Documentation
¶
Index ¶
- Variables
- type Action
- type Address
- type Authorization
- func (*Authorization) Descriptor() ([]byte, []int)deprecated
- func (x *Authorization) GetAction() Action
- func (x *Authorization) GetName() string
- func (x *Authorization) GetNamespace() string
- func (x *Authorization) GetRules() []*Rule
- func (x *Authorization) GetScope() Scope
- func (*Authorization) ProtoMessage()
- func (x *Authorization) ProtoReflect() protoreflect.Message
- func (x *Authorization) Reset()
- func (x *Authorization) ResourceName() string
- func (x *Authorization) String() string
- type Clause
- type Match
- func (*Match) Descriptor() ([]byte, []int)deprecated
- func (x *Match) GetDestinationIps() []*Address
- func (x *Match) GetDestinationPorts() []uint32
- func (x *Match) GetNamespaces() []*StringMatch
- func (x *Match) GetNotDestinationIps() []*Address
- func (x *Match) GetNotDestinationPorts() []uint32
- func (x *Match) GetNotNamespaces() []*StringMatch
- func (x *Match) GetNotPrincipals() []*StringMatch
- func (x *Match) GetNotSourceIps() []*Address
- func (x *Match) GetPrincipals() []*StringMatch
- func (x *Match) GetSourceIps() []*Address
- func (*Match) ProtoMessage()
- func (x *Match) ProtoReflect() protoreflect.Message
- func (x *Match) Reset()
- func (x *Match) String() string
- type Rule
- type Scope
- type StringMatch
- func (*StringMatch) Descriptor() ([]byte, []int)deprecated
- func (x *StringMatch) GetExact() string
- func (m *StringMatch) GetMatchType() isStringMatch_MatchType
- func (x *StringMatch) GetPrefix() string
- func (x *StringMatch) GetSuffix() string
- func (*StringMatch) ProtoMessage()
- func (x *StringMatch) ProtoReflect() protoreflect.Message
- func (x *StringMatch) Reset()
- func (x *StringMatch) String() string
- type StringMatch_Exact
- type StringMatch_Prefix
- type StringMatch_Suffix
Constants ¶
This section is empty.
Variables ¶
View Source
var ( Scope_name = map[int32]string{ 0: "GLOBAL", 1: "NAMESPACE", 2: "WORKLOAD_SELECTOR", } Scope_value = map[string]int32{ "GLOBAL": 0, "NAMESPACE": 1, "WORKLOAD_SELECTOR": 2, } )
Enum value maps for Scope.
View Source
var ( Action_name = map[int32]string{ 0: "ALLOW", 1: "DENY", } Action_value = map[string]int32{ "ALLOW": 0, "DENY": 1, } )
Enum value maps for Action.
Functions ¶
This section is empty.
Types ¶
type Action ¶
type Action int32
func (Action) Descriptor ¶
func (Action) Descriptor() protoreflect.EnumDescriptor
func (Action) EnumDescriptor
deprecated
func (Action) Number ¶
func (x Action) Number() protoreflect.EnumNumber
func (Action) Type ¶
func (Action) Type() protoreflect.EnumType
type Address ¶
type Address struct {
Address []byte `protobuf:"bytes,1,opt,name=address,proto3" json:"address,omitempty"`
Length uint32 `protobuf:"varint,2,opt,name=length,proto3" json:"length,omitempty"`
// contains filtered or unexported fields
}
func (*Address) Descriptor
deprecated
func (*Address) GetAddress ¶
func (*Address) ProtoMessage ¶
func (*Address) ProtoMessage()
func (*Address) ProtoReflect ¶
func (x *Address) ProtoReflect() protoreflect.Message
type Authorization ¶
type Authorization struct {
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
Namespace string `protobuf:"bytes,2,opt,name=namespace,proto3" json:"namespace,omitempty"`
// Determine the scope of this RBAC policy.
// If set to NAMESPACE, the 'namespace' field value will be used.
Scope Scope `protobuf:"varint,3,opt,name=scope,proto3,enum=istio.security.Scope" json:"scope,omitempty"`
// The action to take if the request is matched with the rules.
// Default is ALLOW if not specified.
Action Action `protobuf:"varint,4,opt,name=action,proto3,enum=istio.security.Action" json:"action,omitempty"`
// Set of RBAC policy rules each containing its cluases (To, From, When).
// If at least one of the rules is matched the policy action will
// take place.
// Rules are OR-ed.
Rules []*Rule `protobuf:"bytes,5,rep,name=rules,proto3" json:"rules,omitempty"`
// contains filtered or unexported fields
}
func (*Authorization) Descriptor
deprecated
func (*Authorization) Descriptor() ([]byte, []int)
Deprecated: Use Authorization.ProtoReflect.Descriptor instead.
func (*Authorization) GetAction ¶
func (x *Authorization) GetAction() Action
func (*Authorization) GetName ¶
func (x *Authorization) GetName() string
func (*Authorization) GetNamespace ¶
func (x *Authorization) GetNamespace() string
func (*Authorization) GetRules ¶
func (x *Authorization) GetRules() []*Rule
func (*Authorization) GetScope ¶
func (x *Authorization) GetScope() Scope
func (*Authorization) ProtoMessage ¶
func (*Authorization) ProtoMessage()
func (*Authorization) ProtoReflect ¶
func (x *Authorization) ProtoReflect() protoreflect.Message
func (*Authorization) Reset ¶
func (x *Authorization) Reset()
func (*Authorization) ResourceName ¶
func (x *Authorization) ResourceName() string
ResourceName returns the unique key of Workload.
func (*Authorization) String ¶
func (x *Authorization) String() string
type Clause ¶
type Clause struct {
// The logical behavior between the matches (if there are more than one)
// MatchBehavior match_behavior = 1;
// Matches are OR-ed
// Match is a generic form of the authz policy's expressions contained in To, From and When.
Matches []*Match `protobuf:"bytes,2,rep,name=matches,proto3" json:"matches,omitempty"`
// contains filtered or unexported fields
}
func (*Clause) Descriptor
deprecated
func (*Clause) GetMatches ¶
func (*Clause) ProtoMessage ¶
func (*Clause) ProtoMessage()
func (*Clause) ProtoReflect ¶
func (x *Clause) ProtoReflect() protoreflect.Message
type Match ¶
type Match struct {
Namespaces []*StringMatch `protobuf:"bytes,1,rep,name=namespaces,proto3" json:"namespaces,omitempty"`
NotNamespaces []*StringMatch `protobuf:"bytes,2,rep,name=not_namespaces,json=notNamespaces,proto3" json:"not_namespaces,omitempty"`
Principals []*StringMatch `protobuf:"bytes,3,rep,name=principals,proto3" json:"principals,omitempty"`
NotPrincipals []*StringMatch `protobuf:"bytes,4,rep,name=not_principals,json=notPrincipals,proto3" json:"not_principals,omitempty"`
SourceIps []*Address `protobuf:"bytes,5,rep,name=source_ips,json=sourceIps,proto3" json:"source_ips,omitempty"`
NotSourceIps []*Address `protobuf:"bytes,6,rep,name=not_source_ips,json=notSourceIps,proto3" json:"not_source_ips,omitempty"`
DestinationIps []*Address `protobuf:"bytes,7,rep,name=destination_ips,json=destinationIps,proto3" json:"destination_ips,omitempty"`
NotDestinationIps []*Address `protobuf:"bytes,8,rep,name=not_destination_ips,json=notDestinationIps,proto3" json:"not_destination_ips,omitempty"`
DestinationPorts []uint32 `protobuf:"varint,9,rep,packed,name=destination_ports,json=destinationPorts,proto3" json:"destination_ports,omitempty"`
NotDestinationPorts []uint32 `` /* 129-byte string literal not displayed */
// contains filtered or unexported fields
}
func (*Match) Descriptor
deprecated
func (*Match) GetDestinationIps ¶
func (*Match) GetDestinationPorts ¶
func (*Match) GetNamespaces ¶
func (x *Match) GetNamespaces() []*StringMatch
func (*Match) GetNotDestinationIps ¶
func (*Match) GetNotDestinationPorts ¶
func (*Match) GetNotNamespaces ¶
func (x *Match) GetNotNamespaces() []*StringMatch
func (*Match) GetNotPrincipals ¶
func (x *Match) GetNotPrincipals() []*StringMatch
func (*Match) GetNotSourceIps ¶
func (*Match) GetPrincipals ¶
func (x *Match) GetPrincipals() []*StringMatch
func (*Match) GetSourceIps ¶
func (*Match) ProtoMessage ¶
func (*Match) ProtoMessage()
func (*Match) ProtoReflect ¶
func (x *Match) ProtoReflect() protoreflect.Message
type Rule ¶
type Rule struct {
// Clauses are AND-ed
// This is a generic form of the authz policy's to, from and when
Clauses []*Clause `protobuf:"bytes,1,rep,name=clauses,proto3" json:"clauses,omitempty"`
// contains filtered or unexported fields
}
func (*Rule) Descriptor
deprecated
func (*Rule) GetClauses ¶
func (*Rule) ProtoMessage ¶
func (*Rule) ProtoMessage()
func (*Rule) ProtoReflect ¶
func (x *Rule) ProtoReflect() protoreflect.Message
type Scope ¶
type Scope int32
const ( // ALL means that the authorization policy will be applied to all workloads // in the mesh (any namespace). Scope_GLOBAL Scope = 0 // NAMESPACE means that the policy will only be applied to workloads in a // specific namespace. Scope_NAMESPACE Scope = 1 // WORKLOAD_SELECTOR means that the policy will only be applied to specific // workloads that were selected by their labels. Scope_WORKLOAD_SELECTOR Scope = 2 )
func (Scope) Descriptor ¶
func (Scope) Descriptor() protoreflect.EnumDescriptor
func (Scope) EnumDescriptor
deprecated
func (Scope) Number ¶
func (x Scope) Number() protoreflect.EnumNumber
func (Scope) Type ¶
func (Scope) Type() protoreflect.EnumType
type StringMatch ¶
type StringMatch struct {
// Types that are assignable to MatchType:
//
// *StringMatch_Exact
// *StringMatch_Prefix
// *StringMatch_Suffix
MatchType isStringMatch_MatchType `protobuf_oneof:"match_type"`
// contains filtered or unexported fields
}
func (*StringMatch) Descriptor
deprecated
func (*StringMatch) Descriptor() ([]byte, []int)
Deprecated: Use StringMatch.ProtoReflect.Descriptor instead.
func (*StringMatch) GetExact ¶
func (x *StringMatch) GetExact() string
func (*StringMatch) GetMatchType ¶
func (m *StringMatch) GetMatchType() isStringMatch_MatchType
func (*StringMatch) GetPrefix ¶
func (x *StringMatch) GetPrefix() string
func (*StringMatch) GetSuffix ¶
func (x *StringMatch) GetSuffix() string
func (*StringMatch) ProtoMessage ¶
func (*StringMatch) ProtoMessage()
func (*StringMatch) ProtoReflect ¶
func (x *StringMatch) ProtoReflect() protoreflect.Message
func (*StringMatch) Reset ¶
func (x *StringMatch) Reset()
func (*StringMatch) String ¶
func (x *StringMatch) String() string
type StringMatch_Exact ¶
type StringMatch_Exact struct {
// exact string match
Exact string `protobuf:"bytes,1,opt,name=exact,proto3,oneof"`
}
type StringMatch_Prefix ¶
type StringMatch_Prefix struct {
// prefix-based match
Prefix string `protobuf:"bytes,2,opt,name=prefix,proto3,oneof"`
}
type StringMatch_Suffix ¶
type StringMatch_Suffix struct {
// suffix-based match
Suffix string `protobuf:"bytes,3,opt,name=suffix,proto3,oneof"`
}
Click to show internal directories.
Click to hide internal directories.