- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 69 for families (0.25 sec)
-
cmd/kube-apiserver/app/options/validation_test.go
}{ { name: "master endpoint reconciler - IPv4 families", extra: Extra{ EndpointReconcilerType: "master-count", PrimaryServiceClusterIPRange: *ipv4cidr, }, generic: apiserveroptions.ServerRunOptions{ AdvertiseAddress: ipv4address, }, wantErr: false, }, { name: "master endpoint reconciler - IPv6 families", extra: Extra{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 11.4K bytes - Viewed (0) -
tools/istio-iptables/pkg/capture/run_linux.go
// Equivalent to `ip rule add fwmark <tproxyMark> lookup <tproxyTable>` families := []int{unix.AF_INET} if cfg.EnableIPv6 { families = append(families, unix.AF_INET6) } for _, family := range families { r := netlink.NewRule() r.Family = family r.Table = tproxyTable r.Mark = tproxyMark if err := netlink.RuleAdd(r); err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 30 22:24:38 UTC 2024 - 3.1K bytes - Viewed (0) -
cni/pkg/iptables/iptables_linux.go
} func forEachInpodMarkIPRule(cfg *Config, f func(*netlink.Rule) error) error { var rules []*netlink.Rule families := []int{unix.AF_INET} if cfg.EnableIPv6 { families = append(families, unix.AF_INET6) } for _, family := range families { // Equiv: // ip rule add fwmark 0x111/0xfff pref 32764 lookup 100 // // Adds in-pod rules for marking packets with the istio-specific TPROXY mark.
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 30 22:24:38 UTC 2024 - 3.3K bytes - Viewed (0) -
cmd/kube-proxy/app/server_other.go
// platform-specific setup. func (s *ProxyServer) platformSetup(ctx context.Context) error { return unsupportedError } // platformCheckSupported is called immediately before creating the Proxier, to check // what IP families are supported (and whether the configuration is usable at all). func (s *ProxyServer) platformCheckSupported(ctx context.Context) (ipv4Supported, ipv6Supported, dualStackSupported bool, err error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 22 05:08:41 UTC 2024 - 2.2K bytes - Viewed (0) -
pkg/proxy/util/utils.go
Namespace: svcNamespace, UID: svcUID, }, nil, v1.EventTypeWarning, "KubeProxyIncorrectIPVersion", "GatherEndpoints", errMsg) } } // MapIPsByIPFamily maps a slice of IPs to their respective IP families (v4 or v6) func MapIPsByIPFamily(ipStrings []string) map[v1.IPFamily][]net.IP { ipFamilyMap := map[v1.IPFamily][]net.IP{} for _, ipStr := range ipStrings { ip := netutils.ParseIPSloppy(ipStr) if ip != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon May 20 11:57:43 UTC 2024 - 7.4K bytes - Viewed (0) -
pkg/proxy/util/nodeport_addresses.go
var ipv4LoopbackStart = net.IPv4(127, 0, 0, 0) // NewNodePortAddresses takes an IP family and the `--nodeport-addresses` value (which is // assumed to contain only valid CIDRs, potentially of both IP families) and returns a // NodePortAddresses object for the given family. If there are no CIDRs of the given // family then the CIDR "0.0.0.0/0" or "::/0" will be added (even if there are CIDRs of // the other family).
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Apr 18 13:25:06 UTC 2024 - 3.6K bytes - Viewed (0) -
cmd/kube-proxy/app/server_windows.go
s.NodeIPs[v1.IPv6Protocol] = net.IPv6zero } else { s.NodeIPs[v1.IPv4Protocol] = net.IPv4zero } return nil } // platformCheckSupported is called immediately before creating the Proxier, to check // what IP families are supported (and whether the configuration is usable at all). func (s *ProxyServer) platformCheckSupported(ctx context.Context) (ipv4Supported, ipv6Supported, dualStackSupported bool, err error) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Apr 26 13:27:41 UTC 2024 - 3.9K bytes - Viewed (0) -
cmd/kube-proxy/app/server_linux.go
// that family. func getIPTables(primaryFamily v1.IPFamily) ([2]utiliptables.Interface, utiliptables.Interface) { execer := exec.New() // Create iptables handlers for both families. Always ordered as IPv4, IPv6 ipt := [2]utiliptables.Interface{ utiliptables.New(execer, utiliptables.ProtocolIPv4), utiliptables.New(execer, utiliptables.ProtocolIPv6), }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 08 13:48:54 UTC 2024 - 18.1K bytes - Viewed (0) -
pkg/registry/core/service/storage/storage_test.go
} if tc.expectStackDowngrade && len(want.Spec.IPFamilies) > len(got.Spec.ClusterIPs) { want.Spec.IPFamilies = want.Spec.IPFamilies[0:1] } else if len(got.Spec.IPFamilies) > len(want.Spec.IPFamilies) { want.Spec.IPFamilies = append(want.Spec.IPFamilies, got.Spec.IPFamilies[len(want.Spec.IPFamilies):]...) } } if tc.expectNodePorts { for i := range want.Spec.Ports {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 440.2K bytes - Viewed (0) -
src/net/ipsock.go
// "tcp" and "udp" networks does not listen for both IPv4 and IPv6 // connections. This is due to the fact that IPv4 traffic will not be // routed to an IPv6 socket - two separate sockets are required if // both address families are to be supported. // See inet6(4) for details. type ipStackCapabilities struct { sync.Once // guards following ipv4Enabled bool ipv6Enabled bool ipv4MappedIPv6Enabled bool
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 9.4K bytes - Viewed (0)