Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for PolicyMatcherFor (0.35 sec)

  1. pilot/pkg/security/authn/factory.go

    	return newPolicyApplier(
    		push.AuthnPolicies.GetRootNamespace(),
    		nil,
    		push.AuthnPolicies.GetPeerAuthenticationsForWorkload(model.PolicyMatcherFor(namespace, labels, isWaypoint)),
    		push,
    	)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 3K bytes
    - Viewed (0)
  2. pilot/pkg/model/policyattachment.go

    // or the Services the workload is a part of.
    type WorkloadPolicyMatcher struct {
    	Namespace      string
    	WorkloadLabels labels.Instance
    	IsWaypoint     bool
    	Service        string
    }
    
    func PolicyMatcherFor(workloadNamespace string, labels labels.Instance, isWaypoint bool) WorkloadPolicyMatcher {
    	return WorkloadPolicyMatcher{
    		Namespace:      workloadNamespace,
    		WorkloadLabels: labels,
    		IsWaypoint:     isWaypoint,
    	}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 4.9K bytes
    - Viewed (0)
  3. pilot/pkg/model/authentication_test.go

    						},
    					},
    				},
    			},
    			wantNamespaceMutualTLS: MTLSStrict,
    		},
    	}
    
    	for _, tc := range cases {
    		t.Run(tc.name, func(t *testing.T) {
    			matcher := PolicyMatcherFor(tc.workloadNamespace, tc.workloadLabels, tc.isWaypoint)
    			if got := policies.GetJwtPoliciesForWorkload(matcher); !reflect.DeepEqual(tc.wantRequestAuthn, got) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 45.1K bytes
    - Viewed (0)
Back to top