot/pkg/security/authz/builder/builder_test.go

    	store := memory.Make(collections.Pilot)
    	for _, p := range policies {
    		if _, err := store.Create(*p); err != nil {
    			t.Fatalf("newAuthzPolicies: %v", err)
    		}
    	}
    
    	authzPolicies := model.GetAuthorizationPolicies(&model.Environment{
    		ConfigStore: store,
    	})
    	return authzPolicies
    }
    
    func push(t *testing.T, input string, mc *meshconfig.MeshConfig) *model.PushContext {
    	t.Helper()
    	p := &model.PushContext{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 13.8K bytes
    - Viewed (0)
  6. pilot/pkg/serviceregistry/kube/controller/ambient/ambientindex_test.go

    		})
    	})
    
    	t.Run("attach policy to workload", func(t *testing.T) {
    		assert.EventuallyEqual(t,
    			func() []string {
    				return s.lookup(s.addrXdsName("127.0.0.1"))[0].GetWorkload().GetAuthorizationPolicies()
    			},
    			[]string{policyName},
    		)
    	})
    }
    
    func TestPodLifecycleWorkloadGates(t *testing.T) {
    	s := newAmbientTestServer(t, "", "")
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 08 01:04:50 UTC 2024
    - 70.2K bytes
    - Viewed (0)
  7. pkg/workloadapi/workload.pb.go

    		return x.ApplicationTunnel
    	}
    	return nil
    }
    
    func (x *Workload) GetServices() map[string]*PortList {
    	if x != nil {
    		return x.Services
    	}
    	return nil
    }
    
    func (x *Workload) GetAuthorizationPolicies() []string {
    	if x != nil {
    		return x.AuthorizationPolicies
    	}
    	return nil
    }
    
    func (x *Workload) GetStatus() WorkloadStatus {
    	if x != nil {
    		return x.Status
    	}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 12 18:02:35 UTC 2024
    - 65.9K bytes
    - Viewed (0)
  8. pilot/pkg/model/push_context.go

    }
    
    // pre computes all AuthorizationPolicies per namespace
    func (ps *PushContext) initAuthorizationPolicies(env *Environment) {
    	ps.AuthzPolicies = GetAuthorizationPolicies(env)
    }
    
    func (ps *PushContext) initTelemetry(env *Environment) {
    	ps.Telemetry = getTelemetries(env)
    }
    
    func (ps *PushContext) initProxyConfigs(env *Environment) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 15 09:02:11 UTC 2024
    - 91.8K bytes
    - Viewed (0)
Back to top