Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 51 for PERMISSIVE (0.17 sec)

  1. pilot/pkg/networking/core/listener_inbound.go

    // This allows traffic to ports not exposed by any Service, for example.
    func buildInboundPassthroughChains(lb *ListenerBuilder) []*listener.FilterChain {
    	// Setup enough slots for common max size (permissive mode is 5 filter chains). This is not
    	// exact, just best effort optimization
    	filterChains := make([]*listener.FilterChain, 0, 1+5)
    	filterChains = append(filterChains, buildInboundBlackhole(lb))
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 35.1K bytes
    - Viewed (0)
  2. manifests/charts/istiod-remote/templates/crd-all.gen.yaml

                          Defines the mTLS mode used for peer authentication.
    
                          Valid Options: DISABLE, PERMISSIVE, STRICT
                        enum:
                        - UNSET
                        - DISABLE
                        - PERMISSIVE
                        - STRICT
                        type: string
                    type: object
                  portLevelMtls:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 06 21:31:42 UTC 2024
    - 671.7K bytes
    - Viewed (0)
  3. pilot/pkg/networking/core/cluster_tls_test.go

    				SubjectAltNames: []string{"spiffe://foo/serviceaccount/1"},
    				Sni:             "foo.com",
    			},
    			autoDetected,
    		},
    		{
    			"Auto fill nil settings when mTLS nil for internal service in permissive mode",
    			nil,
    			[]string{"spiffe://foo/serviceaccount/1"},
    			"foo.com",
    			&model.Proxy{Metadata: &model.NodeMetadata{}},
    			true, false, model.MTLSPermissive,
    			&networking.ClientTLSSettings{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 06 03:53:05 UTC 2024
    - 60.9K bytes
    - Viewed (0)
  4. manifests/charts/base/crds/crd-all.gen.yaml

                          Defines the mTLS mode used for peer authentication.
    
                          Valid Options: DISABLE, PERMISSIVE, STRICT
                        enum:
                        - UNSET
                        - DISABLE
                        - PERMISSIVE
                        - STRICT
                        type: string
                    type: object
                  portLevelMtls:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 06 21:31:42 UTC 2024
    - 671.6K bytes
    - Viewed (0)
  5. prow/config/calico.yaml

                      is sent directly from the remote node.  In "DSR" mode, the remote
                      node appears to use the IP of the ingress node; this requires a
                      permissive L2 network.  [Default: Tunnel]'
                    pattern: ^(?i)(Tunnel|DSR)?$
                    type: string
                  bpfForceTrackPacketsFromIfaces:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 21 18:32:01 UTC 2024
    - 246.5K bytes
    - Viewed (0)
  6. CREDITS

    must place, in the relevant source files, a statement of the
    additional terms that apply to those files, or a notice indicating
    where to find the applicable terms.
    
      Additional terms, permissive or non-permissive, may be stated in the
    form of a separately written license, or stated as exceptions;
    the above requirements apply either way.
    
      8. Termination.
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 15:34:20 UTC 2024
    - 1.7M bytes
    - Viewed (0)
  7. pilot/pkg/networking/core/cluster_test.go

    		nodeType:        model.SidecarProxy,
    		mesh:            mesh,
    		destRule:        destRule,
    		peerAuthn:       peerAuthn,
    	})
    
    	// No policy visible, auto-mTLS should set to PERMISSIVE.
    	// For port 8080, (m)TLS settings is automatically added, thus its cluster should have TLS context.
    	// TlsContext is nil because we use socket match instead
    	g.Expect(getTLSContext(t, clusters[0])).To(BeNil())
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 108.8K bytes
    - Viewed (0)
  8. pilot/pkg/model/push_context.go

    	// If the mode is not unknown, use it.
    	if serviceMTLSMode := ps.AuthnPolicies.GetNamespaceMutualTLSMode(service.Attributes.Namespace); serviceMTLSMode != MTLSUnknown {
    		return serviceMTLSMode
    	}
    
    	// Fallback to permissive.
    	return MTLSPermissive
    }
    
    // ServiceEndpointsByPort returns the cached instances by port if it exists.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 15 09:02:11 UTC 2024
    - 91.8K bytes
    - Viewed (0)
  9. src/cmd/go/go_test.go

    	"cmd/internal/sys"
    
    	cmdgo "cmd/go"
    )
    
    func init() {
    	// GOVCS defaults to public:git|hg,private:all,
    	// which breaks many tests here - they can't use non-git, non-hg VCS at all!
    	// Change to fully permissive.
    	// The tests of the GOVCS setting itself are in ../../testdata/script/govcs.txt.
    	os.Setenv("GOVCS", "*:all")
    }
    
    var (
    	canRace = false // whether we can run the race detector
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 01:00:11 UTC 2024
    - 81.1K bytes
    - Viewed (0)
  10. src/cmd/internal/obj/x86/asm6.go

    		//
    		// For 64bit mode only LEAL is allowed to overflow.
    		// It's how https://golang.org/cl/59630 made it.
    		// crypto/sha1/sha1block_amd64.s depends on this feature.
    		//
    		// For 32bit mode rules are more permissive.
    		// If offset fits uint32, it's permitted.
    		// This is allowed for assembly that wants to use 32-bit hex
    		// constants, e.g. LEAL 0x99999999(AX), AX.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 15 15:44:14 UTC 2024
    - 146.9K bytes
    - Viewed (0)
Back to top