linkerd2/controller/k8s
Alejandro Pedraza 71291fe7bc
Add `accessPolicy` field to Server CRD (#12845)
Followup to #12844

This new field defines the default policy for Servers, i.e. if a request doesn't match the policy associated to a Server then this policy applies. The values are the same as for `proxy.defaultInboundPolicy` and the `config.linkerd.io/default-inbound-policy` annotation (all-unauthenticated, all-authenticated, cluster-authenticated, cluster-unauthenticated, deny), plus a new value "audit". The default is "deny", thus remaining backwards-compatible.

This field is also exposed as an additional printer column.
2024-07-22 09:01:09 -05:00
..
api.go Add `accessPolicy` field to Server CRD (#12845) 2024-07-22 09:01:09 -05:00
api_resource.go Add `accessPolicy` field to Server CRD (#12845) 2024-07-22 09:01:09 -05:00
api_test.go Use metadata API in the proxy and tap injectors (#9650) 2022-11-16 09:21:39 -05:00
clientset.go smi: remove default functionality in linkerd (#7334) 2021-12-03 12:07:30 +05:30
k8s.go Add support for remote discovery (#11224) 2023-08-11 09:31:45 -07:00
metadata_api.go Fixed destination metrics warning when re-linking (#11253) 2023-08-16 15:27:31 -07:00
prometheus.go Fixed service-mirror metrics warning (#11246) 2023-08-16 13:34:50 -05:00
test_helper.go Reflect changes to server selector in opaqueness (#12031) 2024-02-05 12:25:16 -08:00