- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 196 for mtls (0.04 sec)
-
pkg/kube/inject/testdata/inject/hello-mount-mtls-certs.yaml.injected
John Howard <******@****.***> 1709052916 -0800
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Feb 27 16:55:16 UTC 2024 - 6.8K bytes - Viewed (0) -
pilot/pkg/serviceregistry/kube/controller/ambient/testdata/peer-authn-strict-and-strict-port-mtls.yaml
John Howard <******@****.***> 1709232034 -0800
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Feb 29 18:40:34 UTC 2024 - Viewed (0) -
pilot/pkg/networking/core/filterchain_options.go
return inboundPlainTextTCPFilterChainMatchOptions } } } func (opt FilterChainMatchOptions) ToTransportSocket(mtls authn.MTLSSettings) *tls.DownstreamTlsContext { if !opt.TLS { return nil } if opt.Protocol == networking.ListenerProtocolHTTP { return mtls.HTTP } return mtls.TCP
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Mar 28 17:09:02 UTC 2024 - 8.4K bytes - Viewed (0) -
tests/integration/security/testdata/authz/plaintext.yaml.tmpl
# This configures all services within the namespace to use mTLS with permissive mode (allowing plaintext). apiVersion: security.istio.io/v1beta1 kind: PeerAuthentication metadata: name: ns-default namespace: {{ .To.NamespaceName }} spec: mtls: mode: PERMISSIVE --- # This configures requests to any service in the namespace to use mTLS. apiVersion: networking.istio.io/v1beta1 kind: DestinationRule metadata:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 08 07:03:01 UTC 2023 - 1.3K bytes - Viewed (0) -
tests/integration/ambient/testdata/global-plaintext.yaml
# mTLS is disabled without destination rule. apiVersion: security.istio.io/v1beta1 kind: PeerAuthentication metadata: name: "default" annotations: test-suite: "beta-mtls-off" spec: mtls:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Feb 16 18:55:23 UTC 2023 - 215 bytes - Viewed (0) -
pilot/pkg/config/kube/gateway/testdata/tls.yaml.golden
internal.istio.io/parents: Gateway/gateway/terminate-mtls.istio-system creationTimestamp: null name: gateway-istio-autogenerated-k8s-gateway-terminate-mtls namespace: istio-system spec: servers: - hosts: - '*/other.example' port: name: default number: 34000 protocol: HTTPS tls: credentialName: kubernetes-gateway://istio-system/my-cert-http
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Mar 01 20:54:36 UTC 2024 - 4K bytes - Viewed (0) -
architecture/ambient/peer-authentication.md
the effective policy is `PERMISSIVE` (the default), the ztunnel will open a vanilla TLS HBONE tunnel (NOTE: this is not mTLS) to the Waypoint proxy and forward the traffic over that connection without presenting a client certificate. Therefore, it is absolutely critical that the waypoint proxy not assume any identity from incoming connections, even if the ztunnel is hairpinning. In other words, all traffic over TLS HBONE tunnels must be considered to be untrusted. From there, traffic is returned to...
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Aug 09 22:09:18 UTC 2023 - 3.9K bytes - Viewed (0) -
pilot/pkg/serviceregistry/kube/controller/ambient/testdata/peer-authn-disable-in.yaml
apiVersion: security.istio.io/v1beta1 kind: PeerAuthentication metadata: name: disable-mtls spec: mtls:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Feb 29 18:40:34 UTC 2024 - 127 bytes - Viewed (0) -
pilot/pkg/config/kube/gateway/testdata/tls.yaml
hostname: "other.example" port: 34000 protocol: HTTPS allowedRoutes: namespaces: from: All tls: mode: Terminate certificateRefs: - name: my-cert-http options: gateway.istio.io/tls-terminate-mode: MUTUAL - name: terminate-istio-mtls hostname: "egress.example" port: 34000 protocol: HTTPS allowedRoutes: namespaces:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Mar 01 20:54:36 UTC 2024 - 2K bytes - Viewed (0) -
tests/integration/security/ca_custom_root/trust_domain_validation_test.go
) const ( httpPlaintext = "http-plaintext" httpMTLS = "http-mtls" tcpPlaintext = "tcp-plaintext" tcpMTLS = "tcp-mtls" tcpWL = "tcp-wl" passThrough = "tcp-mtls-pass-through" // policy to enable mTLS in client and server: // ports with plaintext: 8090 (http) and 8092 (tcp) // ports with mTLS: 8091 (http), 8093 (tcp) and 9000 (tcp passthrough). policy = `
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 5.9K bytes - Viewed (0)