udocs upddate for policies graduation (#12320)

This commit is contained in:
Aryan Gupta 2022-12-07 03:19:06 +05:30 committed by GitHub
parent c64c048174
commit 60eb0e4474
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
22 changed files with 72 additions and 72 deletions

View File

@ -575,7 +575,7 @@ access the workloads with the `app: httpbin` and `version: v1` labels in the
`foo` namespace when requests sent have a valid JWT token. `foo` namespace when requests sent have a valid JWT token.
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: httpbin name: httpbin
@ -604,7 +604,7 @@ The following example shows an authorization policy that denies requests if the
source is not the `foo` namespace: source is not the `foo` namespace:
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: httpbin-deny name: httpbin-deny
@ -645,7 +645,7 @@ For example, the `allow-read` policy allows `"GET"` and `"HEAD"` access to the
workload with the `app: products` label in the `default` namespace. workload with the `app: products` label in the `default` namespace.
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: allow-read name: allow-read
@ -687,7 +687,7 @@ The following example policy allows access at paths with the `/test/*` prefix
or the `*/info` suffix. or the `*/info` suffix.
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: tester name: tester
@ -713,7 +713,7 @@ JWT authentication, if the request path is not `/healthz`. Thus, the policy
excludes requests to the `/healthz` path from the JWT authentication: excludes requests to the `/healthz` path from the JWT authentication:
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: disable-jwt-for-healthz name: disable-jwt-for-healthz
@ -736,7 +736,7 @@ The following example denies the request to the `/admin` path for requests
without request principals: without request principals:
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: enable-jwt-for-admin name: enable-jwt-for-admin
@ -768,7 +768,7 @@ access to the workload.
{{< /tip >}} {{< /tip >}}
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: allow-nothing name: allow-nothing
@ -782,7 +782,7 @@ there is another `ALLOW` policy allowing the request because the `DENY` policy t
This is useful if you want to temporarily disable all access to the workload. This is useful if you want to temporarily disable all access to the workload.
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: deny-all name: deny-all
@ -798,7 +798,7 @@ useless as it will always allow the request. It might be useful if you want to t
workload. Note the request could still be denied due to `CUSTOM` and `DENY` policies. workload. Note the request could still be denied due to `CUSTOM` and `DENY` policies.
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: allow-all name: allow-all
@ -818,7 +818,7 @@ key is `request.headers[version]`, which is an entry in the Istio attribute
`request.headers`, which is a map. `request.headers`, which is a map.
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: httpbin name: httpbin
@ -850,7 +850,7 @@ If you want to make a workload publicly accessible, you need to leave the
unauthenticated) users and workloads, for example: unauthenticated) users and workloads, for example:
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: httpbin name: httpbin
@ -871,7 +871,7 @@ To allow only authenticated users, set `principals` to `"*"` instead, for
example: example:
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: httpbin name: httpbin
@ -911,7 +911,7 @@ configures an authorization policy to only allows the `bookinfo-ratings-v2`
service in the Istio mesh to access the MongoDB workload. service in the Istio mesh to access the MongoDB workload.
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: mongodb-policy name: mongodb-policy

View File

@ -59,7 +59,7 @@ and do not use any of the **positive** matching fields (e.g. `paths`, `values`).
For example, the authorization policy below uses the `ALLOW-with-positive-matching` pattern to allow requests to path `/public`: For example, the authorization policy below uses the `ALLOW-with-positive-matching` pattern to allow requests to path `/public`:
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: foo name: foo
@ -78,7 +78,7 @@ of unknown normalization behavior causing policy bypass.
The following is an example using the `DENY-with-negative-matching` pattern to achieve the same result: The following is an example using the `DENY-with-negative-matching` pattern to achieve the same result:
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: foo name: foo
@ -313,7 +313,7 @@ prefix matches instead of exact matches. For example, for an `AuthorizationPoli
for a hostname of `example.com`, you would use `hosts: ["example.com", "example.com:*"]` as shown in the below `AuthorizationPolicy`. for a hostname of `example.com`, you would use `hosts: ["example.com", "example.com:*"]` as shown in the below `AuthorizationPolicy`.
{{< text yaml >}} {{< text yaml >}}
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-host name: ingress-host

View File

@ -381,7 +381,7 @@ Now, add a request authentication policy that requires end-user JWT for the ingr
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: RequestAuthentication kind: RequestAuthentication
metadata: metadata:
name: "jwt-example" name: "jwt-example"
@ -464,7 +464,7 @@ To reject requests without valid tokens, add an authorization policy with a rule
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "frontend-ingress" name: "frontend-ingress"
@ -494,7 +494,7 @@ To refine authorization with a token requirement per host, path, or method, chan
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "frontend-ingress" name: "frontend-ingress"

View File

@ -313,7 +313,7 @@ ENDSNIP
snip_enduser_authentication_4() { snip_enduser_authentication_4() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: RequestAuthentication kind: RequestAuthentication
metadata: metadata:
name: "jwt-example" name: "jwt-example"
@ -381,7 +381,7 @@ ENDSNIP
snip_require_a_valid_token_1() { snip_require_a_valid_token_1() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "frontend-ingress" name: "frontend-ingress"
@ -408,7 +408,7 @@ ENDSNIP
snip_require_valid_tokens_perpath_1() { snip_require_valid_tokens_perpath_1() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "frontend-ingress" name: "frontend-ingress"

View File

@ -52,7 +52,7 @@ identity and more secure compared using the unauthenticated HTTP attributes (e.g
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: RequestAuthentication kind: RequestAuthentication
metadata: metadata:
name: ingress-jwt name: ingress-jwt

View File

@ -36,7 +36,7 @@ ENDSNIP
snip_configuring_ingress_routing_based_on_jwt_claims_1() { snip_configuring_ingress_routing_based_on_jwt_claims_1() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: RequestAuthentication kind: RequestAuthentication
metadata: metadata:
name: ingress-jwt name: ingress-jwt

View File

@ -157,7 +157,7 @@ The external authorizer is now ready to be used by the authorization policy.
{{< text bash >}} {{< text bash >}}
$ kubectl apply -n foo -f - <<EOF $ kubectl apply -n foo -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ext-authz name: ext-authz

View File

@ -105,7 +105,7 @@ ENDSNIP
snip_enable_with_external_authorization_1() { snip_enable_with_external_authorization_1() {
kubectl apply -n foo -f - <<EOF kubectl apply -n foo -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ext-authz name: ext-authz

View File

@ -52,7 +52,7 @@ In this case, the policy denies requests if their method is `GET`.
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: deny-method-get name: deny-method-get
@ -90,7 +90,7 @@ a header value that is not `admin`:
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: deny-method-get name: deny-method-get
@ -130,7 +130,7 @@ to `ALLOW`. This type of policy is better known as an allow policy.
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: allow-path-ip name: allow-path-ip

View File

@ -36,7 +36,7 @@ ENDSNIP
snip_explicitly_deny_a_request_1() { snip_explicitly_deny_a_request_1() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: deny-method-get name: deny-method-get
@ -71,7 +71,7 @@ ENDSNIP
snip_explicitly_deny_a_request_4() { snip_explicitly_deny_a_request_4() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: deny-method-get name: deny-method-get
@ -109,7 +109,7 @@ ENDSNIP
snip_explicitly_deny_a_request_7() { snip_explicitly_deny_a_request_7() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: allow-path-ip name: allow-path-ip

View File

@ -67,7 +67,7 @@ Caching and propagation overhead can cause some delay.
{{< text bash >}} {{< text bash >}}
$ kubectl apply -n foo -f - <<EOF $ kubectl apply -n foo -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: deny-path-headers name: deny-path-headers

View File

@ -45,7 +45,7 @@ ENDSNIP
snip_create_dryrun_policy_1() { snip_create_dryrun_policy_1() {
kubectl apply -n foo -f - <<EOF kubectl apply -n foo -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: deny-path-headers name: deny-path-headers

View File

@ -56,7 +56,7 @@ and then grant more access to the workload gradually and incrementally.
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: allow-nothing name: allow-nothing
@ -78,7 +78,7 @@ and then grant more access to the workload gradually and incrementally.
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "productpage-viewer" name: "productpage-viewer"
@ -112,7 +112,7 @@ and then grant more access to the workload gradually and incrementally.
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "details-viewer" name: "details-viewer"
@ -138,7 +138,7 @@ and then grant more access to the workload gradually and incrementally.
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "reviews-viewer" name: "reviews-viewer"
@ -172,7 +172,7 @@ and then grant more access to the workload gradually and incrementally.
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "ratings-viewer" name: "ratings-viewer"

View File

@ -22,7 +22,7 @@
snip_configure_access_control_for_workloads_using_http_traffic_1() { snip_configure_access_control_for_workloads_using_http_traffic_1() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: allow-nothing name: allow-nothing
@ -34,7 +34,7 @@ EOF
snip_configure_access_control_for_workloads_using_http_traffic_2() { snip_configure_access_control_for_workloads_using_http_traffic_2() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "productpage-viewer" name: "productpage-viewer"
@ -53,7 +53,7 @@ EOF
snip_configure_access_control_for_workloads_using_http_traffic_3() { snip_configure_access_control_for_workloads_using_http_traffic_3() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "details-viewer" name: "details-viewer"
@ -75,7 +75,7 @@ EOF
snip_configure_access_control_for_workloads_using_http_traffic_4() { snip_configure_access_control_for_workloads_using_http_traffic_4() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "reviews-viewer" name: "reviews-viewer"
@ -97,7 +97,7 @@ EOF
snip_configure_access_control_for_workloads_using_http_traffic_5() { snip_configure_access_control_for_workloads_using_http_traffic_5() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: "ratings-viewer" name: "ratings-viewer"

View File

@ -211,7 +211,7 @@ Create the AuthorizationPolicy:
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy
@ -234,7 +234,7 @@ EOF
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy
@ -277,7 +277,7 @@ $ CLIENT_IP=$(kubectl get pods -n istio-system -o name -l istio=ingressgateway |
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy
@ -309,7 +309,7 @@ Create the AuthorizationPolicy:
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy
@ -347,7 +347,7 @@ not allowed to access the ingress gateway:
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy
@ -370,7 +370,7 @@ EOF
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy

View File

@ -126,7 +126,7 @@ ENDSNIP
snip_ipbased_allow_list_and_deny_list_1() { snip_ipbased_allow_list_and_deny_list_1() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy
@ -145,7 +145,7 @@ EOF
snip_ipbased_allow_list_and_deny_list_2() { snip_ipbased_allow_list_and_deny_list_2() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy
@ -180,7 +180,7 @@ ENDSNIP
snip_ipbased_allow_list_and_deny_list_5() { snip_ipbased_allow_list_and_deny_list_5() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy
@ -207,7 +207,7 @@ ENDSNIP
snip_ipbased_allow_list_and_deny_list_7() { snip_ipbased_allow_list_and_deny_list_7() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy
@ -234,7 +234,7 @@ ENDSNIP
snip_ipbased_allow_list_and_deny_list_9() { snip_ipbased_allow_list_and_deny_list_9() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy
@ -253,7 +253,7 @@ EOF
snip_ipbased_allow_list_and_deny_list_10() { snip_ipbased_allow_list_and_deny_list_10() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: ingress-policy name: ingress-policy

View File

@ -54,7 +54,7 @@ accepts a JWT issued by `testing@secure.istio.io`:
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: RequestAuthentication kind: RequestAuthentication
metadata: metadata:
name: "jwt-example" name: "jwt-example"
@ -91,7 +91,7 @@ with a `/` separator as shown:
{{< text syntax="bash" expandlinks="false" >}} {{< text syntax="bash" expandlinks="false" >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: require-jwt name: require-jwt
@ -135,7 +135,7 @@ the JWT to have a claim named `groups` containing the value `group1`:
{{< text syntax="bash" expandlinks="false" >}} {{< text syntax="bash" expandlinks="false" >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: require-jwt name: require-jwt

View File

@ -36,7 +36,7 @@ ENDSNIP
snip_allow_requests_with_valid_jwt_and_listtyped_claims_1() { snip_allow_requests_with_valid_jwt_and_listtyped_claims_1() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: RequestAuthentication kind: RequestAuthentication
metadata: metadata:
name: "jwt-example" name: "jwt-example"
@ -69,7 +69,7 @@ ENDSNIP
snip_allow_requests_with_valid_jwt_and_listtyped_claims_4() { snip_allow_requests_with_valid_jwt_and_listtyped_claims_4() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: require-jwt name: require-jwt
@ -112,7 +112,7 @@ ENDSNIP
snip_allow_requests_with_valid_jwt_and_listtyped_claims_8() { snip_allow_requests_with_valid_jwt_and_listtyped_claims_8() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: require-jwt name: require-jwt

View File

@ -71,7 +71,7 @@ Run the following command to apply the policy to allow requests to port 9000 and
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: tcp-policy name: tcp-policy
@ -117,7 +117,7 @@ explicitly in the `tcp-echo` Kubernetes service object. Run the following comman
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: tcp-policy name: tcp-policy
@ -159,7 +159,7 @@ ALLOW rules. Run the following command and verify the output:
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: tcp-policy name: tcp-policy
@ -195,7 +195,7 @@ HTTP-only fields while creating a DENY rule for tcp port and due to it's restric
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: tcp-policy name: tcp-policy

View File

@ -56,7 +56,7 @@ ENDSNIP
snip_configure_allow_authorization_policy_for_a_tcp_workload_1() { snip_configure_allow_authorization_policy_for_a_tcp_workload_1() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: tcp-policy name: tcp-policy
@ -101,7 +101,7 @@ ENDSNIP
snip_configure_allow_authorization_policy_for_a_tcp_workload_5() { snip_configure_allow_authorization_policy_for_a_tcp_workload_5() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: tcp-policy name: tcp-policy
@ -137,7 +137,7 @@ ENDSNIP
snip_configure_deny_authorization_policy_for_a_tcp_workload_1() { snip_configure_deny_authorization_policy_for_a_tcp_workload_1() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: tcp-policy name: tcp-policy
@ -172,7 +172,7 @@ ENDSNIP
snip_configure_deny_authorization_policy_for_a_tcp_workload_4() { snip_configure_deny_authorization_policy_for_a_tcp_workload_4() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: tcp-policy name: tcp-policy

View File

@ -43,7 +43,7 @@ Before you begin this task, do the following:
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: service-httpbin.default.svc.cluster.local name: service-httpbin.default.svc.cluster.local

View File

@ -35,7 +35,7 @@ kubectl apply -f samples/sleep/sleep.yaml -n sleep-allow
snip_before_you_begin_3() { snip_before_you_begin_3() {
kubectl apply -f - <<EOF kubectl apply -f - <<EOF
apiVersion: security.istio.io/v1beta1 apiVersion: security.istio.io/v1
kind: AuthorizationPolicy kind: AuthorizationPolicy
metadata: metadata:
name: service-httpbin.default.svc.cluster.local name: service-httpbin.default.svc.cluster.local