- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 118 for MUTUAL (0.24 sec)
-
pkg/config/analysis/analyzers/testdata/destinationrule-mutual-port.yaml
# No caCertificates when mode is mutual at port level apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata: name: db-mtls spec: host: mydbserver.prod.svc.cluster.local trafficPolicy: portLevelSettings: - port: number: 443 tls: mode: MUTUAL clientCertificate: /etc/certs/myclientcert.pem privateKey: /etc/certs/client_private_key.pem
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Nov 17 12:28:05 UTC 2021 - 472 bytes - Viewed (0) -
pkg/config/analysis/analyzers/testdata/destinationrule-mutual-destination.yaml
# No caCertificates when mode is mutual at destination level apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata: name: db-mtls spec: host: mydbserver.prod.svc.cluster.local trafficPolicy: tls: mode: MUTUAL clientCertificate: /etc/certs/myclientcert.pem
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Nov 17 12:28:05 UTC 2021 - 348 bytes - Viewed (0) -
pkg/config/analysis/analyzers/testdata/destinationrule-compound-mutual-simple.yaml
# No caCertificates when mode is simple at destination level and MUTUAL at port level apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata: name: db-mtls spec: host: mydbserver.prod.svc.cluster.local trafficPolicy: tls: mode: SIMPLE clientCertificate: /etc/certs/myclientcert.pem privateKey: /etc/certs/client_private_key.pem portLevelSettings: - port: number: 443 tls:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Nov 17 12:28:05 UTC 2021 - 638 bytes - Viewed (0) -
pkg/config/analysis/analyzers/testdata/destinationrule-compound-simple-mutual.yaml
apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata: name: db-mtls spec: host: mydbserver.prod.svc.cluster.local trafficPolicy: tls: mode: MUTUAL clientCertificate: /etc/certs/myclientcert.pem privateKey: /etc/certs/client_private_key.pem portLevelSettings: - port: number: 443 tls: mode: SIMPLE
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Nov 17 12:28:05 UTC 2021 - 599 bytes - Viewed (0) -
releasenotes/notes/istio-mutual-cred-name.yaml
apiVersion: release-notes/v2 kind: bug-fix area: traffic-management releaseNotes: - | **Fixed** an issue where using `ISTIO_MUTUAL` TLS mode in Gateways while also setting `credentialName` cause mutual TLS to not be configured. This configuration is now rejected, as `ISTIO_MUTUAL` is intended to be used without `credentialName` set.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Jan 22 06:41:00 UTC 2022 - 480 bytes - Viewed (0) -
tests/integration/ambient/testdata/automtls-partial-sidecar-dr-mutual.yaml
kind: PeerAuthentication metadata: name: "default" annotations: test-suite: "automtls-partial-dr-mutual" spec: mtls: mode: STRICT --- apiVersion: networking.istio.io/v1alpha3 kind: VirtualService metadata: name: "multiversion-route" annotations: test-suite: "automtls-partial-dr-mutual" spec: hosts: - "multiversion" http: - name: "vistio-route" match: - uri:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Feb 16 18:55:23 UTC 2023 - 1.1K bytes - Viewed (0) -
pkg/config/analysis/analyzers/testdata/destinationrule-with-ca.yaml
# caCertificates when mode is mutual at destination level and simple at port level apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata: name: db-mtls spec: host: mydbserver.prod.svc.cluster.local trafficPolicy: tls: mode: MUTUAL clientCertificate: /etc/certs/myclientcert.pem privateKey: /etc/certs/client_private_key.pem caCertificates: /etc/certs/root.pem portLevelSettings:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Nov 17 12:28:05 UTC 2021 - 723 bytes - Viewed (0) -
tests/integration/security/egress_sidecar_tls_origination_test.go
"istio.io/istio/pkg/test/framework/resource/config/apply" "istio.io/istio/pkg/test/util/file" ingressutil "istio.io/istio/tests/integration/security/sds_ingress/util" ) // TestSidecarMutualTlsOrigination test MUTUAL TLS mode with TLS origination happening at the sidecar. // It uses CredentialName set in DestinationRule API to fetch secrets from k8s API server. func TestSidecarMutualTlsOrigination(t *testing.T) { // nolint: staticcheck
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 10.4K bytes - Viewed (0) -
tests/integration/security/testdata/authz/egress-gateway.yaml.tmpl
hosts: [ "www.company.com" ] - to: # checks only a call 443 over istio mutual without JWT - operation: hosts: [ "{{ .Allowed.ServiceName }}-{{ .Allowed.NamespaceName }}-only.com" ] from: - source: principals: [ "{{ .Allowed.ServiceAccountName }}" ] - to: # checks workload can call 443 over istio mutual with JWT - operation: hosts: [ "jwt-only.com" ] from:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jul 31 15:08:52 UTC 2023 - 5.2K bytes - Viewed (0) -
tests/testdata/networking/envoyfilter-without-service/configs.yaml
# Authentication policy to enable mutual TLS for all services (that have sidecar) in the mesh. apiVersion: security.istio.io/v1beta1 kind: PeerAuthentication metadata: name: default namespace: istio-config spec: mtls: mode: STRICT --- # Corresponding destination rule to configure client side to use mutual TLS when talking to # any service (host) in the mesh. apiVersion: networking.istio.io/v1alpha3 kind: DestinationRule metadata:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jul 13 16:44:49 UTC 2023 - 1.8K bytes - Viewed (0)