- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 63 for NS1 (0.07 sec)
-
pkg/proxy/nftables/proxier_test.go
# svc1 add chain ip kube-proxy service-ULMVA6XW-ns1/svc1/tcp/p80 add rule ip kube-proxy service-ULMVA6XW-ns1/svc1/tcp/p80 ip daddr 172.30.0.41 tcp dport 80 ip saddr != 10.0.0.0/8 jump mark-for-masquerade add rule ip kube-proxy service-ULMVA6XW-ns1/svc1/tcp/p80 numgen random mod 1 vmap { 0 : goto endpoint-5OJB2KTY-ns1/svc1/tcp/p80__10.180.0.1/80 } add chain ip kube-proxy endpoint-5OJB2KTY-ns1/svc1/tcp/p80__10.180.0.1/80
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Apr 27 01:31:57 UTC 2024 - 173.5K bytes - Viewed (0) -
pkg/dns/client/dns_test.go
expected: sets.New( "productpage.ns1.svc.cluster.local.", "productpage.", "productpage.ns1.svc.cluster.local", "productpage.ns1.", "productpage.ns1.svc.", ), }, { startsWith: "svc-with-alt", expected: sets.New( "svc-with-alt.", "svc-with-alt.ns1.", "svc-with-alt.ns1.svc.", "svc-with-alt.ns1.svc.clusterset.local.", "svc-with-alt.ns1.svc.cluster.local.",
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Feb 29 16:17:34 UTC 2024 - 20.4K bytes - Viewed (0) -
pkg/proxy/endpointslicecache_test.go
namespacedName: types.NamespacedName{Name: "svc1", Namespace: "ns1"}, endpointSlices: []*discovery.EndpointSlice{ generateEndpointSlice("svc1", "ns1", 1, 3, 999, 999, []string{}, []*int32{ptr.To[int32](80)}), generateEndpointSlice("svc1", "ns1", 2, 3, 999, 999, []string{}, []*int32{ptr.To[int32](80)}), }, expectedMap: map[ServicePortName][]*BaseEndpointInfo{ makeServicePortName("ns1", "svc1", "port-0", v1.ProtocolTCP): {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Apr 29 21:07:21 UTC 2024 - 24.9K bytes - Viewed (0) -
pkg/kubelet/util/manager/cache_based_manager_test.go
} return item.refCount } assert.Equal(t, 3, refs("ns1", "s1")) assert.Equal(t, 1, refs("ns1", "s10")) assert.Equal(t, 3, refs("ns1", "s2")) assert.Equal(t, 3, refs("ns1", "s3")) assert.Equal(t, 2, refs("ns1", "s30")) assert.Equal(t, 2, refs("ns1", "s4")) assert.Equal(t, 4, refs("ns1", "s5")) assert.Equal(t, 2, refs("ns1", "s50")) assert.Equal(t, 0, refs("ns1", "s6")) assert.Equal(t, 0, refs("ns1", "s60"))
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 04 06:25:43 UTC 2024 - 19.6K bytes - Viewed (0) -
pkg/proxy/iptables/proxier_test.go
-A KUBE-SERVICES -m comment --comment "ns1/svc1:p80 cluster IP" -m tcp -p tcp -d 10.20.30.41 --dport 80 -j KUBE-SVC-XPGD46QRK7WJZT7O -A KUBE-SVC-XPGD46QRK7WJZT7O -m comment --comment "ns1/svc1:p80 cluster IP" -m tcp -p tcp -d 10.20.30.41 --dport 80 ! -s 10.0.0.0/24 -j KUBE-MARK-MASQ -A KUBE-SVC-XPGD46QRK7WJZT7O -m comment --comment ns1/svc1:p80 -j KUBE-SEP-SXIVWICOYRO3J4NJ
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 249.9K bytes - Viewed (0) -
pilot/pkg/serviceregistry/serviceentry/conversion_test.go
ServiceAccount: "spiffe://cluster.local/ns/ns1/sa/scooby", TLSMode: "istio", Namespace: "ns1", Locality: model.Locality{ ClusterID: cluster.ID(clusterID), }, }, DNSServiceEntryOnly: true, }, }, { name: "DNS address", wle: config.Config{ Meta: config.Meta{ Namespace: "ns1", }, Spec: &networking.WorkloadEntry{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 23 21:07:03 UTC 2024 - 39K bytes - Viewed (0) -
pilot/pkg/config/kube/gateway/controller_test.go
s.AssertEmpty(t, time.Millisecond*10) ns1.Annotations = map[string]string{"foo": "bar"} ns.Update(ns1) s.AssertEmpty(t, time.Millisecond*10) ns2.Annotations = map[string]string{"foo": "bar"} ns.Update(ns2) s.AssertEmpty(t, time.Millisecond*10) ns1.Labels["bar"] = "foo" ns.Update(ns1) s.AssertEmpty(t, time.Millisecond*10) ns2.Labels["foo"] = "bar" ns.Update(ns2)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 02 16:47:06 UTC 2024 - 5.6K bytes - Viewed (0) -
tests/integration/security/authz_test.go
} }) }) } func TestAuthz_Namespace(t *testing.T) { framework.NewTest(t). Run(func(t framework.TestContext) { // Allow anything from ns1. Any service in ns1 will work as the `from` (just using ns1.A) allowed := apps.Ns1.A denied := apps.Ns2.A from := allowed.Append(denied) fromMatch := match.AnyServiceName(from.NamespacedNames()) toMatch := match.Not(fromMatch)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed May 08 23:36:51 UTC 2024 - 50.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/storage/testing/watcher_tests.go
"metadata.namespace": "t11-ns1", }), watchTests: []*testWatchStruct{ {baseNamespacedPod("t11-foo1", "t11-ns1"), true, watch.Added}, {baseNamespacedPod("t11-foo2", "t11-ns1"), false, ""}, {baseNamespacedPod("t11-foo1", "t11-ns2"), false, ""}, {baseNamespacedPodUpdated("t11-foo1", "t11-ns1"), true, watch.Modified}, {baseNamespacedPodAssigned("t11-foo1", "t11-ns1", "t11-bar1"), true, watch.Modified}, },
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 24 18:25:29 UTC 2024 - 63.8K bytes - Viewed (0) -
pkg/controller/garbagecollector/garbagecollector_test.go
"GET" + "/api/v1/namespaces/ns1/pods/rc1Pod1": { 200, serilizeOrDie(t, rc1Pod1), }, "GET" + "/api/v1/namespaces/ns1/pods/rc1Pod2": { 200, serilizeOrDie(t, rc1Pod2), }, "GET" + "/api/v1/namespaces/ns1/pods/rc2Pod1": { 200, serilizeOrDie(t, rc2Pod1), }, "GET" + "/api/v1/namespaces/ns1/pods/rc3Pod1": { 200, serilizeOrDie(t, rc3Pod1),
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat May 04 18:33:12 UTC 2024 - 111.6K bytes - Viewed (0)