Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 133 for IPV4 (0.05 sec)

  1. src/net/net_windows_test.go

    		case "State                              : disconnected":
    			isup = false
    		default:
    			continue
    		}
    		if name != "" {
    			if v, ok := ifaces[name]; ok && v != isup {
    				return fmt.Errorf("%s:%s isup=%v: ipv4 and ipv6 report different interface state", ipver, name, isup)
    			}
    			ifaces[name] = isup
    			name = ""
    		}
    	}
    	return nil
    }
    
    func TestInterfacesWithNetsh(t *testing.T) {
    	checkNetsh(t)
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 01:00:11 UTC 2024
    - 16.3K bytes
    - Viewed (0)
  2. cni/pkg/iptables/iptables_test.go

    	if err != nil {
    		t.Fatal(err)
    	}
    
    	compareToGolden(t, false, tt.name, ext.ExecutedAll)
    }
    
    func ipstr(ipv6 bool) string {
    	if ipv6 {
    		return "ipv6"
    	}
    	return "ipv4"
    }
    
    func compareToGolden(t *testing.T, ipv6 bool, name string, actual []string) {
    	t.Helper()
    	gotBytes := []byte(strings.Join(actual, "\n"))
    	goldenFile := filepath.Join("testdata", name+".golden")
    	if ipv6 {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 20:16:04 UTC 2024
    - 3.7K bytes
    - Viewed (0)
  3. cmd/kubeadm/app/preflight/checks_linux.go

    func addIPv6Checks(checks []Checker) []Checker {
    	checks = append(checks,
    		FileContentCheck{Path: ipv6DefaultForwarding, Content: []byte{'1'}},
    	)
    	return checks
    }
    
    // addIPv4Checks adds IPv4 related checks
    func addIPv4Checks(checks []Checker) []Checker {
    	checks = append(checks,
    		FileContentCheck{Path: ipv4Forward, Content: []byte{'1'}})
    	return checks
    }
    
    // addSwapCheck adds a swap check
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 06:58:01 UTC 2024
    - 3.1K bytes
    - Viewed (0)
  4. pkg/bootstrap/config.go

    	// Support passing extra info from node environment as metadata
    	opts = append(opts, getNodeMetadataOptions(cfg.Node, cfg.CompliancePolicy)...)
    
    	// Check if nodeIP carries IPv4 or IPv6 and set up proxy accordingly
    	if network.AllIPv4(cfg.Metadata.InstanceIPs) {
    		// IPv4 only
    		opts = append(opts,
    			option.Localhost(option.LocalhostIPv4),
    			option.Wildcard(option.WildcardIPv4),
    			option.DNSLookupFamily(option.DNSLookupFamilyIPv4))
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 14 17:02:38 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  5. pilot/cmd/pilot-agent/app/cmd.go

    	proxyAddrs := make([]string, 0)
    	if ipAddrs, ok := network.GetPrivateIPs(context.Background()); ok {
    		proxyAddrs = append(proxyAddrs, ipAddrs...)
    	}
    
    	// No IP addresses provided, append 127.0.0.1 for ipv4 and ::1 for ipv6
    	if len(proxyAddrs) == 0 {
    		proxyAddrs = append(proxyAddrs, localHostIPv4, localHostIPv6)
    	}
    
    	// Get exclusions from traffic.sidecar.istio.io/excludeInterfaces
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 16 22:12:28 UTC 2024
    - 11.9K bytes
    - Viewed (0)
  6. cmd/net.go

    	"runtime"
    	"sort"
    	"strings"
    
    	"github.com/minio/minio-go/v7/pkg/set"
    	"github.com/minio/minio/internal/config"
    	"github.com/minio/minio/internal/logger"
    	xnet "github.com/minio/pkg/v3/net"
    )
    
    // IPv4 addresses of local host.
    var localIP4 = mustGetLocalIP4()
    
    // mustSplitHostPort is a wrapper to net.SplitHostPort() where error is assumed to be a fatal.
    func mustSplitHostPort(hostPort string) (host, port string) {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 9.3K bytes
    - Viewed (0)
  7. manifests/charts/gateway/values.yaml

      # Define the security context for the pod.
      # If unset, this will be automatically set to the minimum privileges required to bind to port 80 and 443.
      # On Kubernetes 1.22+, this only requires the `net.ipv4.ip_unprivileged_port_start` sysctl.
      securityContext: {}
      containerSecurityContext: {}
    
      service:
        # Type of service. Set to "None" to disable the service entirely
        type: LoadBalancer
        ports:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 07 16:51:35 UTC 2024
    - 4.4K bytes
    - Viewed (0)
  8. cmd/kube-proxy/app/server_linux.go

    }
    
    // getIPTables returns an array of [IPv4, IPv6] utiliptables.Interfaces. If primaryFamily
    // is not v1.IPFamilyUnknown then it will also separately return the interface for just
    // that family.
    func getIPTables(primaryFamily v1.IPFamily) ([2]utiliptables.Interface, utiliptables.Interface) {
    	execer := exec.New()
    
    	// Create iptables handlers for both families. Always ordered as IPv4, IPv6
    	ipt := [2]utiliptables.Interface{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Jun 08 13:48:54 UTC 2024
    - 18.1K bytes
    - Viewed (0)
  9. cmd/kubeadm/app/preflight/checks.go

    	// auto-detected and properly bound to an IPV4 address, this will make the cluster non-functional eventually. The case like this should be avoided by the validation instead,
    	// i.e. We don't care whether the input values for those parameters are set correctly here but if it's an IPV4 scoped CIDR or address we will add the file content check for IPV4,
    	// as does the IPV6.
    	IPV4Check := false
    	IPV6Check := false
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon Jun 03 11:20:55 UTC 2024
    - 39.5K bytes
    - Viewed (0)
  10. tools/istio-iptables/pkg/capture/run.go

    // configureIPv6Addresses sets up a new IP address on local interface. This is used as the source IP
    // for inbound traffic to distinguish traffic we want to capture vs traffic we do not. This is needed
    // for IPv6 but not IPv4, as IPv4 defaults to `netmask 255.0.0.0`, which allows binding to addresses
    // in the 127.x.y.z range, while IPv6 defaults to `prefixlen 128` which allows binding only to ::1.
    // Equivalent to `ip -6 addr add "::6/128" dev lo`
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 06 03:53:23 UTC 2024
    - 35.4K bytes
    - Viewed (0)
Back to top