Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 325 for chains (0.2 sec)

  1. tools/istio-iptables/pkg/capture/run.go

    	// Create a new chain for redirecting outbound traffic to the common Envoy port.
    	// In both chains, '-j RETURN' bypasses Envoy and '-j ISTIOREDIRECT'
    	// redirects to Envoy.
    	cfg.ruleBuilder.AppendRule(iptableslog.UndefinedCommand,
    		constants.ISTIOREDIRECT, constants.NAT, "-p", constants.TCP, "-j", constants.REDIRECT, "--to-ports", cfg.cfg.ProxyPort)
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 06 03:53:23 UTC 2024
    - 35.4K bytes
    - Viewed (0)
  2. src/go/types/named.go

    // heading.
    
    // under returns the expanded underlying type of n0; possibly by following
    // forward chains of named types. If an underlying type is found, resolve
    // the chain by setting the underlying type for each defined type in the
    // chain before returning it. If no underlying type is found or a cycle
    // is detected, the result is Typ[Invalid]. If a cycle is detected and
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 15 20:03:31 UTC 2024
    - 24K bytes
    - Viewed (0)
  3. src/crypto/x509/name_constraints_test.go

    					ok: []string{"dns:.foo.com"},
    				},
    			},
    		},
    		leaf: leafSpec{
    			sans: []string{"dns:foo.example.com"},
    		},
    		noOpenSSL: true, // OpenSSL's chain building is not informed by constraints.
    	},
    
    	// #24: when multiple roots are valid, chain building can avoid roots
    	// with incompatible constraints.
    	{
    		roots: []constraintsSpec{
    			{},
    			{
    				ok: []string{"dns:foo.com"},
    			},
    		},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 09 22:40:21 UTC 2024
    - 45.2K bytes
    - Viewed (0)
  4. src/cmd/vendor/github.com/google/pprof/internal/report/source.go

    				// location so we give the some hint as to where the
    				// inlining happened that led to this instruction. So for
    				// example, suppose we have the following (inlined) call
    				// chains for this instruction:
    				//   F1->G->H
    				//   F2->G->H
    				// We could tag the instructions from the first call with
    				// F1 and instructions from the second call with F2. But
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri May 31 19:48:28 UTC 2024
    - 31.3K bytes
    - Viewed (0)
  5. staging/src/k8s.io/apiserver/pkg/server/config.go

    	// BuildHandlerChainFunc allows you to build custom handler chains by decorating the apiHandler.
    	BuildHandlerChainFunc func(apiHandler http.Handler, c *Config) (secure http.Handler)
    	// NonLongRunningRequestWaitGroup allows you to wait for all chain
    	// handlers associated with non long-running requests
    	// to complete while the server is shuting down.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 28 08:48:22 UTC 2024
    - 47.7K bytes
    - Viewed (0)
  6. cmd/kubelet/app/options/options.go

    	fs.BoolVar(&c.MakeIPTablesUtilChains, "make-iptables-util-chains", c.MakeIPTablesUtilChains, "If true, kubelet will ensure iptables utility rules are present on host.")
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Apr 18 07:00:05 UTC 2024
    - 41.6K bytes
    - Viewed (0)
  7. src/crypto/tls/conn.go

    	// activeCertHandles contains the cache handles to certificates in
    	// peerCertificates that are used to track active references.
    	activeCertHandles []*activeCert
    	// verifiedChains contains the certificate chains that we built, as
    	// opposed to the ones presented by the server.
    	verifiedChains [][]*x509.Certificate
    	// serverName contains the server name indicated by the client, if any.
    	serverName string
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 51.8K bytes
    - Viewed (0)
  8. src/crypto/tls/tls_test.go

    			if len(ss.VerifiedChains) != 1 || len(cs.VerifiedChains) != 1 {
    				t.Errorf("Got %d (server) and %d (client) verified chains, expected %d", len(ss.VerifiedChains), len(cs.VerifiedChains), 1)
    			} else if len(ss.VerifiedChains[0]) != 2 || len(cs.VerifiedChains[0]) != 2 {
    				t.Errorf("Got %d (server) and %d (client) long verified chain, expected %d", len(ss.VerifiedChains[0]), len(cs.VerifiedChains[0]), 2)
    			}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 60.5K bytes
    - Viewed (0)
  9. tools/istio-iptables/pkg/builder/testdata/multi-rules-new-chain-v6.golden

    -t table -N chain
    -t table -A chain -f foo -b bar
    -t table -I chain 2 -f foo -b bar
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Jun 11 14:29:54 UTC 2024
    - 117 bytes
    - Viewed (0)
  10. prow/config/calico.yaml

                      top-level iptables chains by inserting a rule at the top of the
                      chain or by appending a rule at the bottom. insert is the safe default
                      since it prevents Calico''s rules from being bypassed. If you switch
                      to append mode, be sure that the other rules in the chains signal
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue May 21 18:32:01 UTC 2024
    - 246.5K bytes
    - Viewed (0)
Back to top