id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
listlengths
21
1.41k
docstring
stringlengths
6
2.61k
docstring_tokens
listlengths
3
215
sha
stringlengths
40
40
url
stringlengths
85
252
163,600
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *FQDNSelector) DeepCopy() *FQDNSelector { if in == nil { return nil } out := new(FQDNSelector) in.DeepCopyInto(out) return out }
go
func (in *FQDNSelector) DeepCopy() *FQDNSelector { if in == nil { return nil } out := new(FQDNSelector) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "FQDNSelector", ")", "DeepCopy", "(", ")", "*", "FQDNSelector", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "FQDNSelector", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new FQDNSelector.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "FQDNSelector", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L283-L290
163,601
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in FQDNSelectorSlice) DeepCopy() FQDNSelectorSlice { if in == nil { return nil } out := new(FQDNSelectorSlice) in.DeepCopyInto(out) return *out }
go
func (in FQDNSelectorSlice) DeepCopy() FQDNSelectorSlice { if in == nil { return nil } out := new(FQDNSelectorSlice) in.DeepCopyInto(out) return *out }
[ "func", "(", "in", "FQDNSelectorSlice", ")", "DeepCopy", "(", ")", "FQDNSelectorSlice", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "FQDNSelectorSlice", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new FQDNSelectorSlice.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "FQDNSelectorSlice", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L303-L310
163,602
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *K8sServiceNamespace) DeepCopy() *K8sServiceNamespace { if in == nil { return nil } out := new(K8sServiceNamespace) in.DeepCopyInto(out) return out }
go
func (in *K8sServiceNamespace) DeepCopy() *K8sServiceNamespace { if in == nil { return nil } out := new(K8sServiceNamespace) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "K8sServiceNamespace", ")", "DeepCopy", "(", ")", "*", "K8sServiceNamespace", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "K8sServiceNamespace", ")", "\n", "in", ".", "DeepCopyInto...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new K8sServiceNamespace.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "K8sServiceNamespace", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L380-L387
163,603
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *K8sServiceSelectorNamespace) DeepCopy() *K8sServiceSelectorNamespace { if in == nil { return nil } out := new(K8sServiceSelectorNamespace) in.DeepCopyInto(out) return out }
go
func (in *K8sServiceSelectorNamespace) DeepCopy() *K8sServiceSelectorNamespace { if in == nil { return nil } out := new(K8sServiceSelectorNamespace) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "K8sServiceSelectorNamespace", ")", "DeepCopy", "(", ")", "*", "K8sServiceSelectorNamespace", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "K8sServiceSelectorNamespace", ")", "\n", "in"...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new K8sServiceSelectorNamespace.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "K8sServiceSelectorNamespace", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L397-L404
163,604
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in KafkaRole) DeepCopy() KafkaRole { if in == nil { return nil } out := new(KafkaRole) in.DeepCopyInto(out) return *out }
go
func (in KafkaRole) DeepCopy() KafkaRole { if in == nil { return nil } out := new(KafkaRole) in.DeepCopyInto(out) return *out }
[ "func", "(", "in", "KafkaRole", ")", "DeepCopy", "(", ")", "KafkaRole", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "KafkaRole", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ")", "\n", "return"...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new KafkaRole.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "KafkaRole", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L417-L424
163,605
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *L7Rules) DeepCopy() *L7Rules { if in == nil { return nil } out := new(L7Rules) in.DeepCopyInto(out) return out }
go
func (in *L7Rules) DeepCopy() *L7Rules { if in == nil { return nil } out := new(L7Rules) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "L7Rules", ")", "DeepCopy", "(", ")", "*", "L7Rules", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "L7Rules", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ")", "\n", ...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new L7Rules.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "L7Rules", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L465-L472
163,606
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *PortProtocol) DeepCopy() *PortProtocol { if in == nil { return nil } out := new(PortProtocol) in.DeepCopyInto(out) return out }
go
func (in *PortProtocol) DeepCopy() *PortProtocol { if in == nil { return nil } out := new(PortProtocol) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "PortProtocol", ")", "DeepCopy", "(", ")", "*", "PortProtocol", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "PortProtocol", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PortProtocol.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "PortProtocol", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L481-L488
163,607
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *PortRule) DeepCopy() *PortRule { if in == nil { return nil } out := new(PortRule) in.DeepCopyInto(out) return out }
go
func (in *PortRule) DeepCopy() *PortRule { if in == nil { return nil } out := new(PortRule) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "PortRule", ")", "DeepCopy", "(", ")", "*", "PortRule", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "PortRule", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ")", "\n",...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PortRule.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "PortRule", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L507-L514
163,608
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *PortRuleDNS) DeepCopy() *PortRuleDNS { if in == nil { return nil } out := new(PortRuleDNS) in.DeepCopyInto(out) return out }
go
func (in *PortRuleDNS) DeepCopy() *PortRuleDNS { if in == nil { return nil } out := new(PortRuleDNS) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "PortRuleDNS", ")", "DeepCopy", "(", ")", "*", "PortRuleDNS", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "PortRuleDNS", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ")"...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PortRuleDNS.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "PortRuleDNS", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L523-L530
163,609
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *PortRuleHTTP) DeepCopy() *PortRuleHTTP { if in == nil { return nil } out := new(PortRuleHTTP) in.DeepCopyInto(out) return out }
go
func (in *PortRuleHTTP) DeepCopy() *PortRuleHTTP { if in == nil { return nil } out := new(PortRuleHTTP) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "PortRuleHTTP", ")", "DeepCopy", "(", ")", "*", "PortRuleHTTP", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "PortRuleHTTP", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PortRuleHTTP.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "PortRuleHTTP", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L544-L551
163,610
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *PortRuleKafka) DeepCopy() *PortRuleKafka { if in == nil { return nil } out := new(PortRuleKafka) in.DeepCopyInto(out) return out }
go
func (in *PortRuleKafka) DeepCopy() *PortRuleKafka { if in == nil { return nil } out := new(PortRuleKafka) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "PortRuleKafka", ")", "DeepCopy", "(", ")", "*", "PortRuleKafka", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "PortRuleKafka", ")", "\n", "in", ".", "DeepCopyInto", "(", "out",...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PortRuleKafka.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "PortRuleKafka", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L570-L577
163,611
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in PortRuleL7) DeepCopy() PortRuleL7 { if in == nil { return nil } out := new(PortRuleL7) in.DeepCopyInto(out) return *out }
go
func (in PortRuleL7) DeepCopy() PortRuleL7 { if in == nil { return nil } out := new(PortRuleL7) in.DeepCopyInto(out) return *out }
[ "func", "(", "in", "PortRuleL7", ")", "DeepCopy", "(", ")", "PortRuleL7", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "PortRuleL7", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ")", "\n", "retu...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PortRuleL7.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "PortRuleL7", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L592-L599
163,612
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in Rules) DeepCopy() Rules { if in == nil { return nil } out := new(Rules) in.DeepCopyInto(out) return *out }
go
func (in Rules) DeepCopy() Rules { if in == nil { return nil } out := new(Rules) in.DeepCopyInto(out) return *out }
[ "func", "(", "in", "Rules", ")", "DeepCopy", "(", ")", "Rules", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "Rules", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ")", "\n", "return", "*", "...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Rules.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "Rules", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L650-L657
163,613
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *ServiceSelector) DeepCopy() *ServiceSelector { if in == nil { return nil } out := new(ServiceSelector) in.DeepCopyInto(out) return out }
go
func (in *ServiceSelector) DeepCopy() *ServiceSelector { if in == nil { return nil } out := new(ServiceSelector) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "ServiceSelector", ")", "DeepCopy", "(", ")", "*", "ServiceSelector", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "ServiceSelector", ")", "\n", "in", ".", "DeepCopyInto", "(", ...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ServiceSelector.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "ServiceSelector", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L708-L715
163,614
cilium/cilium
pkg/policy/api/zz_generated.deepcopy.go
DeepCopy
func (in *ToGroups) DeepCopy() *ToGroups { if in == nil { return nil } out := new(ToGroups) in.DeepCopyInto(out) return out }
go
func (in *ToGroups) DeepCopy() *ToGroups { if in == nil { return nil } out := new(ToGroups) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "ToGroups", ")", "DeepCopy", "(", ")", "*", "ToGroups", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "ToGroups", ")", "\n", "in", ".", "DeepCopyInto", "(", "out", ")", "\n",...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ToGroups.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "ToGroups", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/api/zz_generated.deepcopy.go#L729-L736
163,615
cilium/cilium
pkg/maps/configmap/configmap.go
String
func (f Flags) String() string { var buffer bytes.Buffer for i := uint(0); i < 32; i++ { bitVal := int(f & (1 << i)) if bitVal > 0 { if flag, ok := flagsToString[bitVal]; ok { buffer.WriteString(flag) buffer.WriteString(",") continue } } else if bitVal == 0 { if flag, ok := binMap[i]; ok { buffer.WriteString(flag) buffer.WriteString(",") continue } } buffer.WriteString(fmt.Sprintf("%04x,", 1<<i)) } return buffer.String() }
go
func (f Flags) String() string { var buffer bytes.Buffer for i := uint(0); i < 32; i++ { bitVal := int(f & (1 << i)) if bitVal > 0 { if flag, ok := flagsToString[bitVal]; ok { buffer.WriteString(flag) buffer.WriteString(",") continue } } else if bitVal == 0 { if flag, ok := binMap[i]; ok { buffer.WriteString(flag) buffer.WriteString(",") continue } } buffer.WriteString(fmt.Sprintf("%04x,", 1<<i)) } return buffer.String() }
[ "func", "(", "f", "Flags", ")", "String", "(", ")", "string", "{", "var", "buffer", "bytes", ".", "Buffer", "\n", "for", "i", ":=", "uint", "(", "0", ")", ";", "i", "<", "32", ";", "i", "++", "{", "bitVal", ":=", "int", "(", "f", "&", "(", ...
// String converts the specified flags into a human-readable form.
[ "String", "converts", "the", "specified", "flags", "into", "a", "human", "-", "readable", "form", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/configmap/configmap.go#L62-L83
163,616
cilium/cilium
pkg/maps/configmap/configmap.go
GetConfig
func GetConfig(e endpoint) *EndpointConfig { value := EndpointConfig{} if !e.GetIngressPolicyEnabledLocked() { value.Flags |= SkipPolicyIngress } if !e.GetEgressPolicyEnabledLocked() { value.Flags |= SkipPolicyEgress } return &value }
go
func GetConfig(e endpoint) *EndpointConfig { value := EndpointConfig{} if !e.GetIngressPolicyEnabledLocked() { value.Flags |= SkipPolicyIngress } if !e.GetEgressPolicyEnabledLocked() { value.Flags |= SkipPolicyEgress } return &value }
[ "func", "GetConfig", "(", "e", "endpoint", ")", "*", "EndpointConfig", "{", "value", ":=", "EndpointConfig", "{", "}", "\n", "if", "!", "e", ".", "GetIngressPolicyEnabledLocked", "(", ")", "{", "value", ".", "Flags", "|=", "SkipPolicyIngress", "\n", "}", "...
// GetConfig creates a EndpointConfig structure using the endpoint's // configuration. The endpoint parameter should have its mutex held.
[ "GetConfig", "creates", "a", "EndpointConfig", "structure", "using", "the", "endpoint", "s", "configuration", ".", "The", "endpoint", "parameter", "should", "have", "its", "mutex", "held", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/configmap/configmap.go#L145-L155
163,617
cilium/cilium
pkg/maps/configmap/configmap.go
Update
func (m *EndpointConfigMap) Update(value *EndpointConfig) error { configKey := &Key{Bits: 0} return m.Map.Update(configKey, value) }
go
func (m *EndpointConfigMap) Update(value *EndpointConfig) error { configKey := &Key{Bits: 0} return m.Map.Update(configKey, value) }
[ "func", "(", "m", "*", "EndpointConfigMap", ")", "Update", "(", "value", "*", "EndpointConfig", ")", "error", "{", "configKey", ":=", "&", "Key", "{", "Bits", ":", "0", "}", "\n", "return", "m", ".", "Map", ".", "Update", "(", "configKey", ",", "valu...
// Update pushes the configuration options from the specified endpoint into the // configuration map.
[ "Update", "pushes", "the", "configuration", "options", "from", "the", "specified", "endpoint", "into", "the", "configuration", "map", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/configmap/configmap.go#L159-L162
163,618
cilium/cilium
pkg/maps/configmap/configmap.go
OpenMapWithName
func OpenMapWithName(path string) (*EndpointConfigMap, bool, error) { newMap := bpf.NewMap(path, bpf.BPF_MAP_TYPE_ARRAY, int(unsafe.Sizeof(uint32(0))), int(unsafe.Sizeof(EndpointConfig{})), MaxEntries, 0, 0, func(key []byte, value []byte) (bpf.MapKey, bpf.MapValue, error) { k, v := Key{}, EndpointConfig{} if err := bpf.ConvertKeyValue(key, value, &k, &v); err != nil { return nil, nil, err } return &k, &v, nil }).WithCache() isNewMap, err := newMap.OpenOrCreate() if err != nil { return nil, false, err } m := &EndpointConfigMap{Map: newMap, path: path, Fd: newMap.GetFd()} return m, isNewMap, nil }
go
func OpenMapWithName(path string) (*EndpointConfigMap, bool, error) { newMap := bpf.NewMap(path, bpf.BPF_MAP_TYPE_ARRAY, int(unsafe.Sizeof(uint32(0))), int(unsafe.Sizeof(EndpointConfig{})), MaxEntries, 0, 0, func(key []byte, value []byte) (bpf.MapKey, bpf.MapValue, error) { k, v := Key{}, EndpointConfig{} if err := bpf.ConvertKeyValue(key, value, &k, &v); err != nil { return nil, nil, err } return &k, &v, nil }).WithCache() isNewMap, err := newMap.OpenOrCreate() if err != nil { return nil, false, err } m := &EndpointConfigMap{Map: newMap, path: path, Fd: newMap.GetFd()} return m, isNewMap, nil }
[ "func", "OpenMapWithName", "(", "path", "string", ")", "(", "*", "EndpointConfigMap", ",", "bool", ",", "error", ")", "{", "newMap", ":=", "bpf", ".", "NewMap", "(", "path", ",", "bpf", ".", "BPF_MAP_TYPE_ARRAY", ",", "int", "(", "unsafe", ".", "Sizeof",...
// OpenMapWithName attempts to open or create a BPF config map at the specified // path with the specified name. // On success, it returns a map and whether the map was newly created, or // otherwise an error.
[ "OpenMapWithName", "attempts", "to", "open", "or", "create", "a", "BPF", "config", "map", "at", "the", "specified", "path", "with", "the", "specified", "name", ".", "On", "success", "it", "returns", "a", "map", "and", "whether", "the", "map", "was", "newly...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/configmap/configmap.go#L168-L195
163,619
cilium/cilium
pkg/k8s/error_helpers.go
k8sErrorUpdateCheckUnmuteTime
func k8sErrorUpdateCheckUnmuteTime(errstr string, now time.Time) bool { k8sErrMsgMU.Lock() defer k8sErrMsgMU.Unlock() if unmuteDeadline, ok := k8sErrMsg[errstr]; !ok || now.After(unmuteDeadline) { k8sErrMsg[errstr] = now.Add(k8sErrLogTimeout) return true } return false }
go
func k8sErrorUpdateCheckUnmuteTime(errstr string, now time.Time) bool { k8sErrMsgMU.Lock() defer k8sErrMsgMU.Unlock() if unmuteDeadline, ok := k8sErrMsg[errstr]; !ok || now.After(unmuteDeadline) { k8sErrMsg[errstr] = now.Add(k8sErrLogTimeout) return true } return false }
[ "func", "k8sErrorUpdateCheckUnmuteTime", "(", "errstr", "string", ",", "now", "time", ".", "Time", ")", "bool", "{", "k8sErrMsgMU", ".", "Lock", "(", ")", "\n", "defer", "k8sErrMsgMU", ".", "Unlock", "(", ")", "\n\n", "if", "unmuteDeadline", ",", "ok", ":=...
// k8sErrorUpdateCheckUnmuteTime returns a boolean indicating whether we should // log errmsg or not. It manages once-per-k8sErrLogTimeout entry in k8sErrMsg. // When errmsg is new or more than k8sErrLogTimeout has passed since the last // invocation that returned true, it returns true.
[ "k8sErrorUpdateCheckUnmuteTime", "returns", "a", "boolean", "indicating", "whether", "we", "should", "log", "errmsg", "or", "not", ".", "It", "manages", "once", "-", "per", "-", "k8sErrLogTimeout", "entry", "in", "k8sErrMsg", ".", "When", "errmsg", "is", "new", ...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/error_helpers.go#L37-L47
163,620
cilium/cilium
pkg/k8s/error_helpers.go
K8sErrorHandler
func K8sErrorHandler(e error) { if e == nil { return } // We rate-limit certain categories of error message. These are matched // below, with a default behaviour to print everything else without // rate-limiting. // Note: We also have side-effects in some of the special cases. now := time.Now() errstr := e.Error() switch { // This can occur when cilium comes up before the k8s API server, and keeps // trying to connect. case strings.Contains(errstr, "connection refused"): if k8sErrorUpdateCheckUnmuteTime(errstr, now) { log.WithError(e).Error("k8sError") } // k8s does not allow us to watch both ThirdPartyResource and // CustomResourceDefinition. This would occur when a user mixes these within // the k8s cluster, and might occur when upgrading from versions of cilium // that used ThirdPartyResource to define CiliumNetworkPolicy. case strings.Contains(errstr, "Failed to list *v2.CiliumNetworkPolicy: the server could not find the requested resource"): if k8sErrorUpdateCheckUnmuteTime(errstr, now) { log.WithError(e).Error("Conflicting TPR and CRD resources") log.Warn("Detected conflicting TPR and CRD, please migrate all ThirdPartyResource to CustomResourceDefinition! More info: https://cilium.link/migrate-tpr") log.Warn("Due to conflicting TPR and CRD rules, CiliumNetworkPolicy enforcement can't be guaranteed!") } // fromCIDR and toCIDR used to expect an "ip" subfield (so, they were a YAML // map with one field) but common usage and expectation would simply list the // CIDR ranges and IPs desired as a YAML list. In these cases we would see // this decode error. We have since changed the definition to be a simple // list of strings. case strings.Contains(errstr, "Unable to decode an event from the watch stream: unable to decode watch event"), strings.Contains(errstr, "Failed to list *v1.CiliumNetworkPolicy: only encoded map or array can be decoded into a struct"), strings.Contains(errstr, "Failed to list *v2.CiliumNetworkPolicy: only encoded map or array can be decoded into a struct"), strings.Contains(errstr, "Failed to list *v2.CiliumNetworkPolicy: v2.CiliumNetworkPolicyList:"): if k8sErrorUpdateCheckUnmuteTime(errstr, now) { log.WithError(e).Error("Unable to decode k8s watch event") } default: log.WithError(e).Error("k8sError") } }
go
func K8sErrorHandler(e error) { if e == nil { return } // We rate-limit certain categories of error message. These are matched // below, with a default behaviour to print everything else without // rate-limiting. // Note: We also have side-effects in some of the special cases. now := time.Now() errstr := e.Error() switch { // This can occur when cilium comes up before the k8s API server, and keeps // trying to connect. case strings.Contains(errstr, "connection refused"): if k8sErrorUpdateCheckUnmuteTime(errstr, now) { log.WithError(e).Error("k8sError") } // k8s does not allow us to watch both ThirdPartyResource and // CustomResourceDefinition. This would occur when a user mixes these within // the k8s cluster, and might occur when upgrading from versions of cilium // that used ThirdPartyResource to define CiliumNetworkPolicy. case strings.Contains(errstr, "Failed to list *v2.CiliumNetworkPolicy: the server could not find the requested resource"): if k8sErrorUpdateCheckUnmuteTime(errstr, now) { log.WithError(e).Error("Conflicting TPR and CRD resources") log.Warn("Detected conflicting TPR and CRD, please migrate all ThirdPartyResource to CustomResourceDefinition! More info: https://cilium.link/migrate-tpr") log.Warn("Due to conflicting TPR and CRD rules, CiliumNetworkPolicy enforcement can't be guaranteed!") } // fromCIDR and toCIDR used to expect an "ip" subfield (so, they were a YAML // map with one field) but common usage and expectation would simply list the // CIDR ranges and IPs desired as a YAML list. In these cases we would see // this decode error. We have since changed the definition to be a simple // list of strings. case strings.Contains(errstr, "Unable to decode an event from the watch stream: unable to decode watch event"), strings.Contains(errstr, "Failed to list *v1.CiliumNetworkPolicy: only encoded map or array can be decoded into a struct"), strings.Contains(errstr, "Failed to list *v2.CiliumNetworkPolicy: only encoded map or array can be decoded into a struct"), strings.Contains(errstr, "Failed to list *v2.CiliumNetworkPolicy: v2.CiliumNetworkPolicyList:"): if k8sErrorUpdateCheckUnmuteTime(errstr, now) { log.WithError(e).Error("Unable to decode k8s watch event") } default: log.WithError(e).Error("k8sError") } }
[ "func", "K8sErrorHandler", "(", "e", "error", ")", "{", "if", "e", "==", "nil", "{", "return", "\n", "}", "\n\n", "// We rate-limit certain categories of error message. These are matched", "// below, with a default behaviour to print everything else without", "// rate-limiting.",...
// K8sErrorHandler handles the error messages in a non verbose way by omitting // repeated instances of the same error message for a timeout defined with // k8sErrLogTimeout.
[ "K8sErrorHandler", "handles", "the", "error", "messages", "in", "a", "non", "verbose", "way", "by", "omitting", "repeated", "instances", "of", "the", "same", "error", "message", "for", "a", "timeout", "defined", "with", "k8sErrLogTimeout", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/k8s/error_helpers.go#L52-L98
163,621
cilium/cilium
pkg/fqdn/rulegen.go
NewRuleGen
func NewRuleGen(config Config) *RuleGen { if config.Cache == nil { config.Cache = NewDNSCache(0) } if config.AddGeneratedRules == nil { config.AddGeneratedRules = func(generatedRules []*api.Rule) error { return nil } } return &RuleGen{ config: config, namesToPoll: make(map[string]struct{}), sourceRules: regexpmap.NewRegexpMap(), allRules: make(map[string]*api.Rule), cache: config.Cache, } }
go
func NewRuleGen(config Config) *RuleGen { if config.Cache == nil { config.Cache = NewDNSCache(0) } if config.AddGeneratedRules == nil { config.AddGeneratedRules = func(generatedRules []*api.Rule) error { return nil } } return &RuleGen{ config: config, namesToPoll: make(map[string]struct{}), sourceRules: regexpmap.NewRegexpMap(), allRules: make(map[string]*api.Rule), cache: config.Cache, } }
[ "func", "NewRuleGen", "(", "config", "Config", ")", "*", "RuleGen", "{", "if", "config", ".", "Cache", "==", "nil", "{", "config", ".", "Cache", "=", "NewDNSCache", "(", "0", ")", "\n", "}", "\n\n", "if", "config", ".", "AddGeneratedRules", "==", "nil"...
// NewRuleGen creates an initialized RuleGen. // When config.Cache is nil, the global fqdn.DefaultDNSCache is used.
[ "NewRuleGen", "creates", "an", "initialized", "RuleGen", ".", "When", "config", ".", "Cache", "is", "nil", "the", "global", "fqdn", ".", "DefaultDNSCache", "is", "used", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/rulegen.go#L86-L104
163,622
cilium/cilium
pkg/fqdn/rulegen.go
StartManageDNSName
func (gen *RuleGen) StartManageDNSName(sourceRules []*api.Rule) error { gen.Lock() defer gen.Unlock() perRule: for _, sourceRule := range sourceRules { // Note: we rely on MarkToFQDNRules to insert this label. if !sourceRule.Labels.Has(uuidLabelSearchKey) { continue perRule } // Make a copy to avoid breaking the input rules. Strip ToCIDRSet to avoid // re-including IPs we optimistically inserted in MarkToFQDNRules sourceRuleCopy := sourceRule.DeepCopy() stripToCIDRSet(sourceRuleCopy) uuid := getRuleUUIDLabel(sourceRuleCopy) newDNSNames, alreadyExistsDNSNames, err := gen.addRule(uuid, sourceRuleCopy) if err != nil { return err } // only debug print for new names since this function is called // unconditionally, even when we insert generated rules (which aren't new) if len(newDNSNames) > 0 { log.WithFields(logrus.Fields{ "newDNSNames": newDNSNames, "alreadyExistsDNSNames": alreadyExistsDNSNames, "numRules": len(sourceRules), }).Debug("Added FQDN to managed list") } } return nil }
go
func (gen *RuleGen) StartManageDNSName(sourceRules []*api.Rule) error { gen.Lock() defer gen.Unlock() perRule: for _, sourceRule := range sourceRules { // Note: we rely on MarkToFQDNRules to insert this label. if !sourceRule.Labels.Has(uuidLabelSearchKey) { continue perRule } // Make a copy to avoid breaking the input rules. Strip ToCIDRSet to avoid // re-including IPs we optimistically inserted in MarkToFQDNRules sourceRuleCopy := sourceRule.DeepCopy() stripToCIDRSet(sourceRuleCopy) uuid := getRuleUUIDLabel(sourceRuleCopy) newDNSNames, alreadyExistsDNSNames, err := gen.addRule(uuid, sourceRuleCopy) if err != nil { return err } // only debug print for new names since this function is called // unconditionally, even when we insert generated rules (which aren't new) if len(newDNSNames) > 0 { log.WithFields(logrus.Fields{ "newDNSNames": newDNSNames, "alreadyExistsDNSNames": alreadyExistsDNSNames, "numRules": len(sourceRules), }).Debug("Added FQDN to managed list") } } return nil }
[ "func", "(", "gen", "*", "RuleGen", ")", "StartManageDNSName", "(", "sourceRules", "[", "]", "*", "api", ".", "Rule", ")", "error", "{", "gen", ".", "Lock", "(", ")", "\n", "defer", "gen", ".", "Unlock", "(", ")", "\n\n", "perRule", ":", "for", "_"...
// StartManageDNSName begins managing sourceRules that contain toFQDNs // sections. When the DNS data of the included matchNames changes, RuleGen will // emit a replacement rule that contains the IPs for each matchName. // It only adds rules with the ToFQDN-UUID label, added by MarkToFQDNRules, and // repeat inserts are effectively no-ops.
[ "StartManageDNSName", "begins", "managing", "sourceRules", "that", "contain", "toFQDNs", "sections", ".", "When", "the", "DNS", "data", "of", "the", "included", "matchNames", "changes", "RuleGen", "will", "emit", "a", "replacement", "rule", "that", "contains", "th...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/rulegen.go#L182-L216
163,623
cilium/cilium
pkg/fqdn/rulegen.go
GetDNSNames
func (gen *RuleGen) GetDNSNames() (dnsNames []string) { gen.Lock() defer gen.Unlock() for name := range gen.namesToPoll { dnsNames = append(dnsNames, name) } return dnsNames }
go
func (gen *RuleGen) GetDNSNames() (dnsNames []string) { gen.Lock() defer gen.Unlock() for name := range gen.namesToPoll { dnsNames = append(dnsNames, name) } return dnsNames }
[ "func", "(", "gen", "*", "RuleGen", ")", "GetDNSNames", "(", ")", "(", "dnsNames", "[", "]", "string", ")", "{", "gen", ".", "Lock", "(", ")", "\n", "defer", "gen", ".", "Unlock", "(", ")", "\n\n", "for", "name", ":=", "range", "gen", ".", "names...
// GetDNSNames returns a snapshot of the DNS names managed by this RuleGen
[ "GetDNSNames", "returns", "a", "snapshot", "of", "the", "DNS", "names", "managed", "by", "this", "RuleGen" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/rulegen.go#L246-L255
163,624
cilium/cilium
pkg/fqdn/rulegen.go
UpdateGenerateDNS
func (gen *RuleGen) UpdateGenerateDNS(lookupTime time.Time, updatedDNSIPs map[string]*DNSIPRecords) error { // Update IPs in gen uuidsToUpdate, updatedDNSNames := gen.UpdateDNSIPs(lookupTime, updatedDNSIPs) for dnsName, IPs := range updatedDNSNames { log.WithFields(logrus.Fields{ "matchName": dnsName, "IPs": IPs, "uuidsToUpdate": uuidsToUpdate, }).Debug("Updated FQDN with new IPs") } // Generate a new rule for each sourceRule that needs an update. rulesToUpdate, notFoundUUIDs := gen.GetRulesByUUID(uuidsToUpdate) if len(notFoundUUIDs) != 0 { log.WithField("uuid", strings.Join(notFoundUUIDs, ",")). Debug("Did not find all rules during update") } generatedRules, namesMissingIPs := gen.GenerateRulesFromSources(rulesToUpdate) if len(namesMissingIPs) != 0 { log.WithField(logfields.DNSName, strings.Join(namesMissingIPs, ",")). Debug("No IPs to insert when generating DNS name selected by ToFQDN rule") } // no new rules to add, do not call AddGeneratedRules below if len(generatedRules) == 0 { return nil } // emit the new rules return gen.config.AddGeneratedRules(generatedRules) }
go
func (gen *RuleGen) UpdateGenerateDNS(lookupTime time.Time, updatedDNSIPs map[string]*DNSIPRecords) error { // Update IPs in gen uuidsToUpdate, updatedDNSNames := gen.UpdateDNSIPs(lookupTime, updatedDNSIPs) for dnsName, IPs := range updatedDNSNames { log.WithFields(logrus.Fields{ "matchName": dnsName, "IPs": IPs, "uuidsToUpdate": uuidsToUpdate, }).Debug("Updated FQDN with new IPs") } // Generate a new rule for each sourceRule that needs an update. rulesToUpdate, notFoundUUIDs := gen.GetRulesByUUID(uuidsToUpdate) if len(notFoundUUIDs) != 0 { log.WithField("uuid", strings.Join(notFoundUUIDs, ",")). Debug("Did not find all rules during update") } generatedRules, namesMissingIPs := gen.GenerateRulesFromSources(rulesToUpdate) if len(namesMissingIPs) != 0 { log.WithField(logfields.DNSName, strings.Join(namesMissingIPs, ",")). Debug("No IPs to insert when generating DNS name selected by ToFQDN rule") } // no new rules to add, do not call AddGeneratedRules below if len(generatedRules) == 0 { return nil } // emit the new rules return gen.config.AddGeneratedRules(generatedRules) }
[ "func", "(", "gen", "*", "RuleGen", ")", "UpdateGenerateDNS", "(", "lookupTime", "time", ".", "Time", ",", "updatedDNSIPs", "map", "[", "string", "]", "*", "DNSIPRecords", ")", "error", "{", "// Update IPs in gen", "uuidsToUpdate", ",", "updatedDNSNames", ":=", ...
// UpdateGenerateDNS inserts the new DNS information into the cache. If the IPs // have changed for a name, store which rules must be updated in rulesToUpdate, // regenerate them, and emit via AddGeneratedRules.
[ "UpdateGenerateDNS", "inserts", "the", "new", "DNS", "information", "into", "the", "cache", ".", "If", "the", "IPs", "have", "changed", "for", "a", "name", "store", "which", "rules", "must", "be", "updated", "in", "rulesToUpdate", "regenerate", "them", "and", ...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/rulegen.go#L260-L290
163,625
cilium/cilium
pkg/fqdn/rulegen.go
ForceGenerateDNS
func (gen *RuleGen) ForceGenerateDNS(namesToRegen []string) error { affectedRulesSet := make(map[string]struct{}, 0) for _, dnsName := range namesToRegen { for _, uuid := range gen.sourceRules.LookupValues(dnsName) { affectedRulesSet[uuid] = struct{}{} } } // Convert the set to a list var uuidsToUpdate []string for uuid := range affectedRulesSet { uuidsToUpdate = append(uuidsToUpdate, uuid) } // Generate a new rule for each sourceRule that needs an update. rulesToUpdate, notFoundUUIDs := gen.GetRulesByUUID(uuidsToUpdate) if len(notFoundUUIDs) != 0 { log.WithField("uuid", strings.Join(notFoundUUIDs, ",")). Debug("Did not find all rules during update") } generatedRules, namesMissingIPs := gen.GenerateRulesFromSources(rulesToUpdate) if len(namesMissingIPs) != 0 { log.WithField(logfields.DNSName, strings.Join(namesMissingIPs, ",")). Debug("No IPs to insert when generating DNS name selected by ToFQDN rule") } // no new rules to add, do not call AddGeneratedRules below if len(generatedRules) == 0 { return nil } // emit the new rules return gen.config.AddGeneratedRules(generatedRules) }
go
func (gen *RuleGen) ForceGenerateDNS(namesToRegen []string) error { affectedRulesSet := make(map[string]struct{}, 0) for _, dnsName := range namesToRegen { for _, uuid := range gen.sourceRules.LookupValues(dnsName) { affectedRulesSet[uuid] = struct{}{} } } // Convert the set to a list var uuidsToUpdate []string for uuid := range affectedRulesSet { uuidsToUpdate = append(uuidsToUpdate, uuid) } // Generate a new rule for each sourceRule that needs an update. rulesToUpdate, notFoundUUIDs := gen.GetRulesByUUID(uuidsToUpdate) if len(notFoundUUIDs) != 0 { log.WithField("uuid", strings.Join(notFoundUUIDs, ",")). Debug("Did not find all rules during update") } generatedRules, namesMissingIPs := gen.GenerateRulesFromSources(rulesToUpdate) if len(namesMissingIPs) != 0 { log.WithField(logfields.DNSName, strings.Join(namesMissingIPs, ",")). Debug("No IPs to insert when generating DNS name selected by ToFQDN rule") } // no new rules to add, do not call AddGeneratedRules below if len(generatedRules) == 0 { return nil } // emit the new rules return gen.config.AddGeneratedRules(generatedRules) }
[ "func", "(", "gen", "*", "RuleGen", ")", "ForceGenerateDNS", "(", "namesToRegen", "[", "]", "string", ")", "error", "{", "affectedRulesSet", ":=", "make", "(", "map", "[", "string", "]", "struct", "{", "}", ",", "0", ")", "\n", "for", "_", ",", "dnsN...
// ForceGenerateDNS unconditionally regenerates all rules that refer to DNS // names in namesToRegen. These names are FQDNs and toFQDNs.matchPatterns or // matchNames that match them will cause these rules to regenerate.
[ "ForceGenerateDNS", "unconditionally", "regenerates", "all", "rules", "that", "refer", "to", "DNS", "names", "in", "namesToRegen", ".", "These", "names", "are", "FQDNs", "and", "toFQDNs", ".", "matchPatterns", "or", "matchNames", "that", "match", "them", "will", ...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/rulegen.go#L295-L328
163,626
cilium/cilium
pkg/fqdn/rulegen.go
addRule
func (gen *RuleGen) addRule(uuid string, sourceRule *api.Rule) (newDNSNames, oldDNSNames []string, err error) { // if we are updating a rule, track which old dnsNames are removed. We store // possible names to stop managing in namesToStopManaging. As we add names // from the new rule below, these are cleared. namesToStopManaging := make(map[string]struct{}) if oldRule, exists := gen.allRules[uuid]; exists { for _, egressRule := range oldRule.Egress { for _, ToFQDN := range egressRule.ToFQDNs { if len(ToFQDN.MatchName) > 0 { dnsName := prepareMatchName(ToFQDN.MatchName) dnsNameAsRE := matchpattern.ToRegexp(dnsName) namesToStopManaging[dnsNameAsRE] = struct{}{} } if len(ToFQDN.MatchPattern) > 0 { dnsPattern := matchpattern.Sanitize(ToFQDN.MatchPattern) dnsPatternAsRE := matchpattern.ToRegexp(dnsPattern) namesToStopManaging[dnsPatternAsRE] = struct{}{} } } } } // Always add to allRules gen.allRules[uuid] = sourceRule // Add a dnsname -> rule reference. We track old/new names by the literal // value in matchName/Pattern. They are inserted into the sourceRules // RegexpMap as regexeps, however, so we can match against them later. for _, egressRule := range sourceRule.Egress { for _, ToFQDN := range egressRule.ToFQDNs { REsToAddForUUID := map[string]string{} if len(ToFQDN.MatchName) > 0 { dnsName := prepareMatchName(ToFQDN.MatchName) dnsNameAsRE := matchpattern.ToRegexp(dnsName) REsToAddForUUID[ToFQDN.MatchName] = dnsNameAsRE gen.namesToPoll[dnsName] = struct{}{} } if len(ToFQDN.MatchPattern) > 0 { dnsPattern := matchpattern.Sanitize(ToFQDN.MatchPattern) dnsPatternAsRE := matchpattern.ToRegexp(dnsPattern) REsToAddForUUID[ToFQDN.MatchPattern] = dnsPatternAsRE } for policyMatchStr, dnsPatternAsRE := range REsToAddForUUID { delete(namesToStopManaging, dnsPatternAsRE) // keep managing this matchName/Pattern // check if this is already managed or not if exists := gen.sourceRules.LookupContainsValue(dnsPatternAsRE, uuid); exists { oldDNSNames = append(oldDNSNames, policyMatchStr) } else { // This ToFQDNs.MatchName/Pattern has not been seen before newDNSNames = append(newDNSNames, policyMatchStr) // Add this egress rule as a dependent on ToFQDNs.MatchPattern, but fixup the literal // name so it can work as a regex if err = gen.sourceRules.Add(dnsPatternAsRE, uuid); err != nil { return nil, nil, err } } } } } // Stop managing names/patterns that remain in shouldStopManaging (i.e. not // seen when iterating .ToFQDNs rules above). The net result is to remove // dnsName -> uuid associations that existed in the older version of the rule // with this UUID, but did not re-occur in the new instance. // When a dnsName has no uuid associations, we remove it from the poll list // outright. for dnsName := range namesToStopManaging { if shouldStopManaging := gen.removeFromDNSName(dnsName, uuid); shouldStopManaging { delete(gen.namesToPoll, dnsName) // A no-op for matchPattern } } return newDNSNames, oldDNSNames, nil }
go
func (gen *RuleGen) addRule(uuid string, sourceRule *api.Rule) (newDNSNames, oldDNSNames []string, err error) { // if we are updating a rule, track which old dnsNames are removed. We store // possible names to stop managing in namesToStopManaging. As we add names // from the new rule below, these are cleared. namesToStopManaging := make(map[string]struct{}) if oldRule, exists := gen.allRules[uuid]; exists { for _, egressRule := range oldRule.Egress { for _, ToFQDN := range egressRule.ToFQDNs { if len(ToFQDN.MatchName) > 0 { dnsName := prepareMatchName(ToFQDN.MatchName) dnsNameAsRE := matchpattern.ToRegexp(dnsName) namesToStopManaging[dnsNameAsRE] = struct{}{} } if len(ToFQDN.MatchPattern) > 0 { dnsPattern := matchpattern.Sanitize(ToFQDN.MatchPattern) dnsPatternAsRE := matchpattern.ToRegexp(dnsPattern) namesToStopManaging[dnsPatternAsRE] = struct{}{} } } } } // Always add to allRules gen.allRules[uuid] = sourceRule // Add a dnsname -> rule reference. We track old/new names by the literal // value in matchName/Pattern. They are inserted into the sourceRules // RegexpMap as regexeps, however, so we can match against them later. for _, egressRule := range sourceRule.Egress { for _, ToFQDN := range egressRule.ToFQDNs { REsToAddForUUID := map[string]string{} if len(ToFQDN.MatchName) > 0 { dnsName := prepareMatchName(ToFQDN.MatchName) dnsNameAsRE := matchpattern.ToRegexp(dnsName) REsToAddForUUID[ToFQDN.MatchName] = dnsNameAsRE gen.namesToPoll[dnsName] = struct{}{} } if len(ToFQDN.MatchPattern) > 0 { dnsPattern := matchpattern.Sanitize(ToFQDN.MatchPattern) dnsPatternAsRE := matchpattern.ToRegexp(dnsPattern) REsToAddForUUID[ToFQDN.MatchPattern] = dnsPatternAsRE } for policyMatchStr, dnsPatternAsRE := range REsToAddForUUID { delete(namesToStopManaging, dnsPatternAsRE) // keep managing this matchName/Pattern // check if this is already managed or not if exists := gen.sourceRules.LookupContainsValue(dnsPatternAsRE, uuid); exists { oldDNSNames = append(oldDNSNames, policyMatchStr) } else { // This ToFQDNs.MatchName/Pattern has not been seen before newDNSNames = append(newDNSNames, policyMatchStr) // Add this egress rule as a dependent on ToFQDNs.MatchPattern, but fixup the literal // name so it can work as a regex if err = gen.sourceRules.Add(dnsPatternAsRE, uuid); err != nil { return nil, nil, err } } } } } // Stop managing names/patterns that remain in shouldStopManaging (i.e. not // seen when iterating .ToFQDNs rules above). The net result is to remove // dnsName -> uuid associations that existed in the older version of the rule // with this UUID, but did not re-occur in the new instance. // When a dnsName has no uuid associations, we remove it from the poll list // outright. for dnsName := range namesToStopManaging { if shouldStopManaging := gen.removeFromDNSName(dnsName, uuid); shouldStopManaging { delete(gen.namesToPoll, dnsName) // A no-op for matchPattern } } return newDNSNames, oldDNSNames, nil }
[ "func", "(", "gen", "*", "RuleGen", ")", "addRule", "(", "uuid", "string", ",", "sourceRule", "*", "api", ".", "Rule", ")", "(", "newDNSNames", ",", "oldDNSNames", "[", "]", "string", ",", "err", "error", ")", "{", "// if we are updating a rule, track which ...
// addRule places an api.Rule in the source list for a DNS name. // uuid must be the unique identifier generated for the ToFQDN-UUID label. // newDNSNames and oldDNSNames indicate names that were newly added from this // rule, or that were seen in this rule but were already managed. // If newDNSNames and oldDNSNames are both empty, the rule was not added to the // managed list.
[ "addRule", "places", "an", "api", ".", "Rule", "in", "the", "source", "list", "for", "a", "DNS", "name", ".", "uuid", "must", "be", "the", "unique", "identifier", "generated", "for", "the", "ToFQDN", "-", "UUID", "label", ".", "newDNSNames", "and", "oldD...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/rulegen.go#L424-L500
163,627
cilium/cilium
pkg/fqdn/rulegen.go
removeRule
func (gen *RuleGen) removeRule(uuid string, sourceRule *api.Rule) (noLongerManaged []string) { // Always delete from allRules delete(gen.allRules, uuid) // Delete dnsname -> rule references for _, egressRule := range sourceRule.Egress { for _, ToFQDN := range egressRule.ToFQDNs { if len(ToFQDN.MatchName) > 0 { dnsName := prepareMatchName(ToFQDN.MatchName) dnsNameAsRE := matchpattern.ToRegexp(dnsName) if shouldStopManaging := gen.removeFromDNSName(dnsNameAsRE, uuid); shouldStopManaging { delete(gen.namesToPoll, dnsName) noLongerManaged = append(noLongerManaged, ToFQDN.MatchName) } } if len(ToFQDN.MatchPattern) > 0 { dnsPattern := matchpattern.Sanitize(ToFQDN.MatchPattern) dnsPatternAsRE := matchpattern.ToRegexp(dnsPattern) if shouldStopManaging := gen.removeFromDNSName(dnsPatternAsRE, uuid); shouldStopManaging { noLongerManaged = append(noLongerManaged, ToFQDN.MatchPattern) } } } } return noLongerManaged }
go
func (gen *RuleGen) removeRule(uuid string, sourceRule *api.Rule) (noLongerManaged []string) { // Always delete from allRules delete(gen.allRules, uuid) // Delete dnsname -> rule references for _, egressRule := range sourceRule.Egress { for _, ToFQDN := range egressRule.ToFQDNs { if len(ToFQDN.MatchName) > 0 { dnsName := prepareMatchName(ToFQDN.MatchName) dnsNameAsRE := matchpattern.ToRegexp(dnsName) if shouldStopManaging := gen.removeFromDNSName(dnsNameAsRE, uuid); shouldStopManaging { delete(gen.namesToPoll, dnsName) noLongerManaged = append(noLongerManaged, ToFQDN.MatchName) } } if len(ToFQDN.MatchPattern) > 0 { dnsPattern := matchpattern.Sanitize(ToFQDN.MatchPattern) dnsPatternAsRE := matchpattern.ToRegexp(dnsPattern) if shouldStopManaging := gen.removeFromDNSName(dnsPatternAsRE, uuid); shouldStopManaging { noLongerManaged = append(noLongerManaged, ToFQDN.MatchPattern) } } } } return noLongerManaged }
[ "func", "(", "gen", "*", "RuleGen", ")", "removeRule", "(", "uuid", "string", ",", "sourceRule", "*", "api", ".", "Rule", ")", "(", "noLongerManaged", "[", "]", "string", ")", "{", "// Always delete from allRules", "delete", "(", "gen", ".", "allRules", ",...
// removeRule removes an api.Rule from the source rule set for each DNS name, // and from the IPs if no rules depend on that DNS name. // uuid must be a unique identifier for the sourceRule // noLongerManaged indicates that no more rules rely on this DNS target
[ "removeRule", "removes", "an", "api", ".", "Rule", "from", "the", "source", "rule", "set", "for", "each", "DNS", "name", "and", "from", "the", "IPs", "if", "no", "rules", "depend", "on", "that", "DNS", "name", ".", "uuid", "must", "be", "a", "unique", ...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/rulegen.go#L506-L533
163,628
cilium/cilium
pkg/fqdn/rulegen.go
removeFromDNSName
func (gen *RuleGen) removeFromDNSName(dnsName, uuid string) (shouldStopManaging bool) { // remove the rule from the set of rules that rely on dnsName. // Note: this isn't removing dnsName from gen.sourceRules, that is just // below. return gen.sourceRules.Remove(dnsName, uuid) }
go
func (gen *RuleGen) removeFromDNSName(dnsName, uuid string) (shouldStopManaging bool) { // remove the rule from the set of rules that rely on dnsName. // Note: this isn't removing dnsName from gen.sourceRules, that is just // below. return gen.sourceRules.Remove(dnsName, uuid) }
[ "func", "(", "gen", "*", "RuleGen", ")", "removeFromDNSName", "(", "dnsName", ",", "uuid", "string", ")", "(", "shouldStopManaging", "bool", ")", "{", "// remove the rule from the set of rules that rely on dnsName.", "// Note: this isn't removing dnsName from gen.sourceRules, t...
// removeFromDNSName removes the uuid from the list attached to a dns name. It // will clean up gen.sourceRules if needed. // shouldStopManaging indicates that no more rules rely on this DNS target
[ "removeFromDNSName", "removes", "the", "uuid", "from", "the", "list", "attached", "to", "a", "dns", "name", ".", "It", "will", "clean", "up", "gen", ".", "sourceRules", "if", "needed", ".", "shouldStopManaging", "indicates", "that", "no", "more", "rules", "r...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/rulegen.go#L538-L543
163,629
cilium/cilium
pkg/fqdn/rulegen.go
updateIPsForName
func (gen *RuleGen) updateIPsForName(lookupTime time.Time, dnsName string, newIPs []net.IP, ttl int) (updated bool) { cacheIPs := gen.cache.Lookup(dnsName) if gen.config.MinTTL > ttl { ttl = gen.config.MinTTL } gen.cache.Update(lookupTime, dnsName, newIPs, ttl) sortedNewIPs := gen.cache.Lookup(dnsName) // DNSCache returns IPs sorted // The 0 checks below account for an unlike race condition where this // function is called with already expired data and if other cache data // from before also expired. return (len(cacheIPs) == 0 && len(sortedNewIPs) == 0) || !sortedIPsAreEqual(sortedNewIPs, cacheIPs) }
go
func (gen *RuleGen) updateIPsForName(lookupTime time.Time, dnsName string, newIPs []net.IP, ttl int) (updated bool) { cacheIPs := gen.cache.Lookup(dnsName) if gen.config.MinTTL > ttl { ttl = gen.config.MinTTL } gen.cache.Update(lookupTime, dnsName, newIPs, ttl) sortedNewIPs := gen.cache.Lookup(dnsName) // DNSCache returns IPs sorted // The 0 checks below account for an unlike race condition where this // function is called with already expired data and if other cache data // from before also expired. return (len(cacheIPs) == 0 && len(sortedNewIPs) == 0) || !sortedIPsAreEqual(sortedNewIPs, cacheIPs) }
[ "func", "(", "gen", "*", "RuleGen", ")", "updateIPsForName", "(", "lookupTime", "time", ".", "Time", ",", "dnsName", "string", ",", "newIPs", "[", "]", "net", ".", "IP", ",", "ttl", "int", ")", "(", "updated", "bool", ")", "{", "cacheIPs", ":=", "gen...
// updateIPsName will update the IPs for dnsName. It always retains a copy of // newIPs. // updated is true when the new IPs differ from the old IPs
[ "updateIPsName", "will", "update", "the", "IPs", "for", "dnsName", ".", "It", "always", "retains", "a", "copy", "of", "newIPs", ".", "updated", "is", "true", "when", "the", "new", "IPs", "differ", "from", "the", "old", "IPs" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/fqdn/rulegen.go#L548-L562
163,630
cilium/cilium
api/v1/client/policy/get_identity_parameters.go
WithTimeout
func (o *GetIdentityParams) WithTimeout(timeout time.Duration) *GetIdentityParams { o.SetTimeout(timeout) return o }
go
func (o *GetIdentityParams) WithTimeout(timeout time.Duration) *GetIdentityParams { o.SetTimeout(timeout) return o }
[ "func", "(", "o", "*", "GetIdentityParams", ")", "WithTimeout", "(", "timeout", "time", ".", "Duration", ")", "*", "GetIdentityParams", "{", "o", ".", "SetTimeout", "(", "timeout", ")", "\n", "return", "o", "\n", "}" ]
// WithTimeout adds the timeout to the get identity params
[ "WithTimeout", "adds", "the", "timeout", "to", "the", "get", "identity", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/get_identity_parameters.go#L79-L82
163,631
cilium/cilium
api/v1/client/policy/get_identity_parameters.go
WithContext
func (o *GetIdentityParams) WithContext(ctx context.Context) *GetIdentityParams { o.SetContext(ctx) return o }
go
func (o *GetIdentityParams) WithContext(ctx context.Context) *GetIdentityParams { o.SetContext(ctx) return o }
[ "func", "(", "o", "*", "GetIdentityParams", ")", "WithContext", "(", "ctx", "context", ".", "Context", ")", "*", "GetIdentityParams", "{", "o", ".", "SetContext", "(", "ctx", ")", "\n", "return", "o", "\n", "}" ]
// WithContext adds the context to the get identity params
[ "WithContext", "adds", "the", "context", "to", "the", "get", "identity", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/get_identity_parameters.go#L90-L93
163,632
cilium/cilium
api/v1/client/policy/get_identity_parameters.go
WithHTTPClient
func (o *GetIdentityParams) WithHTTPClient(client *http.Client) *GetIdentityParams { o.SetHTTPClient(client) return o }
go
func (o *GetIdentityParams) WithHTTPClient(client *http.Client) *GetIdentityParams { o.SetHTTPClient(client) return o }
[ "func", "(", "o", "*", "GetIdentityParams", ")", "WithHTTPClient", "(", "client", "*", "http", ".", "Client", ")", "*", "GetIdentityParams", "{", "o", ".", "SetHTTPClient", "(", "client", ")", "\n", "return", "o", "\n", "}" ]
// WithHTTPClient adds the HTTPClient to the get identity params
[ "WithHTTPClient", "adds", "the", "HTTPClient", "to", "the", "get", "identity", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/get_identity_parameters.go#L101-L104
163,633
cilium/cilium
api/v1/client/policy/get_identity_parameters.go
WithLabels
func (o *GetIdentityParams) WithLabels(labels models.Labels) *GetIdentityParams { o.SetLabels(labels) return o }
go
func (o *GetIdentityParams) WithLabels(labels models.Labels) *GetIdentityParams { o.SetLabels(labels) return o }
[ "func", "(", "o", "*", "GetIdentityParams", ")", "WithLabels", "(", "labels", "models", ".", "Labels", ")", "*", "GetIdentityParams", "{", "o", ".", "SetLabels", "(", "labels", ")", "\n", "return", "o", "\n", "}" ]
// WithLabels adds the labels to the get identity params
[ "WithLabels", "adds", "the", "labels", "to", "the", "get", "identity", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/policy/get_identity_parameters.go#L112-L115
163,634
cilium/cilium
api/v1/health/server/restapi/get_hello.go
NewGetHello
func NewGetHello(ctx *middleware.Context, handler GetHelloHandler) *GetHello { return &GetHello{Context: ctx, Handler: handler} }
go
func NewGetHello(ctx *middleware.Context, handler GetHelloHandler) *GetHello { return &GetHello{Context: ctx, Handler: handler} }
[ "func", "NewGetHello", "(", "ctx", "*", "middleware", ".", "Context", ",", "handler", "GetHelloHandler", ")", "*", "GetHello", "{", "return", "&", "GetHello", "{", "Context", ":", "ctx", ",", "Handler", ":", "handler", "}", "\n", "}" ]
// NewGetHello creates a new http.Handler for the get hello operation
[ "NewGetHello", "creates", "a", "new", "http", ".", "Handler", "for", "the", "get", "hello", "operation" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/health/server/restapi/get_hello.go#L28-L30
163,635
cilium/cilium
pkg/mac/mac.go
ParseMAC
func ParseMAC(s string) (MAC, error) { ha, err := net.ParseMAC(s) if err != nil { return MAC{}, err } if len(ha) != 6 { return MAC{}, fmt.Errorf("invalid MAC address %s", s) } return MAC(ha), nil }
go
func ParseMAC(s string) (MAC, error) { ha, err := net.ParseMAC(s) if err != nil { return MAC{}, err } if len(ha) != 6 { return MAC{}, fmt.Errorf("invalid MAC address %s", s) } return MAC(ha), nil }
[ "func", "ParseMAC", "(", "s", "string", ")", "(", "MAC", ",", "error", ")", "{", "ha", ",", "err", ":=", "net", ".", "ParseMAC", "(", "s", ")", "\n", "if", "err", "!=", "nil", "{", "return", "MAC", "{", "}", ",", "err", "\n", "}", "\n", "if",...
// ParseMAC parses s only as an IEEE 802 MAC-48.
[ "ParseMAC", "parses", "s", "only", "as", "an", "IEEE", "802", "MAC", "-", "48", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/mac/mac.go#L33-L43
163,636
cilium/cilium
api/v1/server/restapi/ipam/post_ip_a_m_parameters.go
bindFamily
func (o *PostIPAMParams) bindFamily(rawData []string, hasKey bool, formats strfmt.Registry) error { var raw string if len(rawData) > 0 { raw = rawData[len(rawData)-1] } // Required: false // AllowEmptyValue: false if raw == "" { // empty values pass all other validations return nil } o.Family = &raw if err := o.validateFamily(formats); err != nil { return err } return nil }
go
func (o *PostIPAMParams) bindFamily(rawData []string, hasKey bool, formats strfmt.Registry) error { var raw string if len(rawData) > 0 { raw = rawData[len(rawData)-1] } // Required: false // AllowEmptyValue: false if raw == "" { // empty values pass all other validations return nil } o.Family = &raw if err := o.validateFamily(formats); err != nil { return err } return nil }
[ "func", "(", "o", "*", "PostIPAMParams", ")", "bindFamily", "(", "rawData", "[", "]", "string", ",", "hasKey", "bool", ",", "formats", "strfmt", ".", "Registry", ")", "error", "{", "var", "raw", "string", "\n", "if", "len", "(", "rawData", ")", ">", ...
// bindFamily binds and validates parameter Family from query.
[ "bindFamily", "binds", "and", "validates", "parameter", "Family", "from", "query", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/ipam/post_ip_a_m_parameters.go#L73-L92
163,637
cilium/cilium
api/v1/server/restapi/ipam/post_ip_a_m_parameters.go
validateFamily
func (o *PostIPAMParams) validateFamily(formats strfmt.Registry) error { if err := validate.Enum("family", "query", *o.Family, []interface{}{"ipv4", "ipv6"}); err != nil { return err } return nil }
go
func (o *PostIPAMParams) validateFamily(formats strfmt.Registry) error { if err := validate.Enum("family", "query", *o.Family, []interface{}{"ipv4", "ipv6"}); err != nil { return err } return nil }
[ "func", "(", "o", "*", "PostIPAMParams", ")", "validateFamily", "(", "formats", "strfmt", ".", "Registry", ")", "error", "{", "if", "err", ":=", "validate", ".", "Enum", "(", "\"", "\"", ",", "\"", "\"", ",", "*", "o", ".", "Family", ",", "[", "]",...
// validateFamily carries on validations for parameter Family
[ "validateFamily", "carries", "on", "validations", "for", "parameter", "Family" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/ipam/post_ip_a_m_parameters.go#L95-L102
163,638
cilium/cilium
api/v1/server/restapi/ipam/post_ip_a_m_parameters.go
bindOwner
func (o *PostIPAMParams) bindOwner(rawData []string, hasKey bool, formats strfmt.Registry) error { var raw string if len(rawData) > 0 { raw = rawData[len(rawData)-1] } // Required: false // AllowEmptyValue: false if raw == "" { // empty values pass all other validations return nil } o.Owner = &raw return nil }
go
func (o *PostIPAMParams) bindOwner(rawData []string, hasKey bool, formats strfmt.Registry) error { var raw string if len(rawData) > 0 { raw = rawData[len(rawData)-1] } // Required: false // AllowEmptyValue: false if raw == "" { // empty values pass all other validations return nil } o.Owner = &raw return nil }
[ "func", "(", "o", "*", "PostIPAMParams", ")", "bindOwner", "(", "rawData", "[", "]", "string", ",", "hasKey", "bool", ",", "formats", "strfmt", ".", "Registry", ")", "error", "{", "var", "raw", "string", "\n", "if", "len", "(", "rawData", ")", ">", "...
// bindOwner binds and validates parameter Owner from query.
[ "bindOwner", "binds", "and", "validates", "parameter", "Owner", "from", "query", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/ipam/post_ip_a_m_parameters.go#L105-L120
163,639
cilium/cilium
api/v1/server/restapi/policy/get_identity_id_responses.go
WithPayload
func (o *GetIdentityIDOK) WithPayload(payload *models.Identity) *GetIdentityIDOK { o.Payload = payload return o }
go
func (o *GetIdentityIDOK) WithPayload(payload *models.Identity) *GetIdentityIDOK { o.Payload = payload return o }
[ "func", "(", "o", "*", "GetIdentityIDOK", ")", "WithPayload", "(", "payload", "*", "models", ".", "Identity", ")", "*", "GetIdentityIDOK", "{", "o", ".", "Payload", "=", "payload", "\n", "return", "o", "\n", "}" ]
// WithPayload adds the payload to the get identity Id o k response
[ "WithPayload", "adds", "the", "payload", "to", "the", "get", "identity", "Id", "o", "k", "response" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/policy/get_identity_id_responses.go#L38-L41
163,640
cilium/cilium
api/v1/server/restapi/policy/get_identity_id_responses.go
WithPayload
func (o *GetIdentityIDUnreachable) WithPayload(payload models.Error) *GetIdentityIDUnreachable { o.Payload = payload return o }
go
func (o *GetIdentityIDUnreachable) WithPayload(payload models.Error) *GetIdentityIDUnreachable { o.Payload = payload return o }
[ "func", "(", "o", "*", "GetIdentityIDUnreachable", ")", "WithPayload", "(", "payload", "models", ".", "Error", ")", "*", "GetIdentityIDUnreachable", "{", "o", ".", "Payload", "=", "payload", "\n", "return", "o", "\n", "}" ]
// WithPayload adds the payload to the get identity Id unreachable response
[ "WithPayload", "adds", "the", "payload", "to", "the", "get", "identity", "Id", "unreachable", "response" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/policy/get_identity_id_responses.go#L130-L133
163,641
cilium/cilium
api/v1/server/restapi/policy/get_identity_id_responses.go
WithPayload
func (o *GetIdentityIDInvalidStorageFormat) WithPayload(payload models.Error) *GetIdentityIDInvalidStorageFormat { o.Payload = payload return o }
go
func (o *GetIdentityIDInvalidStorageFormat) WithPayload(payload models.Error) *GetIdentityIDInvalidStorageFormat { o.Payload = payload return o }
[ "func", "(", "o", "*", "GetIdentityIDInvalidStorageFormat", ")", "WithPayload", "(", "payload", "models", ".", "Error", ")", "*", "GetIdentityIDInvalidStorageFormat", "{", "o", ".", "Payload", "=", "payload", "\n", "return", "o", "\n", "}" ]
// WithPayload adds the payload to the get identity Id invalid storage format response
[ "WithPayload", "adds", "the", "payload", "to", "the", "get", "identity", "Id", "invalid", "storage", "format", "response" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/policy/get_identity_id_responses.go#L172-L175
163,642
cilium/cilium
api/v1/server/restapi/ipam/post_ip_a_m_ip_responses.go
WithPayload
func (o *PostIPAMIPFailure) WithPayload(payload models.Error) *PostIPAMIPFailure { o.Payload = payload return o }
go
func (o *PostIPAMIPFailure) WithPayload(payload models.Error) *PostIPAMIPFailure { o.Payload = payload return o }
[ "func", "(", "o", "*", "PostIPAMIPFailure", ")", "WithPayload", "(", "payload", "models", ".", "Error", ")", "*", "PostIPAMIPFailure", "{", "o", ".", "Payload", "=", "payload", "\n", "return", "o", "\n", "}" ]
// WithPayload adds the payload to the post Ip a m Ip failure response
[ "WithPayload", "adds", "the", "payload", "to", "the", "post", "Ip", "a", "m", "Ip", "failure", "response" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/ipam/post_ip_a_m_ip_responses.go#L110-L113
163,643
cilium/cilium
bugtool/cmd/root.go
dryRun
func dryRun(configPath string, k8sPods []string, confDir, cmdDir string) { _, err := setupDefaultConfig(configPath, k8sPods, confDir, cmdDir) if err != nil { fmt.Printf("Error: %s", err) os.Exit(1) } }
go
func dryRun(configPath string, k8sPods []string, confDir, cmdDir string) { _, err := setupDefaultConfig(configPath, k8sPods, confDir, cmdDir) if err != nil { fmt.Printf("Error: %s", err) os.Exit(1) } }
[ "func", "dryRun", "(", "configPath", "string", ",", "k8sPods", "[", "]", "string", ",", "confDir", ",", "cmdDir", "string", ")", "{", "_", ",", "err", ":=", "setupDefaultConfig", "(", "configPath", ",", "k8sPods", ",", "confDir", ",", "cmdDir", ")", "\n"...
// dryRun creates the configuration file to show the user what would have been run. // The same file can be used to modify what will be run by the bugtool.
[ "dryRun", "creates", "the", "configuration", "file", "to", "show", "the", "user", "what", "would", "have", "been", "run", ".", "The", "same", "file", "can", "be", "used", "to", "modify", "what", "will", "be", "run", "by", "the", "bugtool", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/bugtool/cmd/root.go#L222-L228
163,644
cilium/cilium
bugtool/cmd/root.go
writeCmdToFile
func writeCmdToFile(cmdDir, prompt string, k8sPods []string, enableMarkdown bool) { // Clean up the filename name := strings.Replace(prompt, "/", " ", -1) name = strings.Replace(name, " ", "-", -1) f, err := os.Create(filepath.Join(cmdDir, name+".md")) if err != nil { fmt.Fprintf(os.Stderr, "Could not create file %s\n", err) return } defer f.Close() cmd, args := split(prompt) if len(k8sPods) == 0 { // The command does not exist, abort. if _, err := exec.LookPath(cmd); err != nil { os.Remove(f.Name()) return } } else if len(args) > 5 { // Boundary check is necessary to skip other non exec kubectl // commands. ctx, cancel := context.WithTimeout(context.Background(), execTimeout) defer cancel() if _, err := exec.CommandContext(ctx, "kubectl", "exec", args[1], "-n", args[3], "--", "which", args[5]).CombinedOutput(); err != nil || ctx.Err() == context.DeadlineExceeded { os.Remove(f.Name()) return } } // Write prompt as header and the output as body, and / or error but delete empty output. output, err := execCommand(prompt) if err != nil { fmt.Fprintf(f, fmt.Sprintf("> Error while running '%s': %s\n\n", prompt, err)) } // We deliberately continue in case there was a error but the output // produced might have useful information if strings.Contains(output, "```") || !enableMarkdown { // Already contains Markdown, print as is. fmt.Fprint(f, output) } else if enableMarkdown && len(output) > 0 { fmt.Fprint(f, fmt.Sprintf("# %s\n\n```\n%s\n```\n", prompt, output)) } else { // Empty file os.Remove(f.Name()) } }
go
func writeCmdToFile(cmdDir, prompt string, k8sPods []string, enableMarkdown bool) { // Clean up the filename name := strings.Replace(prompt, "/", " ", -1) name = strings.Replace(name, " ", "-", -1) f, err := os.Create(filepath.Join(cmdDir, name+".md")) if err != nil { fmt.Fprintf(os.Stderr, "Could not create file %s\n", err) return } defer f.Close() cmd, args := split(prompt) if len(k8sPods) == 0 { // The command does not exist, abort. if _, err := exec.LookPath(cmd); err != nil { os.Remove(f.Name()) return } } else if len(args) > 5 { // Boundary check is necessary to skip other non exec kubectl // commands. ctx, cancel := context.WithTimeout(context.Background(), execTimeout) defer cancel() if _, err := exec.CommandContext(ctx, "kubectl", "exec", args[1], "-n", args[3], "--", "which", args[5]).CombinedOutput(); err != nil || ctx.Err() == context.DeadlineExceeded { os.Remove(f.Name()) return } } // Write prompt as header and the output as body, and / or error but delete empty output. output, err := execCommand(prompt) if err != nil { fmt.Fprintf(f, fmt.Sprintf("> Error while running '%s': %s\n\n", prompt, err)) } // We deliberately continue in case there was a error but the output // produced might have useful information if strings.Contains(output, "```") || !enableMarkdown { // Already contains Markdown, print as is. fmt.Fprint(f, output) } else if enableMarkdown && len(output) > 0 { fmt.Fprint(f, fmt.Sprintf("# %s\n\n```\n%s\n```\n", prompt, output)) } else { // Empty file os.Remove(f.Name()) } }
[ "func", "writeCmdToFile", "(", "cmdDir", ",", "prompt", "string", ",", "k8sPods", "[", "]", "string", ",", "enableMarkdown", "bool", ")", "{", "// Clean up the filename", "name", ":=", "strings", ".", "Replace", "(", "prompt", ",", "\"", "\"", ",", "\"", "...
// writeCmdToFile will execute command and write markdown output to a file
[ "writeCmdToFile", "will", "execute", "command", "and", "write", "markdown", "output", "to", "a", "file" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/bugtool/cmd/root.go#L328-L375
163,645
cilium/cilium
bugtool/cmd/root.go
split
func split(prompt string) (string, []string) { // Split the command and arguments split := strings.Split(prompt, " ") argc := len(split) var args []string cmd := split[0] if argc > 1 { args = split[1:] } return cmd, args }
go
func split(prompt string) (string, []string) { // Split the command and arguments split := strings.Split(prompt, " ") argc := len(split) var args []string cmd := split[0] if argc > 1 { args = split[1:] } return cmd, args }
[ "func", "split", "(", "prompt", "string", ")", "(", "string", ",", "[", "]", "string", ")", "{", "// Split the command and arguments", "split", ":=", "strings", ".", "Split", "(", "prompt", ",", "\"", "\"", ")", "\n", "argc", ":=", "len", "(", "split", ...
// split takes a command prompt and returns the command and arguments separately
[ "split", "takes", "a", "command", "prompt", "and", "returns", "the", "command", "and", "arguments", "separately" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/bugtool/cmd/root.go#L378-L390
163,646
cilium/cilium
api/v1/client/daemon/patch_config_parameters.go
WithTimeout
func (o *PatchConfigParams) WithTimeout(timeout time.Duration) *PatchConfigParams { o.SetTimeout(timeout) return o }
go
func (o *PatchConfigParams) WithTimeout(timeout time.Duration) *PatchConfigParams { o.SetTimeout(timeout) return o }
[ "func", "(", "o", "*", "PatchConfigParams", ")", "WithTimeout", "(", "timeout", "time", ".", "Duration", ")", "*", "PatchConfigParams", "{", "o", ".", "SetTimeout", "(", "timeout", ")", "\n", "return", "o", "\n", "}" ]
// WithTimeout adds the timeout to the patch config params
[ "WithTimeout", "adds", "the", "timeout", "to", "the", "patch", "config", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/patch_config_parameters.go#L75-L78
163,647
cilium/cilium
api/v1/client/daemon/patch_config_parameters.go
WithContext
func (o *PatchConfigParams) WithContext(ctx context.Context) *PatchConfigParams { o.SetContext(ctx) return o }
go
func (o *PatchConfigParams) WithContext(ctx context.Context) *PatchConfigParams { o.SetContext(ctx) return o }
[ "func", "(", "o", "*", "PatchConfigParams", ")", "WithContext", "(", "ctx", "context", ".", "Context", ")", "*", "PatchConfigParams", "{", "o", ".", "SetContext", "(", "ctx", ")", "\n", "return", "o", "\n", "}" ]
// WithContext adds the context to the patch config params
[ "WithContext", "adds", "the", "context", "to", "the", "patch", "config", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/patch_config_parameters.go#L86-L89
163,648
cilium/cilium
api/v1/client/daemon/patch_config_parameters.go
WithHTTPClient
func (o *PatchConfigParams) WithHTTPClient(client *http.Client) *PatchConfigParams { o.SetHTTPClient(client) return o }
go
func (o *PatchConfigParams) WithHTTPClient(client *http.Client) *PatchConfigParams { o.SetHTTPClient(client) return o }
[ "func", "(", "o", "*", "PatchConfigParams", ")", "WithHTTPClient", "(", "client", "*", "http", ".", "Client", ")", "*", "PatchConfigParams", "{", "o", ".", "SetHTTPClient", "(", "client", ")", "\n", "return", "o", "\n", "}" ]
// WithHTTPClient adds the HTTPClient to the patch config params
[ "WithHTTPClient", "adds", "the", "HTTPClient", "to", "the", "patch", "config", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/patch_config_parameters.go#L97-L100
163,649
cilium/cilium
api/v1/client/daemon/patch_config_parameters.go
WithConfiguration
func (o *PatchConfigParams) WithConfiguration(configuration *models.DaemonConfigurationSpec) *PatchConfigParams { o.SetConfiguration(configuration) return o }
go
func (o *PatchConfigParams) WithConfiguration(configuration *models.DaemonConfigurationSpec) *PatchConfigParams { o.SetConfiguration(configuration) return o }
[ "func", "(", "o", "*", "PatchConfigParams", ")", "WithConfiguration", "(", "configuration", "*", "models", ".", "DaemonConfigurationSpec", ")", "*", "PatchConfigParams", "{", "o", ".", "SetConfiguration", "(", "configuration", ")", "\n", "return", "o", "\n", "}"...
// WithConfiguration adds the configuration to the patch config params
[ "WithConfiguration", "adds", "the", "configuration", "to", "the", "patch", "config", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/patch_config_parameters.go#L108-L111
163,650
cilium/cilium
pkg/policy/policy.go
PolicyTrace
func (s *SearchContext) PolicyTrace(format string, a ...interface{}) { if s.TraceEnabled() { log.Debugf(format, a...) if s.Logging != nil { format = "%-" + s.CallDepth() + "s" + format a = append([]interface{}{""}, a...) s.Logging.Logger.Printf(format, a...) } } }
go
func (s *SearchContext) PolicyTrace(format string, a ...interface{}) { if s.TraceEnabled() { log.Debugf(format, a...) if s.Logging != nil { format = "%-" + s.CallDepth() + "s" + format a = append([]interface{}{""}, a...) s.Logging.Logger.Printf(format, a...) } } }
[ "func", "(", "s", "*", "SearchContext", ")", "PolicyTrace", "(", "format", "string", ",", "a", "...", "interface", "{", "}", ")", "{", "if", "s", ".", "TraceEnabled", "(", ")", "{", "log", ".", "Debugf", "(", "format", ",", "a", "...", ")", "\n", ...
// PolicyTrace logs the given message into the SearchContext logger only if // TRACE_ENABLED or TRACE_VERBOSE is enabled in the receiver's SearchContext.
[ "PolicyTrace", "logs", "the", "given", "message", "into", "the", "SearchContext", "logger", "only", "if", "TRACE_ENABLED", "or", "TRACE_VERBOSE", "is", "enabled", "in", "the", "receiver", "s", "SearchContext", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/policy.go#L45-L54
163,651
cilium/cilium
pkg/policy/policy.go
PolicyTraceVerbose
func (s *SearchContext) PolicyTraceVerbose(format string, a ...interface{}) { switch s.Trace { case TRACE_VERBOSE: log.Debugf(format, a...) if s.Logging != nil { s.Logging.Logger.Printf(format, a...) } } }
go
func (s *SearchContext) PolicyTraceVerbose(format string, a ...interface{}) { switch s.Trace { case TRACE_VERBOSE: log.Debugf(format, a...) if s.Logging != nil { s.Logging.Logger.Printf(format, a...) } } }
[ "func", "(", "s", "*", "SearchContext", ")", "PolicyTraceVerbose", "(", "format", "string", ",", "a", "...", "interface", "{", "}", ")", "{", "switch", "s", ".", "Trace", "{", "case", "TRACE_VERBOSE", ":", "log", ".", "Debugf", "(", "format", ",", "a",...
// PolicyTraceVerbose logs the given message into the SearchContext logger only // if TRACE_VERBOSE is enabled in the receiver's SearchContext.
[ "PolicyTraceVerbose", "logs", "the", "given", "message", "into", "the", "SearchContext", "logger", "only", "if", "TRACE_VERBOSE", "is", "enabled", "in", "the", "receiver", "s", "SearchContext", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/policy.go#L58-L66
163,652
cilium/cilium
pkg/policy/policy.go
WithLogger
func (s *SearchContext) WithLogger(log io.Writer) *SearchContext { result := *s result.Logging = logging.NewLogBackend(log, "", 0) if result.Trace == TRACE_DISABLED { result.Trace = TRACE_ENABLED } return &result }
go
func (s *SearchContext) WithLogger(log io.Writer) *SearchContext { result := *s result.Logging = logging.NewLogBackend(log, "", 0) if result.Trace == TRACE_DISABLED { result.Trace = TRACE_ENABLED } return &result }
[ "func", "(", "s", "*", "SearchContext", ")", "WithLogger", "(", "log", "io", ".", "Writer", ")", "*", "SearchContext", "{", "result", ":=", "*", "s", "\n", "result", ".", "Logging", "=", "logging", ".", "NewLogBackend", "(", "log", ",", "\"", "\"", "...
// WithLogger returns a shallow copy of the received SearchContext with the // logging set to write to 'log'.
[ "WithLogger", "returns", "a", "shallow", "copy", "of", "the", "received", "SearchContext", "with", "the", "logging", "set", "to", "write", "to", "log", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/policy/policy.go#L116-L123
163,653
cilium/cilium
pkg/datapath/linux/ipsec/ipsec_linux.go
EnableIPv6Forwarding
func EnableIPv6Forwarding() error { ip6ConfPath := "/proc/sys/net/ipv6/conf/" device := "all" forwarding := "forwarding" forwardingOn := "1" path := filepath.Join(ip6ConfPath, device, forwarding) return ioutil.WriteFile(path, []byte(forwardingOn), 0644) }
go
func EnableIPv6Forwarding() error { ip6ConfPath := "/proc/sys/net/ipv6/conf/" device := "all" forwarding := "forwarding" forwardingOn := "1" path := filepath.Join(ip6ConfPath, device, forwarding) return ioutil.WriteFile(path, []byte(forwardingOn), 0644) }
[ "func", "EnableIPv6Forwarding", "(", ")", "error", "{", "ip6ConfPath", ":=", "\"", "\"", "\n", "device", ":=", "\"", "\"", "\n", "forwarding", ":=", "\"", "\"", "\n", "forwardingOn", ":=", "\"", "\"", "\n", "path", ":=", "filepath", ".", "Join", "(", "...
// EnableIPv6Forwarding sets proc file to enable IPv6 forwarding
[ "EnableIPv6Forwarding", "sets", "proc", "file", "to", "enable", "IPv6", "forwarding" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/datapath/linux/ipsec/ipsec_linux.go#L409-L416
163,654
cilium/cilium
pkg/kvstore/dummy.go
SetupDummy
func SetupDummy(dummyBackend string) { module := getBackend(dummyBackend) if module == nil { log.Panicf("Unknown dummy kvstore backend %s", dummyBackend) } module.setConfigDummy() if err := initClient(module, nil); err != nil { log.WithError(err).Panic("Unable to initialize kvstore client") } }
go
func SetupDummy(dummyBackend string) { module := getBackend(dummyBackend) if module == nil { log.Panicf("Unknown dummy kvstore backend %s", dummyBackend) } module.setConfigDummy() if err := initClient(module, nil); err != nil { log.WithError(err).Panic("Unable to initialize kvstore client") } }
[ "func", "SetupDummy", "(", "dummyBackend", "string", ")", "{", "module", ":=", "getBackend", "(", "dummyBackend", ")", "\n", "if", "module", "==", "nil", "{", "log", ".", "Panicf", "(", "\"", "\"", ",", "dummyBackend", ")", "\n", "}", "\n\n", "module", ...
// SetupDummy sets up kvstore for tests
[ "SetupDummy", "sets", "up", "kvstore", "for", "tests" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/kvstore/dummy.go#L18-L29
163,655
cilium/cilium
pkg/workloads/kubernetes.go
fetchK8sLabels
func fetchK8sLabels(containerID string, containerLbls map[string]string) (map[string]string, error) { if !k8s.IsEnabled() { return nil, nil } podName := k8sDockerLbls.GetPodName(containerLbls) if podName == "" { return nil, nil } ns := k8sDockerLbls.GetPodNamespace(containerLbls) if ns == "" { ns = "default" } return k8s.GetPodLabels(ns, podName) }
go
func fetchK8sLabels(containerID string, containerLbls map[string]string) (map[string]string, error) { if !k8s.IsEnabled() { return nil, nil } podName := k8sDockerLbls.GetPodName(containerLbls) if podName == "" { return nil, nil } ns := k8sDockerLbls.GetPodNamespace(containerLbls) if ns == "" { ns = "default" } return k8s.GetPodLabels(ns, podName) }
[ "func", "fetchK8sLabels", "(", "containerID", "string", ",", "containerLbls", "map", "[", "string", "]", "string", ")", "(", "map", "[", "string", "]", "string", ",", "error", ")", "{", "if", "!", "k8s", ".", "IsEnabled", "(", ")", "{", "return", "nil"...
// fetchK8sLabels returns the kubernetes labels from the given container labels
[ "fetchK8sLabels", "returns", "the", "kubernetes", "labels", "from", "the", "given", "container", "labels" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/workloads/kubernetes.go#L24-L37
163,656
cilium/cilium
pkg/workloads/config.go
setOpts
func setOpts(opts map[string]string, supportedOpts workloadRuntimeOpts) error { errors := 0 for key, val := range opts { opt, ok := supportedOpts[key] if !ok { errors++ log.Errorf("unknown workload runtime configuration key %q", key) continue } if opt.validate != nil { if err := opt.validate(val); err != nil { log.Errorf("invalid value for key %s: %s", key, err) errors++ } } } // if errors have occurred, print the supported configuration keys to // the log if errors > 0 { log.Error("Supported configuration keys:") for key, val := range supportedOpts { log.Errorf(" %-12s %s", key, val.description) } return fmt.Errorf("invalid workload runtime configuration, see log for details") } // modify the configuration atomically after verification for key, val := range opts { supportedOpts[key].value = val } return nil }
go
func setOpts(opts map[string]string, supportedOpts workloadRuntimeOpts) error { errors := 0 for key, val := range opts { opt, ok := supportedOpts[key] if !ok { errors++ log.Errorf("unknown workload runtime configuration key %q", key) continue } if opt.validate != nil { if err := opt.validate(val); err != nil { log.Errorf("invalid value for key %s: %s", key, err) errors++ } } } // if errors have occurred, print the supported configuration keys to // the log if errors > 0 { log.Error("Supported configuration keys:") for key, val := range supportedOpts { log.Errorf(" %-12s %s", key, val.description) } return fmt.Errorf("invalid workload runtime configuration, see log for details") } // modify the configuration atomically after verification for key, val := range opts { supportedOpts[key].value = val } return nil }
[ "func", "setOpts", "(", "opts", "map", "[", "string", "]", "string", ",", "supportedOpts", "workloadRuntimeOpts", ")", "error", "{", "errors", ":=", "0", "\n\n", "for", "key", ",", "val", ":=", "range", "opts", "{", "opt", ",", "ok", ":=", "supportedOpts...
// setOpts validates the specified options against the selected workload runtime // and then modifies the configuration
[ "setOpts", "validates", "the", "specified", "options", "against", "the", "selected", "workload", "runtime", "and", "then", "modifies", "the", "configuration" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/workloads/config.go#L27-L64
163,657
cilium/cilium
pkg/workloads/config.go
Setup
func Setup(a allocatorInterface, workloadRuntimes []string, opts map[WorkloadRuntimeType]map[string]string) error { return setup(a, workloadRuntimes, opts, false) }
go
func Setup(a allocatorInterface, workloadRuntimes []string, opts map[WorkloadRuntimeType]map[string]string) error { return setup(a, workloadRuntimes, opts, false) }
[ "func", "Setup", "(", "a", "allocatorInterface", ",", "workloadRuntimes", "[", "]", "string", ",", "opts", "map", "[", "WorkloadRuntimeType", "]", "map", "[", "string", "]", "string", ")", "error", "{", "return", "setup", "(", "a", ",", "workloadRuntimes", ...
// Setup sets up the workload runtime specified in workloadRuntime and configures it // with the options provided in opts
[ "Setup", "sets", "up", "the", "workload", "runtime", "specified", "in", "workloadRuntime", "and", "configures", "it", "with", "the", "options", "provided", "in", "opts" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/workloads/config.go#L100-L102
163,658
cilium/cilium
pkg/loadbalancer/loadbalancer.go
AddService
func (lb *LoadBalancer) AddService(svc LBSVC) bool { scopedLog := log.WithFields(logrus.Fields{ logfields.ServiceName: svc.FE.String(), logfields.SHA: svc.Sha256, }) oldSvc, ok := lb.SVCMapID[ServiceID(svc.FE.ID)] if ok { // If service already existed, remove old entry from Cilium's map scopedLog.Debug("service is already in lb.SVCMapID; deleting old entry and updating it with new entry") delete(lb.SVCMap, oldSvc.Sha256) updateMetric.Inc() } else { addMetric.Inc() } scopedLog.Debug("adding service to loadbalancer") lb.SVCMap[svc.Sha256] = svc lb.SVCMapID[ServiceID(svc.FE.ID)] = &svc return !ok }
go
func (lb *LoadBalancer) AddService(svc LBSVC) bool { scopedLog := log.WithFields(logrus.Fields{ logfields.ServiceName: svc.FE.String(), logfields.SHA: svc.Sha256, }) oldSvc, ok := lb.SVCMapID[ServiceID(svc.FE.ID)] if ok { // If service already existed, remove old entry from Cilium's map scopedLog.Debug("service is already in lb.SVCMapID; deleting old entry and updating it with new entry") delete(lb.SVCMap, oldSvc.Sha256) updateMetric.Inc() } else { addMetric.Inc() } scopedLog.Debug("adding service to loadbalancer") lb.SVCMap[svc.Sha256] = svc lb.SVCMapID[ServiceID(svc.FE.ID)] = &svc return !ok }
[ "func", "(", "lb", "*", "LoadBalancer", ")", "AddService", "(", "svc", "LBSVC", ")", "bool", "{", "scopedLog", ":=", "log", ".", "WithFields", "(", "logrus", ".", "Fields", "{", "logfields", ".", "ServiceName", ":", "svc", ".", "FE", ".", "String", "("...
// AddService adds a service to list of loadbalancers and returns true if created.
[ "AddService", "adds", "a", "service", "to", "list", "of", "loadbalancers", "and", "returns", "true", "if", "created", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L142-L161
163,659
cilium/cilium
pkg/loadbalancer/loadbalancer.go
DeleteService
func (lb *LoadBalancer) DeleteService(svc *LBSVC) { log.WithFields(logrus.Fields{ logfields.ServiceName: svc.FE.String(), logfields.SHA: svc.Sha256, }).Debug("deleting service from loadbalancer") delete(lb.SVCMap, svc.Sha256) delete(lb.SVCMapID, ServiceID(svc.FE.ID)) deleteMetric.Inc() }
go
func (lb *LoadBalancer) DeleteService(svc *LBSVC) { log.WithFields(logrus.Fields{ logfields.ServiceName: svc.FE.String(), logfields.SHA: svc.Sha256, }).Debug("deleting service from loadbalancer") delete(lb.SVCMap, svc.Sha256) delete(lb.SVCMapID, ServiceID(svc.FE.ID)) deleteMetric.Inc() }
[ "func", "(", "lb", "*", "LoadBalancer", ")", "DeleteService", "(", "svc", "*", "LBSVC", ")", "{", "log", ".", "WithFields", "(", "logrus", ".", "Fields", "{", "logfields", ".", "ServiceName", ":", "svc", ".", "FE", ".", "String", "(", ")", ",", "logf...
// DeleteService deletes svc from lb's SVCMap and SVCMapID.
[ "DeleteService", "deletes", "svc", "from", "lb", "s", "SVCMap", "and", "SVCMapID", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L164-L172
163,660
cilium/cilium
pkg/loadbalancer/loadbalancer.go
NewL4Addr
func NewL4Addr(protocol L4Type, number uint16) *L4Addr { return &L4Addr{Protocol: protocol, Port: number} }
go
func NewL4Addr(protocol L4Type, number uint16) *L4Addr { return &L4Addr{Protocol: protocol, Port: number} }
[ "func", "NewL4Addr", "(", "protocol", "L4Type", ",", "number", "uint16", ")", "*", "L4Addr", "{", "return", "&", "L4Addr", "{", "Protocol", ":", "protocol", ",", "Port", ":", "number", "}", "\n", "}" ]
// NewL4Addr creates a new L4Addr.
[ "NewL4Addr", "creates", "a", "new", "L4Addr", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L202-L204
163,661
cilium/cilium
pkg/loadbalancer/loadbalancer.go
Equals
func (l *L4Addr) Equals(o *L4Addr) bool { switch { case (l == nil) != (o == nil): return false case (l == nil) && (o == nil): return true } return l.Port == o.Port && l.Protocol == o.Protocol }
go
func (l *L4Addr) Equals(o *L4Addr) bool { switch { case (l == nil) != (o == nil): return false case (l == nil) && (o == nil): return true } return l.Port == o.Port && l.Protocol == o.Protocol }
[ "func", "(", "l", "*", "L4Addr", ")", "Equals", "(", "o", "*", "L4Addr", ")", "bool", "{", "switch", "{", "case", "(", "l", "==", "nil", ")", "!=", "(", "o", "==", "nil", ")", ":", "return", "false", "\n", "case", "(", "l", "==", "nil", ")", ...
// Equals returns true if both L4Addr are considered equal.
[ "Equals", "returns", "true", "if", "both", "L4Addr", "are", "considered", "equal", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L207-L215
163,662
cilium/cilium
pkg/loadbalancer/loadbalancer.go
DeepCopy
func (l *L4Addr) DeepCopy() *L4Addr { return &L4Addr{ Port: l.Port, Protocol: l.Protocol, } }
go
func (l *L4Addr) DeepCopy() *L4Addr { return &L4Addr{ Port: l.Port, Protocol: l.Protocol, } }
[ "func", "(", "l", "*", "L4Addr", ")", "DeepCopy", "(", ")", "*", "L4Addr", "{", "return", "&", "L4Addr", "{", "Port", ":", "l", ".", "Port", ",", "Protocol", ":", "l", ".", "Protocol", ",", "}", "\n", "}" ]
// DeepCopy returns a DeepCopy of the given L4Addr.
[ "DeepCopy", "returns", "a", "DeepCopy", "of", "the", "given", "L4Addr", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L218-L223
163,663
cilium/cilium
pkg/loadbalancer/loadbalancer.go
NewFEPort
func NewFEPort(protocol L4Type, portNumber uint16) *FEPort { return &FEPort{L4Addr: NewL4Addr(protocol, portNumber)} }
go
func NewFEPort(protocol L4Type, portNumber uint16) *FEPort { return &FEPort{L4Addr: NewL4Addr(protocol, portNumber)} }
[ "func", "NewFEPort", "(", "protocol", "L4Type", ",", "portNumber", "uint16", ")", "*", "FEPort", "{", "return", "&", "FEPort", "{", "L4Addr", ":", "NewL4Addr", "(", "protocol", ",", "portNumber", ")", "}", "\n", "}" ]
// NewFEPort creates a new FEPort with the ID set to 0.
[ "NewFEPort", "creates", "a", "new", "FEPort", "with", "the", "ID", "set", "to", "0", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L232-L234
163,664
cilium/cilium
pkg/loadbalancer/loadbalancer.go
EqualsIgnoreID
func (f *FEPort) EqualsIgnoreID(o *FEPort) bool { switch { case (f == nil) != (o == nil): return false case (f == nil) && (o == nil): return true } return f.L4Addr.Equals(o.L4Addr) }
go
func (f *FEPort) EqualsIgnoreID(o *FEPort) bool { switch { case (f == nil) != (o == nil): return false case (f == nil) && (o == nil): return true } return f.L4Addr.Equals(o.L4Addr) }
[ "func", "(", "f", "*", "FEPort", ")", "EqualsIgnoreID", "(", "o", "*", "FEPort", ")", "bool", "{", "switch", "{", "case", "(", "f", "==", "nil", ")", "!=", "(", "o", "==", "nil", ")", ":", "return", "false", "\n", "case", "(", "f", "==", "nil",...
// EqualsIgnoreID returns true if both L4Addr are considered equal without // comparing its ID.
[ "EqualsIgnoreID", "returns", "true", "if", "both", "L4Addr", "are", "considered", "equal", "without", "comparing", "its", "ID", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L238-L246
163,665
cilium/cilium
pkg/loadbalancer/loadbalancer.go
NewL3n4Addr
func NewL3n4Addr(protocol L4Type, ip net.IP, portNumber uint16) *L3n4Addr { lbport := NewL4Addr(protocol, portNumber) addr := L3n4Addr{IP: ip, L4Addr: *lbport} log.WithField(logfields.IPAddr, addr).Debug("created new L3n4Addr") return &addr }
go
func NewL3n4Addr(protocol L4Type, ip net.IP, portNumber uint16) *L3n4Addr { lbport := NewL4Addr(protocol, portNumber) addr := L3n4Addr{IP: ip, L4Addr: *lbport} log.WithField(logfields.IPAddr, addr).Debug("created new L3n4Addr") return &addr }
[ "func", "NewL3n4Addr", "(", "protocol", "L4Type", ",", "ip", "net", ".", "IP", ",", "portNumber", "uint16", ")", "*", "L3n4Addr", "{", "lbport", ":=", "NewL4Addr", "(", "protocol", ",", "portNumber", ")", "\n\n", "addr", ":=", "L3n4Addr", "{", "IP", ":",...
// NewL3n4Addr creates a new L3n4Addr.
[ "NewL3n4Addr", "creates", "a", "new", "L3n4Addr", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L266-L273
163,666
cilium/cilium
pkg/loadbalancer/loadbalancer.go
NewLBBackEnd
func NewLBBackEnd(id BackendID, protocol L4Type, ip net.IP, portNumber uint16, weight uint16) *LBBackEnd { lbport := NewL4Addr(protocol, portNumber) lbbe := LBBackEnd{ ID: BackendID(id), L3n4Addr: L3n4Addr{IP: ip, L4Addr: *lbport}, Weight: weight, } log.WithField("backend", lbbe).Debug("created new LBBackend") return &lbbe }
go
func NewLBBackEnd(id BackendID, protocol L4Type, ip net.IP, portNumber uint16, weight uint16) *LBBackEnd { lbport := NewL4Addr(protocol, portNumber) lbbe := LBBackEnd{ ID: BackendID(id), L3n4Addr: L3n4Addr{IP: ip, L4Addr: *lbport}, Weight: weight, } log.WithField("backend", lbbe).Debug("created new LBBackend") return &lbbe }
[ "func", "NewLBBackEnd", "(", "id", "BackendID", ",", "protocol", "L4Type", ",", "ip", "net", ".", "IP", ",", "portNumber", "uint16", ",", "weight", "uint16", ")", "*", "LBBackEnd", "{", "lbport", ":=", "NewL4Addr", "(", "protocol", ",", "portNumber", ")", ...
// NewLBBackEnd creates the LBBackEnd struct instance from given params.
[ "NewLBBackEnd", "creates", "the", "LBBackEnd", "struct", "instance", "from", "given", "params", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L303-L313
163,667
cilium/cilium
pkg/loadbalancer/loadbalancer.go
DeepCopy
func (a *L3n4Addr) DeepCopy() *L3n4Addr { copyIP := make(net.IP, len(a.IP)) copy(copyIP, a.IP) return &L3n4Addr{ IP: copyIP, L4Addr: *a.L4Addr.DeepCopy(), } }
go
func (a *L3n4Addr) DeepCopy() *L3n4Addr { copyIP := make(net.IP, len(a.IP)) copy(copyIP, a.IP) return &L3n4Addr{ IP: copyIP, L4Addr: *a.L4Addr.DeepCopy(), } }
[ "func", "(", "a", "*", "L3n4Addr", ")", "DeepCopy", "(", ")", "*", "L3n4Addr", "{", "copyIP", ":=", "make", "(", "net", ".", "IP", ",", "len", "(", "a", ".", "IP", ")", ")", "\n", "copy", "(", "copyIP", ",", "a", ".", "IP", ")", "\n", "return...
// DeepCopy returns a DeepCopy of the given L3n4Addr.
[ "DeepCopy", "returns", "a", "DeepCopy", "of", "the", "given", "L3n4Addr", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L397-L404
163,668
cilium/cilium
pkg/loadbalancer/loadbalancer.go
SHA256Sum
func (a L3n4Addr) SHA256Sum() string { // FIXME: Remove Protocol's omission once we care about protocols. protoBak := a.Protocol a.Protocol = "" defer func() { a.Protocol = protoBak }() str := []byte(fmt.Sprintf("%+v", a)) return fmt.Sprintf("%x", sha512.Sum512_256(str)) }
go
func (a L3n4Addr) SHA256Sum() string { // FIXME: Remove Protocol's omission once we care about protocols. protoBak := a.Protocol a.Protocol = "" defer func() { a.Protocol = protoBak }() str := []byte(fmt.Sprintf("%+v", a)) return fmt.Sprintf("%x", sha512.Sum512_256(str)) }
[ "func", "(", "a", "L3n4Addr", ")", "SHA256Sum", "(", ")", "string", "{", "// FIXME: Remove Protocol's omission once we care about protocols.", "protoBak", ":=", "a", ".", "Protocol", "\n", "a", ".", "Protocol", "=", "\"", "\"", "\n", "defer", "func", "(", ")", ...
// SHA256Sum calculates L3n4Addr's internal SHA256Sum.
[ "SHA256Sum", "calculates", "L3n4Addr", "s", "internal", "SHA256Sum", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L407-L417
163,669
cilium/cilium
pkg/loadbalancer/loadbalancer.go
NewL3n4AddrID
func NewL3n4AddrID(protocol L4Type, ip net.IP, portNumber uint16, id ID) *L3n4AddrID { l3n4Addr := NewL3n4Addr(protocol, ip, portNumber) return &L3n4AddrID{L3n4Addr: *l3n4Addr, ID: id} }
go
func NewL3n4AddrID(protocol L4Type, ip net.IP, portNumber uint16, id ID) *L3n4AddrID { l3n4Addr := NewL3n4Addr(protocol, ip, portNumber) return &L3n4AddrID{L3n4Addr: *l3n4Addr, ID: id} }
[ "func", "NewL3n4AddrID", "(", "protocol", "L4Type", ",", "ip", "net", ".", "IP", ",", "portNumber", "uint16", ",", "id", "ID", ")", "*", "L3n4AddrID", "{", "l3n4Addr", ":=", "NewL3n4Addr", "(", "protocol", ",", "ip", ",", "portNumber", ")", "\n", "return...
// NewL3n4AddrID creates a new L3n4AddrID.
[ "NewL3n4AddrID", "creates", "a", "new", "L3n4AddrID", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L432-L435
163,670
cilium/cilium
pkg/loadbalancer/loadbalancer.go
DeepCopy
func (l *L3n4AddrID) DeepCopy() *L3n4AddrID { return &L3n4AddrID{ L3n4Addr: *l.L3n4Addr.DeepCopy(), ID: l.ID, } }
go
func (l *L3n4AddrID) DeepCopy() *L3n4AddrID { return &L3n4AddrID{ L3n4Addr: *l.L3n4Addr.DeepCopy(), ID: l.ID, } }
[ "func", "(", "l", "*", "L3n4AddrID", ")", "DeepCopy", "(", ")", "*", "L3n4AddrID", "{", "return", "&", "L3n4AddrID", "{", "L3n4Addr", ":", "*", "l", ".", "L3n4Addr", ".", "DeepCopy", "(", ")", ",", "ID", ":", "l", ".", "ID", ",", "}", "\n\n", "}"...
// DeepCopy returns a DeepCopy of the given L3n4AddrID.
[ "DeepCopy", "returns", "a", "DeepCopy", "of", "the", "given", "L3n4AddrID", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L438-L444
163,671
cilium/cilium
pkg/loadbalancer/loadbalancer.go
AddFEnBE
func (svcs SVCMap) AddFEnBE(fe *L3n4AddrID, be *LBBackEnd, beIndex int) *LBSVC { log.WithFields(logrus.Fields{ "frontend": fe, "backend": be, "backendIndex": beIndex, }).Debug("adding frontend and backend to SVCMap") sha := fe.SHA256Sum() var lbsvc LBSVC lbsvc, ok := svcs[sha] if !ok { var bes []LBBackEnd if beIndex == 0 { bes = make([]LBBackEnd, 1) bes[0] = *be } else { bes = make([]LBBackEnd, beIndex) bes[beIndex-1] = *be } lbsvc = LBSVC{ FE: *fe, BES: bes, } } else { var bes []LBBackEnd if len(lbsvc.BES) < beIndex { bes = make([]LBBackEnd, beIndex) for i, lbsvcBE := range lbsvc.BES { bes[i] = lbsvcBE } lbsvc.BES = bes } if beIndex == 0 { lbsvc.BES = append(lbsvc.BES, *be) } else { lbsvc.BES[beIndex-1] = *be } } lbsvc.Sha256 = sha svcs[sha] = lbsvc return &lbsvc }
go
func (svcs SVCMap) AddFEnBE(fe *L3n4AddrID, be *LBBackEnd, beIndex int) *LBSVC { log.WithFields(logrus.Fields{ "frontend": fe, "backend": be, "backendIndex": beIndex, }).Debug("adding frontend and backend to SVCMap") sha := fe.SHA256Sum() var lbsvc LBSVC lbsvc, ok := svcs[sha] if !ok { var bes []LBBackEnd if beIndex == 0 { bes = make([]LBBackEnd, 1) bes[0] = *be } else { bes = make([]LBBackEnd, beIndex) bes[beIndex-1] = *be } lbsvc = LBSVC{ FE: *fe, BES: bes, } } else { var bes []LBBackEnd if len(lbsvc.BES) < beIndex { bes = make([]LBBackEnd, beIndex) for i, lbsvcBE := range lbsvc.BES { bes[i] = lbsvcBE } lbsvc.BES = bes } if beIndex == 0 { lbsvc.BES = append(lbsvc.BES, *be) } else { lbsvc.BES[beIndex-1] = *be } } lbsvc.Sha256 = sha svcs[sha] = lbsvc return &lbsvc }
[ "func", "(", "svcs", "SVCMap", ")", "AddFEnBE", "(", "fe", "*", "L3n4AddrID", ",", "be", "*", "LBBackEnd", ",", "beIndex", "int", ")", "*", "LBSVC", "{", "log", ".", "WithFields", "(", "logrus", ".", "Fields", "{", "\"", "\"", ":", "fe", ",", "\"",...
// AddFEnBE adds the given 'fe' and 'be' to the SVCMap. If 'fe' exists and beIndex is 0, // the new 'be' will be appended to the list of existing backends. If beIndex is bigger // than the size of existing backends slice, it will be created a new array with size of // beIndex and the new 'be' will be inserted on index beIndex-1 of that new array. All // remaining be elements will be kept on the same index and, in case the new array is // larger than the number of backends, some elements will be empty.
[ "AddFEnBE", "adds", "the", "given", "fe", "and", "be", "to", "the", "SVCMap", ".", "If", "fe", "exists", "and", "beIndex", "is", "0", "the", "new", "be", "will", "be", "appended", "to", "the", "list", "of", "existing", "backends", ".", "If", "beIndex",...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/loadbalancer/loadbalancer.go#L457-L499
163,672
cilium/cilium
pkg/bpf/perf_linux.go
allocateBuffers
func (e *PerfEvent) allocateBuffers() { // C.malloc() will crash the program if allocation fails, skip check: // https://golang.org/cmd/cgo/ e.state = C.malloc(C.size_t(unsafe.Sizeof(C.struct_read_state{}))) e.buf = C.malloc(C.size_t(e.pagesize)) }
go
func (e *PerfEvent) allocateBuffers() { // C.malloc() will crash the program if allocation fails, skip check: // https://golang.org/cmd/cgo/ e.state = C.malloc(C.size_t(unsafe.Sizeof(C.struct_read_state{}))) e.buf = C.malloc(C.size_t(e.pagesize)) }
[ "func", "(", "e", "*", "PerfEvent", ")", "allocateBuffers", "(", ")", "{", "// C.malloc() will crash the program if allocation fails, skip check:", "// https://golang.org/cmd/cgo/", "e", ".", "state", "=", "C", ".", "malloc", "(", "C", ".", "size_t", "(", "unsafe", ...
// allocateBuffers initializes the buffers for sharing between Golang and C.
[ "allocateBuffers", "initializes", "the", "buffers", "for", "sharing", "between", "Golang", "and", "C", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/bpf/perf_linux.go#L374-L379
163,673
cilium/cilium
pkg/bpf/perf_linux.go
Debug
func (e *PerfEvent) Debug() string { return fmt.Sprintf("cpu: %d, Fd: %d, pagesize: %d, npages: %d, lost: %d, unknown: %d, state: %v", e.cpu, e.Fd, e.pagesize, e.npages, e.lost, e.unknown, C.GoBytes(e.state, C.sizeof_struct_read_state)) }
go
func (e *PerfEvent) Debug() string { return fmt.Sprintf("cpu: %d, Fd: %d, pagesize: %d, npages: %d, lost: %d, unknown: %d, state: %v", e.cpu, e.Fd, e.pagesize, e.npages, e.lost, e.unknown, C.GoBytes(e.state, C.sizeof_struct_read_state)) }
[ "func", "(", "e", "*", "PerfEvent", ")", "Debug", "(", ")", "string", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "e", ".", "cpu", ",", "e", ".", "Fd", ",", "e", ".", "pagesize", ",", "e", ".", "npages", ",", "e", ".", "lost",...
// Debug returns string with internal information about PerfEvent
[ "Debug", "returns", "string", "with", "internal", "information", "about", "PerfEvent" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/bpf/perf_linux.go#L497-L499
163,674
cilium/cilium
pkg/bpf/perf_linux.go
ReadAll
func (e *PerCpuEvents) ReadAll(receive ReceiveFunc, lost LostFunc, handleError ErrorFunc) error { for i := 0; i < e.poll.nfds; i++ { fd := int(e.poll.events[i].Fd) if event, ok := e.event[fd]; ok { event.Read(receive, lost, handleError) } } return nil }
go
func (e *PerCpuEvents) ReadAll(receive ReceiveFunc, lost LostFunc, handleError ErrorFunc) error { for i := 0; i < e.poll.nfds; i++ { fd := int(e.poll.events[i].Fd) if event, ok := e.event[fd]; ok { event.Read(receive, lost, handleError) } } return nil }
[ "func", "(", "e", "*", "PerCpuEvents", ")", "ReadAll", "(", "receive", "ReceiveFunc", ",", "lost", "LostFunc", ",", "handleError", "ErrorFunc", ")", "error", "{", "for", "i", ":=", "0", ";", "i", "<", "e", ".", "poll", ".", "nfds", ";", "i", "++", ...
// ReadAll reads perf events
[ "ReadAll", "reads", "perf", "events" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/bpf/perf_linux.go#L640-L649
163,675
cilium/cilium
pkg/bpf/perf_linux.go
decode
func decode(i interface{}, reader io.ReadSeeker) error { value := reflect.ValueOf(i).Elem() decodeSize := int64(reflect.TypeOf(value).Size()) if _, err := reader.Seek(decodeSize, io.SeekStart); err != nil { return fmt.Errorf("failed to seek into reader %d bytes", decodeSize) } _, _ = reader.Seek(0, io.SeekStart) for i := 0; i < value.NumField(); i++ { if err := binary.Read(reader, binary.LittleEndian, value.Field(i).Addr().Interface()); err != nil { return fmt.Errorf("failed to decode field %d", i) } } return nil }
go
func decode(i interface{}, reader io.ReadSeeker) error { value := reflect.ValueOf(i).Elem() decodeSize := int64(reflect.TypeOf(value).Size()) if _, err := reader.Seek(decodeSize, io.SeekStart); err != nil { return fmt.Errorf("failed to seek into reader %d bytes", decodeSize) } _, _ = reader.Seek(0, io.SeekStart) for i := 0; i < value.NumField(); i++ { if err := binary.Read(reader, binary.LittleEndian, value.Field(i).Addr().Interface()); err != nil { return fmt.Errorf("failed to decode field %d", i) } } return nil }
[ "func", "decode", "(", "i", "interface", "{", "}", ",", "reader", "io", ".", "ReadSeeker", ")", "error", "{", "value", ":=", "reflect", ".", "ValueOf", "(", "i", ")", ".", "Elem", "(", ")", "\n", "decodeSize", ":=", "int64", "(", "reflect", ".", "T...
// decode uses reflection to read bytes directly from 'reader' into the object // pointed to from 'i'. Assumes that 'i' is a pointer. // // This function should not be used from performance-sensitive code.
[ "decode", "uses", "reflection", "to", "read", "bytes", "directly", "from", "reader", "into", "the", "object", "pointed", "to", "from", "i", ".", "Assumes", "that", "i", "is", "a", "pointer", ".", "This", "function", "should", "not", "be", "used", "from", ...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/bpf/perf_linux.go#L685-L699
163,676
cilium/cilium
pkg/bpf/perf_linux.go
Decode
func (r *ReadState) Decode(reader io.ReadSeeker) error { return decode(r, reader) }
go
func (r *ReadState) Decode(reader io.ReadSeeker) error { return decode(r, reader) }
[ "func", "(", "r", "*", "ReadState", ")", "Decode", "(", "reader", "io", ".", "ReadSeeker", ")", "error", "{", "return", "decode", "(", "r", ",", "reader", ")", "\n", "}" ]
// Decode populates 'r' based on the bytes read from the specified reader. // // This function should not be used from performance-sensitive code.
[ "Decode", "populates", "r", "based", "on", "the", "bytes", "read", "from", "the", "specified", "reader", ".", "This", "function", "should", "not", "be", "used", "from", "performance", "-", "sensitive", "code", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/bpf/perf_linux.go#L711-L713
163,677
cilium/cilium
pkg/bpf/perf_linux.go
Decode
func (p *PerfEventMmapPage) Decode(reader io.ReadSeeker) error { return decode(p, reader) }
go
func (p *PerfEventMmapPage) Decode(reader io.ReadSeeker) error { return decode(p, reader) }
[ "func", "(", "p", "*", "PerfEventMmapPage", ")", "Decode", "(", "reader", "io", ".", "ReadSeeker", ")", "error", "{", "return", "decode", "(", "p", ",", "reader", ")", "\n", "}" ]
// Decode populates 'p' base on the bytes read from the specified reader. // // This function should not be used from performance-sensitive code.
[ "Decode", "populates", "p", "base", "on", "the", "bytes", "read", "from", "the", "specified", "reader", ".", "This", "function", "should", "not", "be", "used", "from", "performance", "-", "sensitive", "code", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/bpf/perf_linux.go#L761-L763
163,678
cilium/cilium
pkg/cgroups/cgroups.go
mountCgroup
func mountCgroup() error { cgroupRootStat, err := os.Stat(cgroupRoot) if err != nil { if os.IsNotExist(err) { if err := os.MkdirAll(cgroupRoot, 0755); err != nil { return fmt.Errorf("Unable to create cgroup mount directory: %s", err) } } else { return fmt.Errorf("Failed to stat the mount path %s: %s", cgroupRoot, err) } } else if !cgroupRootStat.IsDir() { return fmt.Errorf("%s is a file which is not a directory", cgroupRoot) } if err := syscall.Mount("none", cgroupRoot, mountinfo.FilesystemTypeCgroup2, 0, ""); err != nil { return fmt.Errorf("failed to mount %s: %s", cgroupRoot, err) } return nil }
go
func mountCgroup() error { cgroupRootStat, err := os.Stat(cgroupRoot) if err != nil { if os.IsNotExist(err) { if err := os.MkdirAll(cgroupRoot, 0755); err != nil { return fmt.Errorf("Unable to create cgroup mount directory: %s", err) } } else { return fmt.Errorf("Failed to stat the mount path %s: %s", cgroupRoot, err) } } else if !cgroupRootStat.IsDir() { return fmt.Errorf("%s is a file which is not a directory", cgroupRoot) } if err := syscall.Mount("none", cgroupRoot, mountinfo.FilesystemTypeCgroup2, 0, ""); err != nil { return fmt.Errorf("failed to mount %s: %s", cgroupRoot, err) } return nil }
[ "func", "mountCgroup", "(", ")", "error", "{", "cgroupRootStat", ",", "err", ":=", "os", ".", "Stat", "(", "cgroupRoot", ")", "\n", "if", "err", "!=", "nil", "{", "if", "os", ".", "IsNotExist", "(", "err", ")", "{", "if", "err", ":=", "os", ".", ...
// mountCgroup mounts the Cgroup v2 filesystem into the desired cgroupRoot directory.
[ "mountCgroup", "mounts", "the", "Cgroup", "v2", "filesystem", "into", "the", "desired", "cgroupRoot", "directory", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/cgroups/cgroups.go#L50-L69
163,679
cilium/cilium
pkg/cgroups/cgroups.go
CheckOrMountCgrpFS
func CheckOrMountCgrpFS(mapRoot string) { cgrpMountOnce.Do(func() { if mapRoot == "" { mapRoot = cgroupRoot } err := cgrpCheckOrMountLocation(mapRoot) // Failed cgroup2 mount is not a fatal error, sockmap will be disabled however if err == nil { log.Infof("Mounted cgroupv2 filesystem at %s", mapRoot) } }) }
go
func CheckOrMountCgrpFS(mapRoot string) { cgrpMountOnce.Do(func() { if mapRoot == "" { mapRoot = cgroupRoot } err := cgrpCheckOrMountLocation(mapRoot) // Failed cgroup2 mount is not a fatal error, sockmap will be disabled however if err == nil { log.Infof("Mounted cgroupv2 filesystem at %s", mapRoot) } }) }
[ "func", "CheckOrMountCgrpFS", "(", "mapRoot", "string", ")", "{", "cgrpMountOnce", ".", "Do", "(", "func", "(", ")", "{", "if", "mapRoot", "==", "\"", "\"", "{", "mapRoot", "=", "cgroupRoot", "\n", "}", "\n", "err", ":=", "cgrpCheckOrMountLocation", "(", ...
// CheckOrMountCgrpFS this checks if the cilium cgroup2 root mount point is // mounted and if not mounts it. If mapRoot is "" it will mount the default // location. It is harmless to have multiple cgroupv2 root mounts so unlike // BPFFS case we simply mount at the cilium default regardless if the system // has another mount created by systemd or otherwise.
[ "CheckOrMountCgrpFS", "this", "checks", "if", "the", "cilium", "cgroup2", "root", "mount", "point", "is", "mounted", "and", "if", "not", "mounts", "it", ".", "If", "mapRoot", "is", "it", "will", "mount", "the", "default", "location", ".", "It", "is", "harm...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/cgroups/cgroups.go#L100-L111
163,680
cilium/cilium
pkg/proxy/logger/logger.go
fillEndpointInfo
func (lr *LogRecord) fillEndpointInfo(info *accesslog.EndpointInfo, ip net.IP) { if ip.To4() != nil { info.IPv4 = ip.String() // first we try to resolve and check if the IP is // same as Host if node.IsHostIPv4(ip) { lr.endpointInfoRegistry.FillEndpointIdentityByID(identity.ReservedIdentityHost, info) } else if !lr.endpointInfoRegistry.FillEndpointIdentityByIP(ip, info) { // If we are unable to resolve the HostIP as well // as the cluster IP we mark this as a 'world' identity. lr.endpointInfoRegistry.FillEndpointIdentityByID(identity.ReservedIdentityWorld, info) } } else { info.IPv6 = ip.String() if node.IsHostIPv6(ip) { lr.endpointInfoRegistry.FillEndpointIdentityByID(identity.ReservedIdentityHost, info) } else if !lr.endpointInfoRegistry.FillEndpointIdentityByIP(ip, info) { lr.endpointInfoRegistry.FillEndpointIdentityByID(identity.ReservedIdentityWorld, info) } } }
go
func (lr *LogRecord) fillEndpointInfo(info *accesslog.EndpointInfo, ip net.IP) { if ip.To4() != nil { info.IPv4 = ip.String() // first we try to resolve and check if the IP is // same as Host if node.IsHostIPv4(ip) { lr.endpointInfoRegistry.FillEndpointIdentityByID(identity.ReservedIdentityHost, info) } else if !lr.endpointInfoRegistry.FillEndpointIdentityByIP(ip, info) { // If we are unable to resolve the HostIP as well // as the cluster IP we mark this as a 'world' identity. lr.endpointInfoRegistry.FillEndpointIdentityByID(identity.ReservedIdentityWorld, info) } } else { info.IPv6 = ip.String() if node.IsHostIPv6(ip) { lr.endpointInfoRegistry.FillEndpointIdentityByID(identity.ReservedIdentityHost, info) } else if !lr.endpointInfoRegistry.FillEndpointIdentityByIP(ip, info) { lr.endpointInfoRegistry.FillEndpointIdentityByID(identity.ReservedIdentityWorld, info) } } }
[ "func", "(", "lr", "*", "LogRecord", ")", "fillEndpointInfo", "(", "info", "*", "accesslog", ".", "EndpointInfo", ",", "ip", "net", ".", "IP", ")", "{", "if", "ip", ".", "To4", "(", ")", "!=", "nil", "{", "info", ".", "IPv4", "=", "ip", ".", "Str...
// fillEndpointInfo tries to resolve the IP address and fills the EndpointInfo // fields with either ReservedIdentityHost or ReservedIdentityWorld
[ "fillEndpointInfo", "tries", "to", "resolve", "the", "IP", "address", "and", "fills", "the", "EndpointInfo", "fields", "with", "either", "ReservedIdentityHost", "or", "ReservedIdentityWorld" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L122-L144
163,681
cilium/cilium
pkg/proxy/logger/logger.go
fillIngressSourceInfo
func (lr *LogRecord) fillIngressSourceInfo(info *accesslog.EndpointInfo, ip *net.IP, srcIdentity uint32) { if srcIdentity != 0 { if ip != nil { if ip.To4() != nil { info.IPv4 = ip.String() } else { info.IPv6 = ip.String() } } lr.endpointInfoRegistry.FillEndpointIdentityByID(identity.NumericIdentity(srcIdentity), info) } else { // source security identity 0 is possible when somebody else other than // the BPF datapath attempts to // connect to the proxy. // We should try to resolve if the identity belongs to reserved_host // or reserved_world. if ip != nil { lr.fillEndpointInfo(info, *ip) } else { log.Warn("Missing security identity in source endpoint info") } } }
go
func (lr *LogRecord) fillIngressSourceInfo(info *accesslog.EndpointInfo, ip *net.IP, srcIdentity uint32) { if srcIdentity != 0 { if ip != nil { if ip.To4() != nil { info.IPv4 = ip.String() } else { info.IPv6 = ip.String() } } lr.endpointInfoRegistry.FillEndpointIdentityByID(identity.NumericIdentity(srcIdentity), info) } else { // source security identity 0 is possible when somebody else other than // the BPF datapath attempts to // connect to the proxy. // We should try to resolve if the identity belongs to reserved_host // or reserved_world. if ip != nil { lr.fillEndpointInfo(info, *ip) } else { log.Warn("Missing security identity in source endpoint info") } } }
[ "func", "(", "lr", "*", "LogRecord", ")", "fillIngressSourceInfo", "(", "info", "*", "accesslog", ".", "EndpointInfo", ",", "ip", "*", "net", ".", "IP", ",", "srcIdentity", "uint32", ")", "{", "if", "srcIdentity", "!=", "0", "{", "if", "ip", "!=", "nil...
// fillIngressSourceInfo fills the EndpointInfo fields using identity sent by // source. This is needed in ingress proxy while logging the source endpoint // info. Since there will be 2 proxies on the same host, if both egress and // ingress policies are set, the ingress policy cannot determine the source // endpoint info based on ip address, as the ip address would be that of the // egress proxy i.e host.
[ "fillIngressSourceInfo", "fills", "the", "EndpointInfo", "fields", "using", "identity", "sent", "by", "source", ".", "This", "is", "needed", "in", "ingress", "proxy", "while", "logging", "the", "source", "endpoint", "info", ".", "Since", "there", "will", "be", ...
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L152-L174
163,682
cilium/cilium
pkg/proxy/logger/logger.go
fillEgressDestinationInfo
func (lr *LogRecord) fillEgressDestinationInfo(info *accesslog.EndpointInfo, ipstr string) { ip := net.ParseIP(ipstr) if ip != nil { lr.fillEndpointInfo(info, ip) } }
go
func (lr *LogRecord) fillEgressDestinationInfo(info *accesslog.EndpointInfo, ipstr string) { ip := net.ParseIP(ipstr) if ip != nil { lr.fillEndpointInfo(info, ip) } }
[ "func", "(", "lr", "*", "LogRecord", ")", "fillEgressDestinationInfo", "(", "info", "*", "accesslog", ".", "EndpointInfo", ",", "ipstr", "string", ")", "{", "ip", ":=", "net", ".", "ParseIP", "(", "ipstr", ")", "\n", "if", "ip", "!=", "nil", "{", "lr",...
// fillEgressDestinationInfo returns the destination EndpointInfo for a flow // leaving the proxy at egress.
[ "fillEgressDestinationInfo", "returns", "the", "destination", "EndpointInfo", "for", "a", "flow", "leaving", "the", "proxy", "at", "egress", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L178-L183
163,683
cilium/cilium
pkg/proxy/logger/logger.go
Verdict
func (logTags) Verdict(v accesslog.FlowVerdict, info string) LogTag { return func(lr *LogRecord) { lr.Verdict = v lr.Info = info } }
go
func (logTags) Verdict(v accesslog.FlowVerdict, info string) LogTag { return func(lr *LogRecord) { lr.Verdict = v lr.Info = info } }
[ "func", "(", "logTags", ")", "Verdict", "(", "v", "accesslog", ".", "FlowVerdict", ",", "info", "string", ")", "LogTag", "{", "return", "func", "(", "lr", "*", "LogRecord", ")", "{", "lr", ".", "Verdict", "=", "v", "\n", "lr", ".", "Info", "=", "in...
// Verdict attachs verdict information to the log record
[ "Verdict", "attachs", "verdict", "information", "to", "the", "log", "record" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L195-L200
163,684
cilium/cilium
pkg/proxy/logger/logger.go
Timestamp
func (logTags) Timestamp(ts time.Time) LogTag { return func(lr *LogRecord) { lr.Timestamp = ts.UTC().Format(time.RFC3339Nano) } }
go
func (logTags) Timestamp(ts time.Time) LogTag { return func(lr *LogRecord) { lr.Timestamp = ts.UTC().Format(time.RFC3339Nano) } }
[ "func", "(", "logTags", ")", "Timestamp", "(", "ts", "time", ".", "Time", ")", "LogTag", "{", "return", "func", "(", "lr", "*", "LogRecord", ")", "{", "lr", ".", "Timestamp", "=", "ts", ".", "UTC", "(", ")", ".", "Format", "(", "time", ".", "RFC3...
// Timestamp overwrites the starting timestamp of the log record
[ "Timestamp", "overwrites", "the", "starting", "timestamp", "of", "the", "log", "record" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L203-L207
163,685
cilium/cilium
pkg/proxy/logger/logger.go
Addressing
func (logTags) Addressing(i AddressingInfo) LogTag { return func(lr *LogRecord) { switch lr.ObservationPoint { case accesslog.Ingress: lr.DestinationEndpoint = *lr.localEndpointInfo case accesslog.Egress: lr.SourceEndpoint = *lr.localEndpointInfo } ipstr, port, err := net.SplitHostPort(i.SrcIPPort) if err == nil { ip := net.ParseIP(ipstr) if ip != nil && ip.To4() == nil { lr.IPVersion = accesslog.VersionIPV6 } p, err := strconv.ParseUint(port, 10, 16) if err == nil { lr.SourceEndpoint.Port = uint16(p) if lr.ObservationPoint == accesslog.Ingress { lr.fillIngressSourceInfo(&lr.SourceEndpoint, &ip, i.SrcIdentity) } } } ipstr, port, err = net.SplitHostPort(i.DstIPPort) if err == nil { p, err := strconv.ParseUint(port, 10, 16) if err == nil { lr.DestinationEndpoint.Port = uint16(p) if lr.ObservationPoint == accesslog.Egress { lr.fillEgressDestinationInfo(&lr.DestinationEndpoint, ipstr) } } } } }
go
func (logTags) Addressing(i AddressingInfo) LogTag { return func(lr *LogRecord) { switch lr.ObservationPoint { case accesslog.Ingress: lr.DestinationEndpoint = *lr.localEndpointInfo case accesslog.Egress: lr.SourceEndpoint = *lr.localEndpointInfo } ipstr, port, err := net.SplitHostPort(i.SrcIPPort) if err == nil { ip := net.ParseIP(ipstr) if ip != nil && ip.To4() == nil { lr.IPVersion = accesslog.VersionIPV6 } p, err := strconv.ParseUint(port, 10, 16) if err == nil { lr.SourceEndpoint.Port = uint16(p) if lr.ObservationPoint == accesslog.Ingress { lr.fillIngressSourceInfo(&lr.SourceEndpoint, &ip, i.SrcIdentity) } } } ipstr, port, err = net.SplitHostPort(i.DstIPPort) if err == nil { p, err := strconv.ParseUint(port, 10, 16) if err == nil { lr.DestinationEndpoint.Port = uint16(p) if lr.ObservationPoint == accesslog.Egress { lr.fillEgressDestinationInfo(&lr.DestinationEndpoint, ipstr) } } } } }
[ "func", "(", "logTags", ")", "Addressing", "(", "i", "AddressingInfo", ")", "LogTag", "{", "return", "func", "(", "lr", "*", "LogRecord", ")", "{", "switch", "lr", ".", "ObservationPoint", "{", "case", "accesslog", ".", "Ingress", ":", "lr", ".", "Destin...
// Addressing attaches addressing information about the source and destination // to the logrecord
[ "Addressing", "attaches", "addressing", "information", "about", "the", "source", "and", "destination", "to", "the", "logrecord" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L218-L254
163,686
cilium/cilium
pkg/proxy/logger/logger.go
HTTP
func (logTags) HTTP(h *accesslog.LogRecordHTTP) LogTag { return func(lr *LogRecord) { lr.HTTP = h } }
go
func (logTags) HTTP(h *accesslog.LogRecordHTTP) LogTag { return func(lr *LogRecord) { lr.HTTP = h } }
[ "func", "(", "logTags", ")", "HTTP", "(", "h", "*", "accesslog", ".", "LogRecordHTTP", ")", "LogTag", "{", "return", "func", "(", "lr", "*", "LogRecord", ")", "{", "lr", ".", "HTTP", "=", "h", "\n", "}", "\n", "}" ]
// HTTP attaches HTTP information to the log record
[ "HTTP", "attaches", "HTTP", "information", "to", "the", "log", "record" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L257-L261
163,687
cilium/cilium
pkg/proxy/logger/logger.go
Kafka
func (logTags) Kafka(k *accesslog.LogRecordKafka) LogTag { return func(lr *LogRecord) { lr.Kafka = k } }
go
func (logTags) Kafka(k *accesslog.LogRecordKafka) LogTag { return func(lr *LogRecord) { lr.Kafka = k } }
[ "func", "(", "logTags", ")", "Kafka", "(", "k", "*", "accesslog", ".", "LogRecordKafka", ")", "LogTag", "{", "return", "func", "(", "lr", "*", "LogRecord", ")", "{", "lr", ".", "Kafka", "=", "k", "\n", "}", "\n", "}" ]
// Kafka attaches Kafka information to the log record
[ "Kafka", "attaches", "Kafka", "information", "to", "the", "log", "record" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L264-L268
163,688
cilium/cilium
pkg/proxy/logger/logger.go
DNS
func (logTags) DNS(d *accesslog.LogRecordDNS) LogTag { return func(lr *LogRecord) { lr.DNS = d } }
go
func (logTags) DNS(d *accesslog.LogRecordDNS) LogTag { return func(lr *LogRecord) { lr.DNS = d } }
[ "func", "(", "logTags", ")", "DNS", "(", "d", "*", "accesslog", ".", "LogRecordDNS", ")", "LogTag", "{", "return", "func", "(", "lr", "*", "LogRecord", ")", "{", "lr", ".", "DNS", "=", "d", "\n", "}", "\n", "}" ]
// DNS attaches DNS information to the log record
[ "DNS", "attaches", "DNS", "information", "to", "the", "log", "record" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L271-L275
163,689
cilium/cilium
pkg/proxy/logger/logger.go
L7
func (logTags) L7(h *accesslog.LogRecordL7) LogTag { return func(lr *LogRecord) { lr.L7 = h } }
go
func (logTags) L7(h *accesslog.LogRecordL7) LogTag { return func(lr *LogRecord) { lr.L7 = h } }
[ "func", "(", "logTags", ")", "L7", "(", "h", "*", "accesslog", ".", "LogRecordL7", ")", "LogTag", "{", "return", "func", "(", "lr", "*", "LogRecord", ")", "{", "lr", ".", "L7", "=", "h", "\n", "}", "\n", "}" ]
// L7 attaches generic L7 information to the log record
[ "L7", "attaches", "generic", "L7", "information", "to", "the", "log", "record" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L278-L282
163,690
cilium/cilium
pkg/proxy/logger/logger.go
Log
func (lr *LogRecord) Log() { flowdebug.Log(lr.getLogFields(), "Logging flow record") // Lock while writing access log so we serialize writes as we may have // to reopen the logfile and parallel writes could fail because of that logMutex.Lock() defer logMutex.Unlock() lr.Metadata = metadata if notifier != nil { notifier.NewProxyLogRecord(lr) } if logger == nil { flowdebug.Log(log.WithField(FieldFilePath, logPath), "Skipping writing to access log (logger nil)") return } if _, err := logger.Write(lr.getRawLogMessage()); err != nil { log.WithError(err).WithField(FieldFilePath, logPath). Errorf("Error writing to access file") } }
go
func (lr *LogRecord) Log() { flowdebug.Log(lr.getLogFields(), "Logging flow record") // Lock while writing access log so we serialize writes as we may have // to reopen the logfile and parallel writes could fail because of that logMutex.Lock() defer logMutex.Unlock() lr.Metadata = metadata if notifier != nil { notifier.NewProxyLogRecord(lr) } if logger == nil { flowdebug.Log(log.WithField(FieldFilePath, logPath), "Skipping writing to access log (logger nil)") return } if _, err := logger.Write(lr.getRawLogMessage()); err != nil { log.WithError(err).WithField(FieldFilePath, logPath). Errorf("Error writing to access file") } }
[ "func", "(", "lr", "*", "LogRecord", ")", "Log", "(", ")", "{", "flowdebug", ".", "Log", "(", "lr", ".", "getLogFields", "(", ")", ",", "\"", "\"", ")", "\n\n", "// Lock while writing access log so we serialize writes as we may have", "// to reopen the logfile and p...
// Log logs a record to the logfile and flushes the buffer
[ "Log", "logs", "a", "record", "to", "the", "logfile", "and", "flushes", "the", "buffer" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L333-L357
163,691
cilium/cilium
pkg/proxy/logger/logger.go
openLogfileLocked
func openLogfileLocked(lf string) error { logPath = lf log.WithField(FieldFilePath, logPath).Info("Opened access log") logger = &lumberjack.Logger{ Filename: lf, MaxSize: 100, // megabytes MaxBackups: 3, MaxAge: 28, //days Compress: true, // disabled by default } return nil }
go
func openLogfileLocked(lf string) error { logPath = lf log.WithField(FieldFilePath, logPath).Info("Opened access log") logger = &lumberjack.Logger{ Filename: lf, MaxSize: 100, // megabytes MaxBackups: 3, MaxAge: 28, //days Compress: true, // disabled by default } return nil }
[ "func", "openLogfileLocked", "(", "lf", "string", ")", "error", "{", "logPath", "=", "lf", "\n", "log", ".", "WithField", "(", "FieldFilePath", ",", "logPath", ")", ".", "Info", "(", "\"", "\"", ")", "\n\n", "logger", "=", "&", "lumberjack", ".", "Logg...
// Called with lock held
[ "Called", "with", "lock", "held" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L360-L373
163,692
cilium/cilium
pkg/proxy/logger/logger.go
OpenLogfile
func OpenLogfile(lf string) error { logMutex.Lock() defer logMutex.Unlock() return openLogfileLocked(lf) }
go
func OpenLogfile(lf string) error { logMutex.Lock() defer logMutex.Unlock() return openLogfileLocked(lf) }
[ "func", "OpenLogfile", "(", "lf", "string", ")", "error", "{", "logMutex", ".", "Lock", "(", ")", "\n", "defer", "logMutex", ".", "Unlock", "(", ")", "\n\n", "return", "openLogfileLocked", "(", "lf", ")", "\n", "}" ]
// OpenLogfile opens a file for logging
[ "OpenLogfile", "opens", "a", "file", "for", "logging" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/proxy/logger/logger.go#L382-L387
163,693
cilium/cilium
pkg/endpoint/endpoint_status.go
GetCiliumEndpointStatus
func (e *Endpoint) GetCiliumEndpointStatus() *cilium_v2.EndpointStatus { e.mutex.RLock() defer e.mutex.RUnlock() model := e.GetModelRLocked() modelStatus := model.Status controllers := getEndpointStatusControllers(modelStatus) identity := getEndpointIdentity(modelStatus) log := e.getEndpointStatusLog() networking := getEndpointNetworking(modelStatus) return &cilium_v2.EndpointStatus{ ID: int64(e.ID), ExternalIdentifiers: modelStatus.ExternalIdentifiers, Controllers: controllers, Identity: identity, Log: log, Networking: networking, Health: modelStatus.Health, State: string(modelStatus.State), Policy: e.getEndpointPolicy(), // Scheduled for deprecation in 1.5 // // Status is deprecated but we have some users depending on // these fields so they continue to be populated until version // 1.5 Status: &cilium_v2.DeprecatedEndpointStatus{ Controllers: controllers, Identity: identity, Log: log, Networking: networking, }, } }
go
func (e *Endpoint) GetCiliumEndpointStatus() *cilium_v2.EndpointStatus { e.mutex.RLock() defer e.mutex.RUnlock() model := e.GetModelRLocked() modelStatus := model.Status controllers := getEndpointStatusControllers(modelStatus) identity := getEndpointIdentity(modelStatus) log := e.getEndpointStatusLog() networking := getEndpointNetworking(modelStatus) return &cilium_v2.EndpointStatus{ ID: int64(e.ID), ExternalIdentifiers: modelStatus.ExternalIdentifiers, Controllers: controllers, Identity: identity, Log: log, Networking: networking, Health: modelStatus.Health, State: string(modelStatus.State), Policy: e.getEndpointPolicy(), // Scheduled for deprecation in 1.5 // // Status is deprecated but we have some users depending on // these fields so they continue to be populated until version // 1.5 Status: &cilium_v2.DeprecatedEndpointStatus{ Controllers: controllers, Identity: identity, Log: log, Networking: networking, }, } }
[ "func", "(", "e", "*", "Endpoint", ")", "GetCiliumEndpointStatus", "(", ")", "*", "cilium_v2", ".", "EndpointStatus", "{", "e", ".", "mutex", ".", "RLock", "(", ")", "\n", "defer", "e", ".", "mutex", ".", "RUnlock", "(", ")", "\n\n", "model", ":=", "...
// GetCiliumEndpointStatus creates a cilium_v2.EndpointStatus of an endpoint. // See cilium_v2.EndpointStatus for a detailed explanation of each field.
[ "GetCiliumEndpointStatus", "creates", "a", "cilium_v2", ".", "EndpointStatus", "of", "an", "endpoint", ".", "See", "cilium_v2", ".", "EndpointStatus", "for", "a", "detailed", "explanation", "of", "each", "field", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/endpoint/endpoint_status.go#L216-L251
163,694
cilium/cilium
api/v1/client/daemon/get_map_name_parameters.go
WithTimeout
func (o *GetMapNameParams) WithTimeout(timeout time.Duration) *GetMapNameParams { o.SetTimeout(timeout) return o }
go
func (o *GetMapNameParams) WithTimeout(timeout time.Duration) *GetMapNameParams { o.SetTimeout(timeout) return o }
[ "func", "(", "o", "*", "GetMapNameParams", ")", "WithTimeout", "(", "timeout", "time", ".", "Duration", ")", "*", "GetMapNameParams", "{", "o", ".", "SetTimeout", "(", "timeout", ")", "\n", "return", "o", "\n", "}" ]
// WithTimeout adds the timeout to the get map name params
[ "WithTimeout", "adds", "the", "timeout", "to", "the", "get", "map", "name", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/get_map_name_parameters.go#L76-L79
163,695
cilium/cilium
api/v1/client/daemon/get_map_name_parameters.go
WithContext
func (o *GetMapNameParams) WithContext(ctx context.Context) *GetMapNameParams { o.SetContext(ctx) return o }
go
func (o *GetMapNameParams) WithContext(ctx context.Context) *GetMapNameParams { o.SetContext(ctx) return o }
[ "func", "(", "o", "*", "GetMapNameParams", ")", "WithContext", "(", "ctx", "context", ".", "Context", ")", "*", "GetMapNameParams", "{", "o", ".", "SetContext", "(", "ctx", ")", "\n", "return", "o", "\n", "}" ]
// WithContext adds the context to the get map name params
[ "WithContext", "adds", "the", "context", "to", "the", "get", "map", "name", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/get_map_name_parameters.go#L87-L90
163,696
cilium/cilium
api/v1/client/daemon/get_map_name_parameters.go
WithHTTPClient
func (o *GetMapNameParams) WithHTTPClient(client *http.Client) *GetMapNameParams { o.SetHTTPClient(client) return o }
go
func (o *GetMapNameParams) WithHTTPClient(client *http.Client) *GetMapNameParams { o.SetHTTPClient(client) return o }
[ "func", "(", "o", "*", "GetMapNameParams", ")", "WithHTTPClient", "(", "client", "*", "http", ".", "Client", ")", "*", "GetMapNameParams", "{", "o", ".", "SetHTTPClient", "(", "client", ")", "\n", "return", "o", "\n", "}" ]
// WithHTTPClient adds the HTTPClient to the get map name params
[ "WithHTTPClient", "adds", "the", "HTTPClient", "to", "the", "get", "map", "name", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/get_map_name_parameters.go#L98-L101
163,697
cilium/cilium
api/v1/client/daemon/get_map_name_parameters.go
WithName
func (o *GetMapNameParams) WithName(name string) *GetMapNameParams { o.SetName(name) return o }
go
func (o *GetMapNameParams) WithName(name string) *GetMapNameParams { o.SetName(name) return o }
[ "func", "(", "o", "*", "GetMapNameParams", ")", "WithName", "(", "name", "string", ")", "*", "GetMapNameParams", "{", "o", ".", "SetName", "(", "name", ")", "\n", "return", "o", "\n", "}" ]
// WithName adds the name to the get map name params
[ "WithName", "adds", "the", "name", "to", "the", "get", "map", "name", "params" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/client/daemon/get_map_name_parameters.go#L109-L112
163,698
cilium/cilium
pkg/maps/sockmap/sockmap.go
NewSockmapKey
func NewSockmapKey(dip, sip net.IP, sport, dport uint32) SockmapKey { result := SockmapKey{} if sip4 := sip.To4(); sip4 != nil { result.Family = bpf.EndpointKeyIPv4 copy(result.SIP[:], sip4) } else { result.Family = bpf.EndpointKeyIPv6 copy(result.SIP[:], sip) } if dip4 := dip.To4(); dip4 != nil { result.Family = bpf.EndpointKeyIPv4 copy(result.SIP[:], dip4) } else { result.Family = bpf.EndpointKeyIPv6 copy(result.DIP[:], dip) } result.DPort = dport result.SPort = sport return result }
go
func NewSockmapKey(dip, sip net.IP, sport, dport uint32) SockmapKey { result := SockmapKey{} if sip4 := sip.To4(); sip4 != nil { result.Family = bpf.EndpointKeyIPv4 copy(result.SIP[:], sip4) } else { result.Family = bpf.EndpointKeyIPv6 copy(result.SIP[:], sip) } if dip4 := dip.To4(); dip4 != nil { result.Family = bpf.EndpointKeyIPv4 copy(result.SIP[:], dip4) } else { result.Family = bpf.EndpointKeyIPv6 copy(result.DIP[:], dip) } result.DPort = dport result.SPort = sport return result }
[ "func", "NewSockmapKey", "(", "dip", ",", "sip", "net", ".", "IP", ",", "sport", ",", "dport", "uint32", ")", "SockmapKey", "{", "result", ":=", "SockmapKey", "{", "}", "\n\n", "if", "sip4", ":=", "sip", ".", "To4", "(", ")", ";", "sip4", "!=", "ni...
// NewSockmapKey returns a new key using 5-tuple input.
[ "NewSockmapKey", "returns", "a", "new", "key", "using", "5", "-", "tuple", "input", "." ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/pkg/maps/sockmap/sockmap.go#L65-L87
163,699
cilium/cilium
api/v1/server/restapi/policy/delete_policy.go
NewDeletePolicy
func NewDeletePolicy(ctx *middleware.Context, handler DeletePolicyHandler) *DeletePolicy { return &DeletePolicy{Context: ctx, Handler: handler} }
go
func NewDeletePolicy(ctx *middleware.Context, handler DeletePolicyHandler) *DeletePolicy { return &DeletePolicy{Context: ctx, Handler: handler} }
[ "func", "NewDeletePolicy", "(", "ctx", "*", "middleware", ".", "Context", ",", "handler", "DeletePolicyHandler", ")", "*", "DeletePolicy", "{", "return", "&", "DeletePolicy", "{", "Context", ":", "ctx", ",", "Handler", ":", "handler", "}", "\n", "}" ]
// NewDeletePolicy creates a new http.Handler for the delete policy operation
[ "NewDeletePolicy", "creates", "a", "new", "http", ".", "Handler", "for", "the", "delete", "policy", "operation" ]
6ecfff82c2314dd9d847645361b57e2646eed64b
https://github.com/cilium/cilium/blob/6ecfff82c2314dd9d847645361b57e2646eed64b/api/v1/server/restapi/policy/delete_policy.go#L28-L30