- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for VirtualInboundListenerName (0.38 sec)
-
pilot/pkg/model/listener.go
// VirtualInboundBlackholeFilterChainName is the name of the filter chain to blackhole undesired traffic VirtualInboundBlackholeFilterChainName = "virtualInbound-blackhole" // VirtualInboundListenerName is the name for traffic capture listener VirtualInboundListenerName = "virtualInbound" // VirtualInboundCatchAllHTTPFilterChainName is the name of the catch all http filter chain
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Mar 10 17:24:55 UTC 2023 - 1.7K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_builder_test.go
} vi := xdstest.ExtractListener(model.VirtualInboundListenerName, listeners) if vi == nil { t.Fatalf("expect virtual inbound listener, found %s", listeners[0].Name) } byListenerName := map[string]int{} for _, fc := range vi.FilterChains { byListenerName[fc.Name]++ } for k, v := range byListenerName { if k == model.VirtualInboundListenerName && v != 3 {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 24.7K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_test.go
verifyFilterChainMatch(t, xdstest.ExtractListener(model.VirtualInboundListenerName, listeners)) } func testInboundListenerConfigWithConflictPort(t *testing.T, proxy *model.Proxy, services ...*model.Service) { t.Helper() listeners := buildListeners(t, TestOptions{Services: services}, proxy) virtualListener := xdstest.ExtractListener(model.VirtualInboundListenerName, listeners) for _, fc := range virtualListener.FilterChains {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 93.6K bytes - Viewed (0) -
pilot/pkg/networking/core/envoyfilter/listener_patch_test.go
Match: &networking.EnvoyFilter_EnvoyConfigObjectMatch{ ObjectTypes: &networking.EnvoyFilter_EnvoyConfigObjectMatch_Listener{ Listener: &networking.EnvoyFilter_ListenerMatch{ Name: model.VirtualInboundListenerName, FilterChain: &networking.EnvoyFilter_ListenerMatch_FilterChainMatch{ DestinationPort: 6380, Filter: &networking.EnvoyFilter_ListenerMatch_FilterMatch{
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sun Apr 21 17:42:54 UTC 2024 - 70.1K bytes - Viewed (0) -
pilot/pkg/networking/core/listener_inbound.go
// Passthrough chains have fix names based on protocol if protocol == istionetworking.ListenerProtocolHTTP { return model.VirtualInboundCatchAllHTTPFilterChainName } return model.VirtualInboundListenerName } // Everything else derived from bind/port return getListenerName(cc.bind, int(cc.port.TargetPort), istionetworking.TransportProtocolTCP) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 35.1K bytes - Viewed (0) -
pilot/pkg/networking/core/envoyfilter/listener_patch.go
// to support portNumber listener filter field within those special listeners as well if lp.ApplyTo != networking.EnvoyFilter_LISTENER && (listener.Name == model.VirtualInboundListenerName || listener.Name == model.VirtualOutboundListenerName) { return true } // FIXME: Ports on a listener can be 0. the API only takes uint32 for ports
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri May 17 15:39:29 UTC 2024 - 26.7K bytes - Viewed (0) -
pilot/pkg/simulation/traffic.go
default: return "" } } func matchListener(listeners []*listener.Listener, input Call) *listener.Listener { if input.CallMode == CallModeInbound { return xdstest.ExtractListener(model.VirtualInboundListenerName, listeners) } // First find exact match for the IP/Port, then fallback to wildcard IP/Port // There is no wildcard port for _, l := range listeners {
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Thu Jun 13 01:56:28 UTC 2024 - 19.4K bytes - Viewed (0) -
istioctl/pkg/describe/describe.go
listenerTyped := &listener.Listener{} err = l.ActiveState.Listener.UnmarshalTo(listenerTyped) if err != nil { return nil, err } if listenerTyped.Name == model.VirtualInboundListenerName { for _, filterChain := range listenerTyped.FilterChains { for _, filter := range filterChain.Filters { hcm := &hcm.HttpConnectionManager{}
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Sat Apr 13 05:23:38 UTC 2024 - 50.4K bytes - Viewed (0)