- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for DestinationPort (0.35 sec)
-
pilot/pkg/security/authz/builder/testdata/http/extended-allow-full-rule-out.yaml
- orRules: rules: - destinationPort: 80 - destinationPort: 90 - notRule: orRules: rules: - destinationPort: 8000 - destinationPort: 9000 - orRules: rules: - destinationIp:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 03 18:02:42 UTC 2024 - 39K bytes - Viewed (0) -
pilot/pkg/security/authz/builder/testdata/http/allow-full-rule-out.yaml
- orRules: rules: - destinationPort: 80 - destinationPort: 90 - notRule: orRules: rules: - destinationPort: 8000 - destinationPort: 9000 - orRules: rules: - destinationIp:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 32.6K bytes - Viewed (0) -
pilot/pkg/networking/core/envoyfilter/listener_patch_test.go
Listener: &networking.EnvoyFilter_ListenerMatch{ Name: model.VirtualInboundListenerName, FilterChain: &networking.EnvoyFilter_ListenerMatch_FilterChainMatch{ DestinationPort: 6380, Filter: &networking.EnvoyFilter_ListenerMatch_FilterMatch{ Name: "network-filter-to-be-replaced", }, }, }, }, }, Patch: &networking.EnvoyFilter_Patch{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Apr 21 17:42:54 UTC 2024 - 70.1K bytes - Viewed (0) -
pilot/pkg/security/authz/model/permission.go
DestinationIp: cidr, }, } } func permissionDestinationPort(port uint32) *rbacpb.Permission { return &rbacpb.Permission{ Rule: &rbacpb.Permission_DestinationPort{ DestinationPort: port, }, } } func permissionRequestedServerName(name *matcher.StringMatcher) *rbacpb.Permission { return &rbacpb.Permission{ Rule: &rbacpb.Permission_RequestedServerName{ RequestedServerName: name,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 3K bytes - Viewed (0) -
pilot/pkg/networking/core/envoyfilter/listener_patch.go
return false } } } // check match for destination port within the FilterChainMatch if match.DestinationPort > 0 { if fc.FilterChainMatch == nil || fc.FilterChainMatch.DestinationPort == nil { return false } else if fc.FilterChainMatch.DestinationPort.Value != match.DestinationPort { return false } } return true }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 17 15:39:29 UTC 2024 - 26.7K bytes - Viewed (0) -
pilot/pkg/security/authz/model/generator_test.go
addressPrefix: 1.2.3.4 prefixLen: 32`), }, { name: "destPortGenerator", g: destPortGenerator{}, value: "80", want: yamlPermission(t, ` destinationPort: 80`), }, { name: "connSNIGenerator", g: connSNIGenerator{}, value: "exact.com", want: yamlPermission(t, ` requestedServerName: exact: exact.com`), },
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 20 01:58:53 UTC 2024 - 13K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_builder.go
// We should not allow requests to the listen port directly. Requests must be // sent to some other original port and iptables redirected to 15001. This // ensures we do not passthrough back to the listen port. DestinationPort: &wrappers.UInt32Value{Value: uint32(push.Mesh.ProxyListenPort)}, }, Filters: append( buildMetricsNetworkFilters(push, node, istionetworking.ListenerClassSidecarOutbound, nil), &listener.Filter{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 04:44:06 UTC 2024 - 17.9K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_inbound.go
match := &listener.FilterChainMatch{} match.ApplicationProtocols = opt.ApplicationProtocols match.TransportProtocol = opt.TransportProtocol if cc.port.TargetPort > 0 { match.DestinationPort = &wrappers.UInt32Value{Value: cc.port.TargetPort} } return match } func (lb *ListenerBuilder) buildInboundHBONEListeners() []*listener.Listener { routes := []*route.Route{{ Match: &route.RouteMatch{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 35.1K bytes - Viewed (0) -
pilot/pkg/simulation/traffic.go
func (sim *Simulation) matchFilterChain(chains []*listener.FilterChain, defaultChain *listener.FilterChain, input Call, hasTLSInspector bool, ) (*listener.FilterChain, error) { chains = filter("DestinationPort", chains, func(fc *listener.FilterChainMatch) bool { return fc.GetDestinationPort() == nil }, func(fc *listener.FilterChainMatch) bool { return int(fc.GetDestinationPort().GetValue()) == input.Port })
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 19.4K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_test.go
virtualListener := xdstest.ExtractListener(model.VirtualInboundListenerName, listeners) for _, fc := range virtualListener.FilterChains { if fc.FilterChainMatch.DestinationPort.GetValue() == 15021 { t.Fatalf("port 15021 should not be included in inbound listener") } } } func testInboundListenerConfigWithGrpc(t *testing.T, proxy *model.Proxy, services ...*model.Service) {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 93.6K bytes - Viewed (0)