Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 226 for Principals (0.15 sec)

  1. tests/integration/security/testdata/authz/allow-principal.yaml.tmpl

                methods: [ "GET" ]
          from:
            - source:
                principals: [ "{{ .Allowed.ServiceAccountName }}" ]
        - to:
            - operation: # GRPC
                ports: [ "{{ (.To.PortForName `grpc`).WorkloadPort }}" ]
                paths: [ "/proto.EchoTestService/Echo" ]
                methods: [ "POST" ]
          from:
            - source:
                principals: [ "{{ .Allowed.ServiceAccountName }}" ]
        - to:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 08 07:03:01 UTC 2023
    - 998 bytes
    - Viewed (0)
  2. pilot/pkg/security/authz/builder/testdata/http/simple-policy-principal-with-wildcard-in.yaml

      namespace: foo
    spec:
      selector:
        matchLabels:
          app: httpbin
          version: v1
      rules:
        - from:
            - source:
                principals: ["*"]
            - source:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 01 19:25:01 UTC 2021
    - 381 bytes
    - Viewed (0)
  3. tests/integration/security/testdata/authz/deny-principal.yaml.tmpl

                methods: [ "GET" ]
          from:
            - source:
                principals: [ "{{ .Denied.ServiceAccountName }}" ]
        - to:
            - operation: # GRPC
                ports: [ "{{ (.To.PortForName `grpc`).WorkloadPort }}" ]
                paths: [ "/proto.EchoTestService/Echo" ]
                methods: [ "POST" ]
          from:
            - source:
                principals: [ "{{ .Denied.ServiceAccountName }}" ]
        - to:
            - operation: # TCP
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 08 07:03:01 UTC 2023
    - 1K bytes
    - Viewed (0)
  4. pilot/pkg/serviceregistry/kube/controller/ambient/testdata/allow-groups-in.yaml

    spec:
      rules:
      # Has mix of L4 and L7 in from
      - from:
        - source:
            principals: ["from-mix-principal"]
            requestPrincipals: ["from-mix-requestPrincipals"]
            namespaces: ["from-mix-ns"]
        to:
        - operation:
            ports: ["80"]
      # Has mix of L4 and L7 in to
      - from:
        - source:
            principals: ["to-mix-principal"]
            namespaces: ["to-mix-ns"]
        to:
        - operation:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Feb 29 18:40:34 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  5. pilot/pkg/security/trustdomain/bundle.go

    	for _, principal := range principals {
    		isTrustDomainBeingEnforced := isTrustDomainBeingEnforced(principal)
    		// Return the existing principals if the policy doesn't care about the trust domain.
    		if !isTrustDomainBeingEnforced {
    			principalsIncludingAliases = append(principalsIncludingAliases, principal)
    			continue
    		}
    		trustDomainFromPrincipal, err := getTrustDomainFromSpiffeIdentity(principal)
    		if err != nil {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Oct 23 15:48:01 UTC 2023
    - 7.5K bytes
    - Viewed (0)
  6. pilot/pkg/security/authz/builder/testdata/http/simple-policy-multiple-td-aliases-in.yaml

      selector:
        matchLabels:
          app: httpbin
          version: v1
      rules:
        - from:
            - source:
                principals: ["cluster.local/ns/rule[0]/sa/from[0]-principal[0]"]
            - source:
                principals: ["some-td/ns/rule[0]/sa/from[1]-principal[0]", "cluster.local/ns/rule[0]/sa/from[1]-principal[1]"]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 01 19:25:01 UTC 2021
    - 485 bytes
    - Viewed (0)
  7. pilot/pkg/security/authz/builder/testdata/http/single-policy-in.yaml

    metadata:
      name: httpbin
      namespace: foo
    spec:
      selector:
        matchLabels:
          app: httpbin
          version: v1
      rules:
        - from:
            - source:
                principals: ["rule[0]-from[0]-principal[1]", "rule[0]-from[0]-principal[2]"]
                requestPrincipals: ["rule[0]-from[0]-requestPrincipal[1]", "rule[0]-from[0]-requestPrincipal[2]"]
                namespaces: ["rule[0]-from[0]-ns[1]", "rule[0]-from[0]-ns[2]"]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Apr 01 19:25:01 UTC 2021
    - 3.1K bytes
    - Viewed (0)
  8. pilot/pkg/security/authz/builder/testdata/http/custom-bad-out.yaml

            permissions:
            - andRules:
                rules:
                - orRules:
                    rules:
                    - urlPath:
                        path:
                          exact: /httpbin1
            principals:
            - andIds:
                ids:
                - any: true
          istio-ext-authz-ns[foo]-policy[httpbin-2]-rule[0]-deny-due-to-bad-CUSTOM-action:
            permissions:
            - andRules:
                rules:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Sep 15 04:13:49 UTC 2023
    - 885 bytes
    - Viewed (0)
  9. pkg/config/analysis/analyzers/testdata/authorizationpolicies.yaml

      namespace: httpbin
    spec:
      selector: # There are workloads matching this selector
        matchLabels:
          app: httpbin
          version: v1
      rules:
        - from:
            - source:
                principals: ["cluster.local/ns/default/sa/sleep"]
            - source:
                namespaces: ["httpbin"] # Namespace exists
          to:
            - operation:
                methods: ["GET"]
                paths: ["/info*"]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Mar 08 14:14:46 UTC 2023
    - 7.8K bytes
    - Viewed (0)
  10. pilot/pkg/security/authz/builder/testdata/http/simple-policy-principal-with-wildcard-out.yaml

                    - authenticated:
                        principalName:
                          exact: spiffe://td1/ns/foo/sa/rule[0]-from[1]-principal[1]
                    - authenticated:
                        principalName:
                          safeRegex:
                            regex: spiffe://.*bar/ns/foo/sa/rule[0]-from[1]-principal[1]
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Oct 17 16:35:46 UTC 2023
    - 1.1K bytes
    - Viewed (0)
Back to top