- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 929 for authn (0.04 sec)
-
pilot/pkg/model/push_context_test.go
}, }, }, }, "authn-med-prio-all": { Meta: config.Meta{Name: "authn-med-prio-all", Namespace: "testns-1", GroupVersionKind: gvk.WasmPlugin}, Spec: &extensions.WasmPlugin{ Phase: extensions.PluginPhase_AUTHN, Priority: &wrapperspb.Int32Value{Value: 50}, }, }, "global-authn-high-prio-app": {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Apr 21 17:42:54 UTC 2024 - 95.3K bytes - Viewed (0) -
pilot/pkg/xds/testdata/benchmarks/authorizationpolicy.yaml
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Jul 29 02:10:48 UTC 2023 - 738 bytes - Viewed (0) -
pilot/pkg/networking/plugin/authn/util.go
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package authn import ( meshconfig "istio.io/api/mesh/v1alpha1" "istio.io/istio/pilot/pkg/features" "istio.io/istio/pkg/util/sets" ) func TrustDomainsForValidation(meshConfig *meshconfig.MeshConfig) []string {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Feb 24 16:11:07 UTC 2023 - 1.3K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_builder.go
// authnBuilder provides access to authn (mTLS) configuration for the given proxy. authnBuilder *authn.Builder // authzBuilder provides access to authz configuration for the given proxy. authzBuilder *authz.Builder // authzCustomBuilder provides access to CUSTOM authz configuration for the given proxy. authzCustomBuilder *authz.Builder }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 04:44:06 UTC 2024 - 17.9K bytes - Viewed (0) -
releasenotes/notes/25818.yaml
# Istio. securityNotes: - | __Source principal validation at Gateway does not work even with ISTIO_MUTUAL TLS mode__: When the Gateway server's TLS mode is ISTIO_MUTUAL, Istio's authN filter is not installed on the appropriate filter chain. Consequently, any Istio Authorization policy with source principal based rules will not work when applied to a Gateway workload.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Aug 11 21:20:58 UTC 2020 - 1.7K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/options/feature.go
"Enable block profiling, if profiling is enabled") fs.StringVar(&o.DebugSocketPath, "debug-socket-path", o.DebugSocketPath, "Use an unprotected (no authn/authz) unix-domain socket for profiling with the given path") fs.BoolVar(&o.EnablePriorityAndFairness, "enable-priority-and-fairness", o.EnablePriorityAndFairness, ""+
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 22 18:51:27 UTC 2024 - 3K bytes - Viewed (0) -
pilot/pkg/networking/grpcgen/lds.go
"istio.io/api/label" "istio.io/istio/pilot/pkg/model" "istio.io/istio/pilot/pkg/networking/util" "istio.io/istio/pilot/pkg/security/authn" authzmodel "istio.io/istio/pilot/pkg/security/authz/model" "istio.io/istio/pilot/pkg/util/protoconv" xdsfilters "istio.io/istio/pilot/pkg/xds/filters" "istio.io/istio/pkg/istio-agent/grpcxds" "istio.io/istio/pkg/util/sets" )
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 14.6K bytes - Viewed (0) -
pilot/pkg/model/authentication.go
case MTLSPermissive: return "PERMISSIVE" case MTLSStrict: return "STRICT" default: return "UNKNOWN" } } // ConvertToMutualTLSMode converts from peer authn MTLS mode (`PeerAuthentication_MutualTLS_Mode`) // to the MTLS mode specified by authn policy. func ConvertToMutualTLSMode(mode v1beta1.PeerAuthentication_MutualTLS_Mode) MutualTLSMode { switch mode { case v1beta1.PeerAuthentication_MutualTLS_DISABLE:
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Apr 17 22:20:44 UTC 2024 - 10.1K bytes - Viewed (0) -
pkg/serviceaccount/jwt_test.go
if err != nil { t.Fatalf("While creating legacy validator, err: %v", err) } authn := serviceaccount.JWTTokenAuthenticator([]string{serviceaccount.LegacyIssuer, "bar"}, tc.Keys, auds, validator) // An invalid, non-JWT token should always fail ctx := authenticator.WithAudiences(context.Background(), auds) if _, ok, err := authn.AuthenticateToken(ctx, "invalid token"); err != nil || ok {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 27 22:16:08 UTC 2024 - 17K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/server/config.go
// authz is nil, this function won't add a token authenticator or authorizer. func AuthorizeClientBearerToken(loopback *restclient.Config, authn *AuthenticationInfo, authz *AuthorizationInfo) { if loopback == nil || len(loopback.BearerToken) == 0 { return } if authn == nil || authz == nil { // prevent nil pointer panic return }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 28 08:48:22 UTC 2024 - 47.7K bytes - Viewed (0)