Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 84 for Dialer (0.3 sec)

  1. src/net/timeout_test.go

    			// the kernel's accept queue is, and we don't want to accidentally saturate
    			// it with concurrent calls. (That could cause the Dial to fail with
    			// ECONNREFUSED or ECONNRESET instead of a timeout error.)
    			d := Dialer{Timeout: tt.initialTimeout}
    			delta := tt.initialDelta
    
    			var (
    				beforeDial time.Time
    				afterDial  time.Time
    				err        error
    			)
    			for {
    				if delta != 0 {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Jan 24 18:06:55 UTC 2024
    - 30K bytes
    - Viewed (0)
  2. src/net/tcpsock_test.go

    	// after calling Close on a Listener, the fake net implementation would
    	// erroneously Accept a connection dialed before the call to Close.
    
    	ln := newLocalListener(t, "tcp")
    	defer ln.Close()
    
    	var wg sync.WaitGroup
    	ctx, cancel := context.WithCancel(context.Background())
    
    	d := &Dialer{}
    	for n := 2; n > 0; n-- {
    		wg.Add(1)
    		go func() {
    			defer wg.Done()
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Feb 20 06:04:31 UTC 2024
    - 17.7K bytes
    - Viewed (0)
  3. staging/src/k8s.io/apiserver/pkg/util/proxy/streamtunnel_test.go

    	// a request to TunnelingHandler using new portforward version 2.
    	tunnelingURL, err := url.Parse(tunnelingServer.URL)
    	require.NoError(t, err)
    	dialer, err := portforward.NewSPDYOverWebsocketDialer(tunnelingURL, &restconfig.Config{Host: tunnelingURL.Host})
    	require.NoError(t, err)
    	spdyClient, protocol, err := dialer.Dial(constants.PortForwardV1Name)
    	require.NoError(t, err)
    	assert.Equal(t, constants.PortForwardV1Name, protocol)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Mar 07 02:21:50 UTC 2024
    - 22.7K bytes
    - Viewed (0)
  4. pkg/kubelet/cm/devicemanager/plugin/v1beta1/stub.go

    		grpc.WithTransportCredentials(insecure.NewCredentials()),
    		grpc.WithBlock(),
    		grpc.WithContextDialer(func(ctx context.Context, addr string) (net.Conn, error) {
    			return (&net.Dialer{}).DialContext(ctx, "unix", addr)
    		}))
    	if err != nil {
    		return err
    	}
    	defer conn.Close()
    	client := pluginapi.NewRegistrationClient(conn)
    	reqt := &pluginapi.RegisterRequest{
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Oct 17 11:19:10 UTC 2023
    - 11.5K bytes
    - Viewed (0)
  5. security/pkg/nodeagent/sds/sdsservice_test.go

    	var opts []grpc.DialOption
    
    	opts = append(opts, grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithContextDialer(func(ctx context.Context, addr string) (net.Conn, error) {
    		var d net.Dialer
    		return d.DialContext(ctx, "unix", socket)
    	}))
    
    	conn, err := grpc.Dial(socket, opts...)
    	if err != nil {
    		return nil, err
    	}
    
    	return conn, nil
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jan 17 20:12:58 UTC 2024
    - 11.6K bytes
    - Viewed (0)
  6. pkg/spiffe/spiffe.go

    			RootCAs:    caCertPool,
    			MinVersion: tls.VersionTLS12,
    		}
    
    		httpClient.Transport = &http.Transport{
    			Proxy:           http.ProxyFromEnvironment,
    			TLSClientConfig: config,
    			DialContext: (&net.Dialer{
    				Timeout: time.Second * 10,
    			}).DialContext,
    			IdleConnTimeout:       90 * time.Second,
    			TLSHandshakeTimeout:   10 * time.Second,
    			ExpectContinueTimeout: 1 * time.Second,
    		}
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 11.1K bytes
    - Viewed (0)
  7. pkg/controlplane/apiserver/config.go

    	config.ServiceAccountJWKSURI = opts.Authentication.ServiceAccounts.JWKSURI
    	config.ServiceAccountPublicKeys = pubKeys
    
    	return config, genericInitializers, nil
    }
    
    // CreateProxyTransport creates the dialer infrastructure to connect to the nodes.
    func CreateProxyTransport() *http.Transport {
    	var proxyDialerFn utilnet.DialFunc
    	// Proxying to pods and services is IP-based... don't expect to be able to verify the hostname
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jun 07 17:57:37 UTC 2024
    - 14.9K bytes
    - Viewed (0)
  8. staging/src/k8s.io/apiserver/pkg/endpoints/filters/authentication_test.go

    					NextProtos: []string{nextProto},
    				}
    
    				dailer := tls.Dialer{
    					Config: tlsConfig,
    				}
    
    				tr := &http.Transport{
    					TLSHandshakeTimeout: 10 * time.Second,
    					TLSClientConfig:     tlsConfig,
    					DialTLSContext: func(ctx context.Context, network, addr string) (net.Conn, error) {
    						conn, err := dailer.DialContext(ctx, network, addr)
    						if err != nil {
    							return nil, err
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Apr 24 18:25:29 UTC 2024
    - 20.5K bytes
    - Viewed (0)
  9. pkg/istio-agent/xds_proxy_test.go

    	}
    }
    
    func setupDownstreamConnectionUDS(t test.Failer, path string) *grpc.ClientConn {
    	var opts []grpc.DialOption
    
    	opts = append(opts, grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithContextDialer(func(ctx context.Context, addr string) (net.Conn, error) {
    		var d net.Dialer
    		return d.DialContext(ctx, "unix", path)
    	}))
    
    	conn, err := grpc.Dial(path, opts...)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Mar 30 04:48:02 UTC 2024
    - 18.6K bytes
    - Viewed (0)
  10. src/net/conf.go

    	if !cgoAvailable {
    		return true
    	}
    
    	if runtime.GOOS == "plan9" {
    		// TODO(bradfitz): for now we only permit use of the PreferGo
    		// implementation when there's a non-nil Resolver with a
    		// non-nil Dialer. This is a sign that the code is trying
    		// to use their DNS-speaking net.Conn (such as an in-memory
    		// DNS cache) and they don't want to actually hit the network.
    		// Once we add support for looking the default DNS servers
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Sat May 18 03:13:26 UTC 2024
    - 15.5K bytes
    - Viewed (0)
Back to top