Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 106 for AuthorizationPolicy (0.33 sec)

  1. tests/integration/security/policy_attachment_only/testdata/requestauthn/gateway-jwt.yaml.tmpl

      jwtRules:
      - issuer: "******@****.***"
        jwksUri: "https://raw.githubusercontent.com/istio/istio/master/tests/common/jwt/jwks.json"
    ---
    apiVersion: security.istio.io/v1beta1
    kind: AuthorizationPolicy
    metadata:
      name: authz-gateway-{{ .To.ServiceName }}
    spec:
      targetRef:
        name: {{ .To.ServiceName }}-gateway
        kind: Gateway
        group: gateway.networking.k8s.io
      rules:
      - to:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Dec 05 21:52:53 UTC 2023
    - 1.7K bytes
    - Viewed (0)
  2. istioctl/pkg/authz/authz_test.go

    			WantException:  true,
    		},
    		{
    			Args: []string{"-f", "testdata/configdump.yaml"},
    			ExpectedOutput: `ACTION   AuthorizationPolicy         RULES
    ALLOW    _anonymous_match_nothing_   1
    ALLOW    httpbin.default             1
    `,
    		},
    	}
    
    	authzCmd := checkCmd(cli.NewFakeContext(&cli.NewFakeContextOption{}))
    	for i, c := range cases {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jun 21 14:20:23 UTC 2023
    - 1.4K bytes
    - Viewed (0)
  3. releasenotes/notes/50110.yaml

    # release notes.
    releaseNotes:
    - |
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Mar 27 04:22:04 UTC 2024
    - 1.2K bytes
    - Viewed (0)
  4. tests/integration/security/testdata/authz/plaintext.yaml.tmpl

    ---
    # This authz policy denies access to the service if the request was not mTLS, since
    # mTLS is required in order to match source principals.
    
    apiVersion: security.istio.io/v1beta1
    kind: AuthorizationPolicy
    metadata:
      name: {{ .To.ServiceName }}
      namespace: {{ .To.NamespaceName }}
    spec:
      selector:
        matchLabels:
          "app": "{{ .To.ServiceName }}"
      action: DENY
      rules:
        - from:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 08 07:03:01 UTC 2023
    - 1.3K bytes
    - Viewed (0)
  5. pilot/pkg/serviceregistry/kube/controller/ambient/ambientindex_test.go

    	s.addPolicy(t, "global", systemNS, nil, gvk.AuthorizationPolicy, nil)
    	s.addPolicy(t, "namespace", testNS, nil, gvk.AuthorizationPolicy, nil)
    	s.assertEvent(t, xdsGlobal, xdsNamespace)
    	assert.Equal(t,
    		s.lookup(s.addrXdsName("127.0.0.1"))[0].Address.GetWorkload().AuthorizationPolicies,
    		nil)
    
    	s.addPolicy(t, selectorPolicyName, testNS, map[string]string{"app": "a"}, gvk.AuthorizationPolicy, nil)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed May 08 01:04:50 UTC 2024
    - 70.2K bytes
    - Viewed (0)
  6. tests/integration/security/testdata/requestauthn/gateway-jwt.yaml.tmpl

      jwtRules:
      - issuer: "******@****.***"
        jwksUri: "https://raw.githubusercontent.com/istio/istio/master/tests/common/jwt/jwks.json"
    ---
    apiVersion: security.istio.io/v1beta1
    kind: AuthorizationPolicy
    metadata:
      name: authz-gateway-{{ .To.ServiceName }}
    spec:
      targetRef:
        name: {{ .To.ServiceName }}-gateway
        kind: Gateway
        group: gateway.networking.k8s.io
      rules:
      - to:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Dec 05 21:52:53 UTC 2023
    - 1.7K bytes
    - Viewed (0)
  7. pilot/pkg/xds/ecds_test.go

    		},
    		{
    			name:           "no_relevant_config_update",
    			proxyNamespace: "default",
    			request: &model.PushRequest{
    				Full:           true,
    				ConfigsUpdated: sets.New(model.ConfigKey{Kind: kind.AuthorizationPolicy}),
    			},
    			watchedResources: []string{"extenstions.istio.io/wasmplugin/default.default-plugin-with-sec", "extenstions.istio.io/wasmplugin/istio-system.root-plugin"},
    			wantExtensions:   sets.String{},
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Mar 27 16:59:05 UTC 2024
    - 12K bytes
    - Viewed (0)
  8. pilot/pkg/serviceregistry/kube/controller/ambient/testdata/allow-groups-in.yaml

    apiVersion: security.istio.io/v1beta1
    kind: AuthorizationPolicy
    metadata:
      name: groups
    spec:
      rules:
      # Has mix of L4 and L7 in from
      - from:
        - source:
            principals: ["from-mix-principal"]
            requestPrincipals: ["from-mix-requestPrincipals"]
            namespaces: ["from-mix-ns"]
        to:
        - operation:
            ports: ["80"]
      # Has mix of L4 and L7 in to
      - from:
        - source:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Feb 29 18:40:34 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  9. tests/integration/ambient/testdata/requestauthn/waypoint-jwt.yaml.tmpl

      jwtRules:
      - issuer: "******@****.***"
        jwksUri: "https://raw.githubusercontent.com/istio/istio/master/tests/common/jwt/jwks.json"
    ---
    apiVersion: security.istio.io/v1beta1
    kind: AuthorizationPolicy
    metadata:
      name: authz-gateway-{{ .To.ServiceName }}
    spec:
      targetRefs:
      - kind: Gateway
        group: gateway.networking.k8s.io
        name: waypoint
      rules:
      - from:
        - source:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 15 16:23:36 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  10. pkg/config/analysis/analyzers/analyzers_test.go

    			{msg.NoMatchingWorkloadsFound, "AuthorizationPolicy istio-system/meshwide-httpbin-v1"},
    			{msg.NoMatchingWorkloadsFound, "AuthorizationPolicy httpbin-empty/httpbin-empty-namespace-wide"},
    			{msg.NoMatchingWorkloadsFound, "AuthorizationPolicy httpbin/httpbin-nopods"},
    			{msg.ReferencedResourceNotFound, "AuthorizationPolicy httpbin/httpbin-bogus-ns"},
    			{msg.ReferencedResourceNotFound, "AuthorizationPolicy httpbin/httpbin-bogus-ns"},
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 07:22:31 UTC 2024
    - 42.6K bytes
    - Viewed (0)
Back to top