- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 12 for ipt (0.39 sec)
-
tools/istio-iptables/pkg/builder/iptables_builder_impl.go
match = append(match, "-j", "NFLOG", "--nflog-prefix", fmt.Sprintf(`%q`, command.Identifier), "--nflog-group", "1337", "--nflog-size", "20") *ipt = append(*ipt, &Rule{ chain: chain, table: table, params: append([]string{"-A", chain}, match...), }) } rules := params *ipt = append(*ipt, &Rule{ chain: chain, table: table, params: append([]string{"-A", chain}, rules...), }) return rb }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 11 14:29:54 UTC 2024 - 8.3K bytes - Viewed (0) -
cmd/kube-proxy/app/server_linux.go
ipt := [2]utiliptables.Interface{ utiliptables.New(execer, utiliptables.ProtocolIPv4), utiliptables.New(execer, utiliptables.ProtocolIPv6), } var iptInterface utiliptables.Interface if primaryFamily == v1.IPv4Protocol { iptInterface = ipt[0] } else if primaryFamily == v1.IPv6Protocol { iptInterface = ipt[1] } return ipt, iptInterface }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Jun 08 13:48:54 UTC 2024 - 18.1K bytes - Viewed (0) -
pkg/util/iptables/monitor_test.go
} if err := waitForReloads(&reloads, 0); err != nil { t.Errorf("got unexpected reloads: %v", err) } // If we delete all of the chains, it should reload ipt.DeleteChain(TableMangle, canary) ipt.DeleteChain(TableFilter, canary) ipt.DeleteChain(TableNAT, canary) if err := waitForReloads(&reloads, 1); err != nil { t.Errorf("got unexpected number of reloads after flush: %v", err) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Nov 08 15:21:59 UTC 2023 - 9.3K bytes - Viewed (0) -
pkg/proxy/ipvs/proxier_test.go
func buildFakeProxier(t *testing.T) (*iptablestest.FakeIPTables, *Proxier) { _, ctx := ktesting.NewTestContext(t) ipt := iptablestest.NewFake() ipvs := ipvstest.NewFake() ipset := ipsettest.NewFake(testIPSetVersion) return ipt, NewFakeProxier(ctx, ipt, ipvs, ipset, nil, nil, v1.IPv4Protocol) } func getRules(ipt *iptablestest.FakeIPTables, chain utiliptables.Chain) []*iptablestest.Rule { var rules []*iptablestest.Rule
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Apr 27 01:31:57 UTC 2024 - 186.8K bytes - Viewed (0) -
cni/pkg/plugin/sidecar_iptables_unspecified.go
var ErrNotImplemented = errors.New("not implemented") // Program defines a method which programs iptables based on the parameters // provided in Redirect. func (ipt *iptables) Program(podName, netns string, rdrct *Redirect) error { return ErrNotImplemented
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jan 26 20:34:28 UTC 2024 - 1.1K bytes - Viewed (0) -
pkg/proxy/iptables/proxier_test.go
// match). func newIPTablesTracer(t *testing.T, ipt *iptablestest.FakeIPTables, nodeIPs []string) *iptablesTracer { localIPs := sets.New("127.0.0.1", "::1") localIPs.Insert(nodeIPs...) return &iptablesTracer{ ipt: ipt, localIPs: localIPs, t: t, } }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 249.9K bytes - Viewed (0) -
cni/pkg/plugin/sidecar_iptables_linux.go
) // getNs is a unit test override variable for interface create. var getNs = ns.GetNS // Program defines a method which programs iptables based on the parameters // provided in Redirect. func (ipt *iptables) Program(podName, netns string, rdrct *Redirect) error { cfg := config.DefaultConfig() cfg.CNIMode = true cfg.NetworkNamespace = netns cfg.ProxyPort = rdrct.targetPort cfg.ProxyUID = rdrct.noRedirectUID
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Apr 18 17:36:41 UTC 2024 - 2.5K bytes - Viewed (0) -
pkg/proxy/iptables/proxier.go
// We pass syncPeriod to ipt.Monitor, which will call us only if it needs to. // We need to pass *some* maxInterval to NewBoundedFrequencyRunner anyway though. // time.Hour is arbitrary. proxier.syncRunner = async.NewBoundedFrequencyRunner("sync-runner", proxier.syncProxyRules, minSyncPeriod, time.Hour, burstSyncs)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 65.1K bytes - Viewed (0) -
pkg/proxy/ipvs/proxier.go
func cleanupIptablesLeftovers(ctx context.Context, ipt utiliptables.Interface) (encounteredError bool) { logger := klog.FromContext(ctx) // Unlink the iptables chains created by ipvs Proxier for _, jc := range iptablesJumpChain { args := []string{ "-m", "comment", "--comment", jc.comment, "-j", string(jc.to), } if err := ipt.DeleteRule(jc.table, jc.from, args...); err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Apr 28 15:51:23 UTC 2024 - 77.7K bytes - Viewed (0) -
pkg/proxy/iptables/number_generated_rules_test.go
epPerService: 10, expectedFilterRules: 14, expectedNatRules: 405, }, } for _, test := range testCases { t.Run(test.name, func(t *testing.T) { ipt := iptablestest.NewFake() fp := NewFakeProxier(ipt) svcs, eps := generateServiceEndpoints(test.services, test.epPerService, test.epsFunc, test.svcFunc) makeServiceMap(fp, svcs...) populateEndpointSlices(fp, eps...)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 21 14:39:54 UTC 2024 - 13.1K bytes - Viewed (0)