local types = import 'types.libsonnet'; types.envoy.config.rbac.v3.Permission .withAndRules(types.envoy.config.rbac.v3.Permission.Set) .withAny(false) .withDestinationIp(types.envoy.config.core.v3.CidrRange) .withDestinationPort(1) .withDestinationPortRange(types.envoy.type.v3.Int32Range) .withHeader(types.envoy.config.route.v3.HeaderMatcher) .withMatcher(types.envoy.config.core.v3.TypedExtensionConfig) .withMetadata(types.envoy.type.matcher.v3.MetadataMatcher) .withNotRule(types.envoy.config.rbac.v3.Permission) .withOrRules(types.envoy.config.rbac.v3.Permission.Set) .withRequestedServerName(types.envoy.type.matcher.v3.StringMatcher) .withUrlPath(types.envoy.type.matcher.v3.PathMatcher) ._validate()
Name | Type | One-of group | Required | Constraints |
---|---|---|---|---|
and_rules | envoy.config.rbac.v3.Permission.Set | rule |
|
|
any | bool | rule |
{"Bool":{"const":true}}
|
|
destination_ip | envoy.config.core.v3.CidrRange | rule |
|
|
destination_port | uint32 | rule |
{"Uint32":{"lte":65535}}
|
|
destination_port_range | envoy.type.v3.Int32Range | rule |
|
|
header | envoy.config.route.v3.HeaderMatcher | rule |
|
|
matcher | envoy.config.core.v3.TypedExtensionConfig | rule |
|
|
metadata | envoy.type.matcher.v3.MetadataMatcher | rule |
|
|
not_rule | envoy.config.rbac.v3.Permission | rule |
|
|
or_rules | envoy.config.rbac.v3.Permission.Set | rule |
|
|
requested_server_name | envoy.type.matcher.v3.StringMatcher | rule |
|
|
url_path | envoy.type.matcher.v3.PathMatcher | rule |
|