- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 119 for iptables (0.06 sec)
-
cni/pkg/iptables/iptables.go
delErrs = append(delErrs, cfg.ext.Run(iptablesconstants.IPTables, &iptVer, nil, cmd...)) } for _, cmd := range optionalDeleteCmds { err := cfg.ext.Run(iptablesconstants.IPTables, &iptVer, nil, cmd...) if err != nil { log.Debugf("ignoring error deleting optional iptables rule: %v", err) } } } return errors.Join(delErrs...) }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Oct 15 15:39:28 UTC 2024 - 23.3K bytes - Viewed (0) -
docker/iptables.yaml
contents: repositories: - https://packages.wolfi.dev/os keyring: - https://packages.wolfi.dev/os/wolfi-signing.rsa.pub packages: - ca-certificates-bundle - wolfi-baselayout - glibc - iptables - ip6tables - libnetfilter_conntrack - libnfnetlink - libmnl - libgcc archs: - x86_64 - aarch64 paths: - path: /run type: directory permissions: 0o755 accounts: users:
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu May 02 17:24:41 UTC 2024 - 541 bytes - Viewed (0) -
cni/pkg/plugin/plugin_dryrun_test.go
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Aug 27 16:44:45 UTC 2024 - 8.5K bytes - Viewed (0) -
docker/Dockerfile.base
&& apt-get clean \ && rm -rf /var/log/*log /var/lib/apt/lists/* /var/log/apt/* /var/lib/dpkg/*-old /var/cache/debconf/*-old \ && update-alternatives --set iptables /usr/sbin/iptables-legacy \ && update-alternatives --set ip6tables /usr/sbin/ip6tables-legacy # Sudoers used to allow tcpdump and other debug utilities. RUN useradd -m --uid 1337 istio-proxy && \
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed May 08 18:50:51 UTC 2024 - 1000 bytes - Viewed (0) -
cni/pkg/iptables/iptables_e2e_test.go
initialized.Do(func() { // Setup group namespace so iptables --gid-owner will work assert.NoError(t, userns.WriteGroupMap(map[uint32]uint32{userns.OriginalGID(): 0})) // Istio iptables expects to find a non-localhost IP in some interface assert.NoError(t, exec.Command("ip", "addr", "add", "240.240.240.240/32", "dev", "lo").Run()) // Put a new file we have permission to access over xtables.lock xtables := filepath.Join(t.TempDir(), "xtables.lock")
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Tue Oct 15 15:39:28 UTC 2024 - 2.9K bytes - Viewed (0) -
cni/pkg/install/binaries_test.go
srcFiles: map[string]string{"istio-cni": "cni111", "istio-iptables": "iptables111"}, expectedFiles: map[string]string{"istio-cni": "cni111", "istio-iptables": "iptables111"}, }, { name: "update binaries", srcFiles: map[string]string{"istio-cni": "cni111", "istio-iptables": "iptables111"}, existingFiles: map[string]string{"istio-cni": "cni000", "istio-iptables": "iptables111"},
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Jul 20 18:34:43 UTC 2023 - 2.3K bytes - Viewed (0) -
cni/pkg/plugin/sidecar_iptables_linux.go
"istio.io/istio/pkg/log" "istio.io/istio/tools/istio-iptables/pkg/cmd" "istio.io/istio/tools/istio-iptables/pkg/config" "istio.io/istio/tools/istio-iptables/pkg/dependencies" ) // getNs is a unit test override variable for interface create. var getNs = ns.GetNS // Program defines a method which programs iptables based on the parameters // provided in Redirect. func (ipt *iptables) Program(podName, netns string, rdrct *Redirect) error {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Sat Jun 29 01:24:47 UTC 2024 - 2.6K bytes - Viewed (0) -
cni/pkg/plugin/sidecar_intercept_rule_mgr.go
// limitations under the License. package plugin // InterceptRuleMgr configures networking tables (e.g. iptables or nftables) for // redirecting traffic to an Istio proxy. type InterceptRuleMgr interface { Program(podName, netns string, redirect *Redirect) error } // Constructor for iptables InterceptRuleMgr func IptablesInterceptRuleMgr() InterceptRuleMgr { return newIPTables()
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Sat Feb 10 00:31:55 UTC 2024 - 940 bytes - Viewed (0) -
istioctl/pkg/kubeinject/testdata/mesh-config.yaml
# # The mode used to redirect inbound connections to Envoy. This setting # has no effect on outbound traffic: iptables REDIRECT is always used for # outbound connections. # If "REDIRECT", use iptables REDIRECT to NAT and redirect to Envoy. # The "REDIRECT" mode loses source addresses during redirection. # If "TPROXY", use iptables TPROXY to redirect to Envoy. # The "TPROXY" mode preserves both the source and destination IP
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Jun 15 15:02:17 UTC 2023 - 2.2K bytes - Viewed (0) -
cni/pkg/nodeagent/fakes_test.go
AddLoopbackRoutesCnt atomic.Int32 DelLoopbackRoutesCnt atomic.Int32 } var _ iptables.NetlinkDependencies = &fakeIptablesDeps{} func (r *fakeIptablesDeps) AddInpodMarkIPRule(cfg *iptables.Config) error { r.AddInpodMarkIPRuleCnt.Add(1) return nil } func (r *fakeIptablesDeps) DelInpodMarkIPRule(cfg *iptables.Config) error { r.DelInpodMarkIPRuleCnt.Add(1) return nil }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Jun 28 23:33:46 UTC 2024 - 3.9K bytes - Viewed (0)