Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for AppendRuleV6 (0.17 sec)

  1. tools/istio-iptables/pkg/builder/iptables_builder_test.go

    			true,
    		},
    		{
    			"append-multi-v6",
    			false,
    			true,
    			func(builder *IptablesRuleBuilder) {
    				builder.AppendRuleV6(iptableslog.UndefinedCommand, "chain", "table", "-f", "foo", "-b", "bar")
    				builder.AppendRuleV6(iptableslog.UndefinedCommand, "chain", "table", "-f", "fu", "-b", "bar")
    				builder.AppendRuleV6(iptableslog.UndefinedCommand, "chain", "table", "-f", "foo", "-b", "baz")
    			},
    			true,
    		},
    		{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jun 11 14:29:54 UTC 2024
    - 6.6K bytes
    - Viewed (0)
  2. tools/istio-iptables/pkg/builder/iptables_builder_impl.go

    	rb.AppendRuleV4(command, chain, table, params...)
    	rb.AppendRuleV6(command, chain, table, params...)
    	return rb
    }
    
    func (rb *IptablesRuleBuilder) AppendRuleV6(command log.Command, chain string, table string, params ...string) *IptablesRuleBuilder {
    	if !rb.cfg.EnableIPv6 {
    		return rb
    	}
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jun 11 14:29:54 UTC 2024
    - 8.3K bytes
    - Viewed (0)
  3. tools/istio-iptables/pkg/capture/run.go

    		cfg.ruleBuilder.AppendRuleV6(iptableslog.UndefinedCommand, constants.ISTIOOUTPUT, constants.NAT, "-d", cidr.String(), "-j", constants.RETURN)
    	}
    
    	cfg.handleOutboundPortsInclude()
    
    	cfg.handleOutboundIncludeRules(ipv4RangesInclude, cfg.ruleBuilder.AppendRuleV4, cfg.ruleBuilder.InsertRuleV4)
    	cfg.handleOutboundIncludeRules(ipv6RangesInclude, cfg.ruleBuilder.AppendRuleV6, cfg.ruleBuilder.InsertRuleV6)
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 06 03:53:23 UTC 2024
    - 35.4K bytes
    - Viewed (0)
  4. cni/pkg/iptables/iptables.go

    		"dst",
    		"-j", "SNAT",
    		"--to-source", hostSNATIP.String(),
    	)
    
    	// For V6 we have to use a different set and a different SNAT IP
    	if cfg.cfg.EnableIPv6 {
    		iptablesBuilder.AppendRuleV6(
    			iptableslog.UndefinedCommand, ChainHostPostrouting, iptablesconstants.NAT,
    			"-m", "owner",
    			"--socket-exists",
    			"-p", "tcp",
    			"-m", "set",
    			"--match-set", fmt.Sprintf(ipset.V6Name, ProbeIPSet),
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri May 31 21:45:18 UTC 2024
    - 19.9K bytes
    - Viewed (0)
Back to top