Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for deng (0.24 sec)

  1. cni/pkg/nodeagent/testdata/localhost.yaml

      services:
        "default/example.com":
          80: 8080
        "default/example2.com":
          80: 8080
    policies:
      - action: Allow
        rules:
        - - - not_destination_ports:
              - 9999
        name: deny-9999
        namespace: default
        scope: Namespace
    services:
    - name: local
      namespace: default
      hostname: example.com
      vips:
        - /127.10.0.1
      ports:
        80: 8080
    - name: remote
    Others
    - Registered: Wed May 01 22:53:12 GMT 2024
    - Last Modified: Fri Jan 26 20:34:28 GMT 2024
    - 1.2K bytes
    - Viewed (0)
  2. architecture/ambient/peer-authentication.md

    spec:
      selector:
        matchLabels:
          app: a
      mtls:
        mode: STRICT
      portLevelMtls:
        9090:
          mode: PERMISSIVE
    ```
    
    will be translated into this `Authorization`:
    
    ```yaml
    action: DENY
    groups:
    - rules:
      - matches:
        - notPrincipals:
          - presence: {}
    - rules:
      - matches:
        - notDestinationPorts:
          - 9090
    name: converted_peer_authentication_strict-and-permissive-mtls
    Plain Text
    - Registered: Wed May 01 22:53:12 GMT 2024
    - Last Modified: Wed Aug 09 22:09:18 GMT 2023
    - 3.9K bytes
    - Viewed (0)
  3. manifests/charts/base/templates/validatingadmissionpolicy.yaml

    apiVersion: admissionregistration.k8s.io/v1
    kind: ValidatingAdmissionPolicyBinding
    metadata:
      name: "stable-channel-default-policy-binding.istio.io"
    spec:
      policyName: "stable-channel-default-policy.istio.io"
      validationActions: [Deny]
    Others
    - Registered: Wed Apr 24 22:53:08 GMT 2024
    - Last Modified: Mon Apr 22 22:00:40 GMT 2024
    - 1.6K bytes
    - Viewed (0)
  4. istioctl/pkg/authz/listener.go

    					addPolicy(action, anonymousName, "0")
    				}
    			}
    		}
    	}
    
    	buf := strings.Builder{}
    	buf.WriteString("ACTION\tAuthorizationPolicy\tRULES\n")
    	for _, action := range []rbacpb.RBAC_Action{rbacpb.RBAC_DENY, rbacpb.RBAC_ALLOW, rbacpb.RBAC_LOG} {
    		if names, ok := actionToPolicy[action]; ok {
    			sortedNames := make([]string, 0, len(names))
    			for name := range names {
    				sortedNames = append(sortedNames, name)
    			}
    Go
    - Registered: Wed May 01 22:53:12 GMT 2024
    - Last Modified: Mon Sep 11 15:29:30 GMT 2023
    - 6K bytes
    - Viewed (0)
Back to top