Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for ParseInterceptFilter (0.41 sec)

  1. tools/istio-iptables/pkg/config/types.go

    	for _, s := range strs {
    		if s == "" {
    			continue
    		}
    		filtered = append(filtered, s)
    	}
    	return filtered
    }
    
    type InterceptFilter struct {
    	Values []string
    	Except bool
    }
    
    func ParseInterceptFilter(include, exclude string) InterceptFilter {
    	if include == "*" {
    		excludes := Split(exclude)
    		return InterceptAllExcept(excludes...)
    	}
    	includes := Split(include)
    	return InterceptOnly(includes...)
    }
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Feb 25 15:43:38 UTC 2022
    - 1.4K bytes
    - Viewed (0)
  2. tools/istio-iptables/pkg/config/validation.go

    	//
    	// Most common Linux distributions allow no more than 128-1200
    	// match expressions per rule.
    	maxOwnerGroupsInclude = 64
    )
    
    func ValidateOwnerGroups(include, exclude string) error {
    	filter := ParseInterceptFilter(include, exclude)
    	if !filter.Except && len(filter.Values) > maxOwnerGroupsInclude {
    		return fmt.Errorf("number of owner groups whose outgoing traffic "+
    			"should be redirected to Envoy cannot exceed %d, got %d: %v",
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jan 11 02:38:28 UTC 2024
    - 2K bytes
    - Viewed (0)
  3. tools/istio-clean-iptables/pkg/cmd/cleanup.go

    	// Remove the old DNS UDP rules
    	if cfg.RedirectDNS {
    		ownerGroupsFilter := types.ParseInterceptFilter(cfg.OwnerGroupsInclude, cfg.OwnerGroupsExclude)
    
    		common.HandleDNSUDP(common.DeleteOps, builder.NewIptablesRuleBuilder(nil), ext, iptV, ipt6V, cfg.ProxyUID, cfg.ProxyGID,
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon May 13 15:51:15 UTC 2024
    - 5.1K bytes
    - Viewed (0)
  4. tools/istio-iptables/pkg/capture/run.go

    		cfg.ruleBuilder.AppendRule(iptableslog.UndefinedCommand, constants.ISTIOOUTPUT, constants.NAT, "-m", "owner", "--gid-owner", gid, "-j", constants.RETURN)
    	}
    
    	ownerGroupsFilter := config.ParseInterceptFilter(cfg.cfg.OwnerGroupsInclude, cfg.cfg.OwnerGroupsExclude)
    
    	cfg.handleCaptureByOwnerGroup(ownerGroupsFilter)
    
    	if redirectDNS {
    		if cfg.cfg.CaptureAllDNS {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 06 03:53:23 UTC 2024
    - 35.4K bytes
    - Viewed (0)
Back to top