Skip to content

Commit 7300918

Browse files
author
Eric Van Norman
authored
Fix link (#2683)
1 parent 481bb40 commit 7300918

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed

security/v1/authorization_policy.proto

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -414,7 +414,7 @@ message Source {
414414
repeated string not_ip_blocks = 8;
415415

416416
// Optional. A list of IP blocks, populated from X-Forwarded-For header or proxy protocol.
417-
// To make use of this field, you must configure the numTrustedProxies field of the gatewayTopology under the meshConfig
417+
// To make use of this field, you must configure the numTrustedProxies field of the gatewayTopology under the meshConfig
418418
// when you install Istio or using an annotation on the ingress gateway. See the documentation here:
419419
// [Configuring Gateway Network Topology](https://istio.io/latest/docs/ops/configuration/traffic-management/network-topologies/).
420420
// Single IP (e.g. "1.2.3.4") and CIDR (e.g. "1.2.3.0/24") are supported.

security/v1beta1/authorization_policy.pb.go

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

security/v1beta1/authorization_policy.pb.html

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

security/v1beta1/authorization_policy.proto

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -129,10 +129,10 @@ import "type/v1beta1/selector.proto";
129129
// ports: ["8080"]
130130
// ```
131131
//
132-
// When this rule is applied to TCP traffic, the `method` field (as will all HTTP based attributes) cannot be processed.
132+
// When this rule is applied to TCP traffic, the `method` field (as will all HTTP based attributes) cannot be processed.
133133
// For a `DENY` rule, missing attributes are treated as matches. This means all TCP traffic on port 8080 would be denied in the example above.
134-
// If we were to remove the `ports` match, all TCP traffic would be denied. As a result, it is recommended to always scope `DENY` policies to a specific port,
135-
// especially when using HTTP attributes [Authorization Policy for TCP Ports] (https://istio.io/latest/docs/tasks/security/authorization/authz-tcp/).
134+
// If we were to remove the `ports` match, all TCP traffic would be denied. As a result, it is recommended to always scope `DENY` policies to a specific port,
135+
// especially when using HTTP attributes [Authorization Policy for TCP Ports](https://istio.io/latest/docs/tasks/security/authorization/authz-tcp/).
136136
//
137137
// The following authorization policy sets the `action` to "AUDIT". It will audit any GET requests to the path with the
138138
// prefix "/user/profile".
@@ -415,7 +415,7 @@ message Source {
415415
repeated string not_ip_blocks = 8;
416416

417417
// Optional. A list of IP blocks, populated from X-Forwarded-For header or proxy protocol.
418-
// To make use of this field, you must configure the numTrustedProxies field of the gatewayTopology under the meshConfig
418+
// To make use of this field, you must configure the numTrustedProxies field of the gatewayTopology under the meshConfig
419419
// when you install Istio or using an annotation on the ingress gateway. See the documentation here:
420420
// [Configuring Gateway Network Topology](https://istio.io/latest/docs/ops/configuration/traffic-management/network-topologies/).
421421
// Single IP (e.g. "1.2.3.4") and CIDR (e.g. "1.2.3.0/24") are supported.

0 commit comments

Comments
 (0)