Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 14 for turn (0.04 sec)

  1. tests/integration/pilot/headers_test.go

    				BuildOrFail(t)
    			instance := instances[0]
    			proxyHeaders := sets.New(
    				"server",
    				"x-forwarded-client-cert",
    				"x-request-id",
    			)
    
    			allowedClientHeaders := sets.New(
    				// Envoy has no way to turn this off
    				"x-forwarded-proto",
    				// Metadata exchange: under discussion of how we can strip this, but for now there is no way
    				"x-envoy-peer-metadata",
    				"x-envoy-peer-metadata-id",
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 20 16:01:31 UTC 2024
    - 4.2K bytes
    - Viewed (0)
  2. tests/integration/security/file_mounted_certs/main_test.go

        controlPlaneAuthPolicy: "MUTUAL_TLS"
        proxyMetadata: ` + strings.Replace(ProxyMetadataJSON, "\n", "", -1) +
    		`
    values:
      global:
        pilotCertProvider: "mycopki"
      pilot:
        env:
          # We need to turn off the XDS Auth because test certificates only have a fixed/hardcoded identity, but the identity of the actual
          # deployed test services changes on each run due to a randomly generated namespace suffixes.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 02 21:29:40 UTC 2024
    - 13.4K bytes
    - Viewed (0)
  3. pilot/pkg/model/typed_xds_cache.go

    		}
    	}
    	size(l.store.Len())
    }
    
    func (l *lruCache[K]) ClearAll() {
    	l.mu.Lock()
    	defer l.mu.Unlock()
    	l.token = CacheToken(time.Now().UnixNano())
    	// Purge with an evict function would turn up to be pretty slow since
    	// it runs the function for every key in the store, might be better to just
    	// create a new store.
    	l.store = newLru(l.onEvict)
    	l.configIndex = map[ConfigHash]sets.Set[K]{}
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Mar 30 05:26:03 UTC 2024
    - 11K bytes
    - Viewed (0)
  4. istioctl/pkg/multixds/gather.go

    		responses, err = queryDebugSynczViaAgents(all, dr, istioNamespace, kubeClient, centralOpts, options)
    	} else {
    		// Self-administered case.  Find all Istiods in revision using K8s, port-forward and call each in turn
    		responses, err = queryEachShard(all, dr, istioNamespace, kubeClient, centralOpts)
    	}
    	if err != nil {
    		if _, ok := err.(ControlPlaneNotFoundError); ok {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Mar 08 08:38:19 UTC 2024
    - 13.6K bytes
    - Viewed (0)
  5. pkg/log/config.go

    			for _, scope := range allScopes {
    				scope.SetLogCallers(true)
    			}
    		}
    
    		if scope, ok := allScopes[s]; ok {
    			scope.SetLogCallers(true)
    		}
    	}
    
    	// If gRPC logging is enabled, turn on gRPC logging automatically
    	if grpcScope.GetOutputLevel() != NoneLevel {
    		options.logGRPC = true
    	}
    
    	return nil
    }
    
    // processLevels breaks down an argument string into a set of scope & levels and then
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Mar 26 20:38:10 UTC 2024
    - 12.1K bytes
    - Viewed (0)
  6. pilot/pkg/xds/endpoints/endpoint_builder.go

    	// EDS to STRICT_DNS or LOGICAL_DNS. When pushEds is called before Envoy sends the updated cluster list via Endpoint request which in turn
    	// will update "Connection.Clusters", we might accidentally send EDS updates for STRICT_DNS cluster. This check guards
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Apr 28 02:18:19 UTC 2024
    - 26.1K bytes
    - Viewed (0)
  7. tools/istio-iptables/pkg/dependencies/implementation_linux.go

    		// as it opens the risk of lock contention with other node actors (such as kube-proxy), and isn't actually needed at all.
    		// Older iptables cannot turn off the lock explicitly, so we hack around it...
    		// Overwrite the lock file with the network namespace file (which is assumed to be unique).
    		// We are setting the lockfile to `r.NetworkNamespace`.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Mar 12 20:49:10 UTC 2024
    - 12K bytes
    - Viewed (0)
  8. pilot/pkg/model/context.go

    	// this would return true only if there was a policy allowing `ingress-ns` to access Secrets in the `ns-name` namespace.
    	SecretAllowed(resourceName string, namespace string) bool
    }
    
    // OutboundListenerClass is a helper to turn a NodeType for outbound to a ListenerClass.
    func OutboundListenerClass(t NodeType) istionetworking.ListenerClass {
    	if t == Router {
    		return istionetworking.ListenerClassGateway
    	}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jun 03 08:29:05 UTC 2024
    - 33.6K bytes
    - Viewed (0)
  9. pilot/pkg/networking/core/listener.go

    			listenerOpts.port.Port, listenerOpts.port.Protocol, currentListenerEntry.protocol, conflictType)
    		return
    	}
    
    	// In general, for handling conflicts we:
    	// * Turn on sniffing if its HTTP and TCP mixed
    	// * Merge filter chains
    	switch conflictType {
    	case NoConflict, AutoOverHTTP:
    		// This is a new entry (NoConflict), or completely overriding (AutoOverHTTP); add it to the map
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 06 04:44:06 UTC 2024
    - 55.1K bytes
    - Viewed (0)
  10. istioctl/pkg/util/formatting/formatter.go

    var (
    	colorPrefixes = map[diag.Level]string{
    		diag.Info:    "",           // no special color for info messages
    		diag.Warning: "\033[33m",   // yellow
    		diag.Error:   "\033[1;31m", // bold red
    	}
    )
    
    // render turns a Message instance into a string with an option of colored bash output
    func render(m diag.Message, colorize bool) string {
    	return fmt.Sprintf("%s%v%s [%v]%s %s",
    		colorPrefix(m, colorize), m.Type.Level(), colorSuffix(colorize),
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jul 11 02:41:45 UTC 2023
    - 3.1K bytes
    - Viewed (0)
Back to top