- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 56 for Routing (0.17 sec)
-
tests/test_generate_unique_id_function.py
import warnings from typing import List from fastapi import APIRouter, FastAPI from fastapi.routing import APIRoute from fastapi.testclient import TestClient from pydantic import BaseModel def custom_generate_unique_id(route: APIRoute): return f"foo_{route.name}" def custom_generate_unique_id2(route: APIRoute): return f"bar_{route.name}" def custom_generate_unique_id3(route: APIRoute):
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Sat Jan 13 15:10:26 UTC 2024 - 66.7K bytes - Viewed (0) -
tests/integration/ambient/baseline_test.go
{ ConfigFile: "beta-mtls-off.yaml", Namespace: systemNM, Include: Always, ExpectSuccess: Always, ExpectMTLS: Never, // Without TLS we can't perform SNI routing required for multi-network ExpectDestinations: SameNetwork, }, { ConfigFile: "plaintext-to-permissive.yaml", Namespace: systemNM, Include: Always,
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 00:07:28 UTC 2024 - 78.4K bytes - Viewed (0) -
pkg/workloadapi/workload.pb.go
// The `mode` determines how these routing preferences are handled RoutingPreference []LoadBalancing_Scope `protobuf:"varint,1,rep,packed,name=routing_preference,json=routingPreference,proto3,enum=istio.workload.LoadBalancing_Scope" json:"routing_preference,omitempty"` // mode defines how we should handle the routing preferences.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 18:02:35 UTC 2024 - 65.9K bytes - Viewed (0) -
pkg/proxy/winkernel/proxier.go
} // If nodePort is specified, user should be able to use nodeIP:nodePort to reach the backend endpoints if svcInfo.NodePort() > 0 { // If the preserve-destination service annotation is present, we will disable routing mesh for NodePort. // This means that health services can use Node Port without falsely getting results from a different node. nodePortEndpoints := hnsEndpoints if svcInfo.preserveDIP || svcInfo.localTrafficDSR {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 13:25:06 UTC 2024 - 59K bytes - Viewed (0) -
staging/src/k8s.io/api/extensions/v1beta1/types.go
// SecretName is the name of the secret used to terminate SSL traffic on 443. // Field is left optional to allow SSL routing based on SNI hostname alone. // If the SNI host in a listener conflicts with the "Host" header field used // by an IngressRule, the SNI host is used for termination and value of the // Host header is used for routing. // +optional SecretName string `json:"secretName,omitempty" protobuf:"bytes,2,opt,name=secretName"`
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Nov 27 20:06:29 UTC 2023 - 61.3K bytes - Viewed (0) -
pkg/proxy/ipvs/proxier.go
} else if proxier.localDetector.IsImplemented() { // This masquerades off-cluster traffic to a service VIP. The idea // is that you can establish a static route for your Service range, // routing to any node, and that node will bridge into the Service // for you. Since that might bounce off-node, we masquerade here. // If/when we support "Local" policy for VIPs, we should update this. proxier.natRules.Write(
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 28 15:51:23 UTC 2024 - 77.7K bytes - Viewed (0) -
docs/bucket/notifications/README.md
ARGS: url* (url) AMQP server endpoint e.g. `amqp://myuser:mypassword@localhost:5672` exchange (string) name of the AMQP exchange exchange_type (string) AMQP exchange type routing_key (string) routing key for publishing mandatory (on|off) quietly ignore undelivered messages when set to 'off', default is 'on' durable (on|off) persist queue across broker restarts when set to 'on', default is 'off'
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 84K bytes - Viewed (0) -
tests/integration/security/authz_test.go
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed May 08 23:36:51 UTC 2024 - 50.1K bytes - Viewed (0) -
pkg/proxy/nftables/proxier.go
}) } else if proxier.localDetector.IsImplemented() { // This masquerades off-cluster traffic to a service VIP. The // idea is that you can establish a static route for your // Service range, routing to any node, and that node will // bridge into the Service for you. Since that might bounce // off-node, we masquerade here. tx.Add(&knftables.Rule{ Chain: internalTrafficChain,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 08 13:48:54 UTC 2024 - 55.5K bytes - Viewed (0) -
pkg/proxy/iptables/proxier.go
} else if proxier.localDetector.IsImplemented() { // This masquerades off-cluster traffic to a service VIP. The // idea is that you can establish a static route for your // Service range, routing to any node, and that node will // bridge into the Service for you. Since that might bounce // off-node, we masquerade here. natRules.Write( "-A", string(internalTrafficChain), args,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 65.1K bytes - Viewed (0)