- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 10 for rubble (0.17 sec)
-
cni/pkg/plugin/sidecar_intercept_rule_mgr.go
Ben Leggett <******@****.***> 1707525115 -0500
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sat Feb 10 00:31:55 GMT 2024 - 940 bytes - Viewed (0) -
cni/pkg/iptables/iptables.go
} for _, cmd := range optionalDeleteCmds { err := cfg.ext.Run(iptablesconstants.IPTables, &iptVer, nil, cmd...) if err != nil { log.Debugf("ignoring error deleting optional iptables rule: %v", err) } } } return errors.Join(delErrs...) } // Setup iptables rules for in-pod mode. Ideally this should be an idempotent function.
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue May 07 19:54:50 GMT 2024 - 19.7K bytes - Viewed (0) -
istioctl/pkg/authz/listener.go
) const ( anonymousName = "_anonymous_match_nothing_" ) // Matches the policy name in RBAC filter config with format like ns[default]-policy[some-policy]-rule[1]. var re = regexp.MustCompile(`ns\[(.+)\]-policy\[(.+)\]-rule\[(.+)\]`) type filterChain struct { rbacHTTP []*rbachttp.RBAC rbacTCP []*rbactcp.RBAC } type parsedListener struct { filterChains []*filterChain }
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Mon Sep 11 15:29:30 GMT 2023 - 6K bytes - Viewed (0) -
istioctl/pkg/util/formatting/formatter_test.go
"Error [B1] (SoapBubble) Explosion accident: the bubble is too big\n" + "Warning [C1] (GrandCastle) Collapse danger: the castle is too old", )) } func TestFormatter_PrintLogWithColor(t *testing.T) { g := NewWithT(t) firstMsg := diag.NewMessage( diag.NewMessageType(diag.Error, "B1", "Explosion accident: %v"), diag.MockResource("SoapBubble"), "the bubble is too big", ) secondMsg := diag.NewMessage(
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Oct 31 14:48:28 GMT 2023 - 4.1K bytes - Viewed (0) -
istioctl/pkg/writer/envoy/configdump/cluster.go
if err != nil { return err } if includeConfigType { _, _ = fmt.Fprintln(w, "NAME\tSERVICE FQDN\tPORT\tSUBSET\tDIRECTION\tTYPE\tDESTINATION RULE") } else { _, _ = fmt.Fprintln(w, "SERVICE FQDN\tPORT\tSUBSET\tDIRECTION\tTYPE\tDESTINATION RULE") } for _, c := range clusters { if filter.Verify(c) { if len(strings.Split(c.Name, "|")) > 3 { direction, subset, fqdn, port := model.ParseSubsetKey(c.Name)
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Thu May 11 05:38:17 GMT 2023 - 5.9K bytes - Viewed (0) -
cni/pkg/iptables/iptables_linux.go
inpodMarkRule.Mask = InpodTProxyMask inpodMarkRule.Priority = 32764 rules = append(rules, inpodMarkRule) } for _, rule := range rules { log.Debugf("Iterating netlink rule : %+v", rule) if err := f(rule); err != nil { return fmt.Errorf("failed to configure netlink rule: %w", err) } } return nil } func AddLoopbackRoutes(cfg *Config) error {
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 3.3K bytes - Viewed (0) -
cni/pkg/repair/repaircontroller.go
// However, this requires elevated privileges we want to avoid if uid, f := c.repairedPods[key]; f { if uid == pod.UID { log.Debugf("Skipping pod, already repaired") } else { // This is unexpected, bubble up to an error. Might be missing event, or invalid assumption in our code. // Either way, we will skip. log.Errorf("Skipping pod, already repaired with an unexpected UID %v vs %v", uid, pod.UID) } return nil }
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sat Feb 10 00:31:55 GMT 2024 - 10.4K bytes - Viewed (0) -
cni/pkg/plugin/plugin_dryrun_test.go
if err != nil { log.Fatalf("Cannot read generated IPTables rule file: %v", err) } generatedRules := getRules(generated) refreshGoldens(t, tt.golden, generatedRules) // Compare generated iptables rule with golden files. golden, err := os.ReadFile(tt.golden) if err != nil { log.Fatalf("Cannot read golden rule file: %v", err) } goldenRules := getRules(golden)
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sat Feb 10 00:31:55 GMT 2024 - 8.4K bytes - Viewed (0) -
cni/pkg/ipset/ipset.go
} // TODO this should actually create v6 and v6 subsets of type `hash:ip`, add them both to a // superset of type `list:set` - we can then query the superset directly in iptables (with the same rule), // and iptables will be smart enough to pick the correct underlying set (v4 or v6, based on context), // reducing the # of rules we need. //
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Apr 30 22:24:38 GMT 2024 - 3.9K bytes - Viewed (0) -
istioctl/pkg/describe/describe.go
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Sat Apr 13 05:23:38 GMT 2024 - 50.4K bytes - Viewed (0)