- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 355 for ServiceName (0.15 sec)
-
tests/integration/security/policy_attachment_only/testdata/requestauthn/gateway-api.yaml.tmpl
kind: Gateway metadata: name: {{ .To.ServiceName }}-gateway spec: gatewayClassName: istio listeners: - name: http port: 80 protocol: HTTP hostname: "*.{{ .To.ServiceName }}.com" --- apiVersion: gateway.networking.k8s.io/v1beta1 kind: HTTPRoute metadata: name: {{ .To.ServiceName }} spec: parentRefs: - name: {{ .To.ServiceName }}-gateway hostnames:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Sep 27 22:08:42 UTC 2023 - 574 bytes - Viewed (0) -
src/main/java/jcifs/smb/JAASAuthenticator.java
* * @param serviceName * JAAS configuration name */ public JAASAuthenticator ( String serviceName ) { super(null); this.serviceName = serviceName; } /** * Create an authenticator using the given JAAS service and the specified credentials * * @param serviceName * JAAS configuration name
Registered: Wed Jun 12 15:45:55 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 8.1K bytes - Viewed (0) -
tests/integration/security/testdata/authz/ingress-gateway.yaml.tmpl
# The following policy denies access to "internal.{{ .To.ServiceName }}.company.com" # and path "/private", denies access from 172.17.72.46 or 192.168.4.0/23 to # "remoteipblocks.{{ .To.ServiceName }}.company.com", denies access from anything # but 172.23.240.0/22 to "notremoteipblocks.{{ .To.ServiceName }}.company.com", # and denies access to "remoteipattr.{{ .To.ServiceName }}.company.com" when the # remote ip is 10.242.5.7 or in the network 10.124.99.0/24.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 08 07:03:01 UTC 2023 - 2.5K bytes - Viewed (0) -
pkg/test/framework/components/echo/common/deployment/namespace.go
} n.Tproxy = match.ServiceName(echo.NamespacedName{Name: TproxySvc, Namespace: ns}).GetMatches(echos) n.Headless = match.ServiceName(echo.NamespacedName{Name: HeadlessSvc, Namespace: ns}).GetMatches(echos) n.StatefulSet = match.ServiceName(echo.NamespacedName{Name: StatefulSetSvc, Namespace: ns}).GetMatches(echos)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 20 16:01:31 UTC 2024 - 6.1K bytes - Viewed (0) -
tests/integration/security/testdata/requestauthn/aud.yaml.tmpl
apiVersion: security.istio.io/v1beta1 kind: RequestAuthentication metadata: name: {{ .To.ServiceName }}-part1 spec: selector: matchLabels: app: {{ .To.ServiceName }} jwtRules: - issuer: "******@****.***" jwksUri: "https://raw.githubusercontent.com/istio/istio/master/tests/common/jwt/jwks.json" audiences: - "foo" - issuer: "******@****.***"
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 08 07:03:01 UTC 2023 - 838 bytes - Viewed (0) -
pilot/pkg/model/endpointshards.go
func (e *EndpointIndex) deleteServiceInner(shard ShardKey, serviceName, namespace string, preserveKeys bool) { if e.shardsBySvc[serviceName] == nil || e.shardsBySvc[serviceName][namespace] == nil { return } epShards := e.shardsBySvc[serviceName][namespace] epShards.Lock() delete(epShards.Shards, shard) // Clear the cache here to avoid race in cache writes. e.clearCacheForService(serviceName, namespace) if !preserveKeys {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jun 14 04:34:37 UTC 2024 - 15.6K bytes - Viewed (0) -
tests/integration/ambient/testdata/gateway-api.yaml
kind: Gateway metadata: name: {{ .To.ServiceName }}-gateway spec: gatewayClassName: istio listeners: - name: http port: 80 protocol: HTTP hostname: "*.{{ .To.ServiceName }}.com" --- apiVersion: gateway.networking.k8s.io/v1beta1 kind: HTTPRoute metadata: name: {{ .To.ServiceName }} spec: parentRefs: - name: {{ .To.ServiceName }}-gateway hostnames:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 03 21:02:05 UTC 2024 - 574 bytes - Viewed (0) -
tests/integration/security/policy_attachment_only/testdata/requestauthn/gateway-jwt.yaml.tmpl
apiVersion: security.istio.io/v1beta1 kind: AuthorizationPolicy metadata: name: authz-gateway-{{ .To.ServiceName }} spec: targetRef: name: {{ .To.ServiceName }}-gateway kind: Gateway group: gateway.networking.k8s.io rules: - to: - operation: hosts: {{- range $svc := .Services }} - "example.{{ $svc.ServiceName }}.com" {{- end }} from: - source:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Dec 05 21:52:53 UTC 2023 - 1.7K bytes - Viewed (0) -
tests/integration/security/policy_attachment_only/testdata/authz/gateway-api.yaml.tmpl
kind: Gateway metadata: name: {{ .To.ServiceName }}-gateway spec: gatewayClassName: istio listeners: - name: http # Exposing port 80 isn't the recommended security practice port: 80 protocol: HTTP hostname: "*.{{ .To.ServiceName }}.com" --- apiVersion: gateway.networking.k8s.io/v1beta1 kind: HTTPRoute metadata: name: {{ .To.ServiceName }} spec: parentRefs:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Oct 24 19:50:43 UTC 2023 - 729 bytes - Viewed (0) -
tests/integration/security/testdata/authz/workload-system-ns.yaml.tmpl
apiVersion: security.istio.io/v1beta1 kind: AuthorizationPolicy metadata: name: policy-system-{{ .To.ServiceName }} spec: selector: matchLabels: "app": "{{ .To.ServiceName }}" rules: - to: - operation: paths: ["/policy-system-{{ .To.ServiceName }}"]
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 08 07:03:01 UTC 2023 - 360 bytes - Viewed (0)