Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 198 for audiences (0.29 sec)

  1. staging/src/k8s.io/api/authentication/v1beta1/generated.proto

      // identifier in the intersection of the TokenReviewSpec audiences and the
      // token's audiences. A client of the TokenReview API that sets the
      // spec.audiences field should validate that a compatible audience identifier
      // is returned in the status.audiences field to ensure that the TokenReview
      // server is audience aware. If a TokenReview returns an empty
      // status.audience field where status.authenticated is "true", the token is
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 28 15:34:11 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  2. staging/src/k8s.io/apiserver/pkg/endpoints/filters/metrics_test.go

            authentication_attempts{result="failure"} 1
    				`,
    		},
    		{
    			desc: "auth failed due to audiences not intersecting",
    			response: &authenticator.Response{
    				User:      &user.DefaultInfo{Name: "admin"},
    				Audiences: authenticator.Audiences{"audience-x"},
    			},
    			status:      true,
    			apiAudience: authenticator.Audiences{"audience-y"},
    			want: `
            # HELP authentication_attempts [ALPHA] Counter of authenticated attempts.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 20 13:35:55 UTC 2023
    - 8.7K bytes
    - Viewed (0)
  3. tests/integration/security/testdata/authz/jwt.yaml.tmpl

    # - Allow request with valid JWT token to access path /jwt1
    # - Allow request with valid JWT token of presenter bar to access path with suffix "/presenter"
    # - Allow request with valid JWT token of audiences foo to access path with suffix "/audiences"
    
    apiVersion: security.istio.io/v1beta1
    kind: AuthorizationPolicy
    metadata:
      name: {{ .To.ServiceName }}
    spec:
      selector:
        matchLabels:
          "app": "{{ .To.ServiceName }}"
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 08 23:36:51 UTC 2024
    - 3K bytes
    - Viewed (0)
  4. pilot/pkg/security/authz/builder/testdata/http/allow-full-rule-in.yaml

              notValues: ["not-requestPrincipals", "not-requestPrincipals-prefix-*", "*-not-suffix-requestPrincipals", "*"]
            - key: "request.auth.audiences"
              values: ["audiences", "audiences-prefix-*", "*-suffix-audiences", "*"]
              notValues: ["not-audiences", "not-audiences-prefix-*", "*-not-suffix-audiences", "*"]
            - key: "request.auth.presenter"
              values: ["presenter", "presenter-prefix-*", "*-suffix-presenter", "*"]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Apr 20 01:58:53 UTC 2024
    - 4.1K bytes
    - Viewed (0)
  5. security/pkg/server/ca/authenticate/oidc.go

    	ksa := parts[3]
    	if !checkAudience(sa.Aud, j.audiences) {
    		return nil, fmt.Errorf("invalid audiences %v", sa.Aud)
    	}
    	return &security.Caller{
    		AuthSource: security.AuthSourceIDToken,
    		Identities: []string{spiffe.MustGenSpiffeURI(j.meshHolder.Mesh(), ns, ksa)},
    	}, nil
    }
    
    // checkAudience() returns true if the audiences to check are in
    // the expected audiences. Otherwise, return false.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 5.1K bytes
    - Viewed (0)
  6. staging/src/k8s.io/apiserver/pkg/endpoints/filters/authentication.go

    			if err != nil {
    				klog.ErrorS(err, "Unable to authenticate the request")
    			}
    			failed.ServeHTTP(w, req)
    			return
    		}
    
    		if !audiencesAreAcceptable(apiAuds, resp.Audiences) {
    			err = fmt.Errorf("unable to match the audience: %v , accepted: %v", resp.Audiences, apiAuds)
    			klog.Error(err)
    			failed.ServeHTTP(w, req)
    			return
    		}
    
    		// authorization header is not required anymore in case of a successful authentication.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Oct 12 20:54:07 UTC 2023
    - 6.4K bytes
    - Viewed (0)
  7. tests/integration/security/testdata/requestauthn/aud.yaml.tmpl

      - issuer: "******@****.***"
        jwksUri: "https://raw.githubusercontent.com/istio/istio/master/tests/common/jwt/jwks.json"
        audiences:
        - "foo"
      - issuer: "******@****.***"
        jwksUri: "https://raw.githubusercontent.com/istio/istio/master/tests/common/jwt/jwks.json"
        audiences:
        - "bar"
    ---
    apiVersion: security.istio.io/v1beta1
    kind: RequestAuthentication
    metadata:
      name: {{ .To.ServiceName }}-part2
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 08 07:03:01 UTC 2023
    - 838 bytes
    - Viewed (0)
  8. staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/webhook/round_trip_test.go

    	return authenticationv1beta1.TokenReviewStatus{
    		Authenticated: in.Authenticated,
    		User:          v1UserToV1beta1User(in.User),
    		Audiences:     in.Audiences,
    		Error:         in.Error,
    	}
    }
    
    func v1UserToV1beta1User(u authenticationv1.UserInfo) authenticationv1beta1.UserInfo {
    	var extra map[string]authenticationv1beta1.ExtraValue
    	if u.Extra != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 12 15:48:03 UTC 2023
    - 2.5K bytes
    - Viewed (0)
  9. pkg/kube/rpc_creds.go

    	tokenNamespace, tokenServiceAccount string, audiences []string, expirationSeconds int64,
    ) (*authenticationv1.TokenRequest, error) {
    	return client.Kube().CoreV1().ServiceAccounts(tokenNamespace).CreateToken(ctx, tokenServiceAccount,
    		&authenticationv1.TokenRequest{
    			Spec: authenticationv1.TokenRequestSpec{
    				Audiences:         audiences,
    				ExpirationSeconds: &expirationSeconds,
    			},
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 23 17:08:31 UTC 2023
    - 4K bytes
    - Viewed (0)
  10. staging/src/k8s.io/api/authentication/v1/zz_generated.deepcopy.go

    // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
    func (in *TokenRequestSpec) DeepCopyInto(out *TokenRequestSpec) {
    	*out = *in
    	if in.Audiences != nil {
    		in, out := &in.Audiences, &out.Audiences
    		*out = make([]string, len(*in))
    		copy(*out, *in)
    	}
    	if in.ExpirationSeconds != nil {
    		in, out := &in.ExpirationSeconds, &out.ExpirationSeconds
    		*out = new(int64)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 02 12:50:40 UTC 2023
    - 8K bytes
    - Viewed (0)
Back to top