- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 642 for tproxy (0.21 sec)
-
cni/pkg/plugin/plugin_dryrun_test.go
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Feb 10 00:31:55 UTC 2024 - 8.4K bytes - Viewed (0) -
pkg/test/framework/components/echo/common/deployment/namespace.go
D echo.Instances // IPv6 only echo app to be used by tests if running in dual-stack mode E echo.Instances // Standard echo app with TPROXY interception mode to be used by tests Tproxy echo.Instances // Headless echo app to be used by tests Headless echo.Instances // StatefulSet echo app to be used by tests StatefulSet echo.Instances
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon May 20 16:01:31 UTC 2024 - 6.1K bytes - Viewed (0) -
tests/integration/pilot/original_src_addr_test.go
) func TestTproxy(t *testing.T) { // nolint: staticcheck framework. NewTest(t). RequiresSingleCluster(). Run(func(t framework.TestContext) { if t.Settings().Skip(echo.TProxy) { t.Skip() } workloads, err := apps.A[0].Workloads() if err != nil { t.Errorf("failed to get Subsets: %v", err) return } // check the server can see the client's original ip
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Mon Apr 08 22:02:59 UTC 2024 - 1.9K bytes - Viewed (0) -
pkg/test/framework/components/echo/match/matchers.go
return i.Config().IsProxylessGRPC() } // NotProxylessGRPC is equivalent to Not(ProxylessGRPC) var NotProxylessGRPC = Not(ProxylessGRPC) var TProxy Matcher = func(i echo.Instance) bool { return i.Config().IsTProxy() } var NotTProxy = Not(TProxy) var ServiceAddressedWaypoint Matcher = func(i echo.Instance) bool { return i.Config().HasServiceAddressedWaypointProxy() }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 02 21:29:40 UTC 2024 - 5.6K bytes - Viewed (0) -
manifests/charts/ztunnel/templates/daemonset.yaml
- ALL add: # See https://man7.org/linux/man-pages/man7/capabilities.7.html - NET_ADMIN # Required for TPROXY and setsockopt - SYS_ADMIN # Required for `setns` - doing things in other netns - NET_RAW # Required for RAW/PACKET sockets, TPROXY readOnlyRootFilesystem: true runAsGroup: 1337 runAsNonRoot: false runAsUser: 0
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 11 01:33:52 UTC 2024 - 5.6K bytes - Viewed (0) -
tools/packaging/common/istio-start.sh
# Update iptables, based on config file "${ISTIO_BIN_BASE}/pilot-agent" istio-iptables fi fi EXEC_USER=${EXEC_USER:-istio-proxy} if [ "${ISTIO_INBOUND_INTERCEPTION_MODE}" = "TPROXY" ] ; then # In order to allow redirect inbound traffic using TPROXY, run envoy with the CAP_NET_ADMIN capability. # This allows configuring listeners with the "transparent" socket option set to true. EXEC_USER=root fi
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Mar 06 22:16:26 UTC 2024 - 5.4K bytes - Viewed (0) -
tools/istio-iptables/pkg/capture/run_linux.go
) // configureTProxyRoutes configures ip firewall rules to enable TPROXY support. // See https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/original_src_filter func configureTProxyRoutes(cfg *config.Config) error { if cfg.InboundPortsInclude != "" { if cfg.InboundInterceptionMode == constants.TPROXY { link, err := netlink.LinkByName("lo") if err != nil {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 30 22:24:38 UTC 2024 - 3.1K bytes - Viewed (0) -
cni/pkg/iptables/iptables_linux.go
} for _, family := range families { // Equiv: // ip rule add fwmark 0x111/0xfff pref 32764 lookup 100 // // Adds in-pod rules for marking packets with the istio-specific TPROXY mark. // A very similar mechanism is used for sidecar TPROXY. // // TODO largely identical/copied from tools/istio-iptables/pkg/capture/run_linux.go inpodMarkRule := netlink.NewRule() inpodMarkRule.Family = family
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Apr 30 22:24:38 UTC 2024 - 3.3K bytes - Viewed (0) -
tools/istio-iptables/pkg/capture/run_unspecified.go
) // ErrNotImplemented is returned when a requested feature is not implemented. var ErrNotImplemented = errors.New("not implemented") // configureTProxyRoutes configures ip firewall rules to enable TPROXY support. // See https://www.envoyproxy.io/docs/envoy/latest/configuration/http/http_filters/original_src_filter func configureTProxyRoutes(cfg *config.Config) error { return ErrNotImplemented }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Nov 01 16:18:12 UTC 2023 - 1.2K bytes - Viewed (0) -
pkg/test/framework/resource/settings.go
SkipString ArrayFlags SkipMatcher *Matcher // SkipWorkloadClasses can be used to skip deploying special workload types like TPROXY, VMs, etc. SkipWorkloadClasses ArrayFlags // OnlyWorkloadClasses can be used to only deploy specific workload types like TPROXY, VMs, etc. OnlyWorkloadClasses ArrayFlags // The label selector, in parsed form. Selector label.Selector
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu May 09 19:04:51 UTC 2024 - 9.2K bytes - Viewed (0)