- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for turn (0.04 sec)
-
tests/integration/pilot/headers_test.go
BuildOrFail(t) instance := instances[0] proxyHeaders := sets.New( "server", "x-forwarded-client-cert", "x-request-id", ) allowedClientHeaders := sets.New( // Envoy has no way to turn this off "x-forwarded-proto", // Metadata exchange: under discussion of how we can strip this, but for now there is no way "x-envoy-peer-metadata", "x-envoy-peer-metadata-id",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 20 16:01:31 UTC 2024 - 4.2K bytes - Viewed (0) -
tests/integration/security/file_mounted_certs/main_test.go
controlPlaneAuthPolicy: "MUTUAL_TLS" proxyMetadata: ` + strings.Replace(ProxyMetadataJSON, "\n", "", -1) + ` values: global: pilotCertProvider: "mycopki" pilot: env: # We need to turn off the XDS Auth because test certificates only have a fixed/hardcoded identity, but the identity of the actual # deployed test services changes on each run due to a randomly generated namespace suffixes.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 02 21:29:40 UTC 2024 - 13.4K bytes - Viewed (0) -
pilot/pkg/model/typed_xds_cache.go
} } size(l.store.Len()) } func (l *lruCache[K]) ClearAll() { l.mu.Lock() defer l.mu.Unlock() l.token = CacheToken(time.Now().UnixNano()) // Purge with an evict function would turn up to be pretty slow since // it runs the function for every key in the store, might be better to just // create a new store. l.store = newLru(l.onEvict) l.configIndex = map[ConfigHash]sets.Set[K]{}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Mar 30 05:26:03 UTC 2024 - 11K bytes - Viewed (0) -
istioctl/pkg/multixds/gather.go
responses, err = queryDebugSynczViaAgents(all, dr, istioNamespace, kubeClient, centralOpts, options) } else { // Self-administered case. Find all Istiods in revision using K8s, port-forward and call each in turn responses, err = queryEachShard(all, dr, istioNamespace, kubeClient, centralOpts) } if err != nil { if _, ok := err.(ControlPlaneNotFoundError); ok {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Mar 08 08:38:19 UTC 2024 - 13.6K bytes - Viewed (0) -
pkg/log/config.go
for _, scope := range allScopes { scope.SetLogCallers(true) } } if scope, ok := allScopes[s]; ok { scope.SetLogCallers(true) } } // If gRPC logging is enabled, turn on gRPC logging automatically if grpcScope.GetOutputLevel() != NoneLevel { options.logGRPC = true } return nil } // processLevels breaks down an argument string into a set of scope & levels and then
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Mar 26 20:38:10 UTC 2024 - 12.1K bytes - Viewed (0) -
pilot/pkg/xds/endpoints/endpoint_builder.go
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Apr 28 02:18:19 UTC 2024 - 26.1K bytes - Viewed (0) -
tools/istio-iptables/pkg/dependencies/implementation_linux.go
// as it opens the risk of lock contention with other node actors (such as kube-proxy), and isn't actually needed at all. // Older iptables cannot turn off the lock explicitly, so we hack around it... // Overwrite the lock file with the network namespace file (which is assumed to be unique). // We are setting the lockfile to `r.NetworkNamespace`.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Mar 12 20:49:10 UTC 2024 - 12K bytes - Viewed (0) -
pilot/pkg/model/context.go
// this would return true only if there was a policy allowing `ingress-ns` to access Secrets in the `ns-name` namespace. SecretAllowed(resourceName string, namespace string) bool } // OutboundListenerClass is a helper to turn a NodeType for outbound to a ListenerClass. func OutboundListenerClass(t NodeType) istionetworking.ListenerClass { if t == Router { return istionetworking.ListenerClassGateway }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Jun 03 08:29:05 UTC 2024 - 33.6K bytes - Viewed (0) -
pilot/pkg/networking/core/listener.go
listenerOpts.port.Port, listenerOpts.port.Protocol, currentListenerEntry.protocol, conflictType) return } // In general, for handling conflicts we: // * Turn on sniffing if its HTTP and TCP mixed // * Merge filter chains switch conflictType { case NoConflict, AutoOverHTTP: // This is a new entry (NoConflict), or completely overriding (AutoOverHTTP); add it to the map
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 06 04:44:06 UTC 2024 - 55.1K bytes - Viewed (0) -
pkg/config/validation/validation.go
return nil, nil }) validateFuncs = make(map[string]ValidateFunc) ) type ( Warning = agent.Warning Validation = agent.Validation ) // WrapWarning turns an error into a Validation as a warning func WrapWarning(e error) Validation { return Validation{Warning: e} } func AppendValidation(v Validation, vs ...error) Validation { return agent.AppendValidation(v, vs...)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Jun 12 04:03:33 UTC 2024 - 107.2K bytes - Viewed (0)